The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
rlm_rest.c
Go to the documentation of this file.
1/*
2 * This program is is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or (at
5 * your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 44e0d889a0309360ad1dea47ff544e11bc903dc9 $
19 * @file rlm_rest.c
20 * @brief Integrate FreeRADIUS with RESTfull APIs
21 *
22 * @copyright 2012-2019,2024 Arran Cudbard-Bell (a.cudbardb@freeradius.org)
23 */
24RCSID("$Id: 44e0d889a0309360ad1dea47ff544e11bc903dc9 $")
25
26#include <freeradius-devel/curl/base.h>
27#include <freeradius-devel/curl/xlat.h>
28#include <freeradius-devel/server/base.h>
29#include <freeradius-devel/server/cf_parse.h>
30#include <freeradius-devel/server/cf_util.h>
31
32#include <freeradius-devel/server/global_lib.h>
33#include <freeradius-devel/server/module_rlm.h>
34#include <freeradius-devel/server/tmpl.h>
35#include <freeradius-devel/server/tmpl_escape.h>
36#include <freeradius-devel/server/pairmove.h>
37#include <freeradius-devel/server/log.h>
38#include <freeradius-devel/tls/base.h>
39#include <freeradius-devel/util/atexit.h>
40#include <freeradius-devel/util/debug.h>
41#include <freeradius-devel/util/table.h>
42#include <freeradius-devel/util/uri.h>
43#include <freeradius-devel/util/value.h>
44#include <freeradius-devel/unlang/call_env.h>
45#include <freeradius-devel/unlang/xlat_func.h>
46#include <freeradius-devel/unlang/xlat.h>
47
48#include <curl/curl.h>
49
50#include <talloc.h>
51
52#include "rest.h"
53
54static int rest_uri_part_escape(fr_value_box_t *vb, void *uctx);
55static void *rest_uri_part_escape_uctx_alloc(UNUSED request_t *request, void const *uctx);
56
57static fr_uri_part_t const rest_uri_parts[] = {
58 { .name = "scheme", .safe_for = CURL_URI_SAFE_FOR, .terminals = &FR_SBUFF_TERMS(L(":")), .part_adv = { [':'] = 1 }, .extra_skip = 2 },
59 { .name = "host", .safe_for = CURL_URI_SAFE_FOR, .terminals = &FR_SBUFF_TERMS(L(":"), L("/")), .part_adv = { [':'] = 1, ['/'] = 2 }, .func = rest_uri_part_escape },
60 { .name = "port", .safe_for = CURL_URI_SAFE_FOR, .terminals = &FR_SBUFF_TERMS(L("/")), .part_adv = { ['/'] = 1 } },
61 { .name = "method", .safe_for = CURL_URI_SAFE_FOR, .terminals = &FR_SBUFF_TERMS(L("?")), .part_adv = { ['?'] = 1 }, .func = rest_uri_part_escape },
62 { .name = "param", .safe_for = CURL_URI_SAFE_FOR, .func = rest_uri_part_escape },
64};
65
67
68 { L("1.0"), CURL_HTTP_VERSION_1_0 }, //!< Enforce HTTP 1.0 requests.
69 { L("1.1"), CURL_HTTP_VERSION_1_1 }, //!< Enforce HTTP 1.1 requests.
70/*
71 * These are all enum values
72 */
73#if CURL_AT_LEAST_VERSION(7,49,0)
74 { L("2.0"), CURL_HTTP_VERSION_2_PRIOR_KNOWLEDGE }, //!< Enforce HTTP 2.0 requests.
75#endif
76#if CURL_AT_LEAST_VERSION(7,33,0)
77 { L("2.0+auto"), CURL_HTTP_VERSION_2_0 }, //!< Attempt HTTP 2 requests. libcurl will fall back
78 ///< to HTTP 1.1 if HTTP 2 can't be negotiated with the
79 ///< server. (Added in 7.33.0)
80#endif
81#if CURL_AT_LEAST_VERSION(7,47,0)
82 { L("2.0+tls"), CURL_HTTP_VERSION_2TLS }, //!< Attempt HTTP 2 over TLS (HTTPS) only.
83 ///< libcurl will fall back to HTTP 1.1 if HTTP 2
84 ///< can't be negotiated with the HTTPS server.
85 ///< For clear text HTTP servers, libcurl will use 1.1.
86#endif
87 { L("default"), CURL_HTTP_VERSION_NONE } //!< We don't care about what version the library uses.
88 ///< libcurl will use whatever it thinks fit.
89};
91
92/** Unique pointer used to determine if we should explicitly disable proxying
93 *
94 */
95char const *rest_no_proxy = "*";
96
97static int rest_proxy_parse(UNUSED TALLOC_CTX *ctx, void *out, UNUSED void *parent,
98 CONF_ITEM *ci, UNUSED conf_parser_t const *rule)
99{
100 static fr_table_num_sorted_t const disable_proxy_table[] = {
101 { L("no"), 1 },
102 { L("false"), 1 },
103 { L("none"), 1 }
104 };
105 static size_t disable_proxy_table_len = NUM_ELEMENTS(disable_proxy_table);
106 char const *value = cf_pair_value(cf_item_to_pair(ci));
107
108 if (fr_table_value_by_str(disable_proxy_table, value, 0) == 1) {
109 *((char const **)out) = rest_no_proxy;
110 } else {
111 *((char const **)out) = value;
112 }
113 return 0;
114}
115
116#define SECTION_REQUEST_COMMON \
117 { FR_CONF_OFFSET("body", rlm_rest_section_request_t, body_str), .dflt = "none" }, \
118 /* User authentication */ \
119 { FR_CONF_OFFSET_IS_SET("auth", FR_TYPE_VOID, 0, rlm_rest_section_request_t, auth), \
120 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = http_auth_table, .len = &http_auth_table_len }, .dflt = "none" }, \
121 { FR_CONF_OFFSET("require_auth", rlm_rest_section_request_t, require_auth), .dflt = "no" }, \
122 { FR_CONF_OFFSET("chunk", rlm_rest_section_request_t, chunk), .dflt = "0" } \
123
130
132 { FR_CONF_OFFSET("force_to", rlm_rest_section_response_t, force_to_str) }, \
133 { FR_CONF_OFFSET_TYPE_FLAGS("max_body_in", FR_TYPE_SIZE, 0, rlm_rest_section_response_t, max_body_in), .dflt = "16k" },
135};
136
140
141 /* Transfer configuration */
142 { FR_CONF_OFFSET("timeout", rlm_rest_section_t, timeout), .dflt = "4.0" },
143
144 /* TLS Parameters */
147};
148
153
154static const conf_parser_t xlat_config[] = {
157
158 /* Transfer configuration */
159 { FR_CONF_OFFSET("timeout", rlm_rest_section_t, timeout), .dflt = "4.0" },
160
161 /* TLS Parameters */
164};
165
166static const conf_parser_t module_config[] = {
167 { FR_CONF_DEPRECATED("connect_timeout", rlm_rest_t, connect_timeout) },
168 { FR_CONF_OFFSET("connect_proxy", rlm_rest_t, connect_proxy), .func = rest_proxy_parse },
169 { FR_CONF_OFFSET("http_negotiation", rlm_rest_t, http_negotiation),
170 .func = cf_table_parse_int,
172 .dflt = "default" },
173
174 { FR_CONF_OFFSET_SUBSECTION("connection", 0, rlm_rest_t, conn_config, fr_curl_conn_config) },
175
176#ifdef CURLPIPE_MULTIPLEX
177 { FR_CONF_OFFSET("multiplex", rlm_rest_t, multiplex), .dflt = "yes" },
178#endif
179
180#ifndef NDEBUG
181 { FR_CONF_OFFSET("fail_header_decode", rlm_rest_t, fail_header_decode), .dflt = "no" },
182 { FR_CONF_OFFSET("fail_body_decode", rlm_rest_t, fail_body_decode), .dflt = "no" },
183#endif
184
186};
187
188#define REST_CALL_ENV_REQUEST_COMMON(_dflt_username, _dflt_password) \
189 { FR_CALL_ENV_OFFSET("header", FR_TYPE_STRING, CALL_ENV_FLAG_MULTI, rlm_rest_call_env_t, request.header) }, \
190 { FR_CALL_ENV_OFFSET("data", FR_TYPE_STRING, CALL_ENV_FLAG_CONCAT, rlm_rest_call_env_t, request.data) }, \
191 { FR_CALL_ENV_OFFSET("username", FR_TYPE_STRING, CALL_ENV_FLAG_SINGLE | CALL_ENV_FLAG_NULLABLE | CALL_ENV_FLAG_BARE_WORD_ATTRIBUTE, \
192 rlm_rest_call_env_t, request.username), .pair.dflt_quote = T_BARE_WORD, _dflt_username }, \
193 { FR_CALL_ENV_OFFSET("password", FR_TYPE_STRING, CALL_ENV_FLAG_SINGLE | CALL_ENV_FLAG_NULLABLE | CALL_ENV_FLAG_SECRET | CALL_ENV_FLAG_BARE_WORD_ATTRIBUTE, \
194 rlm_rest_call_env_t, request.password), .pair.dflt_quote = T_BARE_WORD, _dflt_password }, \
195
196#define REST_CALL_ENV_RESPONSE_COMMON \
197 { FR_CALL_ENV_PARSE_ONLY_OFFSET("header", FR_TYPE_STRING, CALL_ENV_FLAG_ATTRIBUTE, rlm_rest_call_env_t, response.header) }, \
198
199#define REST_CALL_ENV_SECTION(_var, _section, _dflt_username, _dflt_password) \
200static const call_env_method_t _var = { \
201 FR_CALL_ENV_METHOD_OUT(rlm_rest_call_env_t), \
202 .env = (call_env_parser_t[]){ \
203 { FR_CALL_ENV_SUBSECTION(_section, NULL, CALL_ENV_FLAG_NONE, \
204 ((call_env_parser_t[]) { \
205 { FR_CALL_ENV_SUBSECTION("request", NULL, CALL_ENV_FLAG_REQUIRED, \
206 ((call_env_parser_t[]) { \
207 { FR_CALL_ENV_OFFSET("uri", FR_TYPE_STRING, CALL_ENV_FLAG_REQUIRED | CALL_ENV_FLAG_CONCAT, rlm_rest_call_env_t, request.uri), \
208 .pair.escape = { \
209 .box_escape = { \
210 .func = fr_uri_escape, \
211 .safe_for = CURL_URI_SAFE_FOR, \
212 .always_escape = true, /* required! */ \
213 }, \
214 .mode = TMPL_ESCAPE_PRE_CONCAT, \
215 .uctx = { \
216 .func = { \
217 .alloc = rest_uri_part_escape_uctx_alloc, \
218 .uctx = rest_uri_parts \
219 } , \
220 .type = TMPL_ESCAPE_UCTX_ALLOC_FUNC\
221 }, \
222 }, \
223 .pair.literals_safe_for = CURL_URI_SAFE_FOR}, /* Do not concat */ \
224 REST_CALL_ENV_REQUEST_COMMON(_dflt_username, _dflt_password) \
225 CALL_ENV_TERMINATOR \
226 })) }, \
227 { FR_CALL_ENV_SUBSECTION("response", NULL, CALL_ENV_FLAG_NONE, \
228 ((call_env_parser_t[]) { \
229 REST_CALL_ENV_RESPONSE_COMMON \
230 CALL_ENV_TERMINATOR \
231 })) }, \
232 CALL_ENV_TERMINATOR \
233 }) \
234 ) }, \
235 CALL_ENV_TERMINATOR \
236 } \
237}
238
239REST_CALL_ENV_SECTION(rest_call_env_authorize, "authorize",,);
240REST_CALL_ENV_SECTION(rest_call_env_authenticate, "authenticate", .pair.dflt = "User-Name", .pair.dflt = "User-Password");
241REST_CALL_ENV_SECTION(rest_call_env_post_auth, "post-auth",,);
242REST_CALL_ENV_SECTION(rest_call_env_accounting, "accounting",,);
243
244/*
245 * xlat call env doesn't have the same set of config items as the other sections
246 * because some values come from the xlat call itself.
247 *
248 * If someone can figure out a non-fuggly way of omitting the uri from the
249 * configuration, please do, and use the REST_CALL_ENV_SECTION macro for this
250 * too.
251 */
253 FR_CALL_ENV_METHOD_OUT(rlm_rest_call_env_t), \
254 .env = (call_env_parser_t[]){ \
256 ((call_env_parser_t[]) { \
257 { FR_CALL_ENV_SUBSECTION("request", NULL, CALL_ENV_FLAG_NONE, \
258 ((call_env_parser_t[]) { \
259 REST_CALL_ENV_REQUEST_COMMON(,) \
261 })) }, \
262 { FR_CALL_ENV_SUBSECTION("response", NULL, CALL_ENV_FLAG_NONE, \
263 ((call_env_parser_t[]) { \
264 REST_CALL_ENV_RESPONSE_COMMON \
265 CALL_ENV_TERMINATOR \
266 })) }, \
268 }) \
269 ) }, \
271 } \
272};
273
275static fr_dict_t const *dict_radius;
276
279 { .out = &dict_freeradius, .proto = "freeradius" },
280 { .out = &dict_radius, .proto = "radius" },
281 { NULL }
282};
283
289
292 { .out = &attr_rest_http_body, .name = "REST-HTTP-Body", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
293 { .out = &attr_rest_http_header, .name = "REST-HTTP-Header", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
294 { .out = &attr_rest_http_status_code, .name = "REST-HTTP-Status-Code", .type = FR_TYPE_UINT32, .dict = &dict_freeradius },
295 { .out = &attr_user_name, .name = "User-Name", .type = FR_TYPE_STRING, .dict = &dict_radius },
296 { .out = &attr_user_password, .name = "User-Password", .type = FR_TYPE_STRING, .dict = &dict_radius },
297 { NULL }
298};
299
300extern global_lib_autoinst_t const * const rlm_rest_lib[];
305
306/** Update the status attribute
307 *
308 * @param[in] request The current request.
309 * @param[in] handle rest handle.
310 * @return
311 * - 0 if status was updated successfully.
312 * - -1 if status was not updated successfully.
313 */
314static int rlm_rest_status_update(request_t *request, void *handle)
315{
316 int code;
317 fr_pair_t *vp;
318
319 RDEBUG2("Updating result attribute(s)");
320
321 RINDENT();
322 code = rest_get_handle_code(handle);
323 if (!code) {
325 RDEBUG2("request.REST-HTTP-Status-Code !* ANY");
326 REXDENT();
327 return -1;
328 }
329
330 RDEBUG2("request.REST-HTTP-Status-Code := %i", code);
331
333 vp->vp_uint32 = code;
334 REXDENT();
335
336 return 0;
337}
338
340{
341 return talloc_free(uctx);
342}
343
344/** Allocate an escape uctx to pass to fr_uri_escape
345 *
346 * @param[in] request UNUSED.
347 * @param[in] uctx pointer to the start of the uri_parts array.
348 * @return A new fr_uri_escape_ctx_t.
349 */
350static void *rest_uri_part_escape_uctx_alloc(UNUSED request_t *request, void const *uctx)
351{
352 static _Thread_local fr_uri_escape_ctx_t *t_ctx;
353
354 if (unlikely(t_ctx == NULL)) {
356
357 MEM(ctx = talloc_zero(NULL, fr_uri_escape_ctx_t));
359 } else {
360 memset(t_ctx, 0, sizeof(*t_ctx));
361 }
362 t_ctx->uri_part = uctx;
363 return t_ctx;
364}
365
366/** URL escape a single box forming part of a URL
367 *
368 * @param[in] vb to escape
369 * @param[in] uctx UNUSED context containing CURL handle
370 * @return
371 * - 0 on success
372 * - -1 on failure
373 */
374static int rest_uri_part_escape(fr_value_box_t *vb, UNUSED void *uctx)
375{
376 char *escaped, *str;
377
378 escaped = curl_easy_escape(fr_curl_tmp_handle(), vb->vb_strvalue, vb->vb_length);
379 if (!escaped) return -1;
380
381 /*
382 * Returned string the same length - nothing changed
383 */
384 if (strlen(escaped) == vb->vb_length) {
385 curl_free(escaped);
386 return 0;
387 }
388
389 str = talloc_typed_strdup(vb, escaped);
390 fr_value_box_strdup_shallow_replace(vb, str, strlen(str));
391
392 curl_free(escaped);
393
394 return 0;
395}
396
397static int rlm_rest_perform(module_ctx_t const *mctx,
398 rlm_rest_section_t const *section, fr_curl_io_request_t *randle,
399 request_t *request)
400{
401 rlm_rest_thread_t *t = talloc_get_type_abort(mctx->thread, rlm_rest_thread_t);
402 rlm_rest_call_env_t *call_env = talloc_get_type_abort(mctx->env_data, rlm_rest_call_env_t);
403 int ret;
404
405 RDEBUG2("Sending HTTP %s to \"%pV\"",
406 fr_table_str_by_value(http_method_table, section->request.method, NULL), call_env->request.uri);
407
408 /*
409 * Configure various CURL options, and initialise the read/write
410 * context data.
411 */
412 ret = rest_request_config(mctx, section, request, randle, section->request.method, section->request.body,
413 call_env->request.uri->vb_strvalue,
414 call_env->request.data ? call_env->request.data->vb_strvalue : NULL);
415 if (ret < 0) return -1;
416
417 /*
418 * Send the CURL request, pre-parse headers, aggregate incoming
419 * HTTP body data into a single contiguous buffer.
420 */
421 ret = fr_curl_io_request_enqueue(t->mhandle, request, randle);
422 if (ret < 0) return -1;
423
424 return 0;
425}
426
428 xlat_ctx_t const *xctx,
429 request_t *request, UNUSED fr_value_box_list_t *in)
430{
431 rlm_rest_xlat_rctx_t *rctx = talloc_get_type_abort(xctx->rctx, rlm_rest_xlat_rctx_t);
432 int hcode;
433 ssize_t len;
434 char const *body;
436
437 fr_curl_io_request_t *handle = talloc_get_type_abort(rctx->handle, fr_curl_io_request_t);
438 rlm_rest_section_t *section = &rctx->section;
439
440 if (section->tls.extract_cert_attrs) fr_curl_response_certinfo(request, handle);
441
442 if (rlm_rest_status_update(request, handle) < 0) {
443 xa = XLAT_ACTION_FAIL;
444 goto finish;
445 }
446
447 hcode = rest_get_handle_code(handle);
448 switch (hcode) {
449 case 404:
450 case 410:
451 case 403:
452 case 401:
453 {
454 xa = XLAT_ACTION_FAIL;
455error:
456 rest_response_error(request, handle);
457 goto finish;
458 }
459 case 204:
460 goto finish;
461
462 default:
463 /*
464 * Attempt to parse content if there was any.
465 */
466 if ((hcode >= 200) && (hcode < 300)) {
467 break;
468 } else if (hcode < 500) {
469 xa = XLAT_ACTION_FAIL;
470 goto error;
471 } else {
472 xa = XLAT_ACTION_FAIL;
473 goto error;
474 }
475 }
476
477finish:
478 /*
479 * Always output the xlat data.
480 *
481 * The user can check REST-HTTP-Status-Code to figure out what happened.
482 *
483 * Eventually we should just emit two boxes, one with the response code
484 * and one with the body.
485 */
486 len = rest_get_handle_data(&body, handle);
487 if (len > 0) {
488 fr_value_box_t *vb;
489
490 MEM(vb = fr_value_box_alloc_null(ctx));
491 fr_value_box_bstrndup(vb, vb, NULL, body, len, true);
493 }
494
495 rest_slab_release(handle);
496
497 talloc_free(rctx);
498
499 return xa;
500}
501
503 { .required = true, .single = true, .type = FR_TYPE_STRING }, /* HTTP Method */
504 { .required = true, .safe_for = CURL_URI_SAFE_FOR, .type = FR_TYPE_STRING }, /* URL */
505 { .concat = true, .type = FR_TYPE_STRING }, /* Data */
506 { .type = FR_TYPE_STRING }, /* Headers */
508};
509
510/** Simple xlat to read text data from a URL
511 *
512 * Example:
513@verbatim
514%rest(POST, http://example.com/, "{ \"key\": \"value\" }", [<headers>])
515@endverbatim
516 *
517 * @ingroup xlat_functions
518 */
520 xlat_ctx_t const *xctx, request_t *request,
521 fr_value_box_list_t *in)
522{
524 rlm_rest_thread_t *t = talloc_get_type_abort(xctx->mctx->thread, rlm_rest_thread_t);
525
526 fr_curl_io_request_t *randle = NULL;
527 int ret;
528 http_method_t method;
529
530 fr_value_box_t *method_vb;
531 fr_value_box_t *uri_vb;
532 fr_value_box_t *data_vb;
533 fr_value_box_t *header_vb;
534
535 /* There are no configurable parameters other than the URI */
537 rlm_rest_section_t *section;
538
539 XLAT_ARGS(in, &method_vb, &uri_vb, &data_vb, &header_vb);
540
541 MEM(rctx = talloc(request, rlm_rest_xlat_rctx_t));
542 section = &rctx->section;
543
544 /*
545 * Section gets modified, so we need our own copy.
546 */
547 memcpy(&rctx->section, &inst->xlat, sizeof(*section));
548
549 /*
550 * Set the HTTP verb
551 */
552 method = fr_table_value_by_substr(http_method_table, method_vb->vb_strvalue, -1, REST_HTTP_METHOD_UNKNOWN);
553 if (method != REST_HTTP_METHOD_UNKNOWN) {
554 section->request.method = method;
555 /*
556 * If the method is unknown, it's a custom verb
557 */
558 } else {
560 MEM(section->request.method_str = talloc_bstrndup(rctx, method_vb->vb_strvalue, method_vb->vb_length));
561 }
562
563 /*
564 * Handle URI component escaping
565 */
566 if (fr_uri_escape_list(&uri_vb->vb_group, rest_uri_parts, NULL) < 0) {
567 RPEDEBUG("Failed escaping URI");
568 error:
569 talloc_free(section);
570 return XLAT_ACTION_FAIL;
571 }
572
573 /*
574 * Smush all the URI components together
575 */
577 uri_vb, &uri_vb->vb_group, FR_TYPE_STRING,
579 SIZE_MAX) < 0) {
580 REDEBUG("Concatenating URI");
581 goto error;
582 }
583
584 /*
585 * We get a connection from the pool here as the CURL object
586 * is needed to use curl_easy_escape() for escaping
587 */
588 randle = rctx->handle = rest_slab_reserve(t->slab);
589 if (!randle) return XLAT_ACTION_FAIL;
590
591 randle->request = request; /* Populate the request pointer for escape callbacks */
592 if (data_vb) section->request.body = REST_HTTP_BODY_CUSTOM;
593
594 RDEBUG2("Sending HTTP %s to \"%pV\"",
597 uri_vb);
598
599 if (header_vb) {
600 fr_value_box_list_foreach(&header_vb->vb_group, header) {
601 if (unlikely(rest_request_config_add_header(request, randle, header->vb_strvalue, true) < 0)) {
602 error_release:
603 rest_slab_release(randle);
604 goto error;
605 }
606 }
607 }
608
609 /*
610 * Configure various CURL options, and initialise the read/write
611 * context data.
612 *
613 * @todo We could extract the User-Name and password from the URL string.
614 */
615 ret = rest_request_config(MODULE_CTX(xctx->mctx->mi, t, xctx->env_data, NULL),
616 section, request, randle, section->request.method,
617 section->request.body,
618 uri_vb->vb_strvalue, data_vb ? data_vb->vb_strvalue : NULL);
619 if (ret < 0) goto error_release;
620
621 /*
622 * Send the CURL request, pre-parse headers, aggregate incoming
623 * HTTP body data into a single contiguous buffer.
624 *
625 * @fixme need to pass in thread to all xlat functions
626 */
627 ret = fr_curl_io_request_enqueue(t->mhandle, request, randle);
628 if (ret < 0) goto error_release;
629
631}
632
634{
636 rlm_rest_section_t const *section = &inst->authenticate;
637 fr_curl_io_request_t *handle = talloc_get_type_abort(mctx->rctx, fr_curl_io_request_t);
638
639 int hcode;
641 int ret;
642
643 if (section->tls.extract_cert_attrs) fr_curl_response_certinfo(request, handle);
644
645 if (rlm_rest_status_update(request, handle) < 0) {
646 rcode = RLM_MODULE_FAIL;
647 goto finish;
648 }
649
650 hcode = rest_get_handle_code(handle);
651 switch (hcode) {
652 case 404:
653 case 410:
654 rcode = RLM_MODULE_NOTFOUND;
655 break;
656
657 case 403:
658 rcode = RLM_MODULE_DISALLOW;
659 break;
660
661 case 401:
662 /*
663 * Attempt to parse content if there was any.
664 */
665 ret = rest_response_decode(inst, section, request, handle);
666 if (ret < 0) {
667 rcode = RLM_MODULE_FAIL;
668 break;
669 }
670
671 rcode = RLM_MODULE_REJECT;
672 break;
673
674 case 204:
675 rcode = RLM_MODULE_OK;
676 break;
677
678 default:
679 /*
680 * Attempt to parse content if there was any.
681 */
682 if ((hcode >= 200) && (hcode < 300)) {
683 ret = rest_response_decode(inst, section, request, handle);
684 if (ret < 0) rcode = RLM_MODULE_FAIL;
685 else if (ret == 0) rcode = RLM_MODULE_OK;
686 else rcode = RLM_MODULE_UPDATED;
687 break;
688 } else if (hcode < 500) {
689 rcode = RLM_MODULE_INVALID;
690 } else {
691 rcode = RLM_MODULE_FAIL;
692 }
693 }
694
695 switch (rcode) {
697 case RLM_MODULE_FAIL:
699 rest_response_error(request, handle);
700 break;
701
702 default:
703 rest_response_debug(request, handle);
704 break;
705 }
706
707finish:
708 rest_slab_release(handle);
709
710 RETURN_MODULE_RCODE(rcode);
711}
712
713/*
714 * Find the named user in this modules database. Create the set
715 * of attribute-value pairs to check and reply with for this user
716 * from the database. The authentication code only needs to check
717 * the password, the rest is done here.
718 */
719static unlang_action_t CC_HINT(nonnull) mod_authorize(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
720{
722 rlm_rest_thread_t *t = talloc_get_type_abort(mctx->thread, rlm_rest_thread_t);
723 rlm_rest_section_t const *section = &inst->authorize;
724
725 void *handle;
726 int ret;
727
728 if (!section->name) {
729 RDEBUG2("No authorize section configured");
731 }
732
733 handle = rest_slab_reserve(t->slab);
734 if (!handle) RETURN_MODULE_FAIL;
735
736 ret = rlm_rest_perform(mctx, section, handle, request);
737 if (ret < 0) {
738 rest_slab_release(handle);
739
741 }
742
744}
745
747 module_ctx_t const *mctx, request_t *request)
748{
750 rlm_rest_section_t const *section = &inst->authenticate;
751 fr_curl_io_request_t *handle = talloc_get_type_abort(mctx->rctx, fr_curl_io_request_t);
752
753 int hcode;
754 int rcode = RLM_MODULE_OK;
755 int ret;
756
757 if (section->tls.extract_cert_attrs) fr_curl_response_certinfo(request, handle);
758
759 if (rlm_rest_status_update(request, handle) < 0) {
760 rcode = RLM_MODULE_FAIL;
761 goto finish;
762 }
763
764 hcode = rest_get_handle_code(handle);
765 switch (hcode) {
766 case 404:
767 case 410:
768 rcode = RLM_MODULE_NOTFOUND;
769 break;
770
771 case 403:
772 rcode = RLM_MODULE_DISALLOW;
773 break;
774
775 case 401:
776 /*
777 * Attempt to parse content if there was any.
778 */
779 ret = rest_response_decode(inst, section, request, handle);
780 if (ret < 0) {
781 rcode = RLM_MODULE_FAIL;
782 break;
783 }
784
785 rcode = RLM_MODULE_REJECT;
786 break;
787
788 case 204:
789 rcode = RLM_MODULE_OK;
790 break;
791
792 default:
793 /*
794 * Attempt to parse content if there was any.
795 */
796 if ((hcode >= 200) && (hcode < 300)) {
797 ret = rest_response_decode(inst, section, request, handle);
798 if (ret < 0) rcode = RLM_MODULE_FAIL;
799 else if (ret == 0) rcode = RLM_MODULE_OK;
800 else rcode = RLM_MODULE_UPDATED;
801 break;
802 } else if (hcode < 500) {
803 rcode = RLM_MODULE_INVALID;
804 } else {
805 rcode = RLM_MODULE_FAIL;
806 }
807 }
808
809 switch (rcode) {
811 case RLM_MODULE_FAIL:
813 rest_response_error(request, handle);
814 break;
815
816 default:
817 rest_response_debug(request, handle);
818 break;
819 }
820
821finish:
822 rest_slab_release(handle);
823
824 RETURN_MODULE_RCODE(rcode);
825}
826
827/*
828 * Authenticate the user with the given password.
829 */
830static unlang_action_t CC_HINT(nonnull) mod_authenticate(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
831{
833 rlm_rest_thread_t *t = talloc_get_type_abort(mctx->thread, rlm_rest_thread_t);
834 rlm_rest_call_env_t *call_env = talloc_get_type_abort(mctx->env_data, rlm_rest_call_env_t);
835 rlm_rest_section_t const *section = &inst->authenticate;
836 fr_curl_io_request_t *handle;
837
838 int ret;
839
840 if (!section->name) {
841 RDEBUG2("No authentication section configured");
843 }
844
845 /*
846 * We can only authenticate user requests which HAVE
847 * a User-Name attribute.
848 */
849 if (!call_env->request.username) {
850 REDEBUG("Attribute \"User-Name\" is required for authentication");
852 }
853
854 if (!call_env->request.password) {
855 REDEBUG("Attribute \"User-Password\" is required for authentication");
857 }
858
859 /*
860 * Make sure the supplied password isn't empty
861 */
862 if (call_env->request.password->vb_length == 0) {
863 REDEBUG("User-Password must not be empty");
865 }
866
867 /*
868 * Log the password
869 */
870 if (RDEBUG_ENABLED3) {
871 RDEBUG("Login attempt with password \"%pV\"", &call_env->request.password);
872 } else {
873 RDEBUG2("Login attempt with password");
874 }
875
876 handle = rest_slab_reserve(t->slab);
877 if (!handle) RETURN_MODULE_FAIL;
878
879 ret = rlm_rest_perform(mctx, section, handle, request);
880 if (ret < 0) {
881 rest_slab_release(handle);
882
884 }
885
887}
888
890{
892 rlm_rest_section_t const *section = &inst->authenticate;
893 fr_curl_io_request_t *handle = talloc_get_type_abort(mctx->rctx, fr_curl_io_request_t);
894
895 int hcode;
896 int rcode = RLM_MODULE_OK;
897 int ret;
898
899 if (section->tls.extract_cert_attrs) fr_curl_response_certinfo(request, handle);
900
901 if (rlm_rest_status_update(request, handle) < 0) {
902 rcode = RLM_MODULE_FAIL;
903 goto finish;
904 }
905
906 hcode = rest_get_handle_code(handle);
907 if (hcode >= 500) {
908 rcode = RLM_MODULE_FAIL;
909 } else if (hcode == 204) {
910 rcode = RLM_MODULE_OK;
911 } else if ((hcode >= 200) && (hcode < 300)) {
912 ret = rest_response_decode(inst, section, request, handle);
913 if (ret < 0) rcode = RLM_MODULE_FAIL;
914 else if (ret == 0) rcode = RLM_MODULE_OK;
915 else rcode = RLM_MODULE_UPDATED;
916 } else {
917 rcode = RLM_MODULE_INVALID;
918 }
919
920 switch (rcode) {
922 case RLM_MODULE_FAIL:
923 rest_response_error(request, handle);
924 break;
925
926 default:
927 rest_response_debug(request, handle);
928 break;
929 }
930
931finish:
932 rest_slab_release(handle);
933
934 RETURN_MODULE_RCODE(rcode);
935}
936
937/*
938 * Send accounting info to a REST API endpoint
939 */
940static unlang_action_t CC_HINT(nonnull) mod_accounting(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
941{
943 rlm_rest_thread_t *t = talloc_get_type_abort(mctx->thread, rlm_rest_thread_t);
944 rlm_rest_section_t const *section = &inst->accounting;
945
946 void *handle;
947 int ret;
948
949 if (!section->name) {
950 RDEBUG2("No accounting section configured");
952 }
953
954 handle = rest_slab_reserve(t->slab);
955 if (!handle) RETURN_MODULE_FAIL;
956
957 ret = rlm_rest_perform(mctx, section, handle, request);
958 if (ret < 0) {
959 rest_slab_release(handle);
960
962 }
963
965}
966
968{
970 rlm_rest_section_t const *section = &inst->authenticate;
971 fr_curl_io_request_t *handle = talloc_get_type_abort(mctx->rctx, fr_curl_io_request_t);
972
973 int hcode;
974 int rcode = RLM_MODULE_OK;
975 int ret;
976
977 if (section->tls.extract_cert_attrs) fr_curl_response_certinfo(request, handle);
978
979 if (rlm_rest_status_update(request, handle) < 0) {
980 rcode = RLM_MODULE_FAIL;
981 goto finish;
982 }
983
984 hcode = rest_get_handle_code(handle);
985 if (hcode >= 500) {
986 rcode = RLM_MODULE_FAIL;
987 } else if (hcode == 204) {
988 rcode = RLM_MODULE_OK;
989 } else if ((hcode >= 200) && (hcode < 300)) {
990 ret = rest_response_decode(inst, section, request, handle);
991 if (ret < 0) rcode = RLM_MODULE_FAIL;
992 else if (ret == 0) rcode = RLM_MODULE_OK;
993 else rcode = RLM_MODULE_UPDATED;
994 } else {
995 rcode = RLM_MODULE_INVALID;
996 }
997
998 switch (rcode) {
1000 case RLM_MODULE_FAIL:
1001 rest_response_error(request, handle);
1002 break;
1003
1004 default:
1005 rest_response_debug(request, handle);
1006 break;
1007 }
1008
1009finish:
1010 rest_slab_release(handle);
1011
1012 RETURN_MODULE_RCODE(rcode);
1013}
1014
1015/*
1016 * Send post-auth info to a REST API endpoint
1017 */
1018static unlang_action_t CC_HINT(nonnull) mod_post_auth(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
1019{
1021 rlm_rest_thread_t *t = talloc_get_type_abort(mctx->thread, rlm_rest_thread_t);
1022 rlm_rest_section_t const *section = &inst->post_auth;
1023
1024 void *handle;
1025 int ret;
1026
1027 if (!section->name) {
1028 RDEBUG2("No post-auth section configured");
1030 }
1031
1032 handle = rest_slab_reserve(t->slab);
1033 if (!handle) RETURN_MODULE_FAIL;
1034
1035 ret = rlm_rest_perform(mctx, section, handle, request);
1036 if (ret < 0) {
1037 rest_slab_release(handle);
1038
1040 }
1041
1043}
1044
1046 rlm_rest_section_t *config, char const *name)
1047{
1048 CONF_SECTION *cs, *request_cs;
1049
1050 cs = cf_section_find(parent, name, NULL);
1051 if (!cs) {
1052 config->name = NULL;
1053 return 0;
1054 }
1055
1056 if (cf_section_rules_push(cs, config_items) < 0) return -1;
1057 if (cf_section_parse(inst, config, cs) < 0) {
1058 config->name = NULL;
1059 return -1;
1060 }
1061
1062 /*
1063 * Add section name (Maybe add to headers later?).
1064 */
1065 config->name = name;
1066
1067 /*
1068 * Convert HTTP method auth and body type strings into their integer equivalents.
1069 */
1070 if ((config->request.auth != REST_HTTP_AUTH_NONE) && !http_curl_auth[config->request.auth]) {
1071 cf_log_err(cs, "Unsupported HTTP auth type \"%s\", check libcurl version, OpenSSL build "
1072 "configuration, then recompile this module",
1073 fr_table_str_by_value(http_auth_table, config->request.auth, "<INVALID>"));
1074
1075 return -1;
1076 }
1077 config->request.method = fr_table_value_by_str(http_method_table, config->request.method_str, REST_HTTP_METHOD_CUSTOM);
1078
1079 /*
1080 * Custom hackery to figure out if data was set we can't do it any other way because we can't
1081 * parse the tmpl_t except within a call_env.
1082 *
1083 * We have custom body data so we set REST_HTTP_BODY_CUSTOM, but also need to try and
1084 * figure out what content-type to use. So if they've used the canonical form we
1085 * need to convert it back into a proper HTTP content_type value.
1086 */
1087 if ((strcmp(name, "xlat") == 0) || ((request_cs = cf_section_find(cs, "request", NULL)) && cf_pair_find(request_cs, "data"))) {
1088 http_body_type_t body;
1089
1090 config->request.body = REST_HTTP_BODY_CUSTOM;
1091
1093 if (body != REST_HTTP_BODY_UNKNOWN) {
1094 config->request.body_str = fr_table_str_by_value(http_content_type_table, body, config->request.body_str);
1095 }
1096 /*
1097 * We don't have any custom user data, so we need to select the right encoder based
1098 * on the body type.
1099 *
1100 * To make this slightly more/less confusing, we accept both canonical body_types,
1101 * and content_types.
1102 */
1103 } else {
1105 if (config->request.body == REST_HTTP_BODY_UNKNOWN) {
1107 }
1108
1109 if (config->request.body == REST_HTTP_BODY_UNKNOWN) {
1110 cf_log_err(cs, "Unknown HTTP body type '%s'", config->request.body_str);
1111 return -1;
1112 }
1113
1114 switch (http_body_type_supported[config->request.body]) {
1116 cf_log_err(cs, "Unsupported HTTP body type \"%s\", please submit patches",
1117 config->request.body_str);
1118 return -1;
1119
1121 cf_log_err(cs, "Invalid HTTP body type. \"%s\" is not a valid web API data "
1122 "markup format", config->request.body_str);
1123 return -1;
1124
1126 cf_log_err(cs, "Unavailable HTTP body type. \"%s\" is not available in this "
1127 "build", config->request.body_str);
1128 return -1;
1129
1130 default:
1131 break;
1132 }
1133 }
1134
1135 if (config->response.force_to_str) {
1136 config->response.force_to = fr_table_value_by_str(http_body_type_table, config->response.force_to_str, REST_HTTP_BODY_UNKNOWN);
1137 if (config->response.force_to == REST_HTTP_BODY_UNKNOWN) {
1138 config->response.force_to = fr_table_value_by_str(http_content_type_table, config->response.force_to_str, REST_HTTP_BODY_UNKNOWN);
1139 }
1140
1141 if (config->response.force_to == REST_HTTP_BODY_UNKNOWN) {
1142 cf_log_err(cs, "Unknown forced response body type '%s'", config->response.force_to_str);
1143 return -1;
1144 }
1145
1146 switch (http_body_type_supported[config->response.force_to]) {
1148 cf_log_err(cs, "Unsupported forced response body type \"%s\", please submit patches",
1149 config->response.force_to_str);
1150 return -1;
1151
1153 cf_log_err(cs, "Invalid HTTP forced response body type. \"%s\" is not a valid web API data "
1154 "markup format", config->response.force_to_str);
1155 return -1;
1156
1157 default:
1158 break;
1159 }
1160 }
1161
1162 return 0;
1163}
1164
1165/** Cleans up after a REST request.
1166 *
1167 * Resets all options associated with a CURL handle, and frees any headers
1168 * associated with it.
1169 *
1170 * Calls rest_read_ctx_free and rest_response_free to free any memory used by
1171 * context data.
1172 *
1173 * @param[in] randle to cleanup.
1174 * @param[in] uctx unused.
1175 */
1177{
1178 rlm_rest_curl_context_t *ctx = talloc_get_type_abort(randle->uctx, rlm_rest_curl_context_t);
1179 CURL *candle = randle->candle;
1180
1181 /*
1182 * Clear any previously configured options
1183 */
1184 curl_easy_reset(candle);
1185
1186 /*
1187 * Free header list
1188 */
1189 if (ctx->headers != NULL) {
1190 curl_slist_free_all(ctx->headers);
1191 ctx->headers = NULL;
1192 }
1193
1194#ifndef NDEBUG
1195 {
1196 CURLcode ret;
1197 /*
1198 * With curl 7.61 when a request in cancelled we get a result
1199 * with a NULL (invalid) pointer to private data. This lets
1200 * us know that the request was returned to the slab.
1201 */
1202 ret = curl_easy_setopt(candle, CURLOPT_PRIVATE, (void *)0xdeadc341);
1203 if (unlikely(ret != CURLE_OK)) {
1204 ERROR("Failed to set private data on curl easy handle %p: %s",
1205 candle, curl_easy_strerror(ret));
1206 }
1207 }
1208#endif
1209
1210 /*
1211 * Free response data
1212 */
1213 TALLOC_FREE(ctx->body);
1214 TALLOC_FREE(ctx->response.buffer);
1215 TALLOC_FREE(ctx->request.encoder);
1216 TALLOC_FREE(ctx->response.decoder);
1217 ctx->response.header = NULL; /* This is owned by the parsed call env and must not be freed */
1218
1219 randle->request = NULL;
1220 return 0;
1221}
1222
1224{
1225 curl_easy_cleanup(randle->candle);
1226 return 0;
1227}
1228
1229static int rest_conn_alloc(fr_curl_io_request_t *randle, void *uctx)
1230{
1231 rlm_rest_t const *inst = talloc_get_type_abort(uctx, rlm_rest_t);
1232 rlm_rest_curl_context_t *curl_ctx = NULL;
1233
1234 randle->candle = curl_easy_init();
1235 if (unlikely(!randle->candle)) {
1236 fr_strerror_printf("Unable to initialise CURL handle");
1237 return -1;
1238 }
1239
1240 MEM(curl_ctx = talloc_zero(randle, rlm_rest_curl_context_t));
1241 curl_ctx->headers = NULL;
1242 curl_ctx->request.instance = inst;
1243 curl_ctx->response.instance = inst;
1244
1245 randle->uctx = curl_ctx;
1246 talloc_set_destructor(randle, _mod_conn_free);
1247
1248 rest_slab_element_set_destructor(randle, _rest_request_cleanup, NULL);
1249
1250 return 0;
1251}
1252
1253/** Create a thread specific multihandle
1254 *
1255 * Easy handles representing requests are added to the curl multihandle
1256 * with the multihandle used for mux/demux.
1257 *
1258 * @param[in] mctx Thread instantiation data.
1259 * @return
1260 * - 0 on success.
1261 * - -1 on failure.
1262 */
1264{
1265 rlm_rest_t *inst = talloc_get_type_abort(mctx->mi->data, rlm_rest_t);
1266 rlm_rest_thread_t *t = talloc_get_type_abort(mctx->thread, rlm_rest_thread_t);
1267 fr_curl_handle_t *mhandle;
1268
1269 t->inst = inst;
1270
1271 if (!(t->slab = rest_slab_list_alloc(t, mctx->el, &inst->conn_config.reuse,
1272 rest_conn_alloc, NULL, inst, false, false))) {
1273 ERROR("Connection handle pool instantiation failed");
1274 return -1;
1275 }
1276
1277 mhandle = fr_curl_io_init(t, mctx->el, inst->multiplex);
1278 if (!mhandle) return -1;
1279
1280 t->mhandle = mhandle;
1281
1282 return 0;
1283}
1284
1285/** Cleanup all outstanding requests associated with this thread
1286 *
1287 * Destroys all curl easy handles, and then the multihandle associated
1288 * with this thread.
1289 *
1290 * @param[in] mctx data to destroy.
1291 * @return 0
1292 */
1294{
1295 rlm_rest_thread_t *t = talloc_get_type_abort(mctx->thread, rlm_rest_thread_t);
1296
1297 talloc_free(t->mhandle); /* Ensure this is shutdown before the pool */
1298 talloc_free(t->slab);
1299
1300 return 0;
1301}
1302
1303/*
1304 * Do any per-module initialization that is separate to each
1305 * configured instance of the module. e.g. set up connections
1306 * to external databases, read configuration files, set up
1307 * dictionary entries, etc.
1308 *
1309 * If configuration information is given in the config section
1310 * that must be referenced in later calls, store a handle to it
1311 * in *instance otherwise put a null pointer there.
1312 */
1313static int instantiate(module_inst_ctx_t const *mctx)
1314{
1315 rlm_rest_t *inst = talloc_get_type_abort(mctx->mi->data, rlm_rest_t);
1316 CONF_SECTION *conf = mctx->mi->conf;
1317
1318 inst->xlat.request.method_str = "GET";
1319 inst->xlat.request.body = REST_HTTP_BODY_NONE;
1320 inst->xlat.request.body_str = "application/x-www-form-urlencoded";
1321 inst->xlat.response.force_to_str = "plain";
1322
1323 /*
1324 * Parse sub-section configs.
1325 */
1326 if (
1327 (parse_sub_section(inst, conf, xlat_config, &inst->xlat, "xlat") < 0) ||
1329 "authorize") < 0) ||
1330 (parse_sub_section(inst, conf, section_config, &inst->authenticate,
1331 "authenticate") < 0) ||
1333 "accounting") < 0) ||
1335 "post-auth") < 0))
1336 {
1337 return -1;
1338 }
1339
1340 inst->conn_config.reuse.num_children = 1;
1341 inst->conn_config.reuse.child_pool_size = sizeof(rlm_rest_curl_context_t);
1342
1343 return 0;
1344}
1345
1346static int mod_bootstrap(module_inst_ctx_t const *mctx)
1347{
1348 xlat_t *xlat;
1349
1350 xlat = module_rlm_xlat_register(mctx->mi->boot, mctx, NULL, rest_xlat, FR_TYPE_STRING);
1353
1354 return 0;
1355}
1356
1357/** Initialises libcurl.
1358 *
1359 * Allocates global variables and memory required for libcurl to function.
1360 * MUST only be called once per module instance.
1361 *
1362 * mod_unload must not be called if mod_load fails.
1363 *
1364 * @see mod_unload
1365 *
1366 * @return
1367 * - 0 on success.
1368 * - -1 on failure.
1369 */
1370static int mod_load(void)
1371{
1372 /* developer sanity */
1374
1375#ifdef HAVE_JSON
1377#endif
1378
1379 return 0;
1380}
1381
1382/*
1383 * The module name should be the only globally exported symbol.
1384 * That is, everything else should be 'static'.
1385 *
1386 * If the module needs to temporarily modify it's instantiation
1387 * data, the type should be changed to MODULE_TYPE_THREAD_UNSAFE.
1388 * The server will then take care of ensuring that the module
1389 * is single-threaded.
1390 */
1391extern module_rlm_t rlm_rest;
1393 .common = {
1394 .magic = MODULE_MAGIC_INIT,
1395 .name = "rest",
1396 .inst_size = sizeof(rlm_rest_t),
1397 .thread_inst_size = sizeof(rlm_rest_thread_t),
1398 .config = module_config,
1399 .onload = mod_load,
1400 .bootstrap = mod_bootstrap,
1401 .instantiate = instantiate,
1402 .thread_instantiate = mod_thread_instantiate,
1403 .thread_detach = mod_thread_detach
1404 },
1405 .method_group = {
1406 .bindings = (module_method_binding_t[]){
1407 /*
1408 * Hack to support old configurations
1409 */
1410 { .section = SECTION_NAME("authorize", CF_IDENT_ANY), .method = mod_authorize, .method_env = &rest_call_env_authorize },
1411
1412 { .section = SECTION_NAME("recv", "accounting-request"), .method = mod_accounting, .method_env = &rest_call_env_accounting },
1413 { .section = SECTION_NAME("recv", CF_IDENT_ANY), .method = mod_authorize, .method_env = &rest_call_env_authorize },
1414 { .section = SECTION_NAME("accounting", CF_IDENT_ANY), .method = mod_accounting, .method_env = &rest_call_env_accounting },
1415 { .section = SECTION_NAME("authenticate", CF_IDENT_ANY), .method = mod_authenticate, .method_env = &rest_call_env_authenticate },
1416 { .section = SECTION_NAME("send", CF_IDENT_ANY), .method = mod_post_auth, .method_env = &rest_call_env_post_auth },
1418 }
1419 }
1420};
unlang_action_t
Returned by unlang_op_t calls, determine the next action of the interpreter.
Definition action.h:35
#define fr_atexit_thread_local(_name, _free, _uctx)
Definition atexit.h:221
#define RCSID(id)
Definition build.h:485
#define L(_str)
Helper for initialising arrays of string literals.
Definition build.h:209
#define unlikely(_x)
Definition build.h:383
#define UNUSED
Definition build.h:317
#define NUM_ELEMENTS(_t)
Definition build.h:339
#define CALL_ENV_TERMINATOR
Definition call_env.h:236
call_env_parser_t const * env
Parsing rules for call method env.
Definition call_env.h:247
#define FR_CALL_ENV_SUBSECTION(_name, _name2, _flags, _subcs)
Specify a call_env_parser_t which defines a nested subsection.
Definition call_env.h:402
@ CALL_ENV_FLAG_NONE
Definition call_env.h:74
Per method call config.
Definition call_env.h:180
int cf_section_parse(TALLOC_CTX *ctx, void *base, CONF_SECTION *cs)
Parse a configuration section into user-supplied variables.
Definition cf_parse.c:1155
int cf_table_parse_int(UNUSED TALLOC_CTX *ctx, void *out, UNUSED void *parent, CONF_ITEM *ci, conf_parser_t const *rule)
Generic function for parsing conf pair values as int.
Definition cf_parse.c:1594
#define CONF_PARSER_TERMINATOR
Definition cf_parse.h:658
cf_parse_t func
Override default parsing behaviour for the specified type with a custom parsing function.
Definition cf_parse.h:612
#define FR_CONF_DEPRECATED(_name, _struct, _field)
conf_parser_t entry which raises an error if a matching CONF_PAIR is found
Definition cf_parse.h:414
#define FR_CONF_OFFSET(_name, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:284
#define cf_section_rules_push(_cs, _rule)
Definition cf_parse.h:690
#define FR_CONF_OFFSET_SUBSECTION(_name, _flags, _struct, _field, _subcs)
conf_parser_t which populates a sub-struct using a CONF_SECTION
Definition cf_parse.h:313
#define FR_CONF_OFFSET_TYPE_FLAGS(_name, _type, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:241
Defines a CONF_PAIR to C data type mapping.
Definition cf_parse.h:595
Common header for all CONF_* types.
Definition cf_priv.h:49
A section grouping multiple CONF_PAIR.
Definition cf_priv.h:101
CONF_SECTION * cf_section_find(CONF_SECTION const *cs, char const *name1, char const *name2)
Find a CONF_SECTION with name1 and optionally name2.
Definition cf_util.c:1028
CONF_PAIR * cf_pair_find(CONF_SECTION const *cs, char const *attr)
Search for a CONF_PAIR with a specific name.
Definition cf_util.c:1439
CONF_PAIR * cf_item_to_pair(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_PAIR.
Definition cf_util.c:664
char const * cf_pair_value(CONF_PAIR const *pair)
Return the value of a CONF_PAIR.
Definition cf_util.c:1594
#define cf_log_err(_cf, _fmt,...)
Definition cf_util.h:289
#define CF_IDENT_ANY
Definition cf_util.h:78
fr_curl_handle_t * fr_curl_io_init(TALLOC_CTX *ctx, fr_event_list_t *el, bool multiplex)
bool extract_cert_attrs
Definition base.h:119
request_t * request
Current request.
Definition base.h:104
void * uctx
Private data for the module using the API.
Definition base.h:105
int fr_curl_io_request_enqueue(fr_curl_handle_t *mhandle, request_t *request, fr_curl_io_request_t *creq)
Sends a request using libcurl.
Definition io.c:483
CURL * candle
Request specific handle.
Definition base.h:102
Uctx data for timer and I/O functions.
Definition base.h:91
Structure representing an individual request being passed to curl for processing.
Definition base.h:101
#define CURL_URI_SAFE_FOR
safe for value suitable for all users of the curl library
Definition xlat.h:36
static int fr_dcursor_insert(fr_dcursor_t *cursor, void *v)
Insert directly after the current item.
Definition dcursor.h:435
#define MEM(x)
Definition debug.h:36
#define ERROR(fmt,...)
Definition dhcpclient.c:41
fr_dict_attr_t const ** out
Where to write a pointer to the resolved fr_dict_attr_t.
Definition dict.h:272
fr_dict_t const ** out
Where to write a pointer to the loaded/resolved fr_dict_t.
Definition dict.h:285
static fr_slen_t in
Definition dict.h:831
Specifies an attribute which must be present for the module to function.
Definition dict.h:271
Specifies a dictionary which must be loaded/loadable for the module to function.
Definition dict.h:284
Test enumeration values.
Definition dict_test.h:92
#define MODULE_MAGIC_INIT
Stop people using different module/library/server versions together.
Definition dl_module.h:63
#define GLOBAL_LIB_TERMINATOR
Definition global_lib.h:51
Structure to define how to initialise libraries with global configuration.
Definition global_lib.h:38
static xlat_action_t rest_xlat(UNUSED TALLOC_CTX *ctx, UNUSED fr_dcursor_t *out, xlat_ctx_t const *xctx, request_t *request, fr_value_box_list_t *in)
Simple xlat to read text data from a URL.
Definition rlm_rest.c:519
void fr_json_version_print(void)
Print JSON-C version.
Definition json.c:459
int fr_curl_response_certinfo(request_t *request, fr_curl_io_request_t *randle)
Definition base.c:170
global_lib_autoinst_t fr_curl_autoinst
Definition base.c:387
CURL * fr_curl_tmp_handle(void)
Return a thread local curl easy handle.
Definition base.c:267
conf_parser_t fr_curl_conn_config[]
Definition base.c:97
conf_parser_t fr_curl_tls_config[]
Definition base.c:68
#define REXDENT()
Exdent (unindent) R* messages by one level.
Definition log.h:443
#define RDEBUG_ENABLED3
True if request debug level 1-3 messages are enabled.
Definition log.h:335
#define RPEDEBUG(fmt,...)
Definition log.h:376
#define RINDENT()
Indent R* messages by one level.
Definition log.h:430
talloc_free(reap)
@ FR_TYPE_STRING
String of printable characters.
@ FR_TYPE_UINT32
32 Bit unsigned integer.
@ FR_TYPE_SIZE
Unsigned integer capable of representing any memory address on the local system.
long int ssize_t
void * env_data
Per call environment data.
Definition module_ctx.h:44
module_instance_t const * mi
Instance of the module being instantiated.
Definition module_ctx.h:42
void * thread
Thread specific instance data.
Definition module_ctx.h:43
void * rctx
Resume ctx that a module previously set.
Definition module_ctx.h:45
fr_event_list_t * el
Event list to register any IO handlers and timers against.
Definition module_ctx.h:68
void * thread
Thread instance data.
Definition module_ctx.h:67
module_instance_t const * mi
Instance of the module being instantiated.
Definition module_ctx.h:64
#define MODULE_CTX(_mi, _thread, _env_data, _rctx)
Wrapper to create a module_ctx_t as a compound literal.
Definition module_ctx.h:128
module_instance_t * mi
Instance of the module being instantiated.
Definition module_ctx.h:51
Temporary structure to hold arguments for module calls.
Definition module_ctx.h:41
Temporary structure to hold arguments for instantiation calls.
Definition module_ctx.h:50
Temporary structure to hold arguments for thread_instantiation calls.
Definition module_ctx.h:63
xlat_t * module_rlm_xlat_register(TALLOC_CTX *ctx, module_inst_ctx_t const *mctx, char const *name, xlat_func_t func, fr_type_t return_type)
Definition module_rlm.c:257
module_t common
Common fields presented by all modules.
Definition module_rlm.h:39
void rest_io_module_signal(module_ctx_t const *mctx, request_t *request, UNUSED fr_signal_t action)
Handle asynchronous cancellation of a request.
Definition io.c:33
void rest_io_xlat_signal(xlat_ctx_t const *xctx, request_t *request, fr_signal_t action)
Handle asynchronous cancellation of a request.
Definition io.c:56
static const conf_parser_t config[]
Definition base.c:183
#define fr_assert(_expr)
Definition rad_assert.h:38
#define pair_update_request(_attr, _da)
#define REDEBUG(fmt,...)
Definition radclient.h:52
#define RDEBUG2(fmt,...)
Definition radclient.h:54
#define RDEBUG(fmt,...)
Definition radclient.h:53
static rs_t * conf
Definition radsniff.c:53
#define RETURN_MODULE_NOOP
Definition rcode.h:62
#define RETURN_MODULE_RCODE(_rcode)
Definition rcode.h:64
#define RETURN_MODULE_INVALID
Definition rcode.h:59
#define RETURN_MODULE_FAIL
Definition rcode.h:56
rlm_rcode_t
Return codes indicating the result of the module call.
Definition rcode.h:40
@ RLM_MODULE_INVALID
The module considers the request invalid.
Definition rcode.h:45
@ RLM_MODULE_OK
The module is OK, continue.
Definition rcode.h:43
@ RLM_MODULE_FAIL
Module failed, don't reply.
Definition rcode.h:42
@ RLM_MODULE_DISALLOW
Reject the request (user is locked out).
Definition rcode.h:46
@ RLM_MODULE_REJECT
Immediately reject the request.
Definition rcode.h:41
@ RLM_MODULE_NOTFOUND
User not found.
Definition rcode.h:47
@ RLM_MODULE_UPDATED
OK (pairs modified).
Definition rcode.h:49
fr_table_num_sorted_t const http_auth_table[]
Definition rest.c:160
int rest_request_config(module_ctx_t const *mctx, rlm_rest_section_t const *section, request_t *request, fr_curl_io_request_t *randle, http_method_t method, http_body_type_t type, char const *uri, char const *body_data)
Configures request curlopts.
Definition rest.c:1782
fr_table_num_sorted_t const http_body_type_table[]
Conversion table for type config values.
Definition rest.c:145
fr_table_num_sorted_t const http_method_table[]
Conversion table for method config values.
Definition rest.c:126
size_t rest_get_handle_data(char const **out, fr_curl_io_request_t *randle)
Extracts pointer to buffer containing response data.
Definition rest.c:1618
void rest_response_debug(request_t *request, fr_curl_io_request_t *handle)
Print out the response text.
Definition rest.c:1561
fr_table_num_sorted_t const http_content_type_table[]
Conversion table for "Content-Type" header values.
Definition rest.c:188
const unsigned long http_curl_auth[REST_HTTP_AUTH_NUM_ENTRIES]
Definition rest.c:100
const http_body_type_t http_body_type_supported[REST_HTTP_BODY_NUM_ENTRIES]
Table of encoder/decoder support.
Definition rest.c:51
int rest_request_config_add_header(request_t *request, fr_curl_io_request_t *randle, char const *header, bool validate)
Adds an additional header to a handle to use in the next reques.
Definition rest.c:1702
void rest_response_error(request_t *request, fr_curl_io_request_t *handle)
Print out the response text as error lines.
Definition rest.c:1536
int rest_response_decode(rlm_rest_t const *instance, rlm_rest_section_t const *section, request_t *request, fr_curl_io_request_t *randle)
Sends the response to the correct decode function.
Definition rest.c:2082
Function prototypes and datatypes for the REST (HTTP) transport.
rlm_rest_t const * instance
This instance of rlm_rest.
Definition rest.h:229
struct curl_slist * headers
Any HTTP headers which will be sent with the request.
Definition rest.h:253
tmpl_t * header
Where to create pairs representing HTTP response headers.
Definition rest.h:243
#define rest_get_handle_code(_handle)
Definition rest.h:320
char * buffer
Raw incoming HTTP data.
Definition rest.h:235
fr_curl_handle_t * mhandle
Thread specific multi handle.
Definition rest.h:183
char * body
Pointer to the buffer which contains body data/ Only used when not performing chunked encoding.
Definition rest.h:256
fr_curl_tls_t tls
Definition rest.h:145
http_method_t
Definition rest.h:43
@ REST_HTTP_METHOD_UNKNOWN
Definition rest.h:44
@ REST_HTTP_METHOD_CUSTOM
Must always come last, should not be in method table.
Definition rest.h:50
http_body_type_t
Definition rest.h:53
@ REST_HTTP_BODY_INVALID
Definition rest.h:57
@ REST_HTTP_BODY_UNSUPPORTED
Definition rest.h:55
@ REST_HTTP_BODY_CUSTOM
Definition rest.h:59
@ REST_HTTP_BODY_NUM_ENTRIES
Definition rest.h:66
@ REST_HTTP_BODY_UNKNOWN
Definition rest.h:54
@ REST_HTTP_BODY_NONE
Definition rest.h:58
@ REST_HTTP_BODY_UNAVAILABLE
Definition rest.h:56
char const * method_str
The string version of the HTTP method.
Definition rest.h:111
rlm_rest_section_request_t request
Request configuration.
Definition rest.h:142
rlm_rest_response_t response
Response context data.
Definition rest.h:260
void * decoder
Decoder specific data.
Definition rest.h:246
void * encoder
Encoder specific data.
Definition rest.h:221
rlm_rest_request_t request
Request context data.
Definition rest.h:259
http_method_t method
What HTTP method should be used, GET, POST etc...
Definition rest.h:112
rlm_rest_section_t section
Our mutated section config.
Definition rest.h:267
rlm_rest_t const * inst
Instance of rlm_rest.
Definition rest.h:181
char const * name
Section name.
Definition rest.h:138
@ REST_HTTP_AUTH_NONE
Definition rest.h:71
rest_slab_list_t * slab
Slab list for connection handles.
Definition rest.h:182
struct rlm_rest_call_env_t::@178 request
http_body_type_t body
What encoding type should be used.
Definition rest.h:115
fr_curl_io_request_t * handle
curl easy handle servicing our request.
Definition rest.h:268
rlm_rest_t const * instance
This instance of rlm_rest.
Definition rest.h:211
Thread specific rlm_rest instance data.
Definition rest.h:180
Stores the state of a yielded xlat.
Definition rest.h:266
static char const * name
static const call_env_method_t rest_call_env_xlat
Definition rlm_rest.c:252
static int rlm_rest_status_update(request_t *request, void *handle)
Update the status attribute.
Definition rlm_rest.c:314
static int mod_load(void)
Initialises libcurl.
Definition rlm_rest.c:1370
static fr_dict_attr_t const * attr_user_password
Definition rlm_rest.c:288
static int rest_conn_alloc(fr_curl_io_request_t *randle, void *uctx)
Definition rlm_rest.c:1229
static int _rest_uri_part_escape_uctx_free(void *uctx)
Definition rlm_rest.c:339
static const conf_parser_t xlat_config[]
Definition rlm_rest.c:154
static xlat_action_t rest_xlat_resume(TALLOC_CTX *ctx, fr_dcursor_t *out, xlat_ctx_t const *xctx, request_t *request, UNUSED fr_value_box_list_t *in)
Definition rlm_rest.c:427
fr_dict_t const * dict_freeradius
Definition rlm_rest.c:274
static int rlm_rest_perform(module_ctx_t const *mctx, rlm_rest_section_t const *section, fr_curl_io_request_t *randle, request_t *request)
Definition rlm_rest.c:397
static unlang_action_t mod_post_auth_result(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
Definition rlm_rest.c:967
static const conf_parser_t xlat_request_config[]
Definition rlm_rest.c:149
static fr_dict_t const * dict_radius
Definition rlm_rest.c:275
static fr_table_num_sorted_t const http_negotiation_table[]
Definition rlm_rest.c:66
static int instantiate(module_inst_ctx_t const *mctx)
Definition rlm_rest.c:1313
static fr_uri_part_t const rest_uri_parts[]
Definition rlm_rest.c:57
static unlang_action_t mod_authenticate(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
Definition rlm_rest.c:830
static int mod_bootstrap(module_inst_ctx_t const *mctx)
Definition rlm_rest.c:1346
fr_dict_attr_t const * attr_rest_http_header
Definition rlm_rest.c:285
fr_dict_autoload_t rlm_rest_dict[]
Definition rlm_rest.c:278
static const conf_parser_t section_request_config[]
Definition rlm_rest.c:124
static const conf_parser_t section_config[]
Definition rlm_rest.c:137
static int _rest_request_cleanup(fr_curl_io_request_t *randle, UNUSED void *uctx)
Cleans up after a REST request.
Definition rlm_rest.c:1176
#define SECTION_REQUEST_COMMON
Definition rlm_rest.c:116
static int rest_uri_part_escape(fr_value_box_t *vb, void *uctx)
#define REST_CALL_ENV_SECTION(_var, _section, _dflt_username, _dflt_password)
Definition rlm_rest.c:199
static int rest_proxy_parse(UNUSED TALLOC_CTX *ctx, void *out, UNUSED void *parent, CONF_ITEM *ci, UNUSED conf_parser_t const *rule)
Definition rlm_rest.c:97
fr_dict_attr_t const * attr_rest_http_status_code
Definition rlm_rest.c:286
static unlang_action_t mod_accounting(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
Definition rlm_rest.c:940
static unlang_action_t mod_authorize(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
Definition rlm_rest.c:719
static size_t http_negotiation_table_len
Definition rlm_rest.c:90
static int mod_thread_instantiate(module_thread_inst_ctx_t const *mctx)
Create a thread specific multihandle.
Definition rlm_rest.c:1263
module_rlm_t rlm_rest
Definition rlm_rest.c:1392
fr_dict_attr_t const * attr_rest_http_body
Definition rlm_rest.c:284
static unlang_action_t mod_authenticate_result(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
Definition rlm_rest.c:746
static fr_dict_attr_t const * attr_user_name
Definition rlm_rest.c:287
static unlang_action_t mod_accounting_result(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
Definition rlm_rest.c:889
fr_dict_attr_autoload_t rlm_rest_dict_attr[]
Definition rlm_rest.c:291
static const conf_parser_t section_response_config[]
Definition rlm_rest.c:131
static unlang_action_t mod_authorize_result(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
Definition rlm_rest.c:633
static const conf_parser_t module_config[]
Definition rlm_rest.c:166
static int _mod_conn_free(fr_curl_io_request_t *randle)
Definition rlm_rest.c:1223
static xlat_arg_parser_t const rest_xlat_args[]
Definition rlm_rest.c:502
static int mod_thread_detach(module_thread_inst_ctx_t const *mctx)
Cleanup all outstanding requests associated with this thread.
Definition rlm_rest.c:1293
static int parse_sub_section(rlm_rest_t *inst, CONF_SECTION *parent, conf_parser_t const *config_items, rlm_rest_section_t *config, char const *name)
Definition rlm_rest.c:1045
static void * rest_uri_part_escape_uctx_alloc(UNUSED request_t *request, void const *uctx)
Allocate an escape uctx to pass to fr_uri_escape.
Definition rlm_rest.c:350
global_lib_autoinst_t const *const rlm_rest_lib[]
Definition rlm_rest.c:301
char const * rest_no_proxy
Unique pointer used to determine if we should explicitly disable proxying.
Definition rlm_rest.c:95
static unlang_action_t mod_post_auth(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
Definition rlm_rest.c:1018
#define FR_SBUFF_TERMS(...)
Initialise a terminal structure with a list of sorted strings.
Definition sbuff.h:192
#define SECTION_NAME(_name1, _name2)
Define a section name consisting of a verb and a noun.
Definition section.h:40
CONF_SECTION * conf
Module's instance configuration.
Definition module.h:329
size_t inst_size
Size of the module's instance data.
Definition module.h:203
void * data
Module's instance data.
Definition module.h:271
void * boot
Data allocated during the boostrap phase.
Definition module.h:274
#define MODULE_BINDING_TERMINATOR
Terminate a module binding list.
Definition module.h:151
Named methods exported by a module.
Definition module.h:173
#define pair_delete_request(_pair_or_da)
Delete a fr_pair_t in the request list.
Definition pair.h:172
@ FR_SIGNAL_CANCEL
Request has been cancelled.
Definition signal.h:40
unlang_action_t unlang_module_yield(request_t *request, module_method_t resume, unlang_module_signal_t signal, fr_signal_t sigmask, void *rctx)
Yield a request back to the interpreter from within a module.
Definition module.c:420
eap_aka_sim_process_conf_t * inst
fr_pair_t * vp
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
#define fr_table_value_by_str(_table, _name, _def)
Convert a string to a value using a sorted or ordered table.
Definition table.h:653
#define fr_table_str_by_value(_table, _number, _def)
Convert an integer to a string.
Definition table.h:772
#define fr_table_value_by_substr(_table, _name, _name_len, _def)
Convert a partial string to a value using an ordered or sorted table.
Definition table.h:693
An element in a lexicographically sorted array of name to num mappings.
Definition table.h:49
char * talloc_bstrndup(TALLOC_CTX *ctx, char const *in, size_t inlen)
Binary safe strndup function.
Definition talloc.c:564
char * talloc_typed_strdup(TALLOC_CTX *ctx, char const *p)
Call talloc_strdup, setting the type on the new chunk correctly.
Definition talloc.c:445
Functions which we wish were included in the standard talloc distribution.
#define talloc_get_type_abort_const
Definition talloc.h:282
xlat_action_t unlang_xlat_yield(request_t *request, xlat_func_t resume, xlat_func_signal_t signal, fr_signal_t sigmask, void *rctx)
Yield a request back to the interpreter from within a module.
Definition xlat.c:574
bool required
Argument must be present, and non-empty.
Definition xlat.h:148
#define XLAT_ARGS(_list,...)
Populate local variables with value boxes from the input list.
Definition xlat.h:381
#define XLAT_ARG_PARSER_TERMINATOR
Definition xlat.h:168
xlat_action_t
Definition xlat.h:37
@ XLAT_ACTION_FAIL
An xlat function failed.
Definition xlat.h:44
@ XLAT_ACTION_DONE
We're done evaluating this level of nesting.
Definition xlat.h:43
Definition for a single argument consumend by an xlat function.
Definition xlat.h:147
int fr_uri_escape_list(fr_value_box_list_t *uri, fr_uri_part_t const *uri_parts, void *uctx)
Parse a list of value boxes representing a URI.
Definition uri.c:141
#define XLAT_URI_PART_TERMINATOR
Definition uri.h:66
char const * name
Name of this part of the URI.
Definition uri.h:47
uctx to pass to fr_uri_escape
Definition uri.h:60
Definition for a single part of a URI.
Definition uri.h:46
static fr_slen_t parent
Definition pair.h:845
#define fr_strerror_printf(_fmt,...)
Log to thread local error buffer.
Definition strerror.h:64
void fr_value_box_strdup_shallow_replace(fr_value_box_t *vb, char const *src, ssize_t len)
Free the existing buffer (if talloced) associated with the valuebox, and replace it with a new one.
Definition value.c:4082
int fr_value_box_bstrndup(TALLOC_CTX *ctx, fr_value_box_t *dst, fr_dict_attr_t const *enumv, char const *src, size_t len, bool tainted)
Copy a string to to a fr_value_box_t.
Definition value.c:4178
int fr_value_box_list_concat_in_place(TALLOC_CTX *ctx, fr_value_box_t *out, fr_value_box_list_t *list, fr_type_t type, fr_value_box_list_action_t proc_action, bool flatten, size_t max_size)
Concatenate a list of value boxes.
Definition value.c:5730
@ FR_VALUE_BOX_LIST_FREE
Definition value.h:232
int nonnull(2, 5))
#define fr_value_box_alloc_null(_ctx)
Allocate a value box for later use with a value assignment function.
Definition value.h:643
#define fr_value_box_list_foreach(_list_head, _iter)
Definition value.h:217
static size_t char ** out
Definition value.h:1012
void * rctx
Resume context.
Definition xlat_ctx.h:54
void * env_data
Expanded call env data.
Definition xlat_ctx.h:53
module_ctx_t const * mctx
Synthesised module calling ctx.
Definition xlat_ctx.h:52
An xlat calling ctx.
Definition xlat_ctx.h:49
int xlat_func_args_set(xlat_t *x, xlat_arg_parser_t const args[])
Register the arguments of an xlat.
Definition xlat_func.c:365
void xlat_func_call_env_set(xlat_t *x, call_env_method_t const *env_method)
Register call environment of an xlat.
Definition xlat_func.c:392