2 * Copyright (c) 2012, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
24 * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
25 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
26 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
27 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
29 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
31 * OF THE POSSIBILITY OF SUCH DAMAGE.
41 #include <tr_cfgwatch.h>
42 #include <tr_config.h>
44 #include <tr_filter.h>
45 #include <trust_router/tr_constraint.h>
49 void tr_print_config (FILE *stream, TR_CFG *cfg) {
50 fprintf(stream, "tr_print_config: Not yet implemented.");
54 TR_CFG *tr_cfg_new(TALLOC_CTX *mem_ctx)
56 return talloc_zero(mem_ctx, TR_CFG);
59 void tr_cfg_free (TR_CFG *cfg) {
63 TR_CFG_MGR *tr_cfg_mgr_new(TALLOC_CTX *mem_ctx)
65 return talloc_zero(mem_ctx, TR_CFG_MGR);
68 void tr_cfg_mgr_free (TR_CFG_MGR *cfg_mgr) {
72 TR_CFG_RC tr_apply_new_config (TR_CFG_MGR *cfg_mgr)
74 /* cfg_mgr->active is allowed to be null, but new cannot be */
75 if ((cfg_mgr==NULL) || (cfg_mgr->new==NULL))
76 return TR_CFG_BAD_PARAMS;
78 if (cfg_mgr->active != NULL)
79 tr_cfg_free(cfg_mgr->active);
81 cfg_mgr->active = cfg_mgr->new;
82 cfg_mgr->new=NULL; /* only keep a single handle on the new configuration */
84 tr_log_threshold(cfg_mgr->active->internal->log_threshold);
85 tr_console_threshold(cfg_mgr->active->internal->console_threshold);
87 return TR_CFG_SUCCESS;
90 static TR_CFG_RC tr_cfg_parse_internal (TR_CFG *trc, json_t *jcfg) {
93 json_t *jtidsp = NULL;
94 json_t *jtrpsp = NULL;
95 json_t *jhname = NULL;
97 json_t *jconthres = NULL;
98 json_t *jlogthres = NULL;
99 json_t *jcfgpoll = NULL;
100 json_t *jcfgsettle = NULL;
101 json_t *jroutesweep = NULL;
102 json_t *jrouteupdate = NULL;
103 json_t *jrouteconnect = NULL;
105 if ((!trc) || (!jcfg))
106 return TR_CFG_BAD_PARAMS;
108 if (NULL == trc->internal) {
109 if (NULL == (trc->internal = talloc_zero(trc, TR_CFG_INTERNAL)))
113 if (NULL != (jint = json_object_get(jcfg, "tr_internal"))) {
114 if (NULL != (jmtd = json_object_get(jint, "max_tree_depth"))) {
115 if (json_is_number(jmtd)) {
116 trc->internal->max_tree_depth = json_integer_value(jmtd);
118 tr_debug("tr_cfg_parse_internal: Parsing error, max_tree_depth is not a number.");
119 return TR_CFG_NOPARSE;
122 /* If not configured, use the default */
123 trc->internal->max_tree_depth = TR_DEFAULT_MAX_TREE_DEPTH;
125 if (NULL != (jtidsp = json_object_get(jint, "tids_port"))) {
126 if (json_is_number(jtidsp)) {
127 trc->internal->tids_port = json_integer_value(jtidsp);
129 tr_debug("tr_cfg_parse_internal: Parsing error, tids_port is not a number.");
130 return TR_CFG_NOPARSE;
133 /* If not configured, use the default */
134 trc->internal->tids_port = TR_DEFAULT_TIDS_PORT;
136 if (NULL != (jtrpsp = json_object_get(jint, "trps_port"))) {
137 if (json_is_number(jtrpsp)) {
138 trc->internal->trps_port = json_integer_value(jtrpsp);
140 tr_debug("tr_cfg_parse_internal: Parsing error, trps_port is not a number.");
141 return TR_CFG_NOPARSE;
144 /* If not configured, use the default */
145 trc->internal->trps_port = TR_DEFAULT_TRPS_PORT;
147 if (NULL != (jhname = json_object_get(jint, "hostname"))) {
148 if (json_is_string(jhname)) {
149 trc->internal->hostname = json_string_value(jhname);
151 tr_debug("tr_cfg_parse_internal: Parsing error, hostname is not a string.");
152 return TR_CFG_NOPARSE;
155 if (NULL != (jcfgpoll = json_object_get(jint, "cfg_poll_interval"))) {
156 if (json_is_number(jcfgpoll)) {
157 trc->internal->cfg_poll_interval = json_integer_value(jcfgpoll);
159 tr_debug("tr_cfg_parse_internal: Parsing error, cfg_poll_interval is not a number.");
160 return TR_CFG_NOPARSE;
163 trc->internal->cfg_poll_interval = TR_CFGWATCH_DEFAULT_POLL;
166 if (NULL != (jcfgsettle = json_object_get(jint, "cfg_settling_time"))) {
167 if (json_is_number(jcfgsettle)) {
168 trc->internal->cfg_settling_time = json_integer_value(jcfgsettle);
170 tr_debug("tr_cfg_parse_internal: Parsing error, cfg_settling_time is not a number.");
171 return TR_CFG_NOPARSE;
174 trc->internal->cfg_settling_time = TR_CFGWATCH_DEFAULT_SETTLE;
177 if (NULL != (jrouteconnect = json_object_get(jint, "trp_connect_interval"))) {
178 if (json_is_number(jrouteconnect)) {
179 trc->internal->trp_connect_interval = json_integer_value(jrouteconnect);
181 tr_debug("tr_cfg_parse_internal: Parsing error, trp_connect_interval is not a number.");
182 return TR_CFG_NOPARSE;
185 /* if not configured, use the default */
186 trc->internal->trp_connect_interval=TR_DEFAULT_TRP_CONNECT_INTERVAL;
189 if (NULL != (jroutesweep = json_object_get(jint, "trp_sweep_interval"))) {
190 if (json_is_number(jroutesweep)) {
191 trc->internal->trp_sweep_interval = json_integer_value(jroutesweep);
193 tr_debug("tr_cfg_parse_internal: Parsing error, trp_sweep_interval is not a number.");
194 return TR_CFG_NOPARSE;
197 /* if not configured, use the default */
198 trc->internal->trp_sweep_interval=TR_DEFAULT_TRP_SWEEP_INTERVAL;
201 if (NULL != (jrouteupdate = json_object_get(jint, "trp_update_interval"))) {
202 if (json_is_number(jrouteupdate)) {
203 trc->internal->trp_update_interval = json_integer_value(jrouteupdate);
205 tr_debug("tr_cfg_parse_internal: Parsing error, trp_update_interval is not a number.");
206 return TR_CFG_NOPARSE;
209 /* if not configured, use the default */
210 trc->internal->trp_update_interval=TR_DEFAULT_TRP_UPDATE_INTERVAL;
213 if (NULL != (jlog = json_object_get(jint, "logging"))) {
214 if (NULL != (jlogthres = json_object_get(jlog, "log_threshold"))) {
215 if (json_is_string(jlogthres)) {
216 trc->internal->log_threshold = str2sev(json_string_value(jlogthres));
218 tr_debug("tr_cfg_parse_internal: Parsing error, log_threshold is not a string.");
219 return TR_CFG_NOPARSE;
222 /* If not configured, use the default */
223 trc->internal->log_threshold = TR_DEFAULT_LOG_THRESHOLD;
226 if (NULL != (jconthres = json_object_get(jlog, "console_threshold"))) {
227 if (json_is_string(jconthres)) {
228 trc->internal->console_threshold = str2sev(json_string_value(jconthres));
230 tr_debug("tr_cfg_parse_internal: Parsing error, console_threshold is not a string.");
231 return TR_CFG_NOPARSE;
234 /* If not configured, use the default */
235 trc->internal->console_threshold = TR_DEFAULT_CONSOLE_THRESHOLD;
238 /* If not configured, use the default */
239 trc->internal->console_threshold = TR_DEFAULT_CONSOLE_THRESHOLD;
240 trc->internal->log_threshold = TR_DEFAULT_LOG_THRESHOLD;
243 tr_debug("tr_cfg_parse_internal: Internal config parsed.");
244 return TR_CFG_SUCCESS;
246 return TR_CFG_SUCCESS;
249 static TR_CONSTRAINT *tr_cfg_parse_one_constraint (TR_CFG *trc, char *ctype, json_t *jc, TR_CFG_RC *rc)
254 if ((!trc) || (!ctype) || (!jc) || (!rc) ||
255 (!json_is_array(jc)) ||
256 (0 >= json_array_size(jc)) ||
257 (TR_MAX_CONST_MATCHES < json_array_size(jc)) ||
258 (!json_is_string(json_array_get(jc, 0)))) {
259 tr_debug("tr_cfg_parse_one_constraint: config error.");
260 *rc = TR_CFG_NOPARSE;
264 if (NULL == (cons = talloc_zero(trc, TR_CONSTRAINT))) {
265 tr_debug("tr_cfg_parse_one_constraint: Out of memory (cons).");
270 if (NULL == (cons->type = tr_new_name(ctype))) {
271 tr_debug("tr_cfg_parse_one_constraint: Out of memory (type).");
276 for (i = 0; i < json_array_size(jc); i++) {
277 cons->matches[i] = tr_new_name((char *)(json_string_value(json_array_get(jc, i))));
283 static TR_FILTER *tr_cfg_parse_one_filter (TR_CFG *trc, json_t *jfilt, TR_CFG_RC *rc)
285 TR_FILTER *filt = NULL;
286 json_t *jftype = NULL;
288 json_t *jfaction = NULL;
289 json_t *jfspecs = NULL;
290 json_t *jffield = NULL;
291 json_t *jfmatch = NULL;
296 if ((NULL == (jftype = json_object_get(jfilt, "type"))) ||
297 (!json_is_string(jftype))) {
298 tr_debug("tr_cfg_parse_one_filter: Error parsing filter type.");
299 *rc = TR_CFG_NOPARSE;
303 if ((NULL == (jfls = json_object_get(jfilt, "filter_lines"))) ||
304 (!json_is_array(jfls))) {
305 tr_debug("tr_cfg_parse_one_filter: Error parsing filter type.");
306 *rc = TR_CFG_NOPARSE;
310 if (TR_MAX_FILTER_LINES < json_array_size(jfls)) {
311 tr_debug("tr_cfg_parse_one_filter: Filter has too many filter_lines, maximimum of %d.", TR_MAX_FILTER_LINES);
312 *rc = TR_CFG_NOPARSE;
316 if (NULL == (filt = talloc_zero(trc, TR_FILTER))) {
317 tr_debug("tr_cfg_parse_one_filter: Out of memory.");
322 if (!strcmp(json_string_value(jftype), "rp_permitted")) {
323 filt->type = TR_FILTER_TYPE_RP_PERMITTED;
326 tr_debug("tr_cfg_parse_one_filter: Error parsing filter type, unknown type '%s'.", json_string_value(jftype));
327 *rc = TR_CFG_NOPARSE;
328 tr_filter_free(filt);
332 /* For each filter line... */
333 for (i = 0; i < json_array_size(jfls); i++) {
335 if ((NULL == (jfaction = json_object_get(json_array_get(jfls, i), "action"))) ||
336 (!json_is_string(jfaction))) {
337 tr_debug("tr_cfg_parse_one_filter: Error parsing filter action.");
338 *rc = TR_CFG_NOPARSE;
339 tr_filter_free(filt);
343 if ((NULL == (jfspecs = json_object_get(json_array_get(jfls, i), "filter_specs"))) ||
344 (!json_is_array(jfspecs)) ||
345 (0 == json_array_size(jfspecs))) {
346 tr_debug("tr_cfg_parse_one_filter: Error parsing filter specs.");
347 *rc = TR_CFG_NOPARSE;
348 tr_filter_free(filt);
352 if (TR_MAX_FILTER_SPECS < json_array_size(jfspecs)) {
353 tr_debug("tr_cfg_parse_one_filter: Filter has too many filter_specs, maximimum of %d.", TR_MAX_FILTER_SPECS);
354 *rc = TR_CFG_NOPARSE;
355 tr_filter_free(filt);
359 if (NULL == (filt->lines[i] = talloc_zero(trc, TR_FLINE))) {
360 tr_debug("tr_cfg_parse_one_filter: Out of memory (fline).");
362 tr_filter_free(filt);
366 if (!strcmp(json_string_value(jfaction), "accept")) {
367 filt->lines[i]->action = TR_FILTER_ACTION_ACCEPT;
369 else if (!strcmp(json_string_value(jfaction), "reject")) {
370 filt->lines[i]->action = TR_FILTER_ACTION_REJECT;
373 tr_debug("tr_cfg_parse_one_filter: Error parsing filter action, unknown action' %s'.", json_string_value(jfaction));
374 *rc = TR_CFG_NOPARSE;
375 tr_filter_free(filt);
379 if ((NULL != (jrc = json_object_get(json_array_get(jfls, i), "realm_constraints"))) &&
380 (json_is_array(jrc)) &&
381 (0 != json_array_size(jrc)) &&
382 (TR_MAX_CONST_MATCHES >= json_array_size(jrc))) {
384 if (NULL == (filt->lines[i]->realm_cons = tr_cfg_parse_one_constraint(trc, "realm", jrc, rc))) {
385 tr_debug("tr_cfg_parse_one_filter: Error parsing realm constraint");
386 tr_filter_free(filt);
391 if ((NULL != (jdc = json_object_get(json_array_get(jfls, i), "domain_constraints"))) &&
392 (json_is_array(jdc)) &&
393 (0 != json_array_size(jdc)) &&
394 (TR_MAX_CONST_MATCHES >= json_array_size(jdc))) {
396 if (NULL == (filt->lines[i]->domain_cons = tr_cfg_parse_one_constraint(trc, "domain", jdc, rc))) {
397 tr_debug("tr_cfg_parse_one_filter: Error parsing domain constraint");
398 tr_filter_free(filt);
403 /*For each filter spec within the filter line... */
404 for (j = 0; j <json_array_size(jfspecs); j++) {
406 if ((NULL == (jffield = json_object_get(json_array_get(jfspecs, j), "field"))) ||
407 (!json_is_string(jffield)) ||
408 (NULL == (jfmatch = json_object_get(json_array_get(jfspecs, j), "match"))) ||
409 (!json_is_string(jfmatch))) {
410 tr_debug("tr_cfg_parse_one_filter: Error parsing filter field and match for filter spec %d, filter line %d.", i, j);
411 *rc = TR_CFG_NOPARSE;
412 tr_filter_free(filt);
416 if (NULL == (filt->lines[i]->specs[j] = talloc_zero(trc, TR_FSPEC))) {
417 tr_debug("tr_cfg_parse_one_filter: Out of memory.");
419 tr_filter_free(filt);
423 if ((NULL == (filt->lines[i]->specs[j]->field = tr_new_name((char *)json_string_value(jffield)))) ||
424 (NULL == (filt->lines[i]->specs[j]->match = tr_new_name((char *)json_string_value(jfmatch))))) {
425 tr_debug("tr_cfg_parse_one_filter: Out of memory.");
427 tr_filter_free(filt);
436 static TR_RP_CLIENT *tr_cfg_parse_one_rp_client (TR_CFG *trc, json_t *jrp, TR_CFG_RC *rc)
438 TR_RP_CLIENT *rp = NULL;
440 json_t *jfilt = NULL;
441 json_t *jftype = NULL;
444 if ((!trc) || (!jrp) || (!rc)) {
445 tr_debug("tr_cfg_parse_one_rp_realm: Bad parameters.");
447 *rc = TR_CFG_BAD_PARAMS;
451 if ((NULL == (jgns = json_object_get(jrp, "gss_names"))) ||
452 (!json_is_array(jgns))) {
453 tr_debug("tr_cfg_parse_one_rp_client: Error parsing RP client configuration, no GSS names.");
454 *rc = TR_CFG_NOPARSE;
458 /* TBD -- Support more than one filter per RP client? */
459 if (NULL == (jfilt = json_object_get(jrp, "filter"))) {
460 tr_debug("tr_cfg_parse_one_rp_client: Error parsing RP client configuration, no filter.");
461 *rc = TR_CFG_NOPARSE;
465 /* We only support rp_permitted filters for RP clients */
466 if ((NULL == (jftype = json_object_get(jfilt, "type"))) ||
467 (!json_is_string(jftype)) ||
468 (strcmp(json_string_value(jftype), "rp_permitted"))) {
469 tr_debug("tr_cfg_parse_one_rp_client: Error parsing RP client filter type.");
470 *rc = TR_CFG_NOPARSE;
474 if (TR_MAX_GSS_NAMES < json_array_size(jgns)) {
475 tr_debug("tr_cfg_parse_one_rp_client: RP Client has too many GSS Names.");
476 *rc = TR_CFG_NOPARSE;
480 if (NULL == (rp = talloc_zero(trc, TR_RP_CLIENT))) {
481 tr_debug("tr_cfg_parse_one_rp_realm: Out of memory.");
486 /* TBD -- support more than one filter entry per RP Client? */
487 if (NULL == (rp->filter = tr_cfg_parse_one_filter(trc, jfilt, rc))) {
488 tr_debug("tr_cfg_parse_one_rp_client: Error parsing filter.");
489 *rc = TR_CFG_NOPARSE;
493 for (i = 0; i < json_array_size(jgns); i++) {
494 if (NULL == (rp->gss_names[i] = tr_new_name ((char *)json_string_value(json_array_get(jgns, i))))) {
495 tr_debug("tr_cfg_parse_one_rp_client: No memory for GSS Name.");
504 static TR_CFG_RC tr_cfg_parse_rp_clients (TR_CFG *trc, json_t *jcfg) {
506 TR_RP_CLIENT *rp = NULL;
507 TR_CFG_RC rc = TR_CFG_SUCCESS;
510 if ((!trc) || (!jcfg))
511 return TR_CFG_BAD_PARAMS;
513 if (NULL != (jrps = json_object_get(jcfg, "rp_clients"))) {
515 if (!json_is_array(jrps)) {
516 return TR_CFG_NOPARSE;
519 for (i = 0; i < json_array_size(jrps); i++) {
520 if (NULL == (rp = tr_cfg_parse_one_rp_client(trc,
521 json_array_get(jrps, i),
525 tr_debug("tr_cfg_parse_rp_clients: RP client configured -- first gss: %s", rp->gss_names[0]->buf);
526 rp->next = trc->rp_clients;
527 trc->rp_clients = rp;
530 tr_debug("tr_cfg_parse_rp_clients: Finished (rc=%d)", rc);
534 static TR_AAA_SERVER *tr_cfg_parse_one_aaa_server (TR_CFG *trc, json_t *jaddr, TR_CFG_RC *rc) {
535 TR_AAA_SERVER *aaa = NULL;
537 if ((!trc) || (!jaddr) || (!json_is_string(jaddr))) {
538 tr_debug("tr_cfg_parse_one_aaa_server: Bad parameters.");
539 *rc = TR_CFG_BAD_PARAMS;
543 if (NULL == (aaa = talloc_zero(trc, TR_AAA_SERVER))) {
544 tr_debug("tr_cfg_parse_one_aaa_server: Out of memory.");
549 aaa->hostname = tr_new_name((char *)(json_string_value(jaddr)));
554 static TR_AAA_SERVER *tr_cfg_parse_aaa_servers (TR_CFG *trc, json_t *jaaas, TR_CFG_RC *rc)
556 TR_AAA_SERVER *aaa = NULL;
557 TR_AAA_SERVER *temp_aaa = NULL;
560 for (i = 0; i < json_array_size(jaaas); i++) {
561 if (NULL == (temp_aaa = tr_cfg_parse_one_aaa_server(trc, json_array_get(jaaas, i), rc))) {
564 /* TBD -- IPv6 addresses */
565 // tr_debug("tr_cfg_parse_aaa_servers: Configuring AAA Server: ip_addr = %s.", inet_ntoa(temp_aaa->aaa_server_addr));
566 temp_aaa->next = aaa;
569 tr_debug("tr_cfg_parse_aaa_servers: Finished (rc=%d)", *rc);
573 static TR_APC *tr_cfg_parse_apcs (TR_CFG *trc, json_t *japcs, TR_CFG_RC *rc)
577 *rc = TR_CFG_SUCCESS; /* presume success */
579 if ((!trc) || (!japcs) || (!rc)) {
580 tr_debug("tr_cfg_parse_apcs: Bad parameters.");
582 *rc = TR_CFG_BAD_PARAMS;
586 if (NULL == (apc = talloc_zero(trc, TR_APC))) {
587 tr_debug("tr_cfg_parse_apcs: Out of memory.");
592 /* TBD, deal with more than one APC. In the meantime, though... */
593 /* Only parse the first APC, because we only know how to deal with one, anyway. */
594 if (0 == json_array_size(japcs))
597 if (NULL == (apc->id = tr_new_name((char *)json_string_value(json_array_get(japcs, 0))))) {
598 tr_debug("tr_cfg_parse_apcs: No memory for APC name.");
603 tr_debug("tr_cfg_parse_apcs: Finished (rc=%d)", *rc);
607 static TR_IDP_REALM *tr_cfg_parse_one_idp_realm (TR_CFG *trc, json_t *jidp, TR_CFG_RC *rc) {
608 TR_IDP_REALM *idp = NULL;
609 json_t *jremote = NULL;
611 json_t *jscfg = NULL;
612 json_t *jsrvrs = NULL;
613 json_t *japcs = NULL;
615 if ((!trc) || (!jidp) || (!rc)) {
616 tr_debug("tr_cfg_parse_one_idp_realm: Bad parameters.");
618 *rc = TR_CFG_BAD_PARAMS;
622 if (NULL == (idp = tr_idp_realm_new(trc))) {
623 tr_debug("tr_cfg_parse_one_idp_realm: Out of memory.");
628 /* Assume local route unless specified as remote. */
629 jremote = json_object_get(jidp, "remote");
630 if ((jremote!=NULL) && (!json_is_number(jremote))) {
631 tr_debug("tr_cfg_parse_one_idp_realm: Error parsing IDP realm configuration (remote is not a number).");
636 if ((NULL == (jrid = json_object_get(jidp, "realm_id"))) ||
637 (!json_is_string(jrid))) {
638 tr_debug("tr_cfg_parse_one_idp_realm: Error parsing IDP realm configuration (realm_id missing or invalid).");
639 *rc = TR_CFG_NOPARSE;
643 if ((jremote==NULL) || (0==json_integer_value(jremote))) {
644 idp->origin=TR_REALM_LOCAL;
646 if ((NULL == (jscfg = json_object_get(jidp, "shared_config"))) ||
647 (!json_is_string(jscfg)) ||
648 (NULL == (jsrvrs = json_object_get(jidp, "aaa_servers"))) ||
649 (!json_is_array(jsrvrs))) {
650 tr_debug("tr_cfg_parse_one_idp_realm: Error parsing IDP realm configuration.");
651 *rc = TR_CFG_NOPARSE;
655 if (0 == strcmp(json_string_value(jscfg), "no")) {
656 idp->shared_config = 0;
658 idp->shared_config = 1;
661 idp->origin=TR_REALM_REMOTE_INCOMPLETE;
663 if (NULL == (idp->realm_id = tr_new_name((char *)json_string_value(jrid)))) {
664 tr_debug("tr_cfg_parse_one_idp_realm: No memory for realm id.");
669 if ((NULL != (japcs = json_object_get(jidp, "apcs"))) &&
670 (json_is_array(japcs))) {
671 if (NULL == (idp->apcs = tr_cfg_parse_apcs(trc, japcs, rc))) {
672 tr_debug("tr_cfg_parse_one_idp_realm: Can't parse APCs for realm %s .", idp->realm_id->buf);
673 tr_free_name(idp->realm_id);
674 /* TBD -- free aaa_servers */
679 if ((idp->origin==TR_REALM_LOCAL) &&
680 (NULL == (idp->aaa_servers = tr_cfg_parse_aaa_servers(trc, jsrvrs, rc)))) {
681 tr_debug("tr_cfg_parse_one_idp_realm: Can't parse AAA servers for realm %s.", idp->realm_id->buf);
682 tr_free_name(idp->realm_id);
689 static TR_CFG_RC tr_cfg_parse_default_servers (TR_CFG *trc, json_t *jcfg)
692 TR_CFG_RC rc = TR_CFG_SUCCESS;
693 TR_AAA_SERVER *ds = NULL;
696 if ((!trc) || (!jcfg))
697 return TR_CFG_BAD_PARAMS;
699 /* If there are default servers, store them */
700 if ((NULL != (jdss = json_object_get(jcfg, "default_servers"))) &&
701 (json_is_array(jdss)) &&
702 (0 < json_array_size(jdss))) {
704 for (i = 0; i < json_array_size(jdss); i++) {
705 if (NULL == (ds = tr_cfg_parse_one_aaa_server(trc,
706 json_array_get(jdss, i),
710 tr_debug("tr_cfg_parse_default_servers: Default server configured: %s", ds->hostname->buf);
711 ds->next = trc->default_servers;
712 trc->default_servers = ds;
716 tr_debug("tr_cfg_parse_default_servers: Finished (rc=%d)", rc);
720 static TR_CFG_RC tr_cfg_parse_idp_realms (TR_CFG *trc, json_t *jcfg)
722 json_t *jidps = NULL;
723 TR_CFG_RC rc = TR_CFG_SUCCESS;
724 TR_IDP_REALM *idp = NULL;
727 if ((!trc) || (!jcfg))
728 return TR_CFG_BAD_PARAMS;
730 /* If there are any IDP Realms, parse them */
731 if ((NULL != (jidps = json_object_get(jcfg, "idp_realms"))) &&
732 (json_is_array(jidps))) {
733 for (i = 0; i < json_array_size(jidps); i++) {
734 if (NULL == (idp = tr_cfg_parse_one_idp_realm(trc,
735 json_array_get(jidps, i),
739 tr_debug("tr_cfg_parse_idp_realms: IDP realm configured: %s.", idp->realm_id->buf);
740 idp->next = trc->idp_realms;
741 trc->idp_realms = idp;
745 tr_debug("tr_cfg_parse_idp_realms: Finished (rc=%d)", rc);
749 static TR_IDP_REALM *tr_cfg_parse_comm_idps (TR_CFG *trc, json_t *jidps, TR_CFG_RC *rc)
751 TR_IDP_REALM *idp = NULL;
752 TR_IDP_REALM *temp_idp = NULL;
757 (!json_is_array(jidps))) {
759 *rc = TR_CFG_BAD_PARAMS;
763 for (i = 0; i < json_array_size(jidps); i++) {
764 if (NULL == (temp_idp = (tr_cfg_find_idp(trc,
765 tr_new_name((char *)json_string_value(json_array_get(jidps, i))),
767 tr_debug("tr_cfg_parse_comm_idps: Unknown IDP %s.",
768 (char *)json_string_value(json_array_get(jidps, i)));
772 temp_idp->comm_next = idp;
779 static TR_RP_REALM *tr_cfg_parse_comm_rps (TR_CFG *trc, json_t *jrps, TR_CFG_RC *rc)
781 TR_RP_REALM *rp = NULL;
782 TR_RP_REALM *temp_rp = NULL;
787 (!json_is_array(jrps))) {
789 *rc = TR_CFG_BAD_PARAMS;
793 for (i = (json_array_size(jrps)-1); i >= 0; i--) {
794 if (NULL == (temp_rp = talloc_zero(trc, TR_RP_REALM))) {
795 tr_debug("tr_cfg_parse_comm_rps: Can't allocate memory for RP Realm.");
801 if (NULL == (temp_rp->realm_name = tr_new_name((char *)json_string_value(json_array_get(jrps, i))))) {
802 tr_debug("tr_cfg_parse_comm_rps: No memory for RP Realm Name.");
815 static TR_COMM *tr_cfg_parse_one_comm (TR_CFG *trc, json_t *jcomm, TR_CFG_RC *rc) {
816 TR_COMM *comm = NULL;
818 json_t *jtype = NULL;
819 json_t *japcs = NULL;
820 json_t *jidps = NULL;
823 if ((!trc) || (!jcomm) || (!rc)) {
824 tr_debug("tr_cfg_parse_one_comm: Bad parameters.");
826 *rc = TR_CFG_BAD_PARAMS;
830 if (NULL == (comm = talloc_zero(trc, TR_COMM))) {
831 tr_crit("tr_cfg_parse_one_comm: Out of memory.");
837 if ((NULL == (jid = json_object_get(jcomm, "community_id"))) ||
838 (!json_is_string(jid)) ||
839 (NULL == (jtype = json_object_get(jcomm, "type"))) ||
840 (!json_is_string(jtype)) ||
841 (NULL == (japcs = json_object_get(jcomm, "apcs"))) ||
842 (!json_is_array(japcs)) ||
843 (NULL == (jidps = json_object_get(jcomm, "idp_realms"))) ||
844 (!json_is_array(jidps)) ||
845 (NULL == (jrps = json_object_get(jcomm, "rp_realms"))) ||
846 (!json_is_array(jrps))) {
847 tr_debug("tr_cfg_parse_one_comm: Error parsing Communities configuration.");
848 *rc = TR_CFG_NOPARSE;
852 if (NULL == (comm->id = tr_new_name((char *)json_string_value(jid)))) {
853 tr_debug("tr_cfg_parse_one_comm: No memory for community id.");
858 if (0 == strcmp(json_string_value(jtype), "apc")) {
859 comm->type = TR_COMM_APC;
860 } else if (0 == strcmp(json_string_value(jtype), "coi")) {
861 comm->type = TR_COMM_COI;
862 if (NULL == (comm->apcs = tr_cfg_parse_apcs(trc, japcs, rc))) {
863 tr_debug("tr_cfg_parse_one_comm: Can't parse APCs for COI %s.", comm->id->buf);
864 tr_free_name(comm->id);
868 tr_debug("tr_cfg_parse_one_comm: Invalid community type, comm = %s, type = %s", comm->id->buf, json_string_value(jtype));
869 tr_free_name(comm->id);
870 *rc = TR_CFG_NOPARSE;
874 comm->idp_realms = tr_cfg_parse_comm_idps(trc, jidps, rc);
875 if (TR_CFG_SUCCESS != *rc) {
876 tr_debug("tr_cfg_parse_one_comm: Can't parse IDP realms for comm %s.", comm->id->buf);
877 tr_free_name(comm->id);
881 comm->rp_realms = tr_cfg_parse_comm_rps(trc, jrps, rc);
882 if (TR_CFG_SUCCESS != *rc) {
883 tr_debug("tr_cfg_parse_comm: Can't parse RP realms for comm %s .", comm->id->buf);
884 tr_free_name(comm->id);
888 if (TR_COMM_APC == comm->type) {
889 json_t *jexpire = json_object_get(jcomm, "expiration_interval");
890 comm->expiration_interval = 43200; /*30 days*/
892 if (!json_is_integer(jexpire)) {
893 fprintf(stderr, "tr_parse_comm: expirae_interval is not an integer\n");
896 comm->expiration_interval = json_integer_value(jexpire);
897 if (comm->expiration_interval <= 10)
898 comm->expiration_interval = 11; /* Freeradius waits 10 minutes between successful TR queries*/
899 if (comm->expiration_interval > 129600) /* 90 days*/
900 comm->expiration_interval = 129600;
907 static TR_CFG_RC tr_cfg_parse_comms (TR_CFG *trc, json_t *jcfg)
909 json_t *jcomms = NULL;
910 TR_CFG_RC rc = TR_CFG_SUCCESS;
911 TR_COMM *comm = NULL;
914 if ((!trc) || (!jcfg)) {
915 tr_debug("tr_cfg_parse_comms: Bad Parameters.");
916 return TR_CFG_BAD_PARAMS;
919 if (NULL != (jcomms = json_object_get(jcfg, "communities"))) {
920 if (!json_is_array(jcomms)) {
921 return TR_CFG_NOPARSE;
924 for (i = 0; i < json_array_size(jcomms); i++) {
925 if (NULL == (comm = tr_cfg_parse_one_comm(trc,
926 json_array_get(jcomms, i),
930 tr_debug("tr_cfg_parse_comms: Community configured: %s.", comm->id->buf);
931 comm->next = trc->comms;
935 tr_debug("tr_cfg_parse_comms: Finished (rc=%d)", rc);
939 TR_CFG_RC tr_cfg_validate (TR_CFG *trc) {
940 TR_CFG_RC rc = TR_CFG_SUCCESS;
943 return TR_CFG_BAD_PARAMS;
945 if ((NULL == trc->internal)||
946 (NULL == trc->internal->hostname)) {
947 tr_debug("tr_cfg_validate: Error: No internal configuration, or no hostname.");
951 if (NULL == trc->rp_clients) {
952 tr_debug("tr_cfg_validate: Error: No RP Clients configured");
956 if (NULL == trc->comms) {
957 tr_debug("tr_cfg_validate: Error: No Communities configured");
961 if ((NULL == trc->default_servers) && (NULL == trc->idp_realms)) {
962 tr_debug("tr_cfg_validate: Error: No default servers or IDPs configured.");
969 /* Join two paths and return a pointer to the result. This should be freed
970 * via talloc_free. Returns NULL on failure. */
971 static char *join_paths(TALLOC_CTX *mem_ctx, const char *p1, const char *p2) {
972 return talloc_asprintf(mem_ctx, "%s/%s", p1, p2); /* returns NULL on a failure */
975 /* Reads configuration files in config_dir ("" or "./" will use the current directory). */
976 TR_CFG_RC tr_parse_config (TR_CFG_MGR *cfg_mgr, const char *config_dir, int n, struct dirent **cfg_files)
978 TALLOC_CTX *tmp_ctx=talloc_new(NULL);
981 char *file_with_path;
983 TR_CFG_RC cfg_rc=TR_CFG_ERROR;
985 if ((!cfg_mgr) || (!cfg_files) || (n<=0)) {
986 cfg_rc=TR_CFG_BAD_PARAMS;
990 if (cfg_mgr->new != NULL)
991 tr_cfg_free(cfg_mgr->new);
992 cfg_mgr->new=tr_cfg_new(tmp_ctx); /* belongs to the temporary context for now */
993 if (cfg_mgr->new == NULL) {
998 /* Parse configuration information from each config file */
999 for (ii=0; ii<n; ii++) {
1000 file_with_path=join_paths(tmp_ctx, config_dir, cfg_files[ii]->d_name); /* must free result with talloc_free */
1001 if(file_with_path == NULL) {
1002 tr_crit("tr_parse_config: error joining path.");
1003 cfg_rc=TR_CFG_NOMEM;
1006 tr_debug("tr_parse_config: Parsing %s.", cfg_files[ii]->d_name); /* print the filename without the path */
1007 if (NULL == (jcfg = json_load_file(file_with_path,
1008 JSON_DISABLE_EOF_CHECK, &rc))) {
1009 tr_debug("tr_parse_config: Error parsing config file %s.",
1010 cfg_files[ii]->d_name);
1011 cfg_rc=TR_CFG_NOPARSE;
1015 if ((TR_CFG_SUCCESS != tr_cfg_parse_internal(cfg_mgr->new, jcfg)) ||
1016 (TR_CFG_SUCCESS != tr_cfg_parse_rp_clients(cfg_mgr->new, jcfg)) ||
1017 (TR_CFG_SUCCESS != tr_cfg_parse_idp_realms(cfg_mgr->new, jcfg)) ||
1018 (TR_CFG_SUCCESS != tr_cfg_parse_default_servers(cfg_mgr->new, jcfg)) ||
1019 (TR_CFG_SUCCESS != tr_cfg_parse_comms(cfg_mgr->new, jcfg))) {
1020 cfg_rc=TR_CFG_ERROR;
1025 /* make sure we got a complete, consistent configuration */
1026 if (TR_CFG_SUCCESS != tr_cfg_validate(cfg_mgr->new)) {
1027 tr_err("tr_parse_config: Error: INVALID CONFIGURATION");
1028 cfg_rc=TR_CFG_ERROR;
1033 talloc_steal(cfg_mgr, cfg_mgr->new); /* hand this over to the cfg_mgr context */
1034 cfg_rc=TR_CFG_SUCCESS;
1037 talloc_free(tmp_ctx);
1041 TR_IDP_REALM *tr_cfg_find_idp (TR_CFG *tr_cfg, TR_NAME *idp_id, TR_CFG_RC *rc)
1044 TR_IDP_REALM *cfg_idp;
1046 if ((!tr_cfg) || (!idp_id)) {
1048 *rc = TR_CFG_BAD_PARAMS;
1052 for (cfg_idp = tr_cfg->idp_realms; NULL != cfg_idp; cfg_idp = cfg_idp->next) {
1053 if (!tr_name_cmp (idp_id, cfg_idp->realm_id)) {
1054 tr_debug("tr_cfg_find_idp: Found %s.", idp_id->buf);
1058 /* if we didn't find one, return NULL */
1062 TR_RP_CLIENT *tr_cfg_find_rp (TR_CFG *tr_cfg, TR_NAME *rp_gss, TR_CFG_RC *rc)
1064 TR_RP_CLIENT *cfg_rp;
1067 if ((!tr_cfg) || (!rp_gss)) {
1069 *rc = TR_CFG_BAD_PARAMS;
1073 for (cfg_rp = tr_cfg->rp_clients; NULL != cfg_rp; cfg_rp = cfg_rp->next) {
1074 for (i = 0; i < TR_MAX_GSS_NAMES; i++) {
1075 if (!tr_name_cmp (rp_gss, cfg_rp->gss_names[i])) {
1076 tr_debug("tr_cfg_find_rp: Found %s.", rp_gss->buf);
1081 /* if we didn't find one, return NULL */
1085 static int is_cfg_file(const struct dirent *dent) {
1088 /* Only accept filenames ending in ".cfg" and starting with a character
1089 * other than an ASCII '.' */
1091 /* filename must be at least 4 characters long to be acceptable */
1092 n=strlen(dent->d_name);
1097 /* filename must not start with '.' */
1098 if ('.' == dent->d_name[0]) {
1102 /* If the above passed and the last four characters of the filename are .cfg, accept.
1103 * (n.b., assumes an earlier test checked that the name is >= 4 chars long.) */
1104 if (0 == strcmp(&(dent->d_name[n-4]), ".cfg")) {
1108 /* otherwise, return false. */
1112 /* Find configuration files in a particular directory. Returns the
1113 * number of entries found, 0 if none are found, or <0 for some
1114 * errors. If n>=0, the cfg_files parameter will contain a newly
1115 * allocated array of pointers to struct dirent entries, as returned
1116 * by scandir(). These can be freed with tr_free_config_file_list().
1118 int tr_find_config_files (const char *config_dir, struct dirent ***cfg_files) {
1121 n = scandir(config_dir, cfg_files, is_cfg_file, alphasort);
1125 tr_debug("tr_find_config: scandir error trying to scan %s.", config_dir);
1131 /* Free memory allocated for configuration file list returned from tr_find_config_files().
1132 * This can be called regardless of the return value of tr_find_config_values(). */
1133 void tr_free_config_file_list(int n, struct dirent ***cfg_files) {
1136 /* if n < 0, then scandir did not allocate anything because it failed */
1137 if((n>=0) && (*cfg_files != NULL)) {
1138 for(ii=0; ii<n; ii++) {
1139 free((*cfg_files)[ii]);
1141 free(*cfg_files); /* safe even if n==0 */
1142 *cfg_files=NULL; /* this will help prevent accidentally freeing twice */