coturn/src/apps/relay/userdb.c
Michael Jones 5fa67a65f5
Fix compiler warnings from continuous integration (#1555)
Almost all of the warnings were about truncating pointers, because
sizeof(void*) != sizeof(long) on all platforms.
2024-08-04 15:44:15 -07:00

1321 lines
36 KiB
C

/*
* Copyright (C) 2011, 2012, 2013 Citrix Systems
*
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the project nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#include <getopt.h>
#include <limits.h>
#include <locale.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>
#ifndef _MSC_VER
#include <unistd.h>
#endif
#include <signal.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <event2/buffer.h>
#include <event2/bufferevent.h>
#include "dbdrivers/dbdriver.h"
#include "mainrelay.h"
#include "userdb.h"
#include "ns_turn_utils.h"
#include "ns_turn_maps.h"
#include "ns_turn_server.h"
#include "apputils.h"
//////////// REALM //////////////
static realm_params_t *default_realm_params_ptr = NULL;
static ur_string_map *realms = NULL;
static TURN_MUTEX_DECLARE(o_to_realm_mutex);
static ur_string_map *o_to_realm = NULL;
static secrets_list_t realms_list;
static char userdb_type_unknown[] = "Unknown";
static char userdb_type_sqlite[] = "SQLite";
static char userdb_type_postgresql[] = "PostgreSQL";
static char userdb_type_mysql[] = "MySQL/MariaDB";
static char userdb_type_mongo[] = "MongoDB";
static char userdb_type_redis[] = "Redis";
const char *userdb_type_to_string(TURN_USERDB_TYPE t) {
switch (t) {
case TURN_USERDB_TYPE_SQLITE:
return userdb_type_sqlite;
break;
case TURN_USERDB_TYPE_PQ:
return userdb_type_postgresql;
break;
case TURN_USERDB_TYPE_MYSQL:
return userdb_type_mysql;
break;
case TURN_USERDB_TYPE_MONGO:
return userdb_type_mongo;
break;
case TURN_USERDB_TYPE_REDIS:
return userdb_type_redis;
break;
default:
return userdb_type_unknown;
};
}
void lock_realms(void) { ur_string_map_lock(realms); }
void unlock_realms(void) { ur_string_map_unlock(realms); }
void update_o_to_realm(ur_string_map *o_to_realm_new) {
TURN_MUTEX_LOCK(&o_to_realm_mutex);
ur_string_map_free(&o_to_realm);
o_to_realm = o_to_realm_new;
TURN_MUTEX_UNLOCK(&o_to_realm_mutex);
}
void create_default_realm(void) {
if (default_realm_params_ptr) {
return;
}
static realm_params_t _default_realm_params = {1,
{"\0", /* name */
{0, 0, 0}},
{0, NULL}};
/* init everything: */
TURN_MUTEX_INIT_RECURSIVE(&o_to_realm_mutex);
init_secrets_list(&realms_list);
o_to_realm = ur_string_map_create(free);
default_realm_params_ptr = &_default_realm_params;
realms = ur_string_map_create(NULL);
lock_realms();
default_realm_params_ptr->status.alloc_counters = ur_string_map_create(NULL);
unlock_realms();
}
void get_default_realm_options(realm_options_t *ro) {
if (ro) {
lock_realms();
memcpy(ro, &(default_realm_params_ptr->options), sizeof(realm_options_t));
unlock_realms();
}
}
void set_default_realm_name(char *realm) {
lock_realms();
ur_string_map_value_type value = (ur_string_map_value_type)default_realm_params_ptr;
STRCPY(default_realm_params_ptr->options.name, realm);
ur_string_map_put(realms, (ur_string_map_key_type)default_realm_params_ptr->options.name, value);
add_to_secrets_list(&realms_list, realm);
unlock_realms();
}
realm_params_t *get_realm(char *name) {
if (name && name[0]) {
lock_realms();
ur_string_map_value_type value = 0;
ur_string_map_key_type key = (ur_string_map_key_type)name;
if (ur_string_map_get(realms, key, &value)) {
unlock_realms();
return (realm_params_t *)value;
} else {
realm_params_t *ret = (realm_params_t *)malloc(sizeof(realm_params_t));
memcpy(ret, default_realm_params_ptr, sizeof(realm_params_t));
STRCPY(ret->options.name, name);
value = (ur_string_map_value_type)ret;
ur_string_map_put(realms, key, value);
ret->status.alloc_counters = ur_string_map_create(NULL);
add_to_secrets_list(&realms_list, name);
unlock_realms();
return ret;
}
}
return default_realm_params_ptr;
}
int get_realm_data(char *name, realm_params_t *rp) {
lock_realms();
memcpy(rp, get_realm(name), sizeof(realm_params_t));
unlock_realms();
return 0;
}
int get_realm_options_by_origin(char *origin, realm_options_t *ro) {
ur_string_map_value_type value = 0;
TURN_MUTEX_LOCK(&o_to_realm_mutex);
if (ur_string_map_get(o_to_realm, (ur_string_map_key_type)origin, &value) && value) {
char *realm = strdup((char *)value);
TURN_MUTEX_UNLOCK(&o_to_realm_mutex);
realm_params_t rp;
get_realm_data(realm, &rp);
memcpy(ro, &(rp.options), sizeof(realm_options_t));
free(realm);
return 1;
} else {
TURN_MUTEX_UNLOCK(&o_to_realm_mutex);
get_default_realm_options(ro);
return 0;
}
}
void get_realm_options_by_name(char *realm, realm_options_t *ro) {
realm_params_t rp;
get_realm_data(realm, &rp);
memcpy(ro, &(rp.options), sizeof(realm_options_t));
}
int change_total_quota(char *realm, int value) {
int ret = value;
lock_realms();
realm_params_t *rp = get_realm(realm);
rp->options.perf_options.total_quota = value;
unlock_realms();
return ret;
}
int change_user_quota(char *realm, int value) {
int ret = value;
lock_realms();
realm_params_t *rp = get_realm(realm);
rp->options.perf_options.user_quota = value;
unlock_realms();
return ret;
}
static void must_set_admin_realm(void *realm0) {
char *realm = (char *)realm0;
if (!realm || !realm[0]) {
fprintf(stderr, "The operation cannot be completed: the realm must be set.\n");
exit(-1);
}
}
static void must_set_admin_user(void *user0) {
char *user = (char *)user0;
if (!user || !user[0]) {
fprintf(stderr, "The operation cannot be completed: the user must be set.\n");
exit(-1);
}
}
static void must_set_admin_pwd(void *pwd0) {
char *pwd = (char *)pwd0;
if (!pwd || !pwd[0]) {
fprintf(stderr, "The operation cannot be completed: the password must be set.\n");
exit(-1);
}
}
static void must_set_admin_origin(void *origin0) {
char *origin = (char *)origin0;
if (!origin || !origin[0]) {
fprintf(stderr, "The operation cannot be completed: the origin must be set.\n");
exit(-1);
}
}
/////////// SHARED SECRETS /////////////////
void init_secrets_list(secrets_list_t *sl) {
if (sl) {
memset(sl, 0, sizeof(secrets_list_t));
}
}
void clean_secrets_list(secrets_list_t *sl) {
if (sl) {
if (sl->secrets) {
size_t i = 0;
for (i = 0; i < sl->sz; ++i) {
if (sl->secrets[i]) {
free(sl->secrets[i]);
}
}
free(sl->secrets);
sl->secrets = NULL;
sl->sz = 0;
}
}
}
size_t get_secrets_list_size(secrets_list_t *sl) {
if (sl && sl->secrets) {
return sl->sz;
}
return 0;
}
const char *get_secrets_list_elem(secrets_list_t *sl, size_t i) {
if (get_secrets_list_size(sl) > i) {
return sl->secrets[i];
}
return NULL;
}
void add_to_secrets_list(secrets_list_t *sl, const char *elem) {
if (sl && elem) {
sl->secrets = (char **)realloc(sl->secrets, (sizeof(char *) * (sl->sz + 1)));
sl->secrets[sl->sz] = strdup(elem);
sl->sz += 1;
}
}
////////////////////////////////////////////
static int get_auth_secrets(secrets_list_t *sl, uint8_t *realm) {
int ret = -1;
const turn_dbdriver_t *dbd = get_dbdriver();
clean_secrets_list(sl);
if (get_secrets_list_size(&turn_params.default_users_db.ram_db.static_auth_secrets)) {
size_t i = 0;
for (i = 0; i < get_secrets_list_size(&turn_params.default_users_db.ram_db.static_auth_secrets); ++i) {
add_to_secrets_list(sl, get_secrets_list_elem(&turn_params.default_users_db.ram_db.static_auth_secrets, i));
}
ret = 0;
}
if (dbd && dbd->get_auth_secrets) {
ret = (*dbd->get_auth_secrets)(sl, realm);
}
return ret;
}
/*
* Timestamp retrieval
*/
static turn_time_t get_rest_api_timestamp(char *usname) {
turn_time_t ts = 0;
int ts_set = 0;
char *col = strchr(usname, turn_params.rest_api_separator);
if (col) {
if (col == usname) {
usname += 1;
} else {
char *ptr = usname;
int found_non_figure = 0;
while (ptr < col) {
if (!(ptr[0] >= '0' && ptr[0] <= '9')) {
found_non_figure = 1;
break;
}
++ptr;
}
if (found_non_figure) {
ts = (turn_time_t)atol(col + 1);
ts_set = 1;
} else {
*col = 0;
ts = (turn_time_t)atol(usname);
ts_set = 1;
*col = turn_params.rest_api_separator;
}
}
}
if (!ts_set) {
ts = (turn_time_t)atol(usname);
}
return ts;
}
static char *get_real_username(char *usname) {
if (usname[0] && turn_params.use_auth_secret_with_timestamp) {
char *col = strchr(usname, turn_params.rest_api_separator);
if (col) {
if (col == usname) {
usname += 1;
} else {
char *ptr = usname;
int found_non_figure = 0;
while (ptr < col) {
if (!(ptr[0] >= '0' && ptr[0] <= '9')) {
found_non_figure = 1;
break;
}
++ptr;
}
if (!found_non_figure) {
usname = col + 1;
} else {
*col = 0;
usname = strdup(usname);
*col = turn_params.rest_api_separator;
return usname;
}
}
}
}
return strdup(usname);
}
/*
* Password retrieval
*/
int get_user_key(int in_oauth, int *out_oauth, int *max_session_time, uint8_t *usname, uint8_t *realm, hmackey_t key,
ioa_network_buffer_handle nbh) {
int ret = -1;
if (max_session_time) {
*max_session_time = 0;
}
if (in_oauth && out_oauth && usname && usname[0]) {
stun_attr_ref sar = stun_attr_get_first_by_type_str(ioa_network_buffer_data(nbh), ioa_network_buffer_get_size(nbh),
STUN_ATTRIBUTE_OAUTH_ACCESS_TOKEN);
if (sar) {
int len = stun_attr_get_len(sar);
const uint8_t *value = stun_attr_get_value(sar);
*out_oauth = 1;
if (len > 0 && value) {
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->get_oauth_key) {
oauth_key_data_raw rawKey;
memset(&rawKey, 0, sizeof(rawKey));
int gres = (*(dbd->get_oauth_key))(usname, &rawKey);
if (gres < 0) {
return ret;
}
if (!rawKey.kid[0]) {
return ret;
}
if (rawKey.lifetime) {
if (!turn_time_before(turn_time(), (turn_time_t)(rawKey.timestamp + rawKey.lifetime + OAUTH_TIME_DELTA))) {
return ret;
}
}
oauth_key_data okd;
memset(&okd, 0, sizeof(okd));
convert_oauth_key_data_raw(&rawKey, &okd);
char err_msg[1025] = "\0";
size_t err_msg_size = sizeof(err_msg) - 1;
oauth_key okey;
memset(&okey, 0, sizeof(okey));
if (convert_oauth_key_data(&okd, &okey, err_msg, err_msg_size) < 0) {
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s\n", err_msg);
return -1;
}
oauth_token dot;
memset((&dot), 0, sizeof(dot));
encoded_oauth_token etoken;
memset(&etoken, 0, sizeof(etoken));
if ((size_t)len > sizeof(etoken.token)) {
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "Encoded oAuth token is too large\n");
return -1;
}
memcpy(etoken.token, value, (size_t)len);
etoken.size = (size_t)len;
const char *server_name = (char *)turn_params.oauth_server_name;
if (!(server_name && server_name[0])) {
server_name = (char *)realm;
if (!(server_name && server_name[0])) {
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "Cannot determine oAuth server name");
return -1;
}
}
if (decode_oauth_token((const uint8_t *)server_name, &etoken, &okey, &dot) < 0) {
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "Cannot decode oauth token\n");
return -1;
}
switch (dot.enc_block.key_length) {
case SHA1SIZEBYTES:
break;
case SHA256SIZEBYTES:
case SHA384SIZEBYTES:
case SHA512SIZEBYTES:
default:
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "Wrong size of the MAC key in oAuth token(3): %d\n",
(int)dot.enc_block.key_length);
return -1;
};
password_t pwdtmp;
if (stun_check_message_integrity_by_key_str(TURN_CREDENTIALS_LONG_TERM, ioa_network_buffer_data(nbh),
ioa_network_buffer_get_size(nbh), dot.enc_block.mac_key, pwdtmp,
SHATYPE_DEFAULT) > 0) {
turn_time_t lifetime = (turn_time_t)(dot.enc_block.lifetime);
if (lifetime) {
turn_time_t ts = (turn_time_t)(dot.enc_block.timestamp >> 16);
turn_time_t to = ts + lifetime + OAUTH_TIME_DELTA;
turn_time_t ct = turn_time();
if (!turn_time_before(ct, to)) {
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "oAuth token is too old\n");
return -1;
}
if (max_session_time) {
*max_session_time = to - ct;
}
}
memcpy(key, dot.enc_block.mac_key, dot.enc_block.key_length);
if (rawKey.realm[0]) {
memcpy(realm, rawKey.realm, sizeof(rawKey.realm));
}
ret = 0;
}
}
}
}
}
if (out_oauth && *out_oauth) {
return ret;
}
if (turn_params.use_auth_secret_with_timestamp) {
turn_time_t ctime = (turn_time_t)time(NULL);
turn_time_t ts = 0;
secrets_list_t sl;
size_t sll = 0;
init_secrets_list(&sl);
if (get_auth_secrets(&sl, realm) < 0) {
return ret;
}
ts = get_rest_api_timestamp((char *)usname);
if (!turn_time_before(ts, ctime)) {
uint8_t hmac[MAXSHASIZE];
unsigned int hmac_len;
password_t pwdtmp;
hmac[0] = 0;
stun_attr_ref sar = stun_attr_get_first_by_type_str(
ioa_network_buffer_data(nbh), ioa_network_buffer_get_size(nbh), STUN_ATTRIBUTE_MESSAGE_INTEGRITY);
if (!sar) {
return -1;
}
int sarlen = stun_attr_get_len(sar);
switch (sarlen) {
case SHA1SIZEBYTES:
hmac_len = SHA1SIZEBYTES;
break;
case SHA256SIZEBYTES:
case SHA384SIZEBYTES:
case SHA512SIZEBYTES:
default:
return -1;
};
for (sll = 0; sll < get_secrets_list_size(&sl); ++sll) {
const char *secret = get_secrets_list_elem(&sl, sll);
if (secret) {
if (stun_calculate_hmac(usname, strlen((char *)usname), (const uint8_t *)secret, strlen(secret), hmac,
&hmac_len, SHATYPE_DEFAULT) >= 0) {
size_t pwd_length = 0;
char *pwd = base64_encode(hmac, hmac_len, &pwd_length);
if (pwd) {
if (pwd_length < 1) {
free(pwd);
} else {
if (stun_produce_integrity_key_str((uint8_t *)usname, realm, (uint8_t *)pwd, key, SHATYPE_DEFAULT) >=
0) {
if (stun_check_message_integrity_by_key_str(TURN_CREDENTIALS_LONG_TERM, ioa_network_buffer_data(nbh),
ioa_network_buffer_get_size(nbh), key, pwdtmp,
SHATYPE_DEFAULT) > 0) {
ret = 0;
}
}
free(pwd);
if (ret == 0) {
break;
}
}
}
}
}
}
}
clean_secrets_list(&sl);
return ret;
}
ur_string_map_value_type ukey = NULL;
ur_string_map_lock(turn_params.default_users_db.ram_db.static_accounts);
if (ur_string_map_get(turn_params.default_users_db.ram_db.static_accounts, (ur_string_map_key_type)usname, &ukey)) {
ret = 0;
}
ur_string_map_unlock(turn_params.default_users_db.ram_db.static_accounts);
if (ret == 0) {
size_t sz = get_hmackey_size(SHATYPE_DEFAULT);
memcpy(key, ukey, sz);
return 0;
}
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->get_user_key) {
ret = (*(dbd->get_user_key))(usname, realm, key);
}
return ret;
}
uint8_t *start_user_check(turnserver_id id, turn_credential_type ct, int in_oauth, int *out_oauth, uint8_t *usname,
uint8_t *realm, get_username_resume_cb resume, ioa_net_data *in_buffer, uint64_t ctxkey,
int *postpone_reply) {
*postpone_reply = 1;
struct auth_message am;
memset(&am, 0, sizeof(struct auth_message));
am.id = id;
am.ct = ct;
am.in_oauth = in_oauth;
am.out_oauth = *out_oauth;
STRCPY(am.username, usname);
STRCPY(am.realm, realm);
am.resume_func = resume;
memcpy(&(am.in_buffer), in_buffer, sizeof(ioa_net_data));
in_buffer->nbh = NULL;
am.ctxkey = ctxkey;
send_auth_message_to_auth_server(&am);
return NULL;
}
int check_new_allocation_quota(uint8_t *user, int oauth, uint8_t *realm) {
int ret = 0;
if (user || oauth) {
uint8_t *username = oauth ? (uint8_t *)strdup("") : (uint8_t *)get_real_username((char *)user);
realm_params_t *rp = get_realm((char *)realm);
ur_string_map_lock(rp->status.alloc_counters);
if (rp->options.perf_options.total_quota &&
(rp->status.total_current_allocs >= rp->options.perf_options.total_quota)) {
ret = -1;
} else if (username[0]) {
ur_string_map_value_type value = 0;
if (!ur_string_map_get(rp->status.alloc_counters, (ur_string_map_key_type)username, &value)) {
value = (ur_string_map_value_type)1;
ur_string_map_put(rp->status.alloc_counters, (ur_string_map_key_type)username, value);
++(rp->status.total_current_allocs);
} else {
if ((rp->options.perf_options.user_quota) && ((size_t)value >= (size_t)(rp->options.perf_options.user_quota))) {
ret = -1;
} else {
value = (ur_string_map_value_type)(((size_t)value) + 1);
ur_string_map_put(rp->status.alloc_counters, (ur_string_map_key_type)username, value);
++(rp->status.total_current_allocs);
}
}
} else {
++(rp->status.total_current_allocs);
}
free(username);
ur_string_map_unlock(rp->status.alloc_counters);
}
return ret;
}
void release_allocation_quota(uint8_t *user, int oauth, uint8_t *realm) {
if (user) {
uint8_t *username = oauth ? (uint8_t *)strdup("") : (uint8_t *)get_real_username((char *)user);
realm_params_t *rp = get_realm((char *)realm);
ur_string_map_lock(rp->status.alloc_counters);
if (username[0]) {
ur_string_map_value_type value = 0;
ur_string_map_get(rp->status.alloc_counters, (ur_string_map_key_type)username, &value);
if (value) {
value = (ur_string_map_value_type)(((size_t)value) - 1);
if (value == 0) {
ur_string_map_del(rp->status.alloc_counters, (ur_string_map_key_type)username);
} else {
ur_string_map_put(rp->status.alloc_counters, (ur_string_map_key_type)username, value);
}
}
}
if (rp->status.total_current_allocs) {
--(rp->status.total_current_allocs);
}
ur_string_map_unlock(rp->status.alloc_counters);
free(username);
}
}
//////////////////////////////////
int add_static_user_account(char *user) {
/* Realm is either default or empty for users taken from file or command-line */
if (!user || turn_params.use_auth_secret_with_timestamp) {
return -1;
}
char *s = strstr(user, ":");
if (!s || (s == user) || (strlen(s) < 2)) {
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "Wrong user account: %s\n", user);
return -1;
}
size_t ulen = s - user;
// TODO: TURN usernames should be length limited by the RFC.
// are user account names as well? If so, we can avoid allocating
// and instead use a stack buffer.
char *usname = (char *)malloc(ulen + 1);
if (!usname) {
return -1;
}
strncpy(usname, user, ulen);
usname[ulen] = 0;
if (SASLprep((uint8_t *)usname) < 0) {
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "Wrong user name: %s\n", user);
free(usname);
return -1;
}
s = skip_blanks(s + 1);
hmackey_t *key = (hmackey_t *)malloc(sizeof(hmackey_t));
if (!key) {
free(usname);
return -1;
}
if (strstr(s, "0x") == s) {
char *keysource = s + 2;
size_t sz = get_hmackey_size(SHATYPE_DEFAULT);
if (strlen(keysource) < sz * 2) {
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "Wrong key format: %s\n", s);
}
convert_string_key_to_binary(keysource, *key, sz);
} else {
// this is only for default realm
stun_produce_integrity_key_str((uint8_t *)usname, (uint8_t *)get_realm(NULL)->options.name, (uint8_t *)s, *key,
SHATYPE_DEFAULT);
}
// the ur_string_map functions only fail (well... other than allocation failures, which aren't handled)
// if the map isn't valid. So we only need to check the result of locking.
if (!ur_string_map_lock(turn_params.default_users_db.ram_db.static_accounts)) {
free(usname);
free(key);
return -1;
}
// key argument (the usname variable) is deep-copied, so ownership isn't transfered, and we still need to free usname
// later.. value argument (the key variable) has ownership transfered into this function
ur_string_map_put(turn_params.default_users_db.ram_db.static_accounts, (ur_string_map_key_type)usname,
(ur_string_map_value_type)*key);
ur_string_map_unlock(turn_params.default_users_db.ram_db.static_accounts);
turn_params.default_users_db.ram_db.users_number++;
free(usname);
return 0;
}
////////////////// Admin /////////////////////////
static int list_users(uint8_t *realm, int is_admin) {
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd) {
if (is_admin) {
if (dbd->list_admin_users) {
(*dbd->list_admin_users)(0);
}
} else {
if (dbd->list_users) {
(*dbd->list_users)(realm, NULL, NULL);
}
}
}
return 0;
}
static int show_secret(uint8_t *realm) {
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->list_secrets) {
(*dbd->list_secrets)(realm, NULL, NULL);
}
return 0;
}
static int del_secret(uint8_t *secret, uint8_t *realm) {
must_set_admin_realm(realm);
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->del_secret) {
(*dbd->del_secret)(secret, realm);
}
return 0;
}
static int set_secret(uint8_t *secret, uint8_t *realm) {
if (!secret || (secret[0] == 0)) {
return 0;
}
must_set_admin_realm(realm);
del_secret(secret, realm);
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->set_secret) {
(*dbd->set_secret)(secret, realm);
}
return 0;
}
static int add_origin(uint8_t *origin0, uint8_t *realm) {
uint8_t origin[STUN_MAX_ORIGIN_SIZE + 1];
get_canonic_origin((const char *)origin0, (char *)origin, sizeof(origin) - 1);
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->add_origin) {
(*dbd->add_origin)(origin, realm);
}
return 0;
}
static int del_origin(uint8_t *origin0) {
uint8_t origin[STUN_MAX_ORIGIN_SIZE + 1];
get_canonic_origin((const char *)origin0, (char *)origin, sizeof(origin) - 1);
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->del_origin) {
(*dbd->del_origin)(origin);
}
return 0;
}
static int list_origins(uint8_t *realm) {
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->list_origins) {
(*dbd->list_origins)(realm, NULL, NULL);
}
return 0;
}
static int set_realm_option_one(uint8_t *realm, unsigned long value, const char *opt) {
if (value == (unsigned long)-1) {
return 0;
}
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->set_realm_option_one) {
(*dbd->set_realm_option_one)(realm, value, opt);
}
return 0;
}
static int set_realm_option(uint8_t *realm, perf_options_t *po) {
set_realm_option_one(realm, (unsigned long)po->max_bps, "max-bps");
set_realm_option_one(realm, (unsigned long)po->user_quota, "user-quota");
set_realm_option_one(realm, (unsigned long)po->total_quota, "total-quota");
return 0;
}
static int list_realm_options(uint8_t *realm) {
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->list_realm_options) {
(*dbd->list_realm_options)(realm);
}
return 0;
}
int adminuser(uint8_t *user, uint8_t *realm, uint8_t *pwd, uint8_t *secret, uint8_t *origin, TURNADMIN_COMMAND_TYPE ct,
perf_options_t *po, int is_admin) {
hmackey_t key;
char skey[sizeof(hmackey_t) * 2 + 1];
if (ct == TA_LIST_USERS) {
return list_users(realm, is_admin);
}
if (ct == TA_LIST_ORIGINS) {
return list_origins(realm);
}
if (ct == TA_SHOW_SECRET) {
return show_secret(realm);
}
if (ct == TA_SET_SECRET) {
return set_secret(secret, realm);
}
if (ct == TA_DEL_SECRET) {
return del_secret(secret, realm);
}
if (ct == TA_ADD_ORIGIN) {
must_set_admin_origin(origin);
must_set_admin_realm(realm);
return add_origin(origin, realm);
}
if (ct == TA_DEL_ORIGIN) {
must_set_admin_origin(origin);
return del_origin(origin);
}
if (ct == TA_SET_REALM_OPTION) {
must_set_admin_realm(realm);
if (!(po && (po->max_bps != ((band_limit_t)-1) || po->total_quota >= 0 || po->user_quota >= 0))) {
fprintf(stderr, "The operation cannot be completed: a realm option must be set.\n");
exit(-1);
}
return set_realm_option(realm, po);
}
if (ct == TA_LIST_REALM_OPTIONS) {
return list_realm_options(realm);
}
must_set_admin_user(user);
if (ct != TA_DELETE_USER && !is_admin) {
must_set_admin_pwd(pwd);
{
stun_produce_integrity_key_str(user, realm, pwd, key, SHATYPE_DEFAULT);
size_t i = 0;
size_t sz = get_hmackey_size(SHATYPE_DEFAULT);
int maxsz = (int)(sz * 2) + 1;
char *s = skey;
for (i = 0; (i < sz) && (maxsz > 2); i++) {
snprintf(s, (size_t)(sz * 2), "%02x", (unsigned int)key[i]);
maxsz -= 2;
s += 2;
}
skey[sz * 2] = 0;
}
}
const turn_dbdriver_t *dbd = get_dbdriver();
if (ct == TA_PRINT_KEY) {
printf("0x%s\n", skey);
} else if (dbd) {
if (!is_admin) {
must_set_admin_realm(realm);
}
if (ct == TA_DELETE_USER) {
if (is_admin) {
if (dbd->del_admin_user) {
(*dbd->del_admin_user)(user);
}
} else {
if (dbd->del_user) {
(*dbd->del_user)(user, realm);
}
}
} else if (ct == TA_UPDATE_USER) {
if (is_admin) {
must_set_admin_pwd(pwd);
if (dbd->set_admin_user) {
password_t password;
generate_new_enc_password((char *)pwd, (char *)password);
(*dbd->set_admin_user)(user, realm, password);
}
} else {
if (dbd->set_user_key) {
(*dbd->set_user_key)(user, realm, skey);
}
}
}
}
return 0;
}
/////////// PING //////////////
void auth_ping(redis_context_handle rch) {
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->auth_ping) {
(*dbd->auth_ping)(rch);
}
}
///////////////// TEST /////////////////
#if defined(DB_TEST)
void run_db_test(void) {
turn_dbdriver_t *dbd = get_dbdriver();
if (dbd) {
printf("DB TEST 1:\n");
dbd->list_oauth_keys();
printf("DB TEST 2:\n");
oauth_key_data_raw key_;
oauth_key_data_raw *key = &key_;
dbd->get_oauth_key((const uint8_t *)"north", key);
printf(" kid=%s, ikm_key=%s, timestamp=%llu, lifetime=%lu, as_rs_alg=%s\n", key->kid, key->ikm_key,
(unsigned long long)key->timestamp, (unsigned long)key->lifetime, key->as_rs_alg);
printf("DB TEST 3:\n");
STRCPY(key->as_rs_alg, "as_rs_alg");
STRCPY(key->ikm_key, "ikm_key");
STRCPY(key->kid, "kid");
key->timestamp = 123;
key->lifetime = 456;
dbd->del_oauth_key((const uint8_t *)"kid");
dbd->set_oauth_key(key);
dbd->list_oauth_keys();
printf("DB TEST 4:\n");
dbd->get_oauth_key((const uint8_t *)"kid", key);
printf(" kid=%s, ikm_key=%s, timestamp=%llu, lifetime=%lu, as_rs_alg=%s\n", key->kid, key->ikm_key,
(unsigned long long)key->timestamp, (unsigned long)key->lifetime, key->as_rs_alg);
printf("DB TEST 5:\n");
dbd->del_oauth_key((const uint8_t *)"kid");
dbd->list_oauth_keys();
printf("DB TEST 6:\n");
dbd->get_oauth_key((const uint8_t *)"north", key);
oauth_key_data oakd;
convert_oauth_key_data_raw(key, &oakd);
printf(" kid=%s, ikm_key=%s, timestamp=%llu, lifetime=%lu, as_rs_alg=%s\n", oakd.kid, oakd.ikm_key,
(unsigned long long)oakd.timestamp, (unsigned long)oakd.lifetime, oakd.as_rs_alg);
oauth_key oak;
char err_msg[1025];
err_msg[0] = 0;
if (convert_oauth_key_data(&oakd, &oak, err_msg, sizeof(err_msg) - 1) < 0) {
printf(" ERROR: %s\n", err_msg);
} else {
printf(" OK!\n");
}
printf("DB TEST END\n");
}
}
#endif
///////////////// WHITE/BLACK IP LISTS ///////////////////
#if !defined(TURN_NO_RWLOCK)
static pthread_rwlock_t *whitelist_rwlock = NULL;
static pthread_rwlock_t *blacklist_rwlock = NULL;
#else
static TURN_MUTEX_DECLARE(whitelist_mutex);
static TURN_MUTEX_DECLARE(blacklist_mutex);
#endif
static ip_range_list_t *ipwhitelist = NULL;
static ip_range_list_t *ipblacklist = NULL;
void init_dynamic_ip_lists(void) {
#if !defined(TURN_NO_RWLOCK)
whitelist_rwlock = (pthread_rwlock_t *)malloc(sizeof(pthread_rwlock_t));
pthread_rwlock_init(whitelist_rwlock, NULL);
blacklist_rwlock = (pthread_rwlock_t *)malloc(sizeof(pthread_rwlock_t));
pthread_rwlock_init(blacklist_rwlock, NULL);
#else
TURN_MUTEX_INIT(&whitelist_mutex);
TURN_MUTEX_INIT(&blacklist_mutex);
#endif
}
void ioa_lock_whitelist(ioa_engine_handle e) {
UNUSED_ARG(e);
#if !defined(TURN_NO_RWLOCK)
pthread_rwlock_rdlock(whitelist_rwlock);
#else
TURN_MUTEX_LOCK(&whitelist_mutex);
#endif
}
void ioa_unlock_whitelist(ioa_engine_handle e) {
UNUSED_ARG(e);
#if !defined(TURN_NO_RWLOCK)
pthread_rwlock_unlock(whitelist_rwlock);
#else
TURN_MUTEX_UNLOCK(&whitelist_mutex);
#endif
}
static void ioa_wrlock_whitelist(ioa_engine_handle e) {
UNUSED_ARG(e);
#if !defined(TURN_NO_RWLOCK)
pthread_rwlock_wrlock(whitelist_rwlock);
#else
TURN_MUTEX_LOCK(&whitelist_mutex);
#endif
}
const ip_range_list_t *ioa_get_whitelist(ioa_engine_handle e) {
UNUSED_ARG(e);
return ipwhitelist;
}
void ioa_lock_blacklist(ioa_engine_handle e) {
UNUSED_ARG(e);
#if !defined(TURN_NO_RWLOCK)
pthread_rwlock_rdlock(blacklist_rwlock);
#else
TURN_MUTEX_LOCK(&blacklist_mutex);
#endif
}
void ioa_unlock_blacklist(ioa_engine_handle e) {
UNUSED_ARG(e);
#if !defined(TURN_NO_RWLOCK)
pthread_rwlock_unlock(blacklist_rwlock);
#else
TURN_MUTEX_UNLOCK(&blacklist_mutex);
#endif
}
static void ioa_wrlock_blacklist(ioa_engine_handle e) {
UNUSED_ARG(e);
#if !defined(TURN_NO_RWLOCK)
pthread_rwlock_wrlock(blacklist_rwlock);
#else
TURN_MUTEX_LOCK(&blacklist_mutex);
#endif
}
const ip_range_list_t *ioa_get_blacklist(ioa_engine_handle e) {
UNUSED_ARG(e);
return ipblacklist;
}
ip_range_list_t *get_ip_list(const char *kind) {
ip_range_list_t *ret = (ip_range_list_t *)calloc(sizeof(ip_range_list_t), 1);
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->get_ip_list && !turn_params.no_dynamic_ip_list) {
(*dbd->get_ip_list)(kind, ret);
}
return ret;
}
void ip_list_free(ip_range_list_t *l) {
if (l) {
if (l->rs) {
free(l->rs);
}
free(l);
}
}
void update_white_and_black_lists(void) {
{
ip_range_list_t *wl = get_ip_list("allowed");
ip_range_list_t *owl = NULL;
ioa_wrlock_whitelist(NULL);
owl = ipwhitelist;
ipwhitelist = wl;
ioa_unlock_whitelist(NULL);
ip_list_free(owl);
}
{
ip_range_list_t *bl = get_ip_list("denied");
ip_range_list_t *obl = NULL;
ioa_wrlock_blacklist(NULL);
obl = ipblacklist;
ipblacklist = bl;
ioa_unlock_blacklist(NULL);
ip_list_free(obl);
}
}
/////////////// add ACL record ///////////////////
int add_ip_list_range(const char *range0, const char *realm, ip_range_list_t *list) {
char *range = strdup(range0);
char *separator = strchr(range, '-');
if (separator) {
*separator = '\0';
}
ioa_addr min, max;
if (make_ioa_addr((const uint8_t *)range, 0, &min) < 0) {
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "Wrong address format: %s\n", range);
free(range);
return -1;
}
if (separator) {
if (make_ioa_addr((const uint8_t *)separator + 1, 0, &max) < 0) {
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "Wrong address format: %s\n", separator + 1);
free(range);
return -1;
}
} else {
// Doesn't have a '-' character in it, so assume that this is a single address
addr_cpy(&max, &min);
}
if (separator) {
*separator = '-';
}
++(list->ranges_number);
list->rs = (ip_range_t *)realloc(list->rs, sizeof(ip_range_t) * list->ranges_number);
STRCPY(list->rs[list->ranges_number - 1].str, range);
if (realm) {
STRCPY(list->rs[list->ranges_number - 1].realm, realm);
} else {
list->rs[list->ranges_number - 1].realm[0] = 0;
}
free(range);
ioa_addr_range_set(&(list->rs[list->ranges_number - 1].enc), &min, &max);
return 0;
}
int check_ip_list_range(const char *range0) {
char *range = strdup(range0);
char *separator = strchr(range, '-');
if (separator) {
*separator = '\0';
}
ioa_addr min, max;
if (make_ioa_addr((const uint8_t *)range, 0, &min) < 0) {
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "Wrong address range format: %s\n", range);
free(range);
return -1;
}
if (separator) {
if (make_ioa_addr((const uint8_t *)separator + 1, 0, &max) < 0) {
TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "Wrong address range format: %s\n", separator + 1);
free(range);
return -1;
}
} else {
// Doesn't have a '-' character in it, so assume that this is a single address
addr_cpy(&max, &min);
}
if (separator) {
*separator = '-';
}
free(range);
return 0;
}
/////////// REALM //////////////
void reread_realms(void) {
{
realm_params_t *defrp = get_realm(NULL);
lock_realms();
defrp->options.perf_options.max_bps = turn_params.max_bps;
defrp->options.perf_options.total_quota = turn_params.total_quota;
defrp->options.perf_options.user_quota = turn_params.user_quota;
unlock_realms();
}
const turn_dbdriver_t *dbd = get_dbdriver();
if (dbd && dbd->reread_realms && !turn_params.no_dynamic_realms) {
(*dbd->reread_realms)(&realms_list);
}
}
///////////////////////////////