2018-09-14 16:33:36 +08:00
|
|
|
#include "pangu_logger.h"
|
2018-09-27 19:06:57 +08:00
|
|
|
#include "pattern_replace.h"
|
2018-09-14 11:42:22 +08:00
|
|
|
|
2018-09-12 16:04:04 +08:00
|
|
|
#include <tfe_stream.h>
|
|
|
|
|
#include <tfe_utils.h>
|
|
|
|
|
#include <tfe_http.h>
|
2018-09-18 12:01:56 +08:00
|
|
|
#include <tfe_plugin.h>
|
2018-09-12 16:04:04 +08:00
|
|
|
|
|
|
|
|
#include <MESA/Maat_rule.h>
|
|
|
|
|
#include <MESA/MESA_handle_logger.h>
|
|
|
|
|
#include <MESA/MESA_prof_load.h>
|
|
|
|
|
#include <MESA/stream.h>
|
2018-09-09 15:21:26 +08:00
|
|
|
|
2018-09-13 19:28:13 +08:00
|
|
|
#include <event2/event.h>
|
|
|
|
|
#include <event2/buffer.h>
|
|
|
|
|
|
2018-09-15 20:55:31 +08:00
|
|
|
#include <ctemplate/template.h>
|
2018-09-12 16:04:04 +08:00
|
|
|
#include <assert.h>
|
|
|
|
|
#include <time.h>
|
|
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <string.h>
|
2018-09-13 19:28:13 +08:00
|
|
|
#include <sys/types.h>
|
2018-09-27 19:06:57 +08:00
|
|
|
|
2018-09-13 19:28:13 +08:00
|
|
|
|
2018-09-25 11:15:00 +08:00
|
|
|
#define MAX_SCAN_RESULT 16
|
|
|
|
|
#define MAX_EDIT_ZONE_NUM 64
|
|
|
|
|
|
2018-09-12 16:04:04 +08:00
|
|
|
enum pangu_action//Bigger action number is prior.
|
|
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
PG_ACTION_NONE = 0x00,
|
|
|
|
|
PG_ACTION_MONIT = 0x01,
|
|
|
|
|
PG_ACTION_FORWARD = 0x02, /* N/A */
|
|
|
|
|
PG_ACTION_REJECT = 0x10,
|
|
|
|
|
PG_ACTION_DROP = 0x20, /* N/A */
|
|
|
|
|
PG_ACTION_REDIRECT = 0x30,
|
|
|
|
|
PG_ACTION_RATELIMIT = 0x40, /* N/A */
|
|
|
|
|
PG_ACTION_REPLACE = 0x50,
|
|
|
|
|
PG_ACTION_LOOP = 0x60, /* N/A */
|
2018-09-29 16:05:10 +08:00
|
|
|
PG_ACTION_WHITELIST = 0x80,
|
|
|
|
|
__PG_ACTION_MAX
|
2018-09-12 16:04:04 +08:00
|
|
|
};
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-12 16:04:04 +08:00
|
|
|
enum scan_table
|
|
|
|
|
{
|
|
|
|
|
PXY_CTRL_IP,
|
|
|
|
|
PXY_CTRL_HTTP_URL,
|
|
|
|
|
PXY_CTRL_HTTP_REQ_HDR,
|
|
|
|
|
PXY_CTRL_HTTP_REQ_BODY,
|
|
|
|
|
PXY_CTRL_HTTP_RES_HDR,
|
|
|
|
|
PXY_CTRL_HTTP_RES_BODY,
|
|
|
|
|
__SCAN_TABLE_MAX
|
|
|
|
|
};
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-12 16:04:04 +08:00
|
|
|
struct pangu_rt
|
|
|
|
|
{
|
|
|
|
|
Maat_feather_t maat;
|
2018-09-23 20:02:07 +08:00
|
|
|
struct pangu_logger * send_logger;
|
|
|
|
|
void * local_logger;
|
2018-09-12 16:04:04 +08:00
|
|
|
int log_level;
|
|
|
|
|
int thread_num;
|
|
|
|
|
int scan_table_id[__SCAN_TABLE_MAX];
|
2018-09-23 20:02:07 +08:00
|
|
|
ctemplate::Template * tpl_403, * tpl_404, * tpl_451;
|
|
|
|
|
char * reject_page;
|
2018-09-12 16:04:04 +08:00
|
|
|
int page_size;
|
|
|
|
|
};
|
2018-09-23 20:02:07 +08:00
|
|
|
struct pangu_rt * g_pangu_rt;
|
2018-09-25 11:15:00 +08:00
|
|
|
|
|
|
|
|
#define MAAT_INPUT_JSON 0
|
|
|
|
|
#define MAAT_INPUT_REDIS 1
|
|
|
|
|
#define MAAT_INPUT_FILE 2
|
2018-09-18 14:02:39 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
static Maat_feather_t create_maat_feather(const char * profile, const char * section, int max_thread, void * logger)
|
2018-09-09 15:21:26 +08:00
|
|
|
{
|
|
|
|
|
Maat_feather_t target;
|
2018-09-23 20:02:07 +08:00
|
|
|
int input_mode = 0, maat_stat_on = 0, maat_perf_on = 0;
|
|
|
|
|
int ret = 0, scan_detail = 0, effect_interval = 60;
|
|
|
|
|
char table_info[TFE_STRING_MAX] = {0}, inc_cfg_dir[TFE_STRING_MAX] = {0}, ful_cfg_dir[TFE_STRING_MAX] = {0};
|
|
|
|
|
char redis_server[TFE_STRING_MAX] = {0};
|
|
|
|
|
int redis_port = 0;
|
|
|
|
|
int redis_db_idx = 0;
|
|
|
|
|
char json_cfg_file[TFE_STRING_MAX] = {0}, maat_stat_file[TFE_STRING_MAX] = {0};
|
|
|
|
|
const char * instance_name = "pangu";
|
|
|
|
|
MESA_load_profile_int_def(profile, section, "MAAT_INPUT_MODE", &(input_mode), 0);
|
|
|
|
|
MESA_load_profile_int_def(profile, section, "STAT_SWITCH", &(maat_stat_on), 1);
|
|
|
|
|
MESA_load_profile_int_def(profile, section, "PERF_SWITCH", &(maat_perf_on), 1);
|
|
|
|
|
|
|
|
|
|
MESA_load_profile_string_def(profile, section, "TABLE_INFO", table_info, sizeof(table_info), "");
|
|
|
|
|
|
|
|
|
|
MESA_load_profile_string_def(profile, section, "JSON_CFG_FILE", json_cfg_file, sizeof(json_cfg_file), "");
|
|
|
|
|
|
|
|
|
|
MESA_load_profile_string_def(profile, section, "MAAT_REDIS_SERVER", redis_server, sizeof(redis_server), "");
|
|
|
|
|
MESA_load_profile_int_def(profile, section, "MAAT_REDIS_PORT", &(redis_port), 6379);
|
|
|
|
|
MESA_load_profile_int_def(profile, section, "MAAT_REDIS_DB_INDEX", &(redis_db_idx), 0);
|
|
|
|
|
|
|
|
|
|
MESA_load_profile_string_def(profile, section, "INC_CFG_DIR", inc_cfg_dir, sizeof(inc_cfg_dir), "");
|
|
|
|
|
MESA_load_profile_string_def(profile, section, "FULL_CFG_DIR", ful_cfg_dir, sizeof(ful_cfg_dir), "");
|
|
|
|
|
|
|
|
|
|
MESA_load_profile_string_def(profile, section, "STAT_FILE", maat_stat_file, sizeof(maat_stat_file), "");
|
|
|
|
|
MESA_load_profile_int_def(profile, section, "EFFECT_INTERVAL_S", &(effect_interval), 60);
|
|
|
|
|
|
|
|
|
|
effect_interval *= 1000;//convert s to ms
|
|
|
|
|
assert(strlen(inc_cfg_dir) != 0 && strlen(ful_cfg_dir) != 0);
|
|
|
|
|
|
|
|
|
|
target = Maat_feather(max_thread, table_info, logger);
|
|
|
|
|
Maat_set_feather_opt(target, MAAT_OPT_INSTANCE_NAME, instance_name, strlen(instance_name) + 1);
|
|
|
|
|
switch (input_mode)
|
|
|
|
|
{
|
|
|
|
|
case MAAT_INPUT_JSON:
|
|
|
|
|
Maat_set_feather_opt(target, MAAT_OPT_JSON_FILE_PATH, json_cfg_file, strlen(json_cfg_file) + 1);
|
2018-09-18 14:02:39 +08:00
|
|
|
break;
|
2018-09-23 20:02:07 +08:00
|
|
|
case MAAT_INPUT_REDIS: Maat_set_feather_opt(target, MAAT_OPT_REDIS_IP, redis_server, strlen(redis_server) + 1);
|
|
|
|
|
Maat_set_feather_opt(target, MAAT_OPT_REDIS_PORT, &redis_port, sizeof(redis_port));
|
|
|
|
|
Maat_set_feather_opt(target, MAAT_OPT_REDIS_INDEX, &redis_db_idx, sizeof(redis_db_idx));
|
2018-09-18 14:02:39 +08:00
|
|
|
break;
|
2018-09-23 20:02:07 +08:00
|
|
|
case MAAT_INPUT_FILE: Maat_set_feather_opt(target, MAAT_OPT_FULL_CFG_DIR, ful_cfg_dir, strlen(ful_cfg_dir) + 1);
|
|
|
|
|
Maat_set_feather_opt(target, MAAT_OPT_INC_CFG_DIR, inc_cfg_dir, strlen(inc_cfg_dir) + 1);
|
2018-09-18 14:02:39 +08:00
|
|
|
break;
|
2018-09-23 20:02:07 +08:00
|
|
|
default: TFE_LOG_ERROR(logger, "Invalid MAAT Input Mode: %d.", input_mode);
|
2018-09-18 14:02:39 +08:00
|
|
|
goto error_out;
|
|
|
|
|
break;
|
2018-09-09 15:21:26 +08:00
|
|
|
}
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
if (maat_stat_on)
|
2018-09-09 15:21:26 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
Maat_set_feather_opt(target, MAAT_OPT_STAT_FILE_PATH, maat_stat_file, strlen(maat_stat_file) + 1);
|
2018-09-09 15:21:26 +08:00
|
|
|
Maat_set_feather_opt(target, MAAT_OPT_STAT_ON, NULL, 0);
|
2018-09-23 20:02:07 +08:00
|
|
|
if (maat_perf_on)
|
2018-09-09 15:21:26 +08:00
|
|
|
{
|
|
|
|
|
Maat_set_feather_opt(target, MAAT_OPT_PERF_ON, NULL, 0);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Maat_set_feather_opt(target, MAAT_OPT_EFFECT_INVERVAL_MS, &effect_interval, sizeof(effect_interval));
|
|
|
|
|
Maat_set_feather_opt(target, MAAT_OPT_SCAN_DETAIL, &scan_detail, sizeof(scan_detail));
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
ret = Maat_initiate_feather(target);
|
|
|
|
|
if (ret < 0)
|
2018-09-09 15:21:26 +08:00
|
|
|
{
|
2018-09-12 16:04:04 +08:00
|
|
|
TFE_LOG_ERROR(logger, "%s MAAT init failed.", __FUNCTION__);
|
2018-09-18 14:02:39 +08:00
|
|
|
goto error_out;
|
2018-09-09 15:21:26 +08:00
|
|
|
}
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-09 15:21:26 +08:00
|
|
|
return target;
|
2018-09-18 14:02:39 +08:00
|
|
|
error_out:
|
|
|
|
|
Maat_burn_feather(target);
|
|
|
|
|
return NULL;
|
2018-09-09 15:21:26 +08:00
|
|
|
}
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-18 12:01:56 +08:00
|
|
|
int pangu_http_init(struct tfe_proxy * proxy)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
const char * profile = "./pangu_conf/pangu_pxy.conf";
|
|
|
|
|
const char * logfile = "./log/pangu_pxy.log";
|
|
|
|
|
g_pangu_rt = ALLOC(struct pangu_rt, 1);
|
|
|
|
|
g_pangu_rt->thread_num = 16;
|
|
|
|
|
MESA_load_profile_int_def(profile, "DEBUG", "LOG_LEVEL", &(g_pangu_rt->log_level), 0);
|
|
|
|
|
g_pangu_rt->local_logger = MESA_create_runtime_log_handle(logfile, g_pangu_rt->log_level);
|
|
|
|
|
g_pangu_rt->send_logger = pangu_log_handle_create(profile, "LOG", g_pangu_rt->local_logger);
|
|
|
|
|
if (!g_pangu_rt->send_logger)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
|
|
|
|
goto error_out;
|
|
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
g_pangu_rt->maat = create_maat_feather(profile, "MAAT", g_pangu_rt->thread_num, g_pangu_rt->local_logger);
|
|
|
|
|
if (!g_pangu_rt->maat)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
|
|
|
|
goto error_out;
|
|
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
const char * table_name[__SCAN_TABLE_MAX];
|
|
|
|
|
table_name[PXY_CTRL_IP] = "PXY_CTRL_IP";
|
|
|
|
|
table_name[PXY_CTRL_HTTP_URL] = "PXY_CTRL_HTTP_URL";
|
|
|
|
|
table_name[PXY_CTRL_HTTP_REQ_HDR] = "PXY_CTRL_HTTP_REQ_HDR";
|
|
|
|
|
table_name[PXY_CTRL_HTTP_REQ_BODY] = "PXY_CTRL_HTTP_REQ_BODY";
|
|
|
|
|
table_name[PXY_CTRL_HTTP_RES_HDR] = "PXY_CTRL_HTTP_RES_HDR";
|
|
|
|
|
table_name[PXY_CTRL_HTTP_RES_BODY] = "PXY_CTRL_HTTP_RES_BODY";
|
|
|
|
|
for (int i = 0; i < __SCAN_TABLE_MAX; i++)
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
g_pangu_rt->scan_table_id[i] = Maat_table_register(g_pangu_rt->maat, table_name[i]);
|
|
|
|
|
if (g_pangu_rt->scan_table_id[i] < 0)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-14 16:33:36 +08:00
|
|
|
TFE_LOG_ERROR(NULL, "Pangu HTTP Maat table %s register failed.", table_name[i]);
|
2018-09-12 16:04:04 +08:00
|
|
|
goto error_out;
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
|
2018-09-15 20:55:31 +08:00
|
|
|
char page_path[256];
|
2018-09-18 14:15:23 +08:00
|
|
|
memset(page_path, 0, sizeof(page_path));
|
2018-09-23 20:02:07 +08:00
|
|
|
MESA_load_profile_string_def(profile, "TEMPLATE", "PAGE_403", page_path, sizeof(page_path),
|
|
|
|
|
"./pangu_conf/template/HTTP403.html");
|
|
|
|
|
g_pangu_rt->tpl_403 = ctemplate::Template::GetTemplate(page_path, ctemplate::DO_NOT_STRIP);
|
2018-09-18 14:15:23 +08:00
|
|
|
memset(page_path, 0, sizeof(page_path));
|
2018-09-23 20:02:07 +08:00
|
|
|
MESA_load_profile_string_def(profile, "TEMPLATE", "PAGE_404", page_path, sizeof(page_path),
|
|
|
|
|
"./pangu_conf/template/HTTP404.html");
|
|
|
|
|
g_pangu_rt->tpl_404 = ctemplate::Template::GetTemplate(page_path, ctemplate::DO_NOT_STRIP);
|
2018-09-18 14:15:23 +08:00
|
|
|
memset(page_path, 0, sizeof(page_path));
|
2018-09-23 20:02:07 +08:00
|
|
|
MESA_load_profile_string_def(profile, "TEMPLATE", "PAGE_451", page_path, sizeof(page_path),
|
|
|
|
|
"./pangu_conf/template/HTTP451.html");
|
|
|
|
|
g_pangu_rt->tpl_451 = ctemplate::Template::GetTemplate(page_path, ctemplate::DO_NOT_STRIP);
|
|
|
|
|
|
2018-09-14 16:33:36 +08:00
|
|
|
TFE_LOG_INFO(NULL, "Pangu HTTP init success.");
|
2018-09-18 12:01:56 +08:00
|
|
|
return 0;
|
2018-09-23 20:02:07 +08:00
|
|
|
|
2018-09-12 16:04:04 +08:00
|
|
|
error_out:
|
2018-09-14 16:33:36 +08:00
|
|
|
TFE_LOG_ERROR(NULL, "Pangu HTTP init failed.");
|
2018-09-18 12:01:56 +08:00
|
|
|
return -1;
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
|
|
|
|
static void _wrap_std_field_write(struct tfe_http_half * half, enum tfe_http_std_field field_id, const char * value)
|
|
|
|
|
{
|
|
|
|
|
struct http_field_name tmp_name;
|
2018-09-23 20:02:07 +08:00
|
|
|
tmp_name.field_id = field_id;
|
|
|
|
|
tmp_name.field_name = NULL;
|
2018-09-14 16:33:36 +08:00
|
|
|
tfe_http_field_write(half, &tmp_name, value);
|
2018-09-12 16:04:04 +08:00
|
|
|
return;
|
|
|
|
|
}
|
2018-09-14 16:33:36 +08:00
|
|
|
#if 0
|
2018-09-12 16:04:04 +08:00
|
|
|
static void _wrap_non_std_field_write(struct tfe_http_half * half, const char* field_name, const char * value)
|
|
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
struct http_field_name tmp_name;
|
|
|
|
|
tmp_name.field_id=TFE_HTTP_UNKNOWN_FIELD;
|
|
|
|
|
//todo remove force convert after tfe_http.h improved.
|
|
|
|
|
tmp_name.field_name=(char*)field_name;
|
|
|
|
|
tfe_http_field_write(half, &tmp_name, value);
|
|
|
|
|
return;
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-14 16:33:36 +08:00
|
|
|
#endif
|
2018-09-27 19:06:57 +08:00
|
|
|
|
2018-09-13 19:28:13 +08:00
|
|
|
struct replace_ctx
|
|
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
struct replace_rule * rule;
|
2018-09-13 19:28:13 +08:00
|
|
|
size_t n_rule;
|
|
|
|
|
struct tfe_http_half * replacing;
|
2018-09-23 20:02:07 +08:00
|
|
|
struct evbuffer * http_body;
|
2018-09-28 19:27:44 +08:00
|
|
|
int actually_replaced;
|
2018-09-13 19:28:13 +08:00
|
|
|
};
|
2018-09-23 20:02:07 +08:00
|
|
|
|
2018-09-12 16:04:04 +08:00
|
|
|
struct pangu_http_ctx
|
|
|
|
|
{
|
|
|
|
|
enum pangu_action action;
|
2018-09-23 20:02:07 +08:00
|
|
|
char * action_para;
|
2018-09-12 16:04:04 +08:00
|
|
|
scan_status_t mid;
|
|
|
|
|
stream_para_t sp;
|
2018-09-23 20:02:07 +08:00
|
|
|
|
|
|
|
|
struct Maat_rule_t * enforce_rules;
|
2018-09-15 17:52:06 +08:00
|
|
|
size_t n_enforce;
|
2018-09-23 20:02:07 +08:00
|
|
|
char * enforce_para;
|
|
|
|
|
|
|
|
|
|
struct replace_ctx * rep_ctx;
|
2018-09-12 16:04:04 +08:00
|
|
|
int thread_id;
|
|
|
|
|
};
|
2018-09-13 19:28:13 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
static struct pangu_http_ctx * pangu_http_ctx_new(unsigned int thread_id)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
struct pangu_http_ctx * ctx = ALLOC(struct pangu_http_ctx, 1);
|
|
|
|
|
ctx->mid = NULL;
|
|
|
|
|
ctx->thread_id = (int) thread_id;
|
2018-09-12 16:04:04 +08:00
|
|
|
return ctx;
|
|
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
|
|
|
|
|
static void pangu_http_ctx_free(struct pangu_http_ctx * ctx)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-25 20:32:24 +08:00
|
|
|
if (ctx->rep_ctx == NULL)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
for (size_t i = 0; i < ctx->rep_ctx->n_rule; i++)
|
|
|
|
|
{
|
|
|
|
|
FREE(&(ctx->rep_ctx->rule[i].find));
|
|
|
|
|
FREE(&(ctx->rep_ctx->rule[i].replace_with));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (ctx->rep_ctx->http_body)
|
2018-09-13 19:28:13 +08:00
|
|
|
{
|
|
|
|
|
evbuffer_free(ctx->rep_ctx->http_body);
|
2018-09-23 20:02:07 +08:00
|
|
|
ctx->rep_ctx->http_body = NULL;
|
2018-09-13 19:28:13 +08:00
|
|
|
}
|
2018-09-25 20:32:24 +08:00
|
|
|
|
|
|
|
|
//todo destroy http_half;
|
|
|
|
|
assert(ctx->rep_ctx->replacing == NULL);
|
|
|
|
|
FREE(&ctx->rep_ctx);
|
2018-09-15 17:52:06 +08:00
|
|
|
FREE(&ctx->enforce_rules);
|
|
|
|
|
FREE(&ctx->enforce_para);
|
2018-09-12 16:04:04 +08:00
|
|
|
Maat_clean_status(&(ctx->mid));
|
2018-09-23 20:02:07 +08:00
|
|
|
assert(ctx->sp == NULL);
|
|
|
|
|
ctx->mid = NULL;
|
2018-09-15 17:52:06 +08:00
|
|
|
FREE(&ctx);
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
|
|
|
|
|
inline void addr_tfe2sapp(const struct tfe_stream_addr * tfe_addr, struct ipaddr * sapp_addr)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
sapp_addr->addrtype = tfe_addr->addrtype;
|
|
|
|
|
sapp_addr->paddr = (char *) tfe_addr->paddr;
|
2018-09-12 16:04:04 +08:00
|
|
|
return;
|
|
|
|
|
}
|
2018-09-29 16:05:10 +08:00
|
|
|
int action_cmp(enum pangu_action a1, enum pangu_action a2)
|
|
|
|
|
{
|
|
|
|
|
int weight[__PG_ACTION_MAX];
|
|
|
|
|
memset(weight, 0, sizeof(weight));
|
|
|
|
|
weight[PG_ACTION_MONIT] = 0;
|
|
|
|
|
weight[PG_ACTION_REPLACE] = 1;
|
|
|
|
|
weight[PG_ACTION_REDIRECT] = 2;
|
|
|
|
|
weight[PG_ACTION_REJECT] = 3;
|
|
|
|
|
weight[PG_ACTION_WHITELIST] = 4;
|
|
|
|
|
return weight[a1]-weight[a2];
|
|
|
|
|
}
|
2018-09-15 17:52:06 +08:00
|
|
|
//enforce_rules[0] contains execute action.
|
2018-09-23 20:02:07 +08:00
|
|
|
static enum pangu_action decide_ctrl_action(const struct Maat_rule_t * hit_rules, size_t n_hit,
|
|
|
|
|
struct Maat_rule_t ** enforce_rules, size_t * n_enforce)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
size_t n_monit = 0, exist_enforce_num = 0, i = 0;
|
|
|
|
|
const struct Maat_rule_t * prior_rule = hit_rules;
|
2018-09-15 17:52:06 +08:00
|
|
|
struct Maat_rule_t monit_rule[n_hit];
|
2018-09-23 20:02:07 +08:00
|
|
|
enum pangu_action prior_action = PG_ACTION_NONE;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < n_hit; i++)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
if ((enum pangu_action) hit_rules[i].action == PG_ACTION_MONIT)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
memcpy(monit_rule + n_monit, hit_rules + i, sizeof(struct Maat_rule_t));
|
2018-09-15 17:52:06 +08:00
|
|
|
n_monit++;
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-29 16:05:10 +08:00
|
|
|
if (action_cmp((enum pangu_action) hit_rules[i].action, prior_action)>0)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
prior_rule = hit_rules + i;
|
|
|
|
|
prior_action = (enum pangu_action) hit_rules[i].action;
|
2018-09-15 17:52:06 +08:00
|
|
|
}
|
2018-09-29 16:05:10 +08:00
|
|
|
else if (action_cmp((enum pangu_action) hit_rules[i].action, prior_action) == 0)
|
2018-09-15 17:52:06 +08:00
|
|
|
{
|
2018-09-29 16:05:10 +08:00
|
|
|
if (hit_rules[i].config_id > prior_rule->config_id)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
prior_rule = hit_rules + i;
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
|
|
|
|
|
if (prior_action == PG_ACTION_WHITELIST)
|
2018-09-15 17:52:06 +08:00
|
|
|
{
|
|
|
|
|
return PG_ACTION_WHITELIST;
|
|
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
|
|
|
|
|
exist_enforce_num = *n_enforce;
|
|
|
|
|
if (prior_action == PG_ACTION_MONIT)
|
2018-09-15 17:52:06 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
*n_enforce += n_monit;
|
2018-09-15 17:52:06 +08:00
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
*n_enforce += n_monit + 1;
|
2018-09-15 17:52:06 +08:00
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
|
|
|
|
|
*enforce_rules = (struct Maat_rule_t *) realloc(*enforce_rules, sizeof(struct Maat_rule_t) * (*n_enforce));
|
|
|
|
|
|
|
|
|
|
if (prior_action == PG_ACTION_MONIT)
|
|
|
|
|
{
|
|
|
|
|
memcpy(*enforce_rules + exist_enforce_num, monit_rule, n_monit * sizeof(struct Maat_rule_t));
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
memcpy(*enforce_rules + exist_enforce_num, prior_rule, sizeof(struct Maat_rule_t));
|
|
|
|
|
memcpy(*enforce_rules + exist_enforce_num + 1, monit_rule, n_monit * sizeof(struct Maat_rule_t));
|
|
|
|
|
}
|
|
|
|
|
|
2018-09-15 17:52:06 +08:00
|
|
|
return prior_action;
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-27 19:06:57 +08:00
|
|
|
//HTML template is downloaded from https://github.com/AndiDittrich/HttpErrorPages
|
2018-09-29 16:46:58 +08:00
|
|
|
static void html_generate(int status_code, int cfg_id, const char* msg, char ** page_buff, size_t * page_size)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-27 19:06:57 +08:00
|
|
|
ctemplate::TemplateDictionary dict("pg_page_dict"); //dict is automatically finalized after function returned.
|
2018-09-15 20:55:31 +08:00
|
|
|
dict.SetIntValue("cfg_id", cfg_id);
|
2018-09-29 16:46:58 +08:00
|
|
|
dict.SetValue("msg", msg);
|
2018-09-15 20:55:31 +08:00
|
|
|
std::string output;
|
2018-09-23 20:02:07 +08:00
|
|
|
ctemplate::Template * tpl = NULL;
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
switch (status_code)
|
2018-09-15 20:55:31 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
case 403: tpl = g_pangu_rt->tpl_403;
|
2018-09-15 20:55:31 +08:00
|
|
|
break;
|
2018-09-23 20:02:07 +08:00
|
|
|
case 404: tpl = g_pangu_rt->tpl_404;
|
2018-09-15 20:55:31 +08:00
|
|
|
break;
|
2018-09-23 20:02:07 +08:00
|
|
|
case 451: tpl = g_pangu_rt->tpl_451;
|
2018-09-15 20:55:31 +08:00
|
|
|
break;
|
2018-09-23 20:02:07 +08:00
|
|
|
default: return;
|
2018-09-15 20:55:31 +08:00
|
|
|
}
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-15 20:55:31 +08:00
|
|
|
tpl->Expand(&output, &dict);
|
2018-09-23 20:02:07 +08:00
|
|
|
*page_size = output.length();
|
|
|
|
|
*page_buff = ALLOC(char, *page_size);
|
|
|
|
|
memcpy(*page_buff, output.c_str(), *page_size);
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
static void html_free(char ** page_buff)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-15 20:55:31 +08:00
|
|
|
FREE(page_buff);
|
2018-09-12 16:04:04 +08:00
|
|
|
return;
|
|
|
|
|
}
|
2018-09-18 12:01:56 +08:00
|
|
|
static int is_http_request(enum tfe_http_event events)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
if ((events & EV_HTTP_REQ_HDR) | (events & EV_HTTP_REQ_BODY_BEGIN) | (events & EV_HTTP_REQ_BODY_END)
|
|
|
|
|
| (events & EV_HTTP_REQ_BODY_CONT))
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-09-13 19:28:13 +08:00
|
|
|
|
2018-09-25 20:32:24 +08:00
|
|
|
|
2018-09-13 19:28:13 +08:00
|
|
|
void http_replace(const struct tfe_stream * stream, const struct tfe_http_session * session,
|
2018-09-23 20:02:07 +08:00
|
|
|
enum tfe_http_event events, const unsigned char * body_frag, size_t frag_size, struct pangu_http_ctx * ctx)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
struct tfe_http_session * to_write_sess = NULL;
|
2018-09-28 15:41:29 +08:00
|
|
|
char * rewrite_buff = NULL;
|
|
|
|
|
size_t rewrite_sz = 0;
|
|
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
to_write_sess = tfe_http_session_allow_write(session);
|
|
|
|
|
if (to_write_sess == NULL) //fail to wirte, abandon.
|
|
|
|
|
{
|
|
|
|
|
TFE_STREAM_LOG_INFO(stream, "tfe_http_session_allow_write() %s failed.", session->req->req_spec.uri);
|
2018-09-25 20:32:24 +08:00
|
|
|
tfe_http_session_detach(session); return;
|
2018-09-14 16:33:36 +08:00
|
|
|
}
|
2018-09-25 20:32:24 +08:00
|
|
|
|
|
|
|
|
struct replace_ctx * rep_ctx = ctx->rep_ctx;
|
2018-09-23 20:02:07 +08:00
|
|
|
if (ctx->rep_ctx == NULL)
|
2018-09-13 19:28:13 +08:00
|
|
|
{
|
2018-09-25 20:32:24 +08:00
|
|
|
/* we must determinate the replace action on HTTP header, otherwise,
|
|
|
|
|
* the header has been forwarded, only replace the body but not modify header will raise exception */
|
|
|
|
|
if ((events & EV_HTTP_REQ_HDR) || (events & EV_HTTP_RESP_HDR))
|
|
|
|
|
{
|
|
|
|
|
ctx->rep_ctx = rep_ctx = ALLOC(struct replace_ctx, 1);
|
|
|
|
|
rep_ctx->rule = ALLOC(struct replace_rule, MAX_EDIT_ZONE_NUM);
|
|
|
|
|
rep_ctx->n_rule = format_replace_rule(ctx->enforce_para, rep_ctx->rule, MAX_EDIT_ZONE_NUM);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
TFE_STREAM_LOG_INFO(stream, "Can only setup replace on REQ/RESP headers, detached.");
|
|
|
|
|
tfe_http_session_detach(session); return;
|
|
|
|
|
}
|
2018-09-13 19:28:13 +08:00
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
|
2018-09-25 20:32:24 +08:00
|
|
|
struct tfe_http_half * in_req_half = session->req;
|
|
|
|
|
struct tfe_http_half * in_resp_half = session->resp;
|
|
|
|
|
struct tfe_http_req_spec * in_req_spec = &in_req_half->req_spec;
|
|
|
|
|
struct tfe_http_resp_spec * in_resp_spec = &in_resp_half->resp_spec;
|
|
|
|
|
|
|
|
|
|
if ((events & EV_HTTP_REQ_HDR) || (events & EV_HTTP_RESP_HDR))
|
|
|
|
|
{
|
2018-09-28 15:41:29 +08:00
|
|
|
char * rewrite_uri = NULL;
|
|
|
|
|
size_t rewrite_uri_sz=0;
|
2018-09-25 20:32:24 +08:00
|
|
|
if (is_http_request(events))
|
2018-09-13 19:28:13 +08:00
|
|
|
{
|
2018-09-28 15:41:29 +08:00
|
|
|
rewrite_uri_sz = execute_replace_rule(in_req_spec->uri, strlen(in_req_spec->uri),
|
|
|
|
|
kZoneRequestUri, rep_ctx->rule, rep_ctx->n_rule, &rewrite_uri);
|
2018-09-28 19:27:44 +08:00
|
|
|
if(rewrite_uri_sz>0) rep_ctx->actually_replaced=1;
|
2018-09-25 20:32:24 +08:00
|
|
|
rep_ctx->replacing = tfe_http_session_request_create(to_write_sess, in_req_spec->method,
|
2018-09-28 15:41:29 +08:00
|
|
|
rewrite_uri_sz >0 ? rewrite_uri : in_req_spec->uri);
|
2018-09-25 20:32:24 +08:00
|
|
|
|
|
|
|
|
tfe_http_session_request_set(to_write_sess, rep_ctx->replacing);
|
2018-09-13 19:28:13 +08:00
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2018-09-25 20:32:24 +08:00
|
|
|
rep_ctx->replacing = tfe_http_session_response_create(to_write_sess, in_resp_spec->resp_code);
|
|
|
|
|
tfe_http_session_response_set(to_write_sess, rep_ctx->replacing);
|
2018-09-13 19:28:13 +08:00
|
|
|
}
|
2018-09-25 20:32:24 +08:00
|
|
|
|
|
|
|
|
if (rewrite_uri != NULL)
|
2018-09-13 19:28:13 +08:00
|
|
|
{
|
2018-09-28 15:41:29 +08:00
|
|
|
FREE(&rewrite_uri);
|
2018-09-25 20:32:24 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
enum replace_zone zone = is_http_request(events) ? kZoneRequestHeaders : kZoneResponseHeader;
|
|
|
|
|
struct tfe_http_half * in_half = is_http_request(events) ? in_req_half : in_resp_half;
|
|
|
|
|
|
|
|
|
|
struct http_field_name in_header_field{};
|
|
|
|
|
const char * in_header_value = NULL;
|
|
|
|
|
void * iterator = NULL;
|
|
|
|
|
|
|
|
|
|
while (true)
|
|
|
|
|
{
|
|
|
|
|
if ((in_header_value = tfe_http_field_iterate(in_half, &iterator, &in_header_field)) == NULL)
|
2018-09-13 19:28:13 +08:00
|
|
|
{
|
2018-09-25 20:32:24 +08:00
|
|
|
break;
|
2018-09-13 19:28:13 +08:00
|
|
|
}
|
|
|
|
|
|
2018-09-28 15:41:29 +08:00
|
|
|
rewrite_buff = NULL;
|
|
|
|
|
rewrite_sz = 0;
|
|
|
|
|
rewrite_sz=execute_replace_rule(in_header_value,
|
|
|
|
|
strlen(in_header_value), zone, rep_ctx->rule, rep_ctx->n_rule, &rewrite_buff);
|
2018-09-28 19:27:44 +08:00
|
|
|
|
|
|
|
|
if(rewrite_sz>0) rep_ctx->actually_replaced=1;
|
2018-09-28 15:41:29 +08:00
|
|
|
tfe_http_field_write(rep_ctx->replacing, &in_header_field, rewrite_sz>0? rewrite_buff : in_header_value);
|
|
|
|
|
if(rewrite_buff != NULL)
|
2018-09-25 20:32:24 +08:00
|
|
|
{
|
2018-09-28 15:41:29 +08:00
|
|
|
FREE(&rewrite_buff);
|
2018-09-13 19:28:13 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-09-25 20:32:24 +08:00
|
|
|
|
|
|
|
|
if ((events & EV_HTTP_REQ_BODY_BEGIN) || (events & EV_HTTP_RESP_BODY_BEGIN))
|
2018-09-13 19:28:13 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
assert(rep_ctx->http_body == NULL);
|
|
|
|
|
rep_ctx->http_body = evbuffer_new();
|
2018-09-13 19:28:13 +08:00
|
|
|
}
|
2018-09-25 20:32:24 +08:00
|
|
|
|
|
|
|
|
if ((events & EV_HTTP_REQ_BODY_CONT) || (events & EV_HTTP_RESP_BODY_CONT))
|
2018-09-13 19:28:13 +08:00
|
|
|
{
|
|
|
|
|
evbuffer_add(rep_ctx->http_body, body_frag, frag_size);
|
2018-09-25 20:32:24 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ((events & EV_HTTP_REQ_BODY_END) || (events & EV_HTTP_RESP_BODY_END))
|
|
|
|
|
{
|
|
|
|
|
char * __http_body = (char *) evbuffer_pullup(rep_ctx->http_body, -1);
|
|
|
|
|
size_t __http_body_len = evbuffer_get_length(rep_ctx->http_body);
|
|
|
|
|
|
2018-09-28 15:41:29 +08:00
|
|
|
enum replace_zone r_zone = is_http_request(events) ? kZoneRequestBody : kZoneResponseBody;
|
|
|
|
|
|
|
|
|
|
rewrite_buff = NULL;
|
|
|
|
|
rewrite_sz = 0;
|
|
|
|
|
|
|
|
|
|
rewrite_sz = execute_replace_rule(__http_body, __http_body_len, r_zone,
|
|
|
|
|
rep_ctx->rule, rep_ctx->n_rule, &rewrite_buff);
|
|
|
|
|
|
2018-09-25 20:32:24 +08:00
|
|
|
|
2018-09-28 15:41:29 +08:00
|
|
|
if (rewrite_sz >0 )
|
2018-09-13 19:28:13 +08:00
|
|
|
{
|
2018-09-28 15:41:29 +08:00
|
|
|
tfe_http_half_append_body(rep_ctx->replacing, rewrite_buff, rewrite_sz, 0);
|
2018-09-28 19:27:44 +08:00
|
|
|
rep_ctx->actually_replaced=1;
|
2018-09-25 20:32:24 +08:00
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
tfe_http_half_append_body(rep_ctx->replacing, __http_body, __http_body_len, 0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (rewrite_buff != NULL)
|
|
|
|
|
{
|
2018-09-28 15:41:29 +08:00
|
|
|
FREE(&rewrite_buff);
|
2018-09-25 20:32:24 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (rep_ctx->http_body != NULL)
|
|
|
|
|
{
|
|
|
|
|
evbuffer_free(rep_ctx->http_body);
|
|
|
|
|
rep_ctx->http_body = NULL;
|
|
|
|
|
}
|
2018-09-13 19:28:13 +08:00
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
|
2018-09-25 20:32:24 +08:00
|
|
|
if ((events & EV_HTTP_REQ_END) || (events & EV_HTTP_RESP_END))
|
|
|
|
|
{
|
|
|
|
|
tfe_http_half_append_body(rep_ctx->replacing, NULL, 0, 0);
|
|
|
|
|
rep_ctx->replacing = NULL;
|
|
|
|
|
}
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-25 20:32:24 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
static void http_reject(const struct tfe_http_session * session, enum tfe_http_event events,
|
|
|
|
|
struct pangu_http_ctx * ctx)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
int resp_code = 0, ret = 0;
|
|
|
|
|
struct tfe_http_half * response = NULL;
|
|
|
|
|
char * page_buff = NULL;
|
|
|
|
|
size_t page_size = 0;
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-29 16:46:58 +08:00
|
|
|
char cont_len_str[16];
|
|
|
|
|
char msg[TFE_STRING_MAX];
|
2018-09-23 20:02:07 +08:00
|
|
|
struct tfe_http_session * to_write_sess = NULL;
|
2018-09-12 16:04:04 +08:00
|
|
|
|
2018-09-29 16:46:58 +08:00
|
|
|
ret = sscanf(ctx->enforce_para, "code=%d;content=%s", &resp_code, msg);
|
|
|
|
|
if (ret != 2)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
TFE_LOG_ERROR(g_pangu_rt->local_logger, "Invalid reject rule %d paramter %s",
|
2018-09-29 16:46:58 +08:00
|
|
|
ctx->enforce_rules[0].config_id, ctx->enforce_para);
|
|
|
|
|
ctx->action==PG_ACTION_NONE;
|
|
|
|
|
goto error_out;
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
to_write_sess = tfe_http_session_allow_write(session);
|
|
|
|
|
response = tfe_http_session_response_create(to_write_sess, resp_code);
|
|
|
|
|
|
2018-09-29 16:46:58 +08:00
|
|
|
html_generate(resp_code, ctx->enforce_rules[0].config_id, msg, &page_buff, &page_size);
|
2018-09-12 16:04:04 +08:00
|
|
|
_wrap_std_field_write(response, TFE_HTTP_CONT_TYPE, "text/html; charset=utf-8");
|
2018-09-23 20:02:07 +08:00
|
|
|
snprintf(cont_len_str, sizeof(cont_len_str), "%lu", page_size);
|
2018-09-13 19:28:13 +08:00
|
|
|
_wrap_std_field_write(response, TFE_HTTP_CONT_LENGTH, cont_len_str);
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-13 19:28:13 +08:00
|
|
|
tfe_http_half_append_body(response, page_buff, page_size, 0);
|
2018-09-25 20:32:24 +08:00
|
|
|
tfe_http_half_append_body(response, NULL, 0, 0);
|
2018-09-14 16:33:36 +08:00
|
|
|
tfe_http_session_response_set(to_write_sess, response);
|
2018-09-25 11:15:00 +08:00
|
|
|
tfe_http_session_detach(session);
|
|
|
|
|
|
2018-09-12 16:04:04 +08:00
|
|
|
error_out:
|
2018-09-14 16:33:36 +08:00
|
|
|
html_free(&page_buff);
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-25 11:15:00 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
static void http_redirect(const struct tfe_http_session * session, enum tfe_http_event events,
|
|
|
|
|
struct pangu_http_ctx * ctx)
|
|
|
|
|
{
|
|
|
|
|
int resp_code = 0, ret = 0;
|
|
|
|
|
char * url = NULL;
|
2018-09-25 10:17:50 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
struct tfe_http_half * response = NULL;
|
|
|
|
|
struct tfe_http_session * to_write = NULL;
|
2018-09-25 10:17:50 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
url = ALLOC(char, ctx->enforce_rules[0].serv_def_len);
|
2018-09-25 10:17:50 +08:00
|
|
|
ret = sscanf(ctx->enforce_para, "code=%d;url=%[^;]", &resp_code, url);
|
|
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
if (ret != 2)
|
|
|
|
|
{
|
|
|
|
|
TFE_LOG_ERROR(g_pangu_rt->local_logger, "Invalid redirect rule %d paramter %s",
|
|
|
|
|
ctx->enforce_rules[0].config_id, ctx->enforce_para);
|
2018-09-12 16:04:04 +08:00
|
|
|
goto error_out;
|
|
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
|
|
|
|
|
to_write = tfe_http_session_allow_write(session);
|
2018-09-25 10:17:50 +08:00
|
|
|
if (to_write == NULL)
|
|
|
|
|
{
|
|
|
|
|
assert(0);
|
|
|
|
|
}
|
|
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
response = tfe_http_session_response_create(to_write, resp_code);
|
2018-09-12 16:04:04 +08:00
|
|
|
_wrap_std_field_write(response, TFE_HTTP_LOCATION, url);
|
2018-09-25 20:32:24 +08:00
|
|
|
tfe_http_half_append_body(response, NULL, 0, 0);
|
2018-09-25 10:17:50 +08:00
|
|
|
|
2018-09-13 19:28:13 +08:00
|
|
|
tfe_http_session_response_set(to_write, response);
|
2018-09-25 10:17:50 +08:00
|
|
|
tfe_http_session_detach(session);
|
2018-09-23 20:02:07 +08:00
|
|
|
|
2018-09-12 16:04:04 +08:00
|
|
|
error_out:
|
|
|
|
|
free(url);
|
2018-09-13 19:28:13 +08:00
|
|
|
return;
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
|
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
enum pangu_action http_scan(const struct tfe_http_session * session, enum tfe_http_event events,
|
|
|
|
|
const unsigned char * body_frag, size_t frag_size, struct pangu_http_ctx * ctx)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
void * interator = NULL;
|
|
|
|
|
const char * field_val = NULL;
|
2018-09-12 16:04:04 +08:00
|
|
|
struct http_field_name field_name;
|
2018-09-14 16:33:36 +08:00
|
|
|
struct Maat_rule_t result[MAX_SCAN_RESULT];
|
2018-09-23 20:02:07 +08:00
|
|
|
char buff[TFE_STRING_MAX], * p = NULL;
|
|
|
|
|
int scan_ret = 0, table_id = 0, read_rule_ret = 0;
|
|
|
|
|
size_t hit_cnt = 0, i = 0;
|
|
|
|
|
|
|
|
|
|
if (events & EV_HTTP_REQ_HDR)
|
|
|
|
|
{
|
|
|
|
|
const char * str_url = session->req->req_spec.url;
|
|
|
|
|
int str_url_length = (int) (strlen(session->req->req_spec.url));
|
|
|
|
|
|
|
|
|
|
scan_ret = Maat_full_scan_string(g_pangu_rt->maat, g_pangu_rt->scan_table_id[PXY_CTRL_HTTP_URL],
|
|
|
|
|
CHARSET_UTF8, str_url, str_url_length, result, NULL, MAX_SCAN_RESULT, &(ctx->mid), ctx->thread_id);
|
|
|
|
|
|
|
|
|
|
if (scan_ret > 0)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
hit_cnt += scan_ret;
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
|
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
|
|
|
|
|
if ((events & EV_HTTP_REQ_HDR) || (events & EV_HTTP_RESP_HDR))
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
table_id = events & EV_HTTP_REQ_HDR ? g_pangu_rt->scan_table_id[PXY_CTRL_HTTP_REQ_HDR] : g_pangu_rt
|
|
|
|
|
->scan_table_id[PXY_CTRL_HTTP_RES_HDR];
|
|
|
|
|
while (hit_cnt < MAX_SCAN_RESULT)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
field_val = tfe_http_field_iterate(session->req, &interator, &field_name);
|
|
|
|
|
if (field_val == NULL)
|
2018-09-14 16:33:36 +08:00
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
2018-09-18 18:48:21 +08:00
|
|
|
|
|
|
|
|
const char * str_field_name = http_field_to_string(&field_name);
|
2018-09-23 20:02:07 +08:00
|
|
|
scan_ret = Maat_set_scan_status(g_pangu_rt->maat, &(ctx->mid), MAAT_SET_SCAN_DISTRICT,
|
|
|
|
|
str_field_name, strlen(str_field_name));
|
|
|
|
|
|
|
|
|
|
assert(scan_ret == 0);
|
|
|
|
|
scan_ret = Maat_full_scan_string(g_pangu_rt->maat, table_id,
|
|
|
|
|
CHARSET_UTF8, field_val, strlen(field_val),
|
|
|
|
|
result + hit_cnt, NULL, MAX_SCAN_RESULT - hit_cnt, &(ctx->mid), ctx->thread_id);
|
|
|
|
|
if (scan_ret > 0)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
hit_cnt += scan_ret;
|
2018-09-14 16:33:36 +08:00
|
|
|
}
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
|
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
if ((events & EV_HTTP_REQ_BODY_BEGIN) | (events & EV_HTTP_RESP_BODY_BEGIN))
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
assert(ctx->sp == NULL);
|
|
|
|
|
table_id = events & EV_HTTP_REQ_BODY_BEGIN ? g_pangu_rt->scan_table_id[PXY_CTRL_HTTP_REQ_BODY] : g_pangu_rt
|
|
|
|
|
->scan_table_id[PXY_CTRL_HTTP_RES_BODY];
|
|
|
|
|
ctx->sp = Maat_stream_scan_string_start(g_pangu_rt->maat, table_id, ctx->thread_id);
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
if (body_frag != NULL)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
scan_ret = Maat_stream_scan_string(&(ctx->sp), CHARSET_UTF8, (const char *) body_frag, (int) frag_size,
|
|
|
|
|
result + hit_cnt, NULL, MAX_SCAN_RESULT - hit_cnt, &(ctx->mid));
|
|
|
|
|
if (scan_ret > 0)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
hit_cnt += scan_ret;
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
|
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
if ((events & EV_HTTP_REQ_BODY_END) | (events & EV_HTTP_RESP_BODY_END))
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-14 16:33:36 +08:00
|
|
|
Maat_stream_scan_string_end(&(ctx->sp));
|
2018-09-23 20:02:07 +08:00
|
|
|
ctx->sp = NULL;
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-25 10:17:50 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
if (hit_cnt > 0)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
ctx->action = decide_ctrl_action(result, hit_cnt, &ctx->enforce_rules, &ctx->n_enforce);
|
2018-09-25 10:17:50 +08:00
|
|
|
size_t __serv_def_len = (size_t)ctx->enforce_rules[0].serv_def_len;
|
|
|
|
|
ctx->enforce_para = ALLOC(char, __serv_def_len);
|
|
|
|
|
|
|
|
|
|
if (__serv_def_len > MAX_SERVICE_DEFINE_LEN)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-25 10:17:50 +08:00
|
|
|
read_rule_ret = Maat_read_rule(g_pangu_rt->maat, &ctx->enforce_rules[0], MAAT_RULE_SERV_DEFINE,
|
|
|
|
|
ctx->enforce_para, ctx->enforce_rules[0].serv_def_len);
|
2018-09-23 20:02:07 +08:00
|
|
|
assert(read_rule_ret == ctx->enforce_rules[0].serv_def_len);
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-25 10:17:50 +08:00
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
strcpy(ctx->enforce_para, ctx->enforce_rules[0].service_defined);
|
|
|
|
|
}
|
|
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
if (hit_cnt > 1)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
p = buff;
|
|
|
|
|
for (i = 0; i < hit_cnt; i++)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
p += snprintf(p, sizeof(buff) - (p - buff), "%d:", result[i].config_id);
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-25 10:17:50 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
*p = '\0';
|
|
|
|
|
TFE_LOG_INFO(g_pangu_rt->local_logger, "Multiple rules matched: url=%s num=%lu ids=%s execute=%d.",
|
|
|
|
|
session->req->req_spec.url, hit_cnt, buff, ctx->enforce_rules[0].config_id);
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
|
|
|
|
}
|
2018-09-25 10:17:50 +08:00
|
|
|
|
2018-09-12 16:04:04 +08:00
|
|
|
return ctx->action;
|
|
|
|
|
}
|
|
|
|
|
|
2018-09-14 16:33:36 +08:00
|
|
|
void pangu_on_http_begin(const struct tfe_stream * stream,
|
2018-09-12 16:04:04 +08:00
|
|
|
const struct tfe_http_session * session, unsigned int thread_id, void ** pme)
|
|
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
struct pangu_http_ctx * ctx = *(struct pangu_http_ctx **) pme;
|
2018-09-12 16:04:04 +08:00
|
|
|
struct Maat_rule_t result[MAX_SCAN_RESULT];
|
|
|
|
|
struct ipaddr sapp_addr;
|
2018-09-23 20:02:07 +08:00
|
|
|
int hit_cnt = 0;
|
|
|
|
|
assert(ctx == NULL);
|
|
|
|
|
ctx = pangu_http_ctx_new(thread_id);
|
2018-09-14 16:33:36 +08:00
|
|
|
addr_tfe2sapp(stream->addr, &sapp_addr);
|
2018-09-23 20:02:07 +08:00
|
|
|
hit_cnt = Maat_scan_proto_addr(g_pangu_rt->maat, g_pangu_rt->scan_table_id[PXY_CTRL_IP], &sapp_addr, 0,
|
|
|
|
|
result, MAX_SCAN_RESULT, &(ctx->mid), (int) thread_id);
|
|
|
|
|
|
|
|
|
|
if (hit_cnt > 0)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
ctx->action = decide_ctrl_action(result, hit_cnt, &ctx->enforce_rules, &ctx->n_enforce);
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
if (ctx->action == PG_ACTION_WHITELIST)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-14 16:33:36 +08:00
|
|
|
tfe_http_session_detach(session);
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-18 18:48:21 +08:00
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
*pme = ctx;
|
2018-09-18 12:01:56 +08:00
|
|
|
return;
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void pangu_on_http_end(const struct tfe_stream * stream,
|
|
|
|
|
const struct tfe_http_session * session, unsigned int thread_id, void ** pme)
|
|
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
struct pangu_http_ctx * ctx = *(struct pangu_http_ctx **) pme;
|
2018-09-29 16:05:10 +08:00
|
|
|
int i=0, j=0;
|
|
|
|
|
if(ctx->action == PG_ACTION_REPLACE && ctx->rep_ctx->actually_replaced==0)
|
|
|
|
|
{
|
|
|
|
|
for(i=0; i< ctx->n_enforce; i++)
|
|
|
|
|
{
|
|
|
|
|
if(ctx->enforce_rules[i].action == PG_ACTION_REPLACE)
|
|
|
|
|
{
|
|
|
|
|
if(i+1 > ctx->n_enforce)
|
|
|
|
|
{
|
|
|
|
|
memmove(ctx->enforce_rules+i, ctx->enforce_rules+i+1, sizeof(struct Maat_rule_t));
|
|
|
|
|
}
|
|
|
|
|
j++;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ctx->n_enforce-=j;
|
|
|
|
|
if(ctx->n_enforce==0)
|
|
|
|
|
{
|
|
|
|
|
ctx->action = PG_ACTION_NONE;
|
|
|
|
|
FREE(&(ctx->enforce_rules));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
struct pangu_log log_msg = {.stream=stream, .http=session, .result=ctx->enforce_rules, .result_num=ctx->n_enforce};
|
|
|
|
|
if (ctx->action != PG_ACTION_NONE&& !(ctx->action == PG_ACTION_REPLACE && ctx->n_enforce==1 && ctx->rep_ctx->actually_replaced==0))
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-18 14:02:39 +08:00
|
|
|
pangu_send_log(g_pangu_rt->send_logger, &log_msg);
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
|
|
|
|
pangu_http_ctx_free(ctx);
|
2018-09-23 20:02:07 +08:00
|
|
|
*pme = NULL;
|
2018-09-12 16:04:04 +08:00
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2018-09-23 20:02:07 +08:00
|
|
|
void pangu_on_http_data(const struct tfe_stream * stream, const struct tfe_http_session * session,
|
|
|
|
|
enum tfe_http_event events, const unsigned char * body_frag, size_t frag_size, unsigned int thread_id, void ** pme)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
struct pangu_http_ctx * ctx = *(struct pangu_http_ctx **) pme;
|
|
|
|
|
enum pangu_action hit_action = PG_ACTION_NONE;
|
2018-09-12 16:04:04 +08:00
|
|
|
|
|
|
|
|
Re_Enter:
|
2018-09-23 20:02:07 +08:00
|
|
|
switch (ctx->action)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
2018-09-23 20:02:07 +08:00
|
|
|
case PG_ACTION_NONE: hit_action = http_scan(session, events, body_frag, frag_size, ctx);
|
|
|
|
|
if (hit_action != PG_ACTION_NONE)
|
2018-09-12 16:04:04 +08:00
|
|
|
{
|
|
|
|
|
//ctx->action changed in http_scan.
|
|
|
|
|
goto Re_Enter;
|
|
|
|
|
}
|
|
|
|
|
break;
|
2018-09-23 20:02:07 +08:00
|
|
|
case PG_ACTION_MONIT:
|
2018-09-12 16:04:04 +08:00
|
|
|
//send log on close.
|
|
|
|
|
break;
|
2018-09-23 20:02:07 +08:00
|
|
|
case PG_ACTION_REJECT: http_reject(session, events, ctx);
|
2018-09-12 16:04:04 +08:00
|
|
|
break;
|
2018-09-23 20:02:07 +08:00
|
|
|
case PG_ACTION_REDIRECT: http_redirect(session, events, ctx);
|
2018-09-25 10:17:50 +08:00
|
|
|
break;
|
2018-09-23 20:02:07 +08:00
|
|
|
case PG_ACTION_REPLACE: http_replace(stream, session, events, body_frag, frag_size, ctx);
|
2018-09-12 16:04:04 +08:00
|
|
|
break;
|
2018-09-23 20:02:07 +08:00
|
|
|
case PG_ACTION_WHITELIST: tfe_http_session_detach(session);
|
2018-09-12 16:04:04 +08:00
|
|
|
break;
|
2018-09-23 20:02:07 +08:00
|
|
|
default: assert(0);
|
2018-09-12 16:04:04 +08:00
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2018-09-13 19:28:13 +08:00
|
|
|
return;
|
2018-09-12 16:04:04 +08:00
|
|
|
}
|
2018-09-23 20:02:07 +08:00
|
|
|
struct tfe_plugin pangu_http_spec = {
|
|
|
|
|
.symbol=NULL,
|
|
|
|
|
.type = TFE_PLUGIN_TYPE_BUSINESS,
|
|
|
|
|
.on_init = pangu_http_init,
|
|
|
|
|
.on_deinit = NULL,
|
|
|
|
|
.on_open = NULL,
|
|
|
|
|
.on_data = NULL,
|
|
|
|
|
.on_close = NULL,
|
|
|
|
|
.on_session_begin=pangu_on_http_begin,
|
|
|
|
|
.on_session_data=pangu_on_http_data,
|
|
|
|
|
.on_session_end=pangu_on_http_end
|
|
|
|
|
};
|
2018-09-18 12:01:56 +08:00
|
|
|
TFE_PLUGIN_REGISTER(pangu_http, pangu_http_spec)
|
2018-09-09 15:21:26 +08:00
|
|
|
|