2 * rlm_dbm.c authorize: authorize using ndbm database
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 * Copyright 2001 Koulik Andrei, Sandy Service
21 * Copyright 2006 The FreeRADIUS server project
24 #include <freeradius-devel/ident.h>
27 #include <freeradius-devel/radiusd.h>
28 #include <freeradius-devel/modules.h>
34 #ifdef HAVE_GDBM_NDBM_H
35 #include <gdbm/ndbm.h>
38 #ifdef HAVE_GDBMNDBM_H
39 #include <gdbm-ndbm.h>
45 # include "sandymod.h"
49 #define get_user_content dbm_fetch
51 #define SM_JOIN_ATTR 1029
54 # define SM_POOL_ATTR 510
57 typedef struct rlm_dbm_t {
67 typedef struct user_entry {
69 struct user_entry * next;
73 static const CONF_PARSER module_config[] = {
74 { "usersfile", PW_TYPE_STRING_PTR,offsetof(struct rlm_dbm_t,userfile),
76 { NULL, -1, 0, NULL, NULL }
79 static void sm_user_list_wipe (SM_USER_ENTRY **ue) {
81 SM_USER_ENTRY * pue, *nue;
86 while ( pue != NULL ) {
88 DEBUG2("Remove %s from user list", pue -> username);
89 free(pue -> username);
97 * add username un to user list ue;
98 * return 0 if user succefuly added
99 * 1 - if username already exists
100 * -1 - error: no memmory
103 static int sm_user_list_add(SM_USER_ENTRY **ue, const char *un) {
106 if ( strcmp( (*ue) -> username, un) == 0 ) return 1;
107 ue = & ((*ue) -> next);
109 *ue = malloc(sizeof(SM_USER_ENTRY));
110 if ( !*ue ) return -1;
111 (*ue) -> username = strdup(un);
112 DEBUG2("Add %s to user list", (*ue) -> username);
113 (*ue) -> next = NULL ;
114 if ( ! (*ue) -> username ) {
131 static int isfallthrough(VALUE_PAIR *vp) {
134 tmp = pairfind(vp, PW_FALL_THROUGH);
135 return tmp ? tmp -> lvalue : 1; /* if no FALL_THROUGH - keep looking */
139 * find user, parse and return result
142 * username - user name from request
143 * request - pair originated from the nas
144 * mode - search mode SM_SM_ACCUM - accumulative search mode
147 * parsed_users - list of parsed user names for loop removal
150 static int sm_parse_user(DBM *pdb, const char * username, VALUE_PAIR const* request, VALUE_PAIR **config,
151 VALUE_PAIR **reply, SM_USER_ENTRY **ulist)
154 int retcod, found = RLM_MODULE_NOTFOUND, res ;
155 VALUE_PAIR *vp = NULL,* tmp_config = NULL, *tmp_reply = NULL, *nu_reply = NULL;
156 VALUE_PAIR *join_attr;
159 int parse_state = SMP_PATTERN;
160 int continue_search = 1;
164 DEBUG2("sm_parse_user.c: check for loops");
166 if ( (retcod = sm_user_list_add(ulist,username) ) ) {
167 if ( retcod < 0 ) radlog(L_ERR,"rlm_dbm: Couldn't allocate memory");
168 else radlog(L_ERR,"rlm_dbm: Invalid configuration: loop detected");
169 return RLM_MODULE_FAIL;
172 /* retrieve user content */
175 k.dsize = strlen(username) + 1 ; /* username stored with '\0' */
177 d = dbm_fetch(pdb, k);
178 if ( d.dptr == NULL ) {
179 DEBUG2("rlm_dbm: User <%s> not foud in database\n",username);
180 return RLM_MODULE_NOTFOUND;
184 ch [ d.dsize - 1 ] = '\0'; /* should be closed by 0 */
186 DEBUG2("sm_parse_user: start parsing: user: %s", username);
188 /* start parse content */
189 while ( parse_state != SMP_ERROR && *ch && continue_search ) {
193 while( *ch && *ch != '\n') ch++ ;
195 if ( *ch == '\n' ) { *ch = 0; ch++; }
197 DEBUG2("parse buffer: <<%s>>\n",beg);
199 retcod = userparse(beg,&vp);
200 if ( retcod == T_OP_INVALID ) librad_perror("parse error ");
203 case T_COMMA: break; /* continue parse the current list */
204 case T_EOL: DEBUG2("rlm_dbm: recod parsed\n"); /* vp contains full pair list */
205 if ( parse_state == SMP_PATTERN ) { /* pattern line found */
206 DEBUG2("process pattern");
207 /* check pattern against request */
208 if ( paircompare(NULL, request, vp, reply ) == 0 ) {
209 DEBUG2("rlm_dbm: Pattern matched, look for request");
210 pairmove(&tmp_config, &vp);
212 parse_state = SMP_REPLY; /* look for reply */
215 DEBUG2("rlm_dbm: patern not matched, reply skiped");
217 while ( *ch && *ch !='\n' ) ch++;
218 if ( *ch == '\n' ) ch++;
220 } else { /* reply line found */
221 /* look for join-attribute */
222 DEBUG2("rlm_dbm: Reply found");
224 while( (join_attr = pairfind(join_attr,SM_JOIN_ATTR) ) != NULL ) {
225 DEBUG2("rlm_dbm: Proccess nested record: username %s",
226 (char *)join_attr->vp_strvalue);
227 /* res = RLM_MODULE_NOTFOUND; */
228 res = sm_parse_user(pdb, (char *)join_attr->vp_strvalue, request, &tmp_config,
230 DEBUG("rlm_dbm: recived: %d\n",res);
232 case RLM_MODULE_NOTFOUND:
235 default: /* seems error code */
236 parse_state = SMP_ERROR;
237 DEBUG2("rlm_dbm: Nested record error\n");
240 join_attr = join_attr -> next;
242 pairdelete(&vp,SM_JOIN_ATTR);
243 if ( parse_state != SMP_ERROR ) {
244 if ( ! isfallthrough(vp) ) {
246 DEBUG2("rlm_dbm: Break search due Fall-Through = no");
248 pairmove(&vp,&nu_reply);
250 pairmove(&tmp_reply,&vp);
252 parse_state = SMP_PATTERN;
253 found = RLM_MODULE_OK;
256 pairfree(&nu_reply); }
258 default: /* we do not wait that !!!! */
259 parse_state = SMP_ERROR;
260 DEBUG2("rlm_dbm: Unknown token: %d\n",retcod);
265 if ( parse_state == SMP_PATTERN ) {
266 pairmove(config,&tmp_config);
267 pairfree(&tmp_config);
268 pairmove(reply,&tmp_reply);
269 pairfree(&tmp_reply);
271 pairfree(&tmp_config);
272 pairfree(&tmp_reply);
274 DEBUG2("rlm_dbm: Bad final parse state: %d\n",parse_state);
275 found = RLM_MODULE_FAIL ;
281 static int sm_postprocessor(VALUE_PAIR **reply UNUSED) {
285 static int rlm_dbm_instantiate(CONF_SECTION *conf, void **instance) {
286 struct rlm_dbm_t *inst;
288 inst = rad_malloc(sizeof(rlm_dbm_t));
292 memset(inst, 0, sizeof(*inst));
294 if (cf_section_parse(conf, inst, module_config) < 0) {
301 static int rlm_dbm_authorize(void *instance, REQUEST *request)
303 VALUE_PAIR *namepair;
304 VALUE_PAIR *request_pairs;
305 VALUE_PAIR *check_tmp = NULL;
306 VALUE_PAIR *reply_tmp = NULL;
310 SM_USER_ENTRY *ulist = NULL;
313 struct rlm_dbm_t *inst = instance;
315 VALUE_PAIR **check_pairs, **reply_pairs;
317 request_pairs = request->packet->vps;
318 check_pairs = &request->config_items;
319 reply_pairs = &request->reply->vps;
322 * Grab the canonical user name.
324 namepair = request->username;
325 name = namepair ? (char *) namepair->vp_strvalue : "NONE";
327 DEBUG2("rlm_dbm: try open database file: %s\n",inst -> userfile);
330 if ( ( pdb = dbm_open(inst->userfile, O_RDONLY, 0600) ) != NULL ) {
331 DEBUG("rlm_dbm: Call parse_user:\n");
332 found = sm_parse_user(pdb, name, request_pairs, &check_tmp, &reply_tmp, &ulist);
333 if ( found == RLM_MODULE_NOTFOUND ) {
334 sm_user_list_wipe(&ulist);
335 found = sm_parse_user(pdb, "DEFAULT", request_pairs, &check_tmp, &reply_tmp, &ulist);
339 found = RLM_MODULE_FAIL;
340 DEBUG2("rlm_dbm: Cannot open database file: %s\n",
344 if ( found == RLM_MODULE_OK ) {
345 /* do preprocessor for final reply-pair tranformation */
346 if ( !sm_postprocessor(&reply_tmp) ) {
347 pairmove(reply_pairs, &reply_tmp);
348 pairmove(check_pairs, &check_tmp);
349 } else found = RLM_MODULE_FAIL;
351 sm_user_list_wipe(&ulist);
352 pairfree(&reply_tmp);
353 pairfree(&check_tmp);
358 static int rlm_dbm_detach(void *instance)
360 struct rlm_dbm_t *inst = instance;
366 /* globally exported name */
370 0, /* type: reserved */
371 rlm_dbm_instantiate, /* instantiation */
372 rlm_dbm_detach, /* detach */
374 NULL, /* authentication */
375 rlm_dbm_authorize, /* authorization */
376 NULL, /* preaccounting */
377 NULL, /* accounting */
378 NULL, /* checksimul */
379 NULL, /* pre-proxy */
380 NULL, /* post-proxy */