summaryrefslogtreecommitdiffstats
path: root/sources
diff options
context:
space:
mode:
authorOpenGnSys Support Team <soporte-og@soleta.eu>2019-06-21 13:03:04 +0200
committerOpenGnSys Support Team <soporte-og@soleta.eu>2019-06-24 13:42:25 +0200
commitfd305405b753528dd53934a15c5194feb6deb7a9 (patch)
treedf2f72a0bd85a8c2f9da0c6056983087766c6198 /sources
parente45455ec8206d676ff3513dc56456a7e27bc402b (diff)
#915 add support for HTTP Authorization
Add APITOKEN= field to ogAdmServer.cfg to specify the REST API key.
Diffstat (limited to 'sources')
-rw-r--r--sources/ogAdmServer.cpp23
1 files changed, 22 insertions, 1 deletions
diff --git a/sources/ogAdmServer.cpp b/sources/ogAdmServer.cpp
index d70aa0c..2504236 100644
--- a/sources/ogAdmServer.cpp
+++ b/sources/ogAdmServer.cpp
@@ -22,6 +22,7 @@ static char pasguor[LONPRM]; // Password del usuario
static char datasource[LONPRM]; // Dirección IP del gestor de base de datos
static char catalog[LONPRM]; // Nombre de la base de datos
static char interface[LONPRM]; // Interface name
+static char auth_token[LONPRM]; // API token
//________________________________________________________________________________________________________
// Función: tomaConfiguracion
@@ -77,7 +78,8 @@ static bool tomaConfiguracion(const char *filecfg)
snprintf(catalog, sizeof(catalog), "%s", value);
else if (!strcmp(StrToUpper(key), "INTERFACE"))
snprintf(interface, sizeof(interface), "%s", value);
-
+ else if (!strcmp(StrToUpper(key), "APITOKEN"))
+ snprintf(auth_token, sizeof(auth_token), "%s", value);
line = fgets(buf, sizeof(buf), fcfg);
}
@@ -132,6 +134,7 @@ struct og_client {
int keepalive_idx;
bool rest;
unsigned int content_length;
+ char auth_token[64];
};
static inline int og_client_socket(const struct og_client *cli)
@@ -3880,6 +3883,15 @@ static int og_client_not_found(struct og_client *cli)
return -1;
}
+static int og_client_not_authorized(struct og_client *cli)
+{
+ char buf[] = "HTTP/1.1 404 Unauthorized\r\nContent-Length: 0\r\n\r\n";
+
+ send(og_client_socket(cli), buf, strlen(buf), 0);
+
+ return -1;
+}
+
static int og_client_ok(struct og_client *cli, char *buf_reply)
{
char buf[4096] = {};
@@ -3918,6 +3930,11 @@ static int og_client_state_process_payload_rest(struct og_client *cli)
body = strstr(cli->buf, "\r\n\r\n") + 4;
+ if (strcmp(cli->auth_token, auth_token)) {
+ syslog(LOG_ERR, "wrong Authentication key\n");
+ return og_client_not_authorized(cli);
+ }
+
if (cli->content_length) {
root = json_loads(body, 0, &json_err);
if (!root) {
@@ -4047,6 +4064,10 @@ static int og_client_state_recv_hdr_rest(struct og_client *cli)
cli->msg_len += cli->content_length;
}
+ ptr = strstr(cli->buf, "Authorization: ");
+ if (ptr)
+ sscanf(ptr, "Authorization: %64[^\r\n]", cli->auth_token);
+
return 1;
}