⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 mod_access.c

📁 apache简化版
💻 C
字号:
/* ==================================================================== * Copyright (c) 1995-1998 The Apache Group.  All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer.  * * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in *    the documentation and/or other materials provided with the *    distribution. * * 3. All advertising materials mentioning features or use of this *    software must display the following acknowledgment: *    "This product includes software developed by the Apache Group *    for use in the Apache HTTP server project (http://www.apache.org/)." * * 4. The names "Apache Server" and "Apache Group" must not be used to *    endorse or promote products derived from this software without *    prior written permission. For written permission, please contact *    apache@apache.org. * * 5. Products derived from this software may not be called "Apache" *    nor may "Apache" appear in their names without prior written *    permission of the Apache Group. * * 6. Redistributions of any form whatsoever must retain the following *    acknowledgment: *    "This product includes software developed by the Apache Group *    for use in the Apache HTTP server project (http://www.apache.org/)." * * THIS SOFTWARE IS PROVIDED BY THE APACHE GROUP ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE APACHE GROUP OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== * * This software consists of voluntary contributions made by many * individuals on behalf of the Apache Group and was originally based * on public domain software written at the National Center for * Supercomputing Applications, University of Illinois, Urbana-Champaign. * For more information on the Apache Group and the Apache HTTP server * project, please see <http://www.apache.org/>. * *//* * Security options etc. *  * Module derived from code originally written by Rob McCool *  */#include "httpd.h"#include "http_core.h"#include "http_config.h"#include "http_log.h"#include "http_request.h"enum allowdeny_type {    T_ENV,    T_ALL,    T_IP,    T_HOST,    T_FAIL};typedef struct {    int limited;    union {	char *from;	struct {	    unsigned long net;	    unsigned long mask;	} ip;    } x;    enum allowdeny_type type;} allowdeny;/* things in the 'order' array */#define DENY_THEN_ALLOW 0#define ALLOW_THEN_DENY 1#define MUTUAL_FAILURE 2typedef struct {    int order[METHODS];    array_header *allows;    array_header *denys;} access_dir_conf;module MODULE_VAR_EXPORT access_module;static void *create_access_dir_config(pool *p, char *dummy){    access_dir_conf *conf =    (access_dir_conf *) ap_pcalloc(p, sizeof(access_dir_conf));    int i;    for (i = 0; i < METHODS; ++i)	conf->order[i] = DENY_THEN_ALLOW;    conf->allows = ap_make_array(p, 1, sizeof(allowdeny));    conf->denys = ap_make_array(p, 1, sizeof(allowdeny));    return (void *) conf;}static const char *order(cmd_parms *cmd, void *dv, char *arg){    access_dir_conf *d = (access_dir_conf *) dv;    int i, o;    if (!strcasecmp(arg, "allow,deny"))	o = ALLOW_THEN_DENY;    else if (!strcasecmp(arg, "deny,allow"))	o = DENY_THEN_ALLOW;    else if (!strcasecmp(arg, "mutual-failure"))	o = MUTUAL_FAILURE;    else	return "unknown order";    for (i = 0; i < METHODS; ++i)	if (cmd->limited & (1 << i))	    d->order[i] = o;    return NULL;}static int is_ip(const char *host){    while ((*host == '.') || ap_isdigit(*host))	host++;    return (*host == '\0');}static const char *allow_cmd(cmd_parms *cmd, void *dv, char *from, char *where){    access_dir_conf *d = (access_dir_conf *) dv;    allowdeny *a;    char *s;    if (strcasecmp(from, "from"))	return "allow and deny must be followed by 'from'";    a = (allowdeny *) ap_push_array(cmd->info ? d->allows : d->denys);    a->x.from = where;    a->limited = cmd->limited;    if (!strncasecmp(where, "env=", 4)) {	a->type = T_ENV;	a->x.from += 4;    }    else if (!strcasecmp(where, "all")) {	a->type = T_ALL;    }    else if ((s = strchr(where, '/'))) {	unsigned long mask;	a->type = T_IP;	/* trample on where, we won't be using it any more */	*s++ = '\0';	if (!is_ip(where)	    || (a->x.ip.net = ap_inet_addr(where)) == INADDR_NONE) {	    a->type = T_FAIL;	    return "syntax error in network portion of network/netmask";	}	/* is_ip just tests if it matches [\d.]+ */	if (!is_ip(s)) {	    a->type = T_FAIL;	    return "syntax error in mask portion of network/netmask";	}	/* is it in /a.b.c.d form? */	if (strchr(s, '.')) {	    mask = ap_inet_addr(s);	    if (mask == INADDR_NONE) {		a->type = T_FAIL;		return "syntax error in mask portion of network/netmask";	    }	}	else {	    /* assume it's in /nnn form */	    mask = atoi(s);	    if (mask > 32 || mask <= 0) {		a->type = T_FAIL;		return "invalid mask in network/netmask";	    }	    mask = 0xFFFFFFFFUL << (32 - mask);	    mask = htonl(mask);	}	a->x.ip.mask = mask;    }    else if (ap_isdigit(*where) && is_ip(where)) {	/* legacy syntax for ip addrs: a.b.c. ==> a.b.c.0/24 for example */	int shift;	char *t;	int octet;	a->type = T_IP;	/* parse components */	s = where;	a->x.ip.net = 0;	a->x.ip.mask = 0;	shift = 24;	while (*s) {	    t = s;	    if (!ap_isdigit(*t)) {		a->type = T_FAIL;		return "invalid ip address";	    }	    while (ap_isdigit(*t)) {		++t;	    }	    if (*t == '.') {		*t++ = 0;	    }	    else if (*t) {		a->type = T_FAIL;		return "invalid ip address";	    }	    if (shift < 0) {		return "invalid ip address, only 4 octets allowed";	    }	    octet = atoi(s);	    if (octet < 0 || octet > 255) {		a->type = T_FAIL;		return "each octet must be between 0 and 255 inclusive";	    }	    a->x.ip.net |= octet << shift;	    a->x.ip.mask |= 0xFFUL << shift;	    s = t;	    shift -= 8;	}	a->x.ip.net = ntohl(a->x.ip.net);	a->x.ip.mask = ntohl(a->x.ip.mask);    }    else {	a->type = T_HOST;    }    return NULL;}static char its_an_allow;static const command_rec access_cmds[] ={    {"order", order, NULL, OR_LIMIT, TAKE1,     "'allow,deny', 'deny,allow', or 'mutual-failure'"},    {"allow", allow_cmd, &its_an_allow, OR_LIMIT, ITERATE2,     "'from' followed by hostnames or IP-address wildcards"},    {"deny", allow_cmd, NULL, OR_LIMIT, ITERATE2,     "'from' followed by hostnames or IP-address wildcards"},    {NULL}};static int in_domain(const char *domain, const char *what){    int dl = strlen(domain);    int wl = strlen(what);    if ((wl - dl) >= 0) {	if (strcasecmp(domain, &what[wl - dl]) != 0)	    return 0;	/* Make sure we matched an *entire* subdomain --- if the user	 * said 'allow from good.com', we don't want people from nogood.com	 * to be able to get in.	 */	if (wl == dl)	    return 1;		/* matched whole thing */	else	    return (domain[0] == '.' || what[wl - dl - 1] == '.');    }    else	return 0;}static int find_allowdeny(request_rec *r, array_header *a, int method){    allowdeny *ap = (allowdeny *) a->elts;    int mmask = (1 << method);    int i;    int gothost = 0;    const char *remotehost = NULL;    for (i = 0; i < a->nelts; ++i) {	if (!(mmask & ap[i].limited))	    continue;	switch (ap[i].type) {	case T_ENV:	    if (ap_table_get(r->subprocess_env, ap[i].x.from)) {		return 1;	    }	    break;	case T_ALL:	    return 1;	case T_IP:	    if (ap[i].x.ip.net != INADDR_NONE		&& (r->connection->remote_addr.sin_addr.s_addr		    & ap[i].x.ip.mask) == ap[i].x.ip.net) {		return 1;	    }	    break;	case T_HOST:	    if (!gothost) {		remotehost = ap_get_remote_host(r->connection, r->per_dir_config,					    REMOTE_DOUBLE_REV);		if ((remotehost == NULL) || is_ip(remotehost))		    gothost = 1;		else		    gothost = 2;	    }	    if ((gothost == 2) && in_domain(ap[i].x.from, remotehost))		return 1;	    break;	case T_FAIL:	    /* do nothing? */	    break;	}    }    return 0;}static int check_dir_access(request_rec *r){    int method = r->method_number;    access_dir_conf *a =    (access_dir_conf *)    ap_get_module_config(r->per_dir_config, &access_module);    int ret = OK;    if (a->order[method] == ALLOW_THEN_DENY) {	ret = FORBIDDEN;	if (find_allowdeny(r, a->allows, method))	    ret = OK;	if (find_allowdeny(r, a->denys, method))	    ret = FORBIDDEN;    }    else if (a->order[method] == DENY_THEN_ALLOW) {	if (find_allowdeny(r, a->denys, method))	    ret = FORBIDDEN;	if (find_allowdeny(r, a->allows, method))	    ret = OK;    }    else {	if (find_allowdeny(r, a->allows, method)	    && !find_allowdeny(r, a->denys, method))	    ret = OK;	else	    ret = FORBIDDEN;    }    if (ret == FORBIDDEN	&& (ap_satisfies(r) != SATISFY_ANY || !ap_some_auth_required(r))) {	ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,		  "client denied by server configuration: %s",		  r->filename);    }    return ret;}module MODULE_VAR_EXPORT access_module ={    STANDARD_MODULE_STUFF,    NULL,			/* initializer */    create_access_dir_config,	/* dir config creater */    NULL,			/* dir merger --- default is to override */    NULL,			/* server config */    NULL,			/* merge server config */    access_cmds,    NULL,			/* handlers */    NULL,			/* filename translation */    NULL,			/* check_user_id */    NULL,			/* check auth */    check_dir_access,		/* check access */    NULL,			/* type_checker */    NULL,			/* fixups */    NULL,			/* logger */    NULL,			/* header parser */    NULL,			/* child_init */    NULL,			/* child_exit */    NULL			/* post read-request */};

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -