/************************************************************************* > File Name: verify-policy.cpp > Author: > Mail: > Created Time: 2019年08月23日 星期五 14时41分17秒 ************************************************************************/ #include #include #include #include #include #include #include #include #include #include #include //inet_addr #include //inet_addr #include //inet_addr #include #include "verify_policy.h" #include "MESA_prof_load.h" #include "MESA_handle_logger.h" #include "verify_policy_utils.h" #include "verify_policy_logging.h" struct verify_proxy * g_verify_proxy = NULL; struct keyword_obj { int protocol_field; char *content_type; char *content; char *protocol_field_name; struct ipaddr *ip_addr; int addr_type; int protocol; char *clientIp1; unsigned int clientPort1; char *serverIp1; unsigned int serverPort1; char *subscriberid; }; struct verify_policy_query { int c_num; enum policy_type type; char *policy_type_name; struct keyword_obj keywords[32]; }; /* VERSION STRING */ #ifdef TARGET_GIT_VERSION static __attribute__((__used__)) const char * git_ver = TARGET_GIT_VERSION; #else static __attribute__((__used__)) const char * git_ver = "1.1"; #endif const char * version() { return git_ver; } extern int pangu_policy_init(struct verify_proxy * verify, const char* profile_path); static int verify_policy_init(struct verify_proxy * verify, const char *profile) { int xret = -1; xret = MESA_load_profile_uint_nodef(profile, "CONFIG", "thread-nu", &(verify->nr_work_threads)); if (xret < 0){ mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "Reading the number of running threads failed"); } xret = MESA_load_profile_short_nodef(profile, "LISTEN", "port", (short *)&(verify->listen_port)); if (xret < 0){ mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "Listen Port invalid"); } mesa_runtime_log(RLOG_LV_INFO, MODULE_NAME, "%s:%d", "The Threads", verify->nr_work_threads); mesa_runtime_log(RLOG_LV_INFO, MODULE_NAME, "%s:%d", "Libevent Port", verify->listen_port); return xret; } enum policy_type policy_type_str2idx(const char *action_str) { const char * policy_name[__SCAN_POLICY_MAX]; policy_name[PXY_TABLE_SECURITY] = "tsg_security"; policy_name[PXY_TABLE_MANIPULATION] = "proxy_manipulation"; policy_name[PXY_TABLE_DEFENCE] = "active_defence"; size_t i = 0; for (i = 0; i < sizeof(policy_name) / sizeof(const char *); i++) { if (0 == strcasecmp(action_str, policy_name[i])) break; } return (enum policy_type)i; } int field_type_str2idx(enum policy_type type, const char *action_str) { const char * table_name[__SECURITY_TABLE_MAX] ={0}; switch(type) { case PXY_TABLE_MANIPULATION: table_name[PXY_CTRL_IP] = "TSG_OBJ_IP_ADDR"; table_name[PXY_CTRL_HTTP_URL] = "TSG_FIELD_HTTP_URL"; table_name[PXY_CTRL_HTTP_FQDN] = "TSG_FIELD_HTTP_HOST"; table_name[PXY_CTRL_HTTP_REQ_HDR] = "TSG_FIELD_HTTP_REQ_HDR"; table_name[PXY_CTRL_HTTP_REQ_BODY] = "TSG_FIELD_HTTP_REQ_CONTENT"; table_name[PXY_CTRL_HTTP_RES_HDR] = "TSG_FIELD_HTTP_RES_HDR"; table_name[PXY_CTRL_HTTP_RES_BODY] = "TSG_FIELD_HTTP_RES_CONTENT"; table_name[PXY_CTRL_SUBSCRIBE_ID] = "TSG_OBJ_SUBSCRIBER_ID"; break; case PXY_TABLE_SECURITY: table_name[PXY_SECURITY_IP] = "TSG_OBJ_IP_ADDR"; table_name[PXY_SECURITY_HTTP_URL] = "TSG_FIELD_HTTP_URL"; table_name[PXY_SECURITY_HTTP_FQDN] = "TSG_FIELD_HTTP_HOST"; table_name[PXY_SECURITY_HTTP_REQ_HDR] = "TSG_FIELD_HTTP_REQ_HDR"; table_name[PXY_SECURITY_HTTP_REQ_BODY] = "TSG_FIELD_HTTP_REQ_CONTENT"; table_name[PXY_SECURITY_HTTP_RES_HDR] = "TSG_FIELD_HTTP_RES_HDR"; table_name[PXY_SECURITY_HTTP_RES_BODY] = "TSG_FIELD_HTTP_RES_CONTENT"; table_name[PXY_SECURITY_SUBSCRIBE_ID] = "TSG_OBJ_SUBSCRIBER_ID"; table_name[PXY_SECURITY_HTTPS_SNI] = "TSG_FIELD_SSL_SNI"; table_name[PXY_SECURITY_HTTPS_CN] = "TSG_FIELD_SSL_CN"; table_name[PXY_SECURITY_HTTPS_SAN] = "TSG_FIELD_SSL_SAN"; table_name[PXY_SECURITY_DNS_QNAME] = "TSG_FIELD_DNS_QNAME"; table_name[PXY_SECURITY_MAIL_ACCOUNT] = "TSG_FIELD_MAIL_ACCOUNT"; table_name[PXY_SECURITY_FTP_URI] = "TSG_FIELD_MAIL_ACCOUNT"; table_name[PXY_SECURITY_MAIL_ACCOUNT] = "TSG_FIELD_MAIL_ACCOUNT"; table_name[PXY_SECURITY_MAIL_FROM] = "TSG_FIELD_MAIL_FROM"; table_name[PXY_SECURITY_MAIL_TO] = "TSG_FIELD_MAIL_TO"; table_name[PXY_SECURITY_MAIL_SUBJECT] = "TSG_FIELD_MAIL_SUBJECT"; table_name[PXY_SECURITY_MAIL_CONTENT] = "TSG_FIELD_MAIL_CONTENT"; table_name[PXY_SECURITY_MAIL_ATT_NAME] = "TSG_FIELD_MAIL_ATT_NAME"; table_name[PXY_SECURITY_MAIL_ATT_CONTENT] = "TSG_FIELD_MAIL_ATT_CONTENT"; table_name[PXY_SECURITY_FTP_URI] = "TSG_FIELD_FTP_URI"; table_name[PXY_SECURITY_FTP_CONTENT] = "TSG_FIELD_FTP_CONTENT"; table_name[PXY_SECURITY_FTP_ACCOUNT] = "TSG_FIELD_MAIL_ATT_NAME"; break; case PXY_TABLE_DEFENCE: break; default: break; } size_t i = 0; for (i = 0; i < sizeof(table_name) / sizeof(const char *); i++) { if (0 == strcasecmp(action_str, table_name[i])) break; } return i; } void verify_policy_query(struct verify_policy_query *policy_query, int thread_id, cJSON *data_obj) { int i = 0; char buff[VERIFY_STRING_MAX], *p = NULL;; void *ctx = pangu_http_ctx_new(thread_id); mesa_runtime_log(RLOG_LV_INFO, MODULE_NAME, "Query policy table is %s", policy_query->policy_type_name); for (i = 0; i < policy_query->c_num; i++) { p = buff; if(0 == strcasecmp(policy_query->keywords[i].content_type, "ip")) { http_scan(policy_query->keywords[i].content, policy_query->type, PXY_CTRL_IP, ctx, data_obj, policy_query->keywords[i].ip_addr); } else if(0 == strcasecmp(policy_query->keywords[i].content_type, "subscriberid")) { p += snprintf(p, sizeof(buff) - (p - buff), "contentType=%s, subscriberid=%s", policy_query->keywords[i].content_type, policy_query->keywords[i].subscriberid); http_scan(policy_query->keywords[i].content, policy_query->type, PXY_CTRL_SUBSCRIBE_ID, ctx, data_obj, NULL); }else { p += snprintf(p, sizeof(buff) - (p - buff), "contentType=%s, protocolField=%s content=%s", policy_query->keywords[i].content_type, policy_query->keywords[i].protocol_field_name, policy_query->keywords[i].content); http_scan(policy_query->keywords[i].content, policy_query->type, policy_query->keywords[i].protocol_field, ctx, data_obj, NULL); } *p = '\0'; mesa_runtime_log(RLOG_LV_DEBUG, MODULE_NAME, "%s", buff); } FREE(&ctx); return; } struct ipaddr *ip_to_stream_addr(char *clientIp1, unsigned int clientPort1, char *serverIp1, unsigned int serverPort1, int addr_type) { struct ipaddr *ip_addr = ALLOC(struct ipaddr, 1); if(addr_type == 4) { struct stream_tuple4_v4 *v4_addr = ALLOC(struct stream_tuple4_v4, 1); ip_addr->addrtype=ADDR_TYPE_IPV4; inet_pton(AF_INET,clientIp1,&(v4_addr->saddr)); v4_addr->source=htons(clientPort1); inet_pton(AF_INET,serverIp1,&(v4_addr->daddr)); v4_addr->dest=htons(serverPort1); ip_addr->v4=v4_addr; } if(addr_type == 6) { struct stream_tuple4_v6 *v6_addr = ALLOC(struct stream_tuple4_v6, 1); ip_addr->addrtype=ADDR_TYPE_IPV6; inet_pton(AF_INET6,clientIp1,&(v6_addr->saddr)); v6_addr->source=htons(clientPort1); inet_pton(AF_INET6,serverIp1,&(v6_addr->daddr)); v6_addr->dest=htons(serverPort1); ip_addr->v6=v6_addr; } return ip_addr; } cJSON *get_query_from_request(const char *data, int thread_id) { int c_num = 0, i = 0; cJSON* data_json = cJSON_Parse(data); if(data_json == NULL) { mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "invalid policy parameter"); return NULL; } cJSON *policy_obj=NULL, *data_obj=NULL; policy_obj=cJSON_CreateObject(); cJSON_AddNumberToObject(policy_obj, "code", 200); cJSON_AddStringToObject(policy_obj, "msg", "Success"); cJSON_AddNumberToObject(policy_obj, "success", 1); data_obj = cJSON_CreateObject(); cJSON_AddItemToObject(policy_obj, "data", data_obj); cJSON* item = NULL, *subitem = NULL, *subchild = NULL; item = cJSON_GetObjectItem(data_json,"verifyList"); if(item && item->type==cJSON_Array) { c_num=cJSON_GetArraySize(item); for (subitem = item->child; subitem != NULL; subitem = subitem->next) { struct verify_policy_query *query_ctx = ALLOC(struct verify_policy_query, 1); item = cJSON_GetObjectItem(subitem,"policyType"); if(item && item->type==cJSON_String) { query_ctx->type = policy_type_str2idx(item->valuestring); query_ctx->policy_type_name = item->valuestring; } item = cJSON_GetObjectItem(subitem,"verifyConditions"); if(item && item->type==cJSON_Array) { query_ctx->c_num=c_num=cJSON_GetArraySize(item); for (subchild = item->child; subchild != NULL; subchild = subchild->next) { item = cJSON_GetObjectItem(subchild, "contentType"); if(item && item->type==cJSON_String) { query_ctx->keywords[i].content_type = item->valuestring; } if(0 == strcasecmp(query_ctx->keywords[i].content_type, "subscriberid")) { item = cJSON_GetObjectItem(subchild,"subscriberid"); if(item && item->type==cJSON_String) { query_ctx->keywords[i].subscriberid = item->valuestring; } i++; continue; } if(0 == strcasecmp(query_ctx->keywords[i].content_type, "ip")) { int addr_type=0, protocol=0; char *clientIp1=NULL,*serverIp1=NULL; unsigned int clientPort1=0,serverPort1=0; item = cJSON_GetObjectItem(subchild,"clientIp"); if(item && item->type==cJSON_String) { clientIp1 = item->valuestring; } item = cJSON_GetObjectItem(subchild,"serverIp"); if(item && item->type==cJSON_String) { serverIp1 = (item->valuestring); } item = cJSON_GetObjectItem(subchild,"clientPort"); if(item && item->type==cJSON_String) { clientPort1 =atoi(item->valuestring); } item = cJSON_GetObjectItem(subchild,"serverPort"); if(item && item->type==cJSON_String) { serverPort1 =atoi(item->valuestring); } item = cJSON_GetObjectItem(subchild,"protocol"); if(item && item->type==cJSON_Number) { protocol = item->valueint; } item=cJSON_GetObjectItem(subchild,"addrType"); if(item && item->type==cJSON_Number) { addr_type = item->valueint; } query_ctx->keywords[i].ip_addr = ip_to_stream_addr(clientIp1, clientPort1, serverIp1, serverPort1, addr_type); i++; continue; } item = cJSON_GetObjectItem(subchild, "protocolField"); if(item && item->type==cJSON_String) { query_ctx->keywords[i].protocol_field = field_type_str2idx(query_ctx->type, item->valuestring); query_ctx->keywords[i].protocol_field_name = item->valuestring; } item = cJSON_GetObjectItem(subchild, "content"); if(item && item->type==cJSON_String) { query_ctx->keywords[i].content = item->valuestring; } i++; } } verify_policy_query(query_ctx, thread_id, data_obj); i=0; FREE(&query_ctx); } } cJSON_Delete(data_json); return policy_obj; } static int evhttp_socket_send(struct evhttp_request *req, char *sendbuf) { struct evbuffer *evb = NULL; /* This holds the content we're sending. */ evb = evbuffer_new(); if (sendbuf[0] == '\0' && req == NULL){ goto err; } evhttp_add_header(evhttp_request_get_output_headers(req), "Content-Type", "text/html"); evhttp_add_header(evhttp_request_get_output_headers(req), "Connection", "keep-alive"); evbuffer_add_printf(evb, "%s", sendbuf); evhttp_send_reply(req, HTTP_OK, "OK", evb); goto done; err: evhttp_send_error(req, HTTP_NOTFOUND, "Document was not found"); done: evbuffer_free(evb); return 0; } void evhttp_request_cb(struct evhttp_request *evh_req, void *arg) { char *policy_payload= NULL; cJSON *policy_obj; struct evbuffer * evbuf_body = NULL; char *input = NULL; ssize_t inputlen=0; struct verify_proxy_thread *thread_ctx = (struct verify_proxy_thread *)arg; if (evhttp_request_get_command(evh_req) != EVHTTP_REQ_POST) { mesa_runtime_log(RLOG_LV_DEBUG, MODULE_NAME, "FAILED (post type)"); goto error; } evbuf_body = evhttp_request_get_input_buffer(evh_req); if (!evbuf_body || 0==(inputlen = evbuffer_get_length(evbuf_body)) ||!(input = (char *)evbuffer_pullup(evbuf_body,inputlen))) { mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "Failed to get post data information."); goto error; } policy_obj = get_query_from_request(input, thread_ctx->id); if(policy_obj == NULL) { goto error; } policy_payload = cJSON_PrintUnformatted(policy_obj); printf("%s\n", policy_payload); evhttp_socket_send(evh_req, policy_payload); cJSON_Delete(policy_obj); free(policy_payload); #if 0 if (policy_query == NULL) { mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "Data parsing failed."); goto error; } policy_payload = verify_policy_scan(policy_query, thread_ctx->id); if (policy_payload) { mesa_runtime_log(RLOG_LV_DEBUG, MODULE_NAME, "%s", policy_payload); evhttp_socket_send(evh_req, policy_payload); free(policy_payload); } #endif goto finish; error: evhttp_send_error(evh_req, HTTP_BADREQUEST, 0); finish: return; } void * verify_policy_thread(void * arg) { struct evhttp_bound_socket *bound = NULL; struct verify_proxy_thread *thread_ctx = (struct verify_proxy_thread *)arg; thread_ctx->base = event_base_new(); if (! thread_ctx->base) { mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "Can'thread_ctx allocate event base"); goto finish; } thread_ctx->http = evhttp_new(thread_ctx->base); if (!thread_ctx->http) { mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "couldn'thread_ctx create evhttp. Exiting."); goto error; } evhttp_set_cb(thread_ctx->http, "/v1/policy/verification", evhttp_request_cb, thread_ctx); bound = evhttp_accept_socket_with_handle(thread_ctx->http, thread_ctx->accept_fd); if (bound != NULL) { mesa_runtime_log(RLOG_LV_INFO, MODULE_NAME, "Bound(%p) to port %d - Awaiting connections ... ", bound, g_verify_proxy->listen_port); } mesa_runtime_log(RLOG_LV_INFO, MODULE_NAME, "Work thread %u is run...", thread_ctx->id); event_base_dispatch(thread_ctx->base); error: event_base_free(thread_ctx->base); finish: return NULL; } static int evutil_fast_socket_nonblocking(evutil_socket_t fd) { #ifdef _WIN32 return evutil_make_socket_nonblocking(fd); #else if (fcntl(fd, F_SETFL, O_NONBLOCK) == -1) { return -1; } return 0; #endif } static int evutil_fast_socket_closeonexec(evutil_socket_t fd) { #if !defined(_WIN32) && defined(EVENT__HAVE_SETFD) if (fcntl(fd, F_SETFD, FD_CLOEXEC) == -1) { return -1; } #endif return 0; } evutil_socket_t evutil_socket_(int domain, int type, int protocol) { evutil_socket_t r; #if defined(SOCK_NONBLOCK) && defined(SOCK_CLOEXEC) r = socket(domain, type, protocol); if (r >= 0) return r; else if ((type & (SOCK_NONBLOCK|SOCK_CLOEXEC)) == 0) return -1; #endif #define SOCKET_TYPE_MASK (~(EVUTIL_SOCK_NONBLOCK|EVUTIL_SOCK_CLOEXEC)) r = socket(domain, type & SOCKET_TYPE_MASK, protocol); if (r < 0) return -1; if (type & EVUTIL_SOCK_NONBLOCK) { if (evutil_fast_socket_nonblocking(r) < 0) { evutil_closesocket(r); return -1; } } if (type & EVUTIL_SOCK_CLOEXEC) { if (evutil_fast_socket_closeonexec(r) < 0) { evutil_closesocket(r); return -1; } } return r; } static evutil_socket_t evhttp_listen_socket_byuser(const struct sockaddr *sa, int socklen, unsigned flags, int backlog) { evutil_socket_t fd; int on = 1; int family = sa ? sa->sa_family : AF_UNSPEC; int socktype = SOCK_STREAM | EVUTIL_SOCK_NONBLOCK; if (flags & LEV_OPT_CLOSE_ON_EXEC) socktype |= EVUTIL_SOCK_CLOEXEC; fd = evutil_socket_(family, socktype, 0); if (fd == -1) return fd; if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, (void*)&on, sizeof(on))<0) goto err; if (flags & LEV_OPT_REUSEABLE) { if (evutil_make_listen_socket_reuseable(fd) < 0) goto err; } if (flags & LEV_OPT_REUSEABLE_PORT) { if (evutil_make_listen_socket_reuseable_port(fd) < 0){ goto err; } } if (sa) { if (bind(fd, sa, socklen)<0) goto err; } if (listen(fd, backlog) == -1) { goto err; } return fd; err: evutil_closesocket(fd); return fd; } int pangu_policy_work_thread_run(struct verify_proxy * verify) { int xret = 0; unsigned int tid = 0; struct verify_proxy_thread *thread_ctx = NULL; struct sockaddr_in sin; memset(&sin, 0, sizeof(struct sockaddr_in)); sin.sin_family = AF_INET; sin.sin_port = htons(verify->listen_port); evutil_socket_t accept_fd = evhttp_listen_socket_byuser((struct sockaddr*)&sin, sizeof(struct sockaddr_in),LEV_OPT_REUSEABLE_PORT|LEV_OPT_CLOSE_ON_FREE, -1); if (accept_fd < 0) { mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "Could not create a listen!"); goto finish; } for (tid = 0; tid < verify->nr_work_threads; tid++) { verify->work_threads[tid] = ALLOC(struct verify_proxy_thread, 1); thread_ctx = verify->work_threads[tid]; thread_ctx->id = tid; thread_ctx->accept_fd =accept_fd; thread_ctx->routine = verify_policy_thread; if (pthread_create(&thread_ctx->pid, thread_ctx->attr, thread_ctx->routine, thread_ctx)) { mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "%s", strerror(errno)); goto finish; } if (pthread_detach(thread_ctx->pid)) { mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "%s", strerror(errno)); goto finish; } } FOREVER{ sleep(1); } finish: return xret; } int main(int argc, char * argv[]) { const char * main_profile = "./conf/verify_policy.conf"; int ret = 0, opt = 0; while ((opt = getopt(argc, argv, "v")) != -1) { switch (opt) { case 'v': fprintf(stderr, "Welcome to Verify Policy Engine, Version: %s\n", version()); return 0; default: break; } } g_verify_proxy = ALLOC(struct verify_proxy, 1); assert(g_verify_proxy); strcpy(g_verify_proxy->name, "verify_policy"); g_verify_proxy->logger = verify_syslog_init(main_profile); CHECK_OR_EXIT(g_verify_proxy->logger != NULL, "Failed at init log module. Exit."); ret = verify_policy_init(g_verify_proxy, main_profile); CHECK_OR_EXIT(ret == 0, "Failed at loading profile %s, Exit.", main_profile); ret = pangu_policy_init(g_verify_proxy, main_profile); CHECK_OR_EXIT(ret == 0, "Failed at init panggu module, Exit."); ret = security_policy_init(g_verify_proxy, main_profile); CHECK_OR_EXIT(ret == 0, "Failed at init security module, Exit."); ret = pangu_policy_work_thread_run(g_verify_proxy); return ret; }