2 * Copyright (c) 2012-2018, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
24 * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
25 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
26 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
27 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
29 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
31 * OF THE POSSIBILITY OF SUCH DAMAGE.
41 #include <tr_cfgwatch.h>
43 #include <tr_config.h>
44 #include <tr_gss_names.h>
46 #include <tr_filter.h>
47 #include <trust_router/tr_constraint.h>
50 #include <trust_router/trp.h>
52 #if JANSSON_VERSION_HEX < 0x020500
53 #include "jansson_iterators.h"
56 TR_AAA_SERVER *tr_cfg_parse_one_aaa_server(TALLOC_CTX *mem_ctx, json_t *jaddr, TR_CFG_RC *rc)
58 TR_AAA_SERVER *aaa = NULL;
61 if ((!jaddr) || (!json_is_string(jaddr))) {
62 tr_debug("tr_cfg_parse_one_aaa_server: Bad parameters.");
63 *rc = TR_CFG_BAD_PARAMS;
67 name=tr_new_name(json_string_value(jaddr));
69 tr_debug("tr_cfg_parse_one_aaa_server: Out of memory allocating hostname.");
74 aaa=tr_aaa_server_new(mem_ctx, name);
77 tr_debug("tr_cfg_parse_one_aaa_server: Out of memory allocating AAA server.");
85 static TR_AAA_SERVER *tr_cfg_parse_aaa_servers(TALLOC_CTX *mem_ctx, json_t *jaaas, TR_CFG_RC *rc)
87 TALLOC_CTX *tmp_ctx=NULL;
88 TR_AAA_SERVER *aaa = NULL;
89 TR_AAA_SERVER *temp_aaa = NULL;
92 for (i = 0; i < json_array_size(jaaas); i++) {
93 /* rc gets set in here */
94 if (NULL == (temp_aaa = tr_cfg_parse_one_aaa_server(tmp_ctx, json_array_get(jaaas, i), rc))) {
98 /* TBD -- IPv6 addresses */
99 // tr_debug("tr_cfg_parse_aaa_servers: Configuring AAA Server: ip_addr = %s.", inet_ntoa(temp_aaa->aaa_server_addr));
100 temp_aaa->next = aaa;
103 tr_debug("tr_cfg_parse_aaa_servers: Finished (rc=%d)", *rc);
105 for (temp_aaa=aaa; temp_aaa!=NULL; temp_aaa=temp_aaa->next)
106 talloc_steal(mem_ctx, temp_aaa);
107 talloc_free(tmp_ctx);
111 static TR_APC *tr_cfg_parse_one_apc(TALLOC_CTX *mem_ctx, json_t *japc, TR_CFG_RC *rc)
116 *rc = TR_CFG_SUCCESS; /* presume success */
118 if ((!japc) || (!rc) || (!json_is_string(japc))) {
119 tr_debug("tr_cfg_parse_one_apc: Bad parameters.");
121 *rc = TR_CFG_BAD_PARAMS;
125 apc=tr_apc_new(mem_ctx);
127 tr_debug("tr_cfg_parse_one_apc: Out of memory.");
132 name=tr_new_name(json_string_value(japc));
134 tr_debug("tr_cfg_parse_one_apc: No memory for APC name.");
139 tr_apc_set_id(apc, name); /* apc is now responsible for freeing the name */
144 TR_APC *tr_cfg_parse_apcs(TALLOC_CTX *mem_ctx, json_t *japcs, TR_CFG_RC *rc)
146 TALLOC_CTX *tmp_ctx=talloc_new(NULL);
148 TR_APC *new_apc=NULL;
150 TR_CFG_RC call_rc=TR_CFG_ERROR;
152 *rc = TR_CFG_SUCCESS; /* presume success */
154 if ((!japcs) || (!rc) || (!json_is_array(japcs))) {
155 tr_debug("tr_cfg_parse_one_apc: Bad parameters.");
157 *rc = TR_CFG_BAD_PARAMS;
161 for (ii=0; ii<json_array_size(japcs); ii++) {
162 new_apc=tr_cfg_parse_one_apc(tmp_ctx, json_array_get(japcs, ii), &call_rc);
163 if ((call_rc!=TR_CFG_SUCCESS) || (new_apc==NULL)) {
164 tr_debug("tr_cfg_parse_apcs: Error parsing APC %d.", ii+1);
168 tr_apc_add(apcs, new_apc);
171 talloc_steal(mem_ctx, apcs);
175 talloc_free(tmp_ctx);
179 static TR_NAME *tr_cfg_parse_name(TALLOC_CTX *mem_ctx, json_t *jname, TR_CFG_RC *rc)
184 if ((jname==NULL) || (!json_is_string(jname))) {
185 tr_err("tr_cfg_parse_name: name missing or not a string");
186 *rc=TR_CFG_BAD_PARAMS;
189 name=tr_new_name(json_string_value(jname));
191 tr_err("tr_cfg_parse_name: could not allocate name");
200 static int tr_cfg_parse_shared_config(json_t *jsc, TR_CFG_RC *rc)
202 const char *shared=NULL;
206 (!json_is_string(jsc)) ||
207 (NULL==(shared=json_string_value(jsc)))) {
208 *rc=TR_CFG_BAD_PARAMS;
212 if (0==strcmp(shared, "no"))
214 else if (0==strcmp(shared, "yes"))
217 /* any other value is an error */
218 tr_debug("tr_cfg_parse_shared_config: invalid shared_config value \"%s\" (should be \"yes\" or \"no\")",
224 static TR_REALM_ORIGIN tr_cfg_realm_origin(json_t *jrealm)
226 json_t *jremote=json_object_get(jrealm, "remote");
230 return TR_REALM_LOCAL;
231 if (!json_is_string(jremote)) {
232 tr_warning("tr_cfg_realm_origin: \"remote\" is not a string, assuming this is a local realm.");
233 return TR_REALM_LOCAL;
235 s=json_string_value(jremote);
236 if (strcasecmp(s, "yes")==0)
237 return TR_REALM_REMOTE_INCOMPLETE;
238 else if (strcasecmp(s, "no")!=0)
239 tr_warning("tr_cfg_realm_origin: \"remote\" is neither 'yes' nor 'no', assuming this is a local realm.");
241 return TR_REALM_LOCAL;
244 /* Parse the identity provider object from a realm and fill in the given TR_IDP_REALM. */
245 static TR_CFG_RC tr_cfg_parse_idp(TR_IDP_REALM *idp, json_t *jidp)
247 TALLOC_CTX *tmp_ctx=talloc_new(NULL);
249 TR_AAA_SERVER *aaa=NULL;
250 TR_CFG_RC rc=TR_CFG_ERROR;
255 idp->shared_config=tr_cfg_parse_shared_config(json_object_get(jidp, "shared_config"), &rc);
256 if (rc!=TR_CFG_SUCCESS) {
257 tr_err("tr_cfg_parse_idp: missing or malformed shared_config specification");
262 apcs=tr_cfg_parse_apcs(tmp_ctx, json_object_get(jidp, "apcs"), &rc);
263 if ((rc!=TR_CFG_SUCCESS) || (apcs==NULL)) {
264 tr_err("tr_cfg_parse_idp: unable to parse APC");
269 aaa=tr_cfg_parse_aaa_servers(idp, json_object_get(jidp, "aaa_servers"), &rc);
270 if (rc!=TR_CFG_SUCCESS) {
271 tr_err("tr_cfg_parse_idp: unable to parse AAA servers");
276 tr_debug("tr_cfg_parse_idp: APC=\"%.*s\"",
280 /* done, fill in the idp structures */
282 talloc_steal(idp, apcs);
283 idp->aaa_servers=aaa;
287 if (rc!=TR_CFG_SUCCESS) {
291 tr_aaa_server_free(aaa);
294 talloc_free(tmp_ctx);
298 /* parses idp realm */
299 static TR_IDP_REALM *tr_cfg_parse_one_idp_realm(TALLOC_CTX *mem_ctx, json_t *jrealm, TR_CFG_RC *rc)
301 TALLOC_CTX *tmp_ctx=talloc_new(NULL);
302 TR_IDP_REALM *realm=NULL;
303 TR_CFG_RC call_rc=TR_CFG_ERROR;
305 *rc=TR_CFG_ERROR; /* default to error if not set */
307 if ((!jrealm) || (!rc)) {
308 tr_err("tr_cfg_parse_one_idp_realm: Bad parameters.");
310 *rc=TR_CFG_BAD_PARAMS;
314 if (NULL==(realm=tr_idp_realm_new(tmp_ctx))) {
315 tr_err("tr_cfg_parse_one_idp_realm: could not allocate idp realm.");
320 realm->origin=tr_cfg_realm_origin(jrealm);
321 if (realm->origin!=TR_REALM_LOCAL) {
322 tr_debug("tr_cfg_parse_one_idp_realm: realm is remote, should not have full IdP info.");
327 /* must have a name */
328 realm->realm_id=tr_cfg_parse_name(realm,
329 json_object_get(jrealm, "realm"),
331 if ((call_rc!=TR_CFG_SUCCESS) || (realm->realm_id==NULL)) {
332 tr_err("tr_cfg_parse_one_idp_realm: could not parse realm name");
336 tr_debug("tr_cfg_parse_one_idp_realm: realm_id=\"%.*s\"",
337 realm->realm_id->len,
338 realm->realm_id->buf);
340 call_rc=tr_cfg_parse_idp(realm, json_object_get(jrealm, "identity_provider"));
341 if (call_rc!=TR_CFG_SUCCESS) {
342 tr_err("tr_cfg_parse_one_idp_realm: could not parse identity_provider.");
350 if (*rc==TR_CFG_SUCCESS)
351 talloc_steal(mem_ctx, realm);
357 talloc_free(tmp_ctx);
361 /* Determine whether the realm is an IDP realm */
362 static int tr_cfg_is_idp_realm(json_t *jrealm)
364 /* If a realm spec contains an identity_provider, it's an IDP realm. */
365 if (NULL != json_object_get(jrealm, "identity_provider"))
371 static TR_IDP_REALM *tr_cfg_parse_one_remote_realm(TALLOC_CTX *mem_ctx, json_t *jrealm, TR_CFG_RC *rc)
373 TALLOC_CTX *tmp_ctx=talloc_new(NULL);
374 TR_IDP_REALM *realm=talloc(mem_ctx, TR_IDP_REALM);
376 *rc=TR_CFG_ERROR; /* default to error if not set */
378 if ((!jrealm) || (!rc)) {
379 tr_err("tr_cfg_parse_one_remote_realm: Bad parameters.");
381 *rc=TR_CFG_BAD_PARAMS;
385 if (NULL==(realm=tr_idp_realm_new(tmp_ctx))) {
386 tr_err("tr_cfg_parse_one_remote_realm: could not allocate idp realm.");
391 /* must have a name */
392 realm->realm_id=tr_cfg_parse_name(realm,
393 json_object_get(jrealm, "realm"),
395 if ((*rc!=TR_CFG_SUCCESS) || (realm->realm_id==NULL)) {
396 tr_err("tr_cfg_parse_one_remote_realm: could not parse realm name");
400 tr_debug("tr_cfg_parse_one_remote_realm: realm_id=\"%.*s\"",
401 realm->realm_id->len,
402 realm->realm_id->buf);
404 realm->origin=tr_cfg_realm_origin(jrealm);
408 if (*rc==TR_CFG_SUCCESS)
409 talloc_steal(mem_ctx, realm);
415 talloc_free(tmp_ctx);
419 static int tr_cfg_is_remote_realm(json_t *jrealm)
421 return (tr_cfg_realm_origin(jrealm)!=TR_REALM_LOCAL);
424 /* Parse any idp realms in the j_realms object. Ignores other realm types. */
425 TR_IDP_REALM *tr_cfg_parse_idp_realms(TALLOC_CTX *mem_ctx, json_t *jrealms, TR_CFG_RC *rc)
427 TALLOC_CTX *tmp_ctx=talloc_new(NULL);
428 TR_IDP_REALM *realms=NULL;
429 TR_IDP_REALM *new_realm=NULL;
430 json_t *this_jrealm=NULL;
434 if ((jrealms==NULL) || (!json_is_array(jrealms))) {
435 tr_err("tr_cfg_parse_idp_realms: realms not an array");
436 *rc=TR_CFG_BAD_PARAMS;
440 for (ii=0; ii<json_array_size(jrealms); ii++) {
441 this_jrealm=json_array_get(jrealms, ii);
442 if (tr_cfg_is_idp_realm(this_jrealm)) {
443 new_realm=tr_cfg_parse_one_idp_realm(tmp_ctx, this_jrealm, rc);
444 if ((*rc)!=TR_CFG_SUCCESS) {
445 tr_err("tr_cfg_parse_idp_realms: error decoding realm entry %d", ii+1);
449 tr_idp_realm_add(realms, new_realm);
450 } else if (tr_cfg_is_remote_realm(this_jrealm)) {
451 new_realm=tr_cfg_parse_one_remote_realm(tmp_ctx, this_jrealm, rc);
452 if ((*rc)!=TR_CFG_SUCCESS) {
453 tr_err("tr_cfg_parse_idp_realms: error decoding remote realm entry %d", ii+1);
457 tr_idp_realm_add(realms, new_realm);
462 talloc_steal(mem_ctx, realms);
465 talloc_free(tmp_ctx);