Source file accesscontrol.ml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
open Ocsigen_lib
open Xml
let section = Lwt_log.Section.make "ocsigen:ext:access-control"
type condition = Ocsigen_request.t -> bool
let ip s =
let prefix =
try Ipaddr.Prefix.of_string_exn s
with Ipaddr.Parse_error _ -> (
try
let ip = Ipaddr.of_string_exn s in
Ipaddr.Prefix.of_addr ip
with _ ->
Ocsigen_extensions.badconfig "Bad ip/netmask [%s] in <ip> condition" s)
in
fun ri ->
let r = Ipaddr.Prefix.mem (Ocsigen_request.remote_ip_parsed ri) prefix in
if r
then
Lwt_log.ign_info_f ~section "IP: %a matches %s"
(fun () -> Ocsigen_request.remote_ip)
ri s
else
Lwt_log.ign_info_f ~section "IP: %a does not match %s"
(fun () -> Ocsigen_request.remote_ip)
ri s;
r
let port port ri =
let r = Ocsigen_request.port ri = port in
if r
then Lwt_log.ign_info_f ~section "PORT = %d: true" port
else
Lwt_log.ign_info_f ~section "PORT = %d: false (it is %a)" port
(fun () ri -> string_of_int (Ocsigen_request.port ri))
ri;
r
let ssl ri =
let r = Ocsigen_request.ssl ri in
if r
then Lwt_log.ign_info ~section "SSL: true"
else Lwt_log.ign_info ~section "SSL: false";
r
let ~name ~regexp:re =
let regexp =
try Netstring_pcre.regexp ("^" ^ re ^ "$")
with Failure _ ->
Ocsigen_extensions.badconfig
"Bad regular expression [%s] in <header> condition" re
in
fun ri ->
let r =
List.exists
(fun a ->
let r = Netstring_pcre.string_match regexp a 0 <> None in
if r then Lwt_log.ign_info_f "HEADER: header %s matches %S" name re;
r)
(Ocsigen_request.header_multi ri (Ocsigen_header.Name.of_string name))
in
if not r
then Lwt_log.ign_info_f "HEADER: header %s does not match %S" name re;
r
let method_ m ri =
let m' = Ocsigen_request.meth ri in
let s = Cohttp.Code.string_of_method m in
let s' = Cohttp.Code.string_of_method m' in
let r = m = m' in
if r
then Lwt_log.ign_info_f ~section "METHOD: %s matches %s" s' s
else Lwt_log.ign_info_f ~section "METHOD: %s does not match %s" s' s;
r
let protocol v ri =
let v' = Ocsigen_request.version ri in
let s = Cohttp.Code.string_of_version v in
let s' = Cohttp.Code.string_of_version v' in
let r = v = v' in
if r
then Lwt_log.ign_info_f ~section "PROTOCOL: %s matches %s" s' s
else Lwt_log.ign_info_f ~section "PROTOCOL: %s does not match %s" s' s;
r
let path ~regexp:s =
let regexp =
try Netstring_pcre.regexp ("^" ^ s ^ "$")
with Failure _ ->
Ocsigen_extensions.badconfig
"Bad regular expression [%s] in <path> condition" s
in
fun ri ->
let sps = Ocsigen_request.sub_path_string ri in
let r = Netstring_pcre.string_match regexp sps 0 <> None in
if r
then Lwt_log.ign_info_f ~section "PATH: \"%s\" matches %S" sps s
else Lwt_log.ign_info_f ~section "PATH: \"%s\" does not match %S" sps s;
r
let and_ sub ri = List.for_all (fun cond -> cond ri) sub
let or_ sub ri = List.exists (fun cond -> cond ri) sub
let not_ sub ri = not (sub ri)
let rec parse_condition = function
| Element ("ip", [("value", s)], []) -> ip s
| Element (("ip" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("port", [("value", s)], []) ->
let p =
try int_of_string s
with Failure _ ->
Ocsigen_extensions.badconfig "Bad port [%s] in <port> condition" s
in
port p
| Element (("port" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("ssl", [], []) -> ssl
| Element (("ssl" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("header", [("name", name); ("regexp", regexp)], []) ->
header ~name ~regexp
| Element (("header" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("method", [("value", s)], []) ->
let m = Cohttp.Code.method_of_string s in
method_ m
| Element (("method" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("protocol", [("value", s)], []) ->
let v = Cohttp.Code.version_of_string s in
protocol v
| Element (("protocol" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("path", [("regexp", s)], []) ->
let regexp =
try Netstring_pcre.regexp ("^" ^ s ^ "$")
with Failure _ ->
Ocsigen_extensions.badconfig
"Bad regular expression [%s] in <path> condition" s
in
fun ri ->
let sps = Ocsigen_request.sub_path_string ri in
let r = Netstring_pcre.string_match regexp sps 0 <> None in
if r
then Lwt_log.ign_info_f ~section "PATH: \"%s\" matches %S" sps s
else Lwt_log.ign_info_f ~section "PATH: \"%s\" does not match %S" sps s;
r
| Element (("path" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("and", [], sub) ->
let sub = List.map parse_condition sub in
fun ri -> List.for_all (fun cond -> cond ri) sub
| Element (("and" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("or", [], sub) ->
let sub = List.map parse_condition sub in
fun ri -> List.exists (fun cond -> cond ri) sub
| Element (("or" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("not", [], [sub]) ->
let sub = parse_condition sub in
fun ri -> not (sub ri)
| Element (("not" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| _ -> Ocsigen_extensions.badconfig "Bad syntax for condition"
let comma_space_regexp = Netstring_pcre.regexp "\ *,\ *"
let allow_forward_for_handler ?(check_equal_ip = false) () =
let apply ({Ocsigen_extensions.request_info; _} as request) code =
Lwt_log.ign_info ~section "Allowed proxy";
let request =
let =
Ocsigen_request.header request_info Ocsigen_header.Name.x_forwarded_for
in
match header with
| Some -> (
match Ocsigen_lib.Netstring_pcre.split comma_space_regexp header with
| original_ip :: proxies ->
let last_proxy = List.last proxies in
let proxy_ip = Ipaddr.of_string_exn last_proxy in
let equal_ip =
proxy_ip = Ocsigen_request.remote_ip_parsed request_info
in
if equal_ip || not check_equal_ip
then
{ request with
Ocsigen_extensions.request_info =
Ocsigen_request.update ~forward_ip:proxies
~remote_ip:original_ip request_info }
else (
Lwt_log.ign_warning_f ~section
"X-Forwarded-For: host ip (%s) does not match the header (%s)"
(Ocsigen_request.remote_ip request_info)
header;
request)
| _ ->
Lwt_log.ign_info_f ~section "Malformed X-Forwarded-For field: %s"
header;
request)
| None -> request
in
Lwt.return
(Ocsigen_extensions.Ext_continue_with
(request, Ocsigen_cookie_map.empty, code))
in
function
| Ocsigen_extensions.Req_found (request, resp) ->
apply request (Ocsigen_response.status resp)
| Ocsigen_extensions.Req_not_found (code, request) -> apply request code
let allow_forward_proto_handler =
let apply ({Ocsigen_extensions.request_info; _} as request) code =
Lwt_log.ign_info ~section "Allowed proxy for ssl";
let request_info =
let =
Ocsigen_request.header request_info
Ocsigen_header.Name.x_forwarded_proto
in
match header with
| Some -> (
match String.lowercase_ascii header with
| "http" -> Ocsigen_request.update ~ssl:false request_info
| "https" -> Ocsigen_request.update ~ssl:true request_info
| _ ->
Lwt_log.ign_info_f ~section "Malformed X-Forwarded-Proto field: %s"
header;
request_info)
| None -> request_info
in
Lwt.return
(Ocsigen_extensions.Ext_continue_with
( {request with Ocsigen_extensions.request_info}
, Ocsigen_cookie_map.empty
, code ))
in
function
| Ocsigen_extensions.Req_found (request, resp) ->
apply request (Ocsigen_response.status resp)
| Ocsigen_extensions.Req_not_found (code, request) -> apply request code
let parse_config parse_fun = function
| Element ("if", [], sub) -> (
let condition, sub =
match sub with
| cond :: q -> parse_condition cond, q
| _ -> Ocsigen_extensions.badconfig "Bad condition in <if>"
in
let ithen, sub =
match sub with
| Element ("then", [], ithen) :: q -> parse_fun ithen, q
| _ -> Ocsigen_extensions.badconfig "Bad <then> branch in <if>"
in
let ielse, _sub =
match sub with
| Element ("else", [], ielse) :: ([] as q) -> parse_fun ielse, q
| [] -> parse_fun [], []
| _ -> Ocsigen_extensions.badconfig "Bad <else> branch in <if>"
in
function
| Ocsigen_extensions.Req_found (ri, _)
| Ocsigen_extensions.Req_not_found (_, ri) ->
Lwt.return
(if condition ri.Ocsigen_extensions.request_info
then (
Lwt_log.ign_info ~section "COND: going into <then> branch";
Ocsigen_extensions.Ext_sub_result ithen)
else (
Lwt_log.ign_info ~section
"COND: going into <else> branch, if any";
Ocsigen_extensions.Ext_sub_result ielse)))
| Element (("if" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("notfound", [], []) ->
fun _rs ->
Lwt_log.ign_info ~section "NOT_FOUND: taking in charge 404";
Lwt.return
(Ocsigen_extensions.Ext_stop_all (Ocsigen_cookie_map.empty, `Not_found))
| Element (("notfound" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("nextsite", [], []) -> (
function
| Ocsigen_extensions.Req_found (_, r) ->
Lwt.return
(Ocsigen_extensions.Ext_found_stop (fun () -> Lwt.return r))
| Ocsigen_extensions.Req_not_found _ ->
Lwt.return
(Ocsigen_extensions.Ext_stop_site
(Ocsigen_cookie_map.empty, `Not_found)))
| Element ("nexthost", [], []) -> (
function
| Ocsigen_extensions.Req_found (_, r) ->
Lwt.return
(Ocsigen_extensions.Ext_found_stop (fun () -> Lwt.return r))
| Ocsigen_extensions.Req_not_found _ ->
Lwt.return
(Ocsigen_extensions.Ext_stop_host
(Ocsigen_cookie_map.empty, `Not_found)))
| Element (("nextsite" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("stop", [], []) -> (
function
| Ocsigen_extensions.Req_found (_, r) ->
Lwt.return
(Ocsigen_extensions.Ext_found_stop (fun () -> Lwt.return r))
| Ocsigen_extensions.Req_not_found _ ->
Lwt.return
(Ocsigen_extensions.Ext_stop_all
(Ocsigen_cookie_map.empty, `Not_found)))
| Element (("stop" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Xml.Element ("forbidden", [], []) ->
fun _rs ->
Lwt_log.ign_info ~section "FORBIDDEN: taking in charge 403";
Lwt.return
(Ocsigen_extensions.Ext_stop_all (Ocsigen_cookie_map.empty, `Forbidden))
| Element (("forbidden" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("iffound", [], sub) -> (
let ext = parse_fun sub in
function
| Ocsigen_extensions.Req_found (_, _) ->
Lwt.return (Ocsigen_extensions.Ext_sub_result ext)
| Ocsigen_extensions.Req_not_found (err, _ri) ->
Lwt.return (Ocsigen_extensions.Ext_next err))
| Element (("iffound" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("ifnotfound", [], sub) -> (
let ext = parse_fun sub in
function
| Ocsigen_extensions.Req_found (_, r) ->
Lwt.return (Ocsigen_extensions.Ext_found (fun () -> Lwt.return r))
| Ocsigen_extensions.Req_not_found _ ->
Lwt.return (Ocsigen_extensions.Ext_sub_result ext))
| Element ("ifnotfound", [("code", s)], sub) -> (
let ext = parse_fun sub in
let re = Netstring_pcre.regexp ("^" ^ s ^ "$") in
function
| Ocsigen_extensions.Req_found (_, r) ->
Lwt.return (Ocsigen_extensions.Ext_found (fun () -> Lwt.return r))
| Ocsigen_extensions.Req_not_found (err, _ri) ->
if let err =
string_of_int Cohttp.Code.(code_of_status (err :> status_code))
in
Netstring_pcre.string_match re err 0 <> None
then Lwt.return (Ocsigen_extensions.Ext_sub_result ext)
else Lwt.return (Ocsigen_extensions.Ext_next err))
| Element (("ifnotfound" as s), _, _) ->
Ocsigen_extensions.badconfig "Bad syntax for tag %s" s
| Element ("allow-forward-for", param, _) ->
let check_equal_ip =
match param with
| [] -> false
| [("check-equal-ip", b)] -> (
try bool_of_string b
with Invalid_argument _ ->
Ocsigen_extensions.badconfig
"Bad syntax for argument of tag allow-forward-for")
| _ ->
Ocsigen_extensions.badconfig
"Bad syntax for argument of tag allow-forward-for"
in
allow_forward_for_handler ~check_equal_ip ()
| Element ("allow-forward-proto", _, _) -> allow_forward_proto_handler
| Element (t, _, _) ->
raise (Ocsigen_extensions.Bad_config_tag_for_extension t)
| _ -> Ocsigen_extensions.badconfig "(accesscontrol extension) Bad data"
let () =
Ocsigen_extensions.register ~name:"accesscontrol"
~fun_site:(fun _ _ _ _ _ -> parse_config)
()
let if_ condition ithen ielse vh ci p = function
| Ocsigen_extensions.Req_found (ri, _)
| Ocsigen_extensions.Req_not_found (_, ri) ->
Lwt.return
(if condition ri.Ocsigen_extensions.request_info
then
Ocsigen_extensions.Ext_sub_result
(Ocsigen_extensions.compose (List.map (fun i -> i vh ci p) ithen))
else
Ocsigen_extensions.Ext_sub_result
(Ocsigen_extensions.compose (List.map (fun i -> i vh ci p) ielse)))
let iffound instrs vh ci p = function
| Ocsigen_extensions.Req_found (_, _) ->
Lwt.return
(Ocsigen_extensions.Ext_sub_result
(Ocsigen_extensions.compose (List.map (fun i -> i vh ci p) instrs)))
| Ocsigen_extensions.Req_not_found (err, _ri) ->
Lwt.return (Ocsigen_extensions.Ext_next err)
let ifnotfound ?code instrs vh ci p =
let re = Option.map (fun s -> Netstring_pcre.regexp ("^" ^ s ^ "$")) code in
function
| Ocsigen_extensions.Req_found (_, r) ->
Lwt.return (Ocsigen_extensions.Ext_found (fun () -> Lwt.return r))
| Ocsigen_extensions.Req_not_found (err, _) -> (
match re with
| None ->
Lwt.return
(Ocsigen_extensions.Ext_sub_result
(Ocsigen_extensions.compose (List.map (fun i -> i vh ci p) instrs)))
| Some re ->
if let err =
string_of_int Cohttp.Code.(code_of_status (err :> status_code))
in
Netstring_pcre.string_match re err 0 <> None
then
Lwt.return
(Ocsigen_extensions.Ext_sub_result
(Ocsigen_extensions.compose
(List.map (fun i -> i vh ci p) instrs)))
else Lwt.return (Ocsigen_extensions.Ext_next err))
let notfound _ _ _ _ =
Lwt.return
(Ocsigen_extensions.Ext_stop_all (Ocsigen_cookie_map.empty, `Not_found))
let nextsite _ _ _ = function
| Ocsigen_extensions.Req_found (_, r) ->
Lwt.return (Ocsigen_extensions.Ext_found_stop (fun () -> Lwt.return r))
| Ocsigen_extensions.Req_not_found _ ->
Lwt.return
(Ocsigen_extensions.Ext_stop_site (Ocsigen_cookie_map.empty, `Not_found))
let nexthost _ _ _ = function
| Ocsigen_extensions.Req_found (_, r) ->
Lwt.return (Ocsigen_extensions.Ext_found_stop (fun () -> Lwt.return r))
| Ocsigen_extensions.Req_not_found _ ->
Lwt.return
(Ocsigen_extensions.Ext_stop_host (Ocsigen_cookie_map.empty, `Not_found))
let stop _ _ _ = function
| Ocsigen_extensions.Req_found (_, r) ->
Lwt.return (Ocsigen_extensions.Ext_found_stop (fun () -> Lwt.return r))
| Ocsigen_extensions.Req_not_found _ ->
Lwt.return
(Ocsigen_extensions.Ext_stop_all (Ocsigen_cookie_map.empty, `Not_found))
let forbidden _ _ _ _ =
Lwt.return
(Ocsigen_extensions.Ext_stop_all (Ocsigen_cookie_map.empty, `Forbidden))
let allow_forward_for ?check_equal_ip () _ _ _ =
allow_forward_for_handler ?check_equal_ip ()
let allow_forward_proto () _ _ _ = allow_forward_proto_handler