Initial implementation of the firewall filter.

This commit is contained in:
Markus Makela
2014-10-02 14:57:53 +03:00
parent bb11f6236f
commit 8a71c85dd3
4 changed files with 508 additions and 1 deletions

View File

@ -1186,6 +1186,60 @@ bool is_drop_table_query(GWBUF* querybuf)
lex->sql_command == SQLCOM_DROP_TABLE;
}
char* skygw_get_where_clause(GWBUF* buf)
{
LEX* lex;
unsigned int buffsz = 0,bufflen = 0;
char* where = NULL;
Item* item;
if(!query_is_parsed(buf)){
parse_query(buf);
}
if((lex = get_lex(buf)) == NULL){
return NULL;
}
lex->current_select = lex->all_selects_list;
while(lex->current_select)
{
if(lex->current_select->where){
for (item=lex->current_select->where; item != NULL; item=item->next)
{
Item::Type tp = item->type();
if(item->name && tp == Item::FIELD_ITEM){
int isize = strlen(item->name) + 1;
if(where == NULL || isize + bufflen >= buffsz)
{
char *tmp = (char*)calloc(buffsz*2 + isize,sizeof(char));
if(tmp){
memcpy(tmp,where,buffsz);
if(where){
free(where);
}
where = tmp;
buffsz = buffsz*2 + isize;
}else{
return NULL;
}
}
if(bufflen > 0){
strcat(where," ");
}
strcat(where,item->name);
bufflen += isize;
}
}
}
lex->current_select = lex->current_select->next_select_in_list();
}
return where;
}
/*
* Replace user-provided literals with question marks. Return a copy of the
* querystr with replacements.

View File

@ -94,7 +94,7 @@ parsing_info_t* parsing_info_init(void (*donefun)(void *));
void parsing_info_done(void* ptr);
bool query_is_parsed(GWBUF* buf);
char* skygw_get_qtype_str(skygw_query_type_t qtype);
char* skygw_get_where_clause(GWBUF* buf);
EXTERN_C_BLOCK_END

View File

@ -24,4 +24,9 @@ add_library(topfilter SHARED topfilter.c)
target_link_libraries(topfilter log_manager utils)
install(TARGETS topfilter DESTINATION modules)
add_library(fwfilter SHARED fwfilter.c)
target_link_libraries(fwfilter log_manager utils query_classifier)
install(TARGETS fwfilter DESTINATION modules)
add_subdirectory(hint)

View File

@ -0,0 +1,448 @@
/*
* This file is distributed as part of MaxScale by MariaDB Corporation. It is free
* software: you can redistribute it and/or modify it under the terms of the
* GNU General Public License as published by the Free Software Foundation,
* version 2.
*
* This program is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
* FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
* details.
*
* You should have received a copy of the GNU General Public License along with
* this program; if not, write to the Free Software Foundation, Inc., 51
* Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Copyright MariaDB Corporation Ab 2014
*/
/**
* @file fwfilter.c
* Firewall Filter
*
* A filter that acts as a firewall, blocking queries that do not meet the set requirements.
*/
#include <stdio.h>
#include <fcntl.h>
#include <filter.h>
#include <string.h>
#include <atomic.h>
#include <log_manager.h>
#include <query_classifier.h>
#include <spinlock.h>
#include <session.h>
#include <plugin.h>
#include <stdint.h>
#include <skygw_types.h>
MODULE_INFO info = {
MODULE_API_FILTER,
MODULE_ALPHA_RELEASE,
FILTER_VERSION,
"Firewall Filter"
};
static int sess_num;
/**
* Utility function to check if a string contains a valid IP address.
* The string handled as a null-terminated string.
* @param str String to parse
* @return True if the string contains a valid IP address.
*/
bool valid_ip(char* str)
{
int octval = 0;
bool valid = true;
char cmpbuff[32];
char *source = str,*dest = cmpbuff,*end = strchr(str,'\0');
while(source < end && (int)(dest - cmpbuff) < 32 && valid){
switch(*source){
case '.':
case '/':
case '\0':
/**End of IP, string or octet*/
*(dest++) = '\0';
octval = atoi(cmpbuff);
dest = cmpbuff;
valid = octval < 256 && octval > -1 ? true: false;
if(*source == '/' || *source == '\0'){
return valid;
}else{
source++;
}
break;
default:
/**In the IP octet, copy to buffer*/
*(dest++) = *(source++);
break;
}
}
return valid;
}
/**
* Get one octet of IP
*/
int get_octet(char* str)
{
int octval = 0,retval = -1;
bool valid = false;
char cmpbuff[32];
char *source = str,*dest = cmpbuff,*end = strchr(str,'\0');
if(end == NULL){
return retval;
}
while(source < end && (int)(dest - cmpbuff) < 32 && !valid){
switch(*source){
/**End of IP or string or the octet is done*/
case '.':
case '/':
case '\0':
*(dest++) = '\0';
source++;
octval = atoi(cmpbuff);
dest = cmpbuff;
valid = octval < 256 && octval > -1 ? true: false;
if(valid)
{
retval = octval;
}
break;
default:
/**In the IP octet, copy to buffer*/
*(dest++) = *(source++);
break;
}
}
return retval;
}
/**
*Convert string with IP address to an unsigned 32-bit integer
* @param str String to convert
* @return Value of the IP converted to an unsigned 32-bit integer or zero in case of an error.
*/
uint32_t strtoip(char* str)
{
uint32_t ip = 0;
char* tok = str;
if(!valid_ip(str)){
return 0;
}
ip = get_octet(tok);
tok = strchr(tok,'.') + 1;
ip |= (get_octet(tok))<< 8;
tok = strchr(tok,'.') + 1;
ip |= (get_octet(tok))<< 16;
tok = strchr(tok,'.') + 1;
ip |= (get_octet(tok))<< 24;
return ip;
}
/**
*Convert string with a subnet mask to an unsigned 32-bit integer
*/
uint32_t strtosubmask(char* str)
{
uint32_t mask = 0;
char *ptr;
if(!valid_ip(str) ||
(ptr = strchr(str,'/')) == NULL ||
!valid_ip(++ptr))
{
return mask;
}
mask = strtoip(ptr+1);
return mask;
}
static char *version_str = "V1.0.0";
/*
* The filter entry points
*/
static FILTER *createInstance(char **options, FILTER_PARAMETER **);
static void *newSession(FILTER *instance, SESSION *session);
static void closeSession(FILTER *instance, void *session);
static void freeSession(FILTER *instance, void *session);
static void setDownstream(FILTER *instance, void *fsession, DOWNSTREAM *downstream);
static void setUpstream(FILTER *instance, void *fsession, UPSTREAM *upstream);
static int routeQuery(FILTER *instance, void *fsession, GWBUF *queue);
static int clientReply(FILTER *instance, void *fsession, GWBUF *queue);
static void diagnostic(FILTER *instance, void *fsession, DCB *dcb);
static FILTER_OBJECT MyObject = {
createInstance,
newSession,
closeSession,
freeSession,
setDownstream,
setUpstream,
routeQuery,
clientReply,
diagnostic,
};
/**
* The Firewall filter instance.
*/
typedef struct {
} FW_INSTANCE;
/**
* The session structure for Firewall filter.
*/
typedef struct {
DOWNSTREAM down;
UPSTREAM up;
SESSION* session;
FILE* debug_file;
} FW_SESSION;
/**
* Implementation of the mandatory version entry point
*
* @return version string of the module
*/
char *
version()
{
return version_str;
}
/**
* The module initialisation routine, called when the module
* is first loaded.
*/
void
ModuleInit()
{
}
/**
* The module entry point routine. It is this routine that
* must populate the structure that is referred to as the
* "module object", this is a structure with the set of
* external entry points for this module.
*
* @return The module object
*/
FILTER_OBJECT *
GetModuleObject()
{
return &MyObject;
}
/**
* Create an instance of the filter for a particular service
* within MaxScale.
*
* @param options The options for this filter
*
* @return The instance data for this new instance
*/
static FILTER *
createInstance(char **options, FILTER_PARAMETER **params)
{
FW_INSTANCE *my_instance;
if ((my_instance = calloc(1, sizeof(FW_INSTANCE))) == NULL){
return NULL;
}
sess_num = 0;
return (FILTER *)my_instance;
}
/**
* Associate a new session with this instance of the filter and opens
* a connection to the server and prepares the exchange and the queue for use.
*
*
* @param instance The filter instance data
* @param session The session itself
* @return Session specific data for this session
*/
static void *
newSession(FILTER *instance, SESSION *session)
{
FW_SESSION *my_session;
if ((my_session = calloc(1, sizeof(FW_SESSION))) == NULL){
return NULL;
}
my_session->session = session;
my_session->debug_file = fopen("/tmp/fwsession.log","a");
fprintf(my_session->debug_file,"Logfile: /tmp/fwsession.log\n");
fflush(my_session->debug_file);
return my_session;
}
/**
* Close a session with the filter, this is the mechanism
* by which a filter may cleanup data structure etc.
*
* @param instance The filter instance data
* @param session The session being closed
*/
static void
closeSession(FILTER *instance, void *session)
{
FW_SESSION *my_session = (FW_SESSION *)session;
fclose(my_session->debug_file);
}
/**
* Free the memory associated with the session
*
* @param instance The filter instance
* @param session The filter session
*/
static void
freeSession(FILTER *instance, void *session)
{
FW_SESSION *my_session = (FW_SESSION *)session;
free(my_session);
}
/**
* Set the downstream filter or router to which queries will be
* passed from this filter.
*
* @param instance The filter instance data
* @param session The filter session
* @param downstream The downstream filter or router.
*/
static void
setDownstream(FILTER *instance, void *session, DOWNSTREAM *downstream)
{
FW_SESSION *my_session = (FW_SESSION *)session;
my_session->down = *downstream;
}
static void setUpstream(FILTER *instance, void *session, UPSTREAM *upstream)
{
FW_SESSION *my_session = (FW_SESSION *)session;
my_session->up = *upstream;
}
/**
* The routeQuery entry point. This is passed the query buffer
* to which the filter should be applied. Once processed the
* query is passed to the downstream component
* (filter or router) in the filter chain.
*
* @param instance The filter instance data
* @param session The filter session
* @param queue The query data
*/
static int
routeQuery(FILTER *instance, void *session, GWBUF *queue)
{
FW_SESSION *my_session = (FW_SESSION *)session;
FW_INSTANCE *my_instance = (FW_INSTANCE *)instance;
bool accept = true;
char* where;
DCB* dcb = my_session->session->client;
if(modutil_is_SQL(queue)){
if(!query_is_parsed(queue))
{
parse_query(queue);
}
where = skygw_get_where_clause(queue);
if(where && strchr(where,'*') != NULL){
accept = false;
skygw_log_write(LOGFILE_TRACE, "where clause has '*': %s", where);
}
free(where);
}
if(!accept){
/**
* Fake empty COM_QUERY to block the query
*/
*((unsigned char*)queue->start) = 0x02;
*((unsigned char*)queue->start + 1) = 0x00;
*((unsigned char*)queue->start + 2) = 0x00;
*((unsigned char*)queue->start + 3) = 0x00;
*((unsigned char*)queue->start + 4) = 0x03;
*((unsigned char*)queue->start + 5) = ';';
}
return my_session->down.routeQuery(my_session->down.instance,
my_session->down.session, queue);
}
/**
* The clientReply entry point. This is passed the response buffer
* to which the filter should be applied. Once processed the
* query is passed to the upstream component
* (filter or router) in the filter chain.
*
* @param instance The filter instance data
* @param session The filter session
* @param reply The response data
*/
static int clientReply(FILTER* instance, void *session, GWBUF *reply)
{
FW_SESSION *my_session = (FW_SESSION *)session;
FW_INSTANCE *my_instance = (FW_INSTANCE *)instance;
return my_session->up.clientReply(my_session->up.instance,
my_session->up.session, reply);
}
/**
* Diagnostics routine
*
* Prints the connection details and the names of the exchange,
* queue and the routing key.
*
* @param instance The filter instance
* @param fsession Filter session, may be NULL
* @param dcb The DCB for diagnostic output
*/
static void
diagnostic(FILTER *instance, void *fsession, DCB *dcb)
{
FW_INSTANCE *my_instance = (FW_INSTANCE *)instance;
if (my_instance)
{
dcb_printf(dcb, "\t\tFirewall Filter\n");
}
}