2 * authz.c: authorization related code
4 * ====================================================================
5 * Copyright (c) 2000-2006 CollabNet. All rights reserved.
7 * This software is licensed as described in the file COPYING, which
8 * you should have received as part of this distribution. The terms
9 * are also available at http://subversion.tigris.org/license-1.html.
10 * If newer versions of this license are posted there, you may use a
11 * newer version instead, at your option.
13 * This software consists of voluntary contributions made by many
14 * individuals. For exact contribution history, see the revision
15 * history and logs, available at http://subversion.tigris.org/.
16 * ====================================================================
19 #include <http_request.h>
22 #include "svn_pools.h"
25 #include "mod_authz_svn.h"
29 /* Convert incoming REV and PATH from request R into a version-resource URI
30 for REPOS and perform a GET subrequest on it. This will invoke any authz
31 modules loaded into apache. Return TRUE if the subrequest succeeds, FALSE
32 otherwise. If REV is SVN_INVALID_REVNUM, then we look at HEAD.
35 allow_read(request_rec
*r
,
36 const dav_svn_repos
*repos
,
43 enum dav_svn__build_what uri_type
;
44 svn_boolean_t allowed
= FALSE
;
45 authz_svn__subreq_bypass_func_t allow_read_bypass
= NULL
;
47 /* Easy out: if the admin has explicitly set 'SVNPathAuthz Off',
48 then this whole callback does nothing. */
49 if (! dav_svn__get_pathauthz_flag(r
))
54 /* If bypass is specified and authz has exported the provider.
55 Otherwise, we fall through to the full version. This should be
56 safer than allowing or disallowing all accesses if there is a
58 XXX: Is this the proper thing to do in this case? */
59 allow_read_bypass
= dav_svn__get_pathauthz_bypass(r
);
60 if (allow_read_bypass
!= NULL
)
62 if (allow_read_bypass(r
,path
, repos
->repo_name
) == OK
)
68 /* If no revnum is specified, assume HEAD. */
69 if (SVN_IS_VALID_REVNUM(rev
))
70 uri_type
= DAV_SVN__BUILD_URI_VERSION
;
72 uri_type
= DAV_SVN__BUILD_URI_PUBLIC
;
74 /* Build a Version Resource uri representing (rev, path). */
75 uri
= dav_svn__build_uri(repos
, uri_type
, rev
, path
, FALSE
, pool
);
77 /* Check if GET would work against this uri. */
78 subreq
= ap_sub_req_method_uri("GET", uri
, r
, r
->output_filters
);
82 if (subreq
->status
== HTTP_OK
)
85 ap_destroy_sub_req(subreq
);
92 /* This function implements 'svn_repos_authz_func_t', specifically
93 for read authorization.
95 Convert incoming ROOT and PATH into a version-resource URI and
96 perform a GET subrequest on it. This will invoke any authz modules
97 loaded into apache. Set *ALLOWED to TRUE if the subrequest
98 succeeds, FALSE otherwise.
100 BATON must be a pointer to a dav_svn__authz_read_baton.
101 Use POOL for for any temporary allocation.
104 authz_read(svn_boolean_t
*allowed
,
110 dav_svn__authz_read_baton
*arb
= baton
;
111 svn_revnum_t rev
= SVN_INVALID_REVNUM
;
112 const char *revpath
= NULL
;
114 /* Our ultimate goal here is to create a Version Resource (VR) url,
115 which is a url that represents a path within a revision. We then
116 send a subrequest to apache, so that any installed authz modules
117 can allow/disallow the path.
119 ### That means that we're assuming that any installed authz
120 module is *only* paying attention to revision-paths, not paths in
121 uncommitted transactions. Someday we need to widen our horizons. */
123 if (svn_fs_is_txn_root(root
))
125 /* This means svn_repos_dir_delta2 is comparing two txn trees,
126 rather than a txn and revision. It's probably updating a
127 working copy that contains 'disjoint urls'.
129 Because the 2nd transaction is likely to have all sorts of
130 paths linked in from random places, we need to find the
131 original (rev,path) of each txn path. That's what needs
134 svn_stringbuf_t
*path_s
= svn_stringbuf_create(path
, pool
);
135 const char *lopped_path
= "";
137 /* The path might be copied implicitly, because it's down in a
138 copied tree. So we start at path and walk up its parents
139 asking if anyone was copied, and if so where from. */
140 while (! (svn_path_is_empty(path_s
->data
)
141 || ((path_s
->len
== 1) && (path_s
->data
[0] == '/'))))
143 SVN_ERR(svn_fs_copied_from(&rev
, &revpath
, root
,
144 path_s
->data
, pool
));
146 if (SVN_IS_VALID_REVNUM(rev
) && revpath
)
148 revpath
= svn_path_join(revpath
, lopped_path
, pool
);
152 /* Lop off the basename and try again. */
153 lopped_path
= svn_path_join(svn_path_basename
154 (path_s
->data
, pool
), lopped_path
, pool
);
155 svn_path_remove_component(path_s
);
158 /* If no copy produced this path, its path in the original
159 revision is the same as its path in this txn. */
160 if ((rev
== SVN_INVALID_REVNUM
) && (revpath
== NULL
))
162 rev
= svn_fs_txn_root_base_revision(root
);
166 else /* revision root */
168 rev
= svn_fs_revision_root_revision(root
);
172 /* We have a (rev, path) pair to check authorization on. */
173 *allowed
= allow_read(arb
->r
, arb
->repos
, revpath
, rev
, pool
);
179 svn_repos_authz_func_t
180 dav_svn__authz_read_func(dav_svn__authz_read_baton
*baton
)
182 /* Easy out: If the admin has explicitly set 'SVNPathAuthz Off',
183 then we don't need to do any authorization checks. */
184 if (! dav_svn__get_pathauthz_flag(baton
->r
))
192 dav_svn__allow_read(const dav_resource
*resource
,
196 return allow_read(resource
->info
->r
, resource
->info
->repos
,
197 resource
->info
->repos_path
, rev
, pool
);