123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143 |
- // Copyright (C) 2011 Internet Systems Consortium, Inc. ("ISC")
- //
- // Permission to use, copy, modify, and/or distribute this software for any
- // purpose with or without fee is hereby granted, provided that the above
- // copyright notice and this permission notice appear in all copies.
- //
- // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
- // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
- // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
- // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
- // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
- // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
- // PERFORMANCE OF THIS SOFTWARE.
- #include <exceptions/exceptions.h>
- #include <dns/name.h>
- #include <dns/tsigrecord.h>
- #include <cc/data.h>
- #include <acl/dns.h>
- #include <acl/ip_check.h>
- #include <acl/dnsname_check.h>
- #include <acl/loader.h>
- #include <acl/logic_check.h>
- #include <boost/shared_ptr.hpp>
- #include <boost/scoped_ptr.hpp>
- #include <memory>
- #include <string>
- #include <vector>
- using namespace std;
- using namespace isc::dns;
- using namespace isc::data;
- namespace isc {
- namespace acl {
- /// The specialization of \c IPCheck for access control with \c RequestContext.
- ///
- /// It returns \c true if the remote (source) IP address of the request
- /// matches the expression encapsulated in the \c IPCheck, and returns
- /// \c false if not.
- template <>
- bool
- IPCheck<dns::RequestContext>::matches(
- const dns::RequestContext& request) const
- {
- return (compare(request.remote_address.getData(),
- request.remote_address.getFamily()));
- }
- namespace dns {
- /// The specialization of \c NameCheck for access control with
- /// \c RequestContext.
- ///
- /// It returns \c true if the request contains a TSIG record and its key
- /// (owner) name is equal to the name stored in the check; otherwise
- /// it returns \c false.
- template<>
- bool
- NameCheck<RequestContext>::matches(const RequestContext& request) const {
- return (request.tsig != NULL && request.tsig->getName() == name_);
- }
- vector<string>
- internal::RequestCheckCreator::names() const {
- // Probably we should eventually build this vector in a more
- // sophisticated way. For now, it's simple enough to hardcode
- // everything.
- vector<string> supported_names;
- supported_names.push_back("from");
- supported_names.push_back("key");
- return (supported_names);
- }
- boost::shared_ptr<RequestCheck>
- internal::RequestCheckCreator::create(const string& name,
- ConstElementPtr definition,
- // unused:
- const acl::Loader<RequestContext>&)
- {
- if (!definition) {
- isc_throw(LoaderError,
- "NULL pointer is passed to RequestCheckCreator");
- }
- if (name == "from") {
- return (boost::shared_ptr<internal::RequestIPCheck>(
- new internal::RequestIPCheck(definition->stringValue())));
- } else if (name == "key") {
- return (boost::shared_ptr<internal::RequestKeyCheck>(
- new internal::RequestKeyCheck(
- Name(definition->stringValue()))));
- } else {
- // This case shouldn't happen (normally) as it should have been
- // rejected at the loader level. But we explicitly catch the case
- // and throw an exception for that.
- isc_throw(LoaderError, "Invalid check name for RequestCheck: " <<
- name);
- }
- }
- RequestLoader&
- getRequestLoader() {
- // To ensure that the singleton gets destroyed at the end of the
- // program's lifetime, we put it in a static scoped_ptr.
- static boost::scoped_ptr<RequestLoader> loader(NULL);
- if (loader.get() == NULL) {
- // Creator registration may throw, so we first store the new loader
- // in a second auto pointer in order to provide the strong exception
- // guarantee.
- auto_ptr<RequestLoader> loader_ptr =
- auto_ptr<RequestLoader>(new RequestLoader(REJECT));
- // Register default check creator(s)
- loader_ptr->registerCreator(
- boost::shared_ptr<internal::RequestCheckCreator>(
- new internal::RequestCheckCreator()));
- loader_ptr->registerCreator(
- boost::shared_ptr<NotCreator<RequestContext> >(
- new NotCreator<RequestContext>("NOT")));
- loader_ptr->registerCreator(
- boost::shared_ptr<LogicCreator<AnyOfSpec, RequestContext> >(
- new LogicCreator<AnyOfSpec, RequestContext>("ANY")));
- loader_ptr->registerCreator(
- boost::shared_ptr<LogicCreator<AllOfSpec, RequestContext> >(
- new LogicCreator<AllOfSpec, RequestContext>("ALL")));
- // From this point there shouldn't be any exception thrown
- loader.reset(loader_ptr.release());
- }
- return (*loader);
- }
- }
- }
- }
|