|
|
|
@@ -1,183 +1,183 @@ |
1 | #include <uuid/uuid.h> |
1 | #include <uuid/uuid.h> |
2 | #include <iostream> |
2 | #include <iostream> |
3 | #include <cassert> |
3 | #include <cassert> |
4 | #include <string> |
4 | #include <string> |
5 | #include <ext/algorithm> |
5 | #include <ext/algorithm> |
6 | using namespace std; |
6 | using namespace std; |
7 | #include <kingate/exception.h> |
7 | #include <kingate/exception.h> |
8 | #include <kingate/plaincgi.h> |
8 | #include <kingate/plaincgi.h> |
9 | #include <kingate/cgi_gateway.h> |
9 | #include <kingate/cgi_gateway.h> |
10 | #include <opkele/exception.h> |
10 | #include <opkele/exception.h> |
11 | #include <opkele/util.h> |
11 | #include <opkele/util.h> |
12 | #include <opkele/uris.h> |
12 | #include <opkele/uris.h> |
13 | #include <opkele/extension.h> |
13 | #include <opkele/extension.h> |
14 | #include <opkele/association.h> |
14 | #include <opkele/association.h> |
15 | #include <opkele/debug.h> |
15 | #include <opkele/debug.h> |
16 | #include <opkele/verify_op.h> |
16 | #include <opkele/verify_op.h> |
17 | #include <opkele/sreg.h> |
17 | #include <opkele/sreg.h> |
18 | |
18 | |
19 | #include "sqlite.h" |
19 | #include "sqlite.h" |
20 | #include "kingate_openid_message.h" |
20 | #include "kingate_openid_message.h" |
21 | |
21 | |
22 | static const string get_self_url(const kingate::cgi_gateway& gw) { |
22 | static const string get_self_url(const kingate::cgi_gateway& gw) { |
23 | bool s = gw.has_meta("SSL_PROTOCOL_VERSION"); |
23 | bool s = gw.has_meta("SSL_PROTOCOL_VERSION"); |
24 | string rv = s?"https://":"http://"; |
24 | string rv = s?"https://":"http://"; |
25 | rv += gw.http_request_header("Host"); |
25 | rv += gw.http_request_header("Host"); |
26 | const string& port = gw.get_meta("SERVER_PORT"); |
26 | const string& port = gw.get_meta("SERVER_PORT"); |
27 | if( port!=(s?"443":"80") ) { |
27 | if( port!=(s?"443":"80") ) { |
28 | rv += ':'; rv += port; |
28 | rv += ':'; rv += port; |
29 | } |
29 | } |
30 | rv += gw.get_meta("REQUEST_URI"); |
30 | rv += gw.get_meta("REQUEST_URI"); |
31 | string::size_type q = rv.find('?'); |
31 | string::size_type q = rv.find('?'); |
32 | if(q!=string::npos) |
32 | if(q!=string::npos) |
33 | rv.erase(q); |
33 | rv.erase(q); |
34 | return rv; |
34 | return rv; |
35 | } |
35 | } |
36 | |
36 | |
37 | class opdb_t : public sqlite3_t { |
37 | class opdb_t : public sqlite3_t { |
38 | public: |
38 | public: |
39 | opdb_t() |
39 | opdb_t() |
40 | : sqlite3_t("/tmp/OP.db") { |
40 | : sqlite3_t("/tmp/OP.db") { |
41 | assert(_D); |
41 | assert(_D); |
42 | char **resp; int nr,nc; char *errm; |
42 | char **resp; int nr,nc; char *errm; |
43 | if(sqlite3_get_table( |
43 | if(sqlite3_get_table( |
44 | _D, "SELECT a_op FROM assoc LIMIT 0", |
44 | _D, "SELECT a_op FROM assoc LIMIT 0", |
45 | &resp,&nr,&nc,&errm)!=SQLITE_OK) { |
45 | &resp,&nr,&nc,&errm)!=SQLITE_OK) { |
46 | extern const char *__OP_db_bootstrap; |
46 | extern const char *__OP_db_bootstrap; |
47 | DOUT_("Bootstrapping DB"); |
47 | DOUT_("Bootstrapping DB"); |
48 | if(sqlite3_exec(_D,__OP_db_bootstrap,NULL,NULL,&errm)!=SQLITE_OK) |
48 | if(sqlite3_exec(_D,__OP_db_bootstrap,NULL,NULL,&errm)!=SQLITE_OK) |
49 | throw opkele::exception(OPKELE_CP_ string("Failed to boostrap SQLite database: ")+errm); |
49 | throw opkele::exception(OPKELE_CP_ string("Failed to boostrap SQLite database: ")+errm); |
50 | }else |
50 | }else |
51 | sqlite3_free_table(resp); |
51 | sqlite3_free_table(resp); |
52 | } |
52 | } |
53 | }; |
53 | }; |
54 | |
54 | |
55 | class example_op_t : public opkele::verify_op { |
55 | class example_op_t : public opkele::verify_OP { |
56 | public: |
56 | public: |
57 | kingate::cgi_gateway& gw; |
57 | kingate::cgi_gateway& gw; |
58 | opdb_t db; |
58 | opdb_t db; |
59 | kingate::cookie htc; |
59 | kingate::cookie htc; |
60 | |
60 | |
61 | |
61 | |
62 | example_op_t(kingate::cgi_gateway& gw) |
62 | example_op_t(kingate::cgi_gateway& gw) |
63 | : gw(gw) { |
63 | : gw(gw) { |
64 | try { |
64 | try { |
65 | htc = gw.cookies.get_cookie("htop_session"); |
65 | htc = gw.cookies.get_cookie("htop_session"); |
66 | sqlite3_mem_t<char*> S = sqlite3_mprintf( |
66 | sqlite3_mem_t<char*> S = sqlite3_mprintf( |
67 | "SELECT 1 FROM ht_sessions WHERE hts_id=%Q", |
67 | "SELECT 1 FROM ht_sessions WHERE hts_id=%Q", |
68 | htc.get_value().c_str()); |
68 | htc.get_value().c_str()); |
69 | sqlite3_table_t T; int nr,nc; |
69 | sqlite3_table_t T; int nr,nc; |
70 | db.get_table(S,T,&nr,&nc); |
70 | db.get_table(S,T,&nr,&nc); |
71 | if(nr<1) |
71 | if(nr<1) |
72 | throw kingate::exception_notfound(CODEPOINT,"forcing cookie generation"); |
72 | throw kingate::exception_notfound(CODEPOINT,"forcing cookie generation"); |
73 | }catch(kingate::exception_notfound& kenf) { |
73 | }catch(kingate::exception_notfound& kenf) { |
74 | uuid_t uuid; uuid_generate(uuid); |
74 | uuid_t uuid; uuid_generate(uuid); |
75 | htc = kingate::cookie("htop_session",opkele::util::encode_base64(uuid,sizeof(uuid))); |
75 | htc = kingate::cookie("htop_session",opkele::util::encode_base64(uuid,sizeof(uuid))); |
76 | sqlite3_mem_t<char*> S = sqlite3_mprintf( |
76 | sqlite3_mem_t<char*> S = sqlite3_mprintf( |
77 | "INSERT INTO ht_sessions (hts_id) VALUES (%Q)", |
77 | "INSERT INTO ht_sessions (hts_id) VALUES (%Q)", |
78 | htc.get_value().c_str()); |
78 | htc.get_value().c_str()); |
79 | db.exec(S); |
79 | db.exec(S); |
80 | } |
80 | } |
81 | } |
81 | } |
82 | |
82 | |
83 | void set_authorized(bool a) { |
83 | void set_authorized(bool a) { |
84 | sqlite3_mem_t<char*> |
84 | sqlite3_mem_t<char*> |
85 | S = sqlite3_mprintf( |
85 | S = sqlite3_mprintf( |
86 | "UPDATE ht_sessions" |
86 | "UPDATE ht_sessions" |
87 | " SET authorized=%d" |
87 | " SET authorized=%d" |
88 | " WHERE hts_id=%Q", |
88 | " WHERE hts_id=%Q", |
89 | (int)a,htc.get_value().c_str()); |
89 | (int)a,htc.get_value().c_str()); |
90 | db.exec(S); |
90 | db.exec(S); |
91 | } |
91 | } |
92 | bool get_authorized() { |
92 | bool get_authorized() { |
93 | sqlite3_mem_t<char*> |
93 | sqlite3_mem_t<char*> |
94 | S = sqlite3_mprintf( |
94 | S = sqlite3_mprintf( |
95 | "SELECT authorized" |
95 | "SELECT authorized" |
96 | " FROM ht_sessions" |
96 | " FROM ht_sessions" |
97 | " WHERE hts_id=%Q", |
97 | " WHERE hts_id=%Q", |
98 | htc.get_value().c_str()); |
98 | htc.get_value().c_str()); |
99 | sqlite3_table_t T; int nr,nc; |
99 | sqlite3_table_t T; int nr,nc; |
100 | db.get_table(S,T,&nr,&nc); |
100 | db.get_table(S,T,&nr,&nc); |
101 | assert(nr==1); assert(nc=1); |
101 | assert(nr==1); assert(nc=1); |
102 | return opkele::util::string_to_long(T.get(1,0,nc)); |
102 | return opkele::util::string_to_long(T.get(1,0,nc)); |
103 | } |
103 | } |
104 | |
104 | |
105 | ostream& cookie_header(ostream& o) const { |
105 | ostream& cookie_header(ostream& o) const { |
106 | o << "Set-Cookie: " << htc.set_cookie_header() << "\n"; |
106 | o << "Set-Cookie: " << htc.set_cookie_header() << "\n"; |
107 | return o; |
107 | return o; |
108 | } |
108 | } |
109 | |
109 | |
110 | opkele::assoc_t alloc_assoc(const string& type,size_t klength,bool sl) { |
110 | opkele::assoc_t alloc_assoc(const string& type,size_t klength,bool sl) { |
111 | uuid_t uuid; uuid_generate(uuid); |
111 | uuid_t uuid; uuid_generate(uuid); |
112 | string a_handle = opkele::util::encode_base64(uuid,sizeof(uuid)); |
112 | string a_handle = opkele::util::encode_base64(uuid,sizeof(uuid)); |
113 | opkele::secret_t a_secret; |
113 | opkele::secret_t a_secret; |
114 | generate_n( |
114 | generate_n( |
115 | back_insert_iterator<opkele::secret_t>(a_secret),klength, |
115 | back_insert_iterator<opkele::secret_t>(a_secret),klength, |
116 | rand ); |
116 | rand ); |
117 | string ssecret; a_secret.to_base64(ssecret); |
117 | string ssecret; a_secret.to_base64(ssecret); |
118 | time_t now = time(0); |
118 | time_t now = time(0); |
119 | int expires_in = sl?3600*2:3600*24*7*2; |
119 | int expires_in = sl?3600*2:3600*24*7*2; |
120 | sqlite3_mem_t<char*> |
120 | sqlite3_mem_t<char*> |
121 | S = sqlite3_mprintf( |
121 | S = sqlite3_mprintf( |
122 | "INSERT INTO assoc" |
122 | "INSERT INTO assoc" |
123 | " (a_handle,a_type,a_ctime,a_etime,a_secret,a_stateless)" |
123 | " (a_handle,a_type,a_ctime,a_etime,a_secret,a_stateless)" |
124 | " VALUES (" |
124 | " VALUES (" |
125 | " %Q,%Q,datetime('now')," |
125 | " %Q,%Q,datetime('now')," |
126 | " datetime('now','+%d seconds')," |
126 | " datetime('now','+%d seconds')," |
127 | " %Q,%d );", |
127 | " %Q,%d );", |
128 | a_handle.c_str(), type.c_str(), |
128 | a_handle.c_str(), type.c_str(), |
129 | expires_in, |
129 | expires_in, |
130 | ssecret.c_str(), sl ); |
130 | ssecret.c_str(), sl ); |
131 | db.exec(S); |
131 | db.exec(S); |
132 | return opkele::assoc_t(new opkele::association( |
132 | return opkele::assoc_t(new opkele::association( |
133 | "", |
133 | "", |
134 | a_handle, type, a_secret, |
134 | a_handle, type, a_secret, |
135 | now+expires_in, sl )); |
135 | now+expires_in, sl )); |
136 | } |
136 | } |
137 | |
137 | |
138 | opkele::assoc_t retrieve_assoc(const string& h) { |
138 | opkele::assoc_t retrieve_assoc(const string& h) { |
139 | sqlite3_mem_t<char*> |
139 | sqlite3_mem_t<char*> |
140 | S = sqlite3_mprintf( |
140 | S = sqlite3_mprintf( |
141 | "SELECT" |
141 | "SELECT" |
142 | " a_handle,a_type,a_secret,a_stateless," |
142 | " a_handle,a_type,a_secret,a_stateless," |
143 | " strftime('%%s',a_etime) AS a_etime," |
143 | " strftime('%%s',a_etime) AS a_etime," |
144 | " a_itime" |
144 | " a_itime" |
145 | " FROM assoc" |
145 | " FROM assoc" |
146 | " WHERE a_handle=%Q AND a_itime IS NULL" |
146 | " WHERE a_handle=%Q AND a_itime IS NULL" |
147 | " AND datetime('now') < a_etime" |
147 | " AND datetime('now') < a_etime" |
148 | " LIMIT 1", |
148 | " LIMIT 1", |
149 | h.c_str() ); |
149 | h.c_str() ); |
150 | sqlite3_table_t T; |
150 | sqlite3_table_t T; |
151 | int nr,nc; |
151 | int nr,nc; |
152 | db.get_table(S,T,&nr,&nc); |
152 | db.get_table(S,T,&nr,&nc); |
153 | if(nr<1) |
153 | if(nr<1) |
154 | throw opkele::failed_lookup(OPKELE_CP_ |
154 | throw opkele::failed_lookup(OPKELE_CP_ |
155 | "couldn't retrieve valid unexpired assoc"); |
155 | "couldn't retrieve valid unexpired assoc"); |
156 | assert(nr==1); assert(nc==6); |
156 | assert(nr==1); assert(nc==6); |
157 | opkele::secret_t secret; opkele::util::decode_base64(T.get(1,2,nc),secret); |
157 | opkele::secret_t secret; opkele::util::decode_base64(T.get(1,2,nc),secret); |
158 | return opkele::assoc_t(new opkele::association( |
158 | return opkele::assoc_t(new opkele::association( |
159 | "", h, T.get(1,1,nc), secret, |
159 | "", h, T.get(1,1,nc), secret, |
160 | strtol(T.get(1,4,nc),0,0), |
160 | strtol(T.get(1,4,nc),0,0), |
161 | strtol(T.get(1,3,nc),0,0) )); |
161 | strtol(T.get(1,3,nc),0,0) )); |
162 | } |
162 | } |
163 | |
163 | |
164 | string& alloc_nonce(string& nonce) { |
164 | string& alloc_nonce(string& nonce) { |
165 | uuid_t uuid; uuid_generate(uuid); |
165 | uuid_t uuid; uuid_generate(uuid); |
166 | nonce += opkele::util::encode_base64(uuid,sizeof(uuid)); |
166 | nonce += opkele::util::encode_base64(uuid,sizeof(uuid)); |
167 | sqlite3_mem_t<char*> |
167 | sqlite3_mem_t<char*> |
168 | S = sqlite3_mprintf( |
168 | S = sqlite3_mprintf( |
169 | "INSERT INTO nonces" |
169 | "INSERT INTO nonces" |
170 | " (n_once) VALUES (%Q)", |
170 | " (n_once) VALUES (%Q)", |
171 | nonce.c_str() ); |
171 | nonce.c_str() ); |
172 | db.exec(S); |
172 | db.exec(S); |
173 | return nonce; |
173 | return nonce; |
174 | } |
174 | } |
175 | bool check_nonce(const string& nonce) { |
175 | bool check_nonce(const string& nonce) { |
176 | sqlite3_mem_t<char*> |
176 | sqlite3_mem_t<char*> |
177 | S = sqlite3_mprintf( |
177 | S = sqlite3_mprintf( |
178 | "SELECT 1" |
178 | "SELECT 1" |
179 | " FROM nonces" |
179 | " FROM nonces" |
180 | " WHERE n_once=%Q AND n_itime IS NULL", |
180 | " WHERE n_once=%Q AND n_itime IS NULL", |
181 | nonce.c_str()); |
181 | nonce.c_str()); |
182 | sqlite3_table_t T; |
182 | sqlite3_table_t T; |
183 | int nr,nc; |
183 | int nr,nc; |
|