access test
This commit is contained in:
parent
2f9320e270
commit
a791d31490
|
@ -32,13 +32,28 @@
|
|||
|
||||
-include_lib("eunit/include/eunit.hrl").
|
||||
|
||||
-define(RULES1, [{allow, all}]).
|
||||
-define(RULES2, [{deny, all}]).
|
||||
compile_test() ->
|
||||
?assertMatch({allow, {ipaddr, {"127.0.0.1", _I, _I}}, subscribe, [ [<<"$SYS">>, '#'], ['#'] ]},
|
||||
emqttd_access:compile({allow, {ipaddr, "127.0.0.1"}, subscribe, ["$SYS/#", "#"]})),
|
||||
?assertMatch({allow, {user, <<"testuser">>}, subscribe, [ [<<"a">>, <<"b">>, <<"c">>], [<<"d">>, <<"e">>, <<"f">>, '#'] ]},
|
||||
emqttd_access:compile({allow, {user, "testuser"}, subscribe, ["a/b/c", "d/e/f/#"]})),
|
||||
?assertEqual({allow, {user, <<"admin">>}, pubsub, [ [<<"d">>, <<"e">>, <<"f">>, '#'] ]},
|
||||
emqttd_access:compile({allow, {user, "admin"}, pubsub, ["d/e/f/#"]})),
|
||||
?assertEqual({allow, {client, <<"testClient">>}, publish, [ [<<"testTopics">>, <<"testClient">>] ]},
|
||||
emqttd_access:compile({allow, {client, "testClient"}, publish, ["testTopics/testClient"]})),
|
||||
?assertEqual({allow, all, pubsub, [{pattern, [<<"clients">>, <<"$c">>]}]},
|
||||
emqttd_access:compile({allow, all, pubsub, ["clients/$c"]})),
|
||||
?assertEqual({allow, all, subscribe, [{pattern, [<<"users">>, <<"$u">>, '#']}]},
|
||||
emqttd_access:compile({allow, all, subscribe, ["users/$u/#"]})),
|
||||
?assertEqual({deny, all, subscribe, [ [<<"$SYS">>, '#'], ['#'] ]},
|
||||
emqttd_access:compile({deny, all, subscribe, ["$SYS/#", "#"]})),
|
||||
?assertEqual({allow, all}, emqttd_access:compile({allow, all})),
|
||||
?assertEqual({deny, all}, emqttd_access:compile({deny, all})).
|
||||
|
||||
match_test() ->
|
||||
User = #mqtt_user{peername = {127,0,0,1}, clientid = <<"testClient">>, username = <<"TestUser">>},
|
||||
?assertEqual(allow, emqttd_access:match(User, <<"Test/Topic">>, ?RULES1)),
|
||||
?assertEqual(deny, emqttd_access:match(User, <<"Test/Topic">>, ?RULES2)).
|
||||
User = #mqtt_user{ipaddr = {127,0,0,1}, clientid = <<"testClient">>, username = <<"TestUser">>},
|
||||
?assertEqual({matched, allow}, emqttd_access:match(User, <<"Test/Topic">>, {allow, all})),
|
||||
?assertEqual({matched, deny}, emqttd_access:match(User, <<"Test/Topic">>, {deny, all})).
|
||||
|
||||
-endif.
|
||||
|
||||
|
|
|
@ -0,0 +1,152 @@
|
|||
%%%-----------------------------------------------------------------------------
|
||||
%%% @Copyright (C) 2014-2015, Feng Lee <feng@emqtt.io>
|
||||
%%%
|
||||
%%% Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
%%% of this software and associated documentation files (the "Software"), to deal
|
||||
%%% in the Software without restriction, including without limitation the rights
|
||||
%%% to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||
%%% copies of the Software, and to permit persons to whom the Software is
|
||||
%%% furnished to do so, subject to the following conditions:
|
||||
%%%
|
||||
%%% The above copyright notice and this permission notice shall be included in all
|
||||
%%% copies or substantial portions of the Software.
|
||||
%%%
|
||||
%%% THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
%%% IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
%%% FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
%%% AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
%%% LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
%%% OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
%%% SOFTWARE.
|
||||
%%%-----------------------------------------------------------------------------
|
||||
%%% @doc
|
||||
%%% esockd access control.
|
||||
%%%
|
||||
%%% CIDR: Classless Inter-Domain Routing
|
||||
%%%
|
||||
%%% @end
|
||||
%%%-----------------------------------------------------------------------------
|
||||
-module(esockd_access).
|
||||
|
||||
-type cidr() :: string().
|
||||
|
||||
-type rule() :: {allow, all} |
|
||||
{allow, cidr()} |
|
||||
{deny, all} |
|
||||
{deny, cidr()}.
|
||||
|
||||
-type range() :: {cidr(), pos_integer(), pos_integer()}.
|
||||
|
||||
-export_type([cidr/0, range/0, rule/0]).
|
||||
|
||||
-type range_rule() :: {allow, all} |
|
||||
{allow, range()} |
|
||||
{deny, all} |
|
||||
{deny, range()}.
|
||||
|
||||
-export([rule/1, match/2, range/1, mask/1, atoi/1, itoa/1]).
|
||||
|
||||
%%------------------------------------------------------------------------------
|
||||
%% @doc
|
||||
%% Build CIDR, Make rule.
|
||||
%%
|
||||
%% @end
|
||||
%%------------------------------------------------------------------------------
|
||||
-spec rule(rule()) -> range_rule().
|
||||
rule({allow, all}) ->
|
||||
{allow, all};
|
||||
rule({allow, CIDR}) when is_list(CIDR) ->
|
||||
rule(allow, CIDR);
|
||||
rule({deny, CIDR}) when is_list(CIDR) ->
|
||||
rule(deny, CIDR);
|
||||
rule({deny, all}) ->
|
||||
{deny, all}.
|
||||
|
||||
rule(Type, CIDR) when is_list(CIDR) ->
|
||||
{Start, End} = range(CIDR), {Type, {CIDR, Start, End}}.
|
||||
|
||||
%%------------------------------------------------------------------------------
|
||||
%% @doc
|
||||
%% Match Addr with Access Rules.
|
||||
%%
|
||||
%% @end
|
||||
%%------------------------------------------------------------------------------
|
||||
-spec match(inet:ip_address(), [range_rule()]) -> {matched, allow} | {matched, deny} | nomatch.
|
||||
match(Addr, Rules) when is_tuple(Addr) ->
|
||||
match2(atoi(Addr), Rules).
|
||||
|
||||
match2(_I, []) ->
|
||||
nomatch;
|
||||
match2(_I, [{allow, all}|_]) ->
|
||||
{matched, allow};
|
||||
match2(I, [{allow, {_, Start, End}}|_]) when I >= Start, I =< End ->
|
||||
{matched, allow};
|
||||
match2(I, [{allow, {_, _Start, _End}}|Rules]) ->
|
||||
match2(I, Rules);
|
||||
match2(I, [{deny, {_, Start, End}}|_]) when I >= Start, I =< End ->
|
||||
{matched, deny};
|
||||
match2(I, [{deny, {_, _Start, _End}}|Rules]) ->
|
||||
match2(I, Rules);
|
||||
match2(_I, [{deny, all}|_]) ->
|
||||
{matched, deny}.
|
||||
|
||||
%%------------------------------------------------------------------------------
|
||||
%% @doc
|
||||
%% CIDR range.
|
||||
%%
|
||||
%% @end
|
||||
%%------------------------------------------------------------------------------
|
||||
-spec range(cidr()) -> {pos_integer(), pos_integer()}.
|
||||
range(CIDR) ->
|
||||
case string:tokens(CIDR, "/") of
|
||||
[Addr] ->
|
||||
{ok, IP} = inet:getaddr(Addr, inet),
|
||||
{atoi(IP), atoi(IP)};
|
||||
[Addr, Mask] ->
|
||||
{ok, IP} = inet:getaddr(Addr, inet),
|
||||
{Start, End} = subnet(IP, mask(list_to_integer(Mask))),
|
||||
{Start, End}
|
||||
end.
|
||||
|
||||
subnet(IP, Mask) ->
|
||||
Start = atoi(IP) band Mask,
|
||||
End = Start bor (Mask bxor 16#FFFFFFFF),
|
||||
{Start, End}.
|
||||
|
||||
%%------------------------------------------------------------------------------
|
||||
%% @doc
|
||||
%% Mask Int
|
||||
%%
|
||||
%% @end
|
||||
%%------------------------------------------------------------------------------
|
||||
-spec mask(0..32) -> 0..16#FFFFFFFF.
|
||||
mask(0) ->
|
||||
16#00000000;
|
||||
mask(32) ->
|
||||
16#FFFFFFFF;
|
||||
mask(N) when N >= 1, N =< 31 ->
|
||||
lists:foldl(fun(I, Mask) -> (1 bsl I) bor Mask end, 0, lists:seq(32 - N, 31)).
|
||||
|
||||
%%------------------------------------------------------------------------------
|
||||
%% @doc
|
||||
%% Addr to Integer.
|
||||
%%
|
||||
%% @end
|
||||
%%------------------------------------------------------------------------------
|
||||
atoi({A, B, C, D}) ->
|
||||
(A bsl 24) + (B bsl 16) + (C bsl 8) + D.
|
||||
|
||||
%%------------------------------------------------------------------------------
|
||||
%% @doc
|
||||
%% Integer to Addr.
|
||||
%%
|
||||
%% @end
|
||||
%%------------------------------------------------------------------------------
|
||||
itoa(I) ->
|
||||
A = (I bsr 24) band 16#FF,
|
||||
B = (I bsr 16) band 16#FF,
|
||||
C = (I bsr 8) band 16#FF,
|
||||
D = I band 16#FF,
|
||||
{A, B, C, D}.
|
||||
|
||||
|
Loading…
Reference in New Issue