FreeRDP/server/proxy/pf_modules.c

543 lines
14 KiB
C
Raw Normal View History

2019-08-19 16:05:59 +03:00
/**
* FreeRDP: A Remote Desktop Protocol Implementation
* FreeRDP Proxy Server modules API
*
* Copyright 2019 Kobi Mizrachi <kmizrachi18@gmail.com>
* Copyright 2019 Idan Freiberg <speidy@gmail.com>
2021-09-01 14:30:09 +03:00
* Copyright 2021 Armin Novak <anovak@thincast.com>
* Copyright 2021 Thincast Technologies GmbH
2019-08-19 16:05:59 +03:00
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
2021-06-09 15:03:34 +03:00
#include <winpr/assert.h>
2019-08-19 16:05:59 +03:00
#include <winpr/file.h>
2019-08-19 16:05:59 +03:00
#include <winpr/wlog.h>
#include <winpr/path.h>
2019-08-19 16:05:59 +03:00
#include <winpr/library.h>
#include <freerdp/api.h>
#include <freerdp/build-config.h>
2019-08-19 16:05:59 +03:00
#include <freerdp/server/proxy/proxy_log.h>
#include <freerdp/server/proxy/proxy_modules_api.h>
#include <freerdp/server/proxy/proxy_context.h>
#include "proxy_modules.h"
2019-08-19 16:05:59 +03:00
#define TAG PROXY_TAG("modules")
#define MODULE_ENTRY_POINT "proxy_module_entry_point"
2019-08-19 16:05:59 +03:00
struct proxy_module
{
proxyPluginsManager mgr;
wArrayList* plugins;
wArrayList* handles;
};
2019-08-19 16:05:59 +03:00
static const char* FILTER_TYPE_STRINGS[] = { "KEYBOARD_EVENT", "MOUSE_EVENT", "CLIENT_CHANNEL_DATA",
"SERVER_CHANNEL_DATA", "SERVER_FETCH_TARGET_ADDR" };
2019-08-19 16:05:59 +03:00
static const char* HOOK_TYPE_STRINGS[] = {
"CLIENT_PRE_CONNECT", "CLIENT_POST_CONNECT", "CLIENT_LOGIN_FAILURE", "CLIENT_END_PAINT",
"SERVER_POST_CONNECT", "SERVER_CHANNELS_INIT", "SERVER_CHANNELS_FREE", "SERVER_SESSION_END",
2019-08-19 16:05:59 +03:00
};
static const char* pf_modules_get_filter_type_string(PF_FILTER_TYPE result)
{
if (result >= FILTER_TYPE_KEYBOARD && result < FILTER_LAST)
2019-08-19 16:05:59 +03:00
return FILTER_TYPE_STRINGS[result];
else
return "FILTER_UNKNOWN";
}
static const char* pf_modules_get_hook_type_string(PF_HOOK_TYPE result)
{
if (result >= HOOK_TYPE_CLIENT_PRE_CONNECT && result < HOOK_LAST)
2019-08-19 16:05:59 +03:00
return HOOK_TYPE_STRINGS[result];
else
return "HOOK_UNKNOWN";
}
static BOOL pf_modules_proxy_ArrayList_ForEachFkt(void* data, size_t index, va_list ap)
2019-08-19 16:05:59 +03:00
{
proxyPlugin* plugin = (proxyPlugin*)data;
PF_HOOK_TYPE type;
proxyData* pdata;
void* custom;
BOOL ok = FALSE;
2019-08-19 16:05:59 +03:00
WINPR_UNUSED(index);
type = va_arg(ap, PF_HOOK_TYPE);
pdata = va_arg(ap, proxyData*);
custom = va_arg(ap, void*);
2019-08-19 16:05:59 +03:00
WLog_VRB(TAG, "running hook %s.%s", plugin->name, pf_modules_get_hook_type_string(type));
switch (type)
{
case HOOK_TYPE_CLIENT_INIT_CONNECT:
ok = IFCALLRESULT(TRUE, plugin->ClientInitConnect, plugin, pdata, custom);
break;
case HOOK_TYPE_CLIENT_UNINIT_CONNECT:
ok = IFCALLRESULT(TRUE, plugin->ClientUninitConnect, plugin, pdata, custom);
break;
case HOOK_TYPE_CLIENT_PRE_CONNECT:
ok = IFCALLRESULT(TRUE, plugin->ClientPreConnect, plugin, pdata, custom);
break;
case HOOK_TYPE_CLIENT_POST_CONNECT:
ok = IFCALLRESULT(TRUE, plugin->ClientPostConnect, plugin, pdata, custom);
break;
case HOOK_TYPE_CLIENT_POST_DISCONNECT:
ok = IFCALLRESULT(TRUE, plugin->ClientPostDisconnect, plugin, pdata, custom);
break;
case HOOK_TYPE_CLIENT_VERIFY_X509:
ok = IFCALLRESULT(TRUE, plugin->ClientX509Certificate, plugin, pdata, custom);
break;
case HOOK_TYPE_CLIENT_LOGIN_FAILURE:
ok = IFCALLRESULT(TRUE, plugin->ClientLoginFailure, plugin, pdata, custom);
break;
case HOOK_TYPE_CLIENT_END_PAINT:
ok = IFCALLRESULT(TRUE, plugin->ClientEndPaint, plugin, pdata, custom);
break;
2019-08-19 16:05:59 +03:00
case HOOK_TYPE_SERVER_POST_CONNECT:
ok = IFCALLRESULT(TRUE, plugin->ServerPostConnect, plugin, pdata, custom);
break;
case HOOK_TYPE_SERVER_ACTIVATE:
ok = IFCALLRESULT(TRUE, plugin->ServerPeerActivate, plugin, pdata, custom);
break;
2019-08-19 16:05:59 +03:00
case HOOK_TYPE_SERVER_CHANNELS_INIT:
ok = IFCALLRESULT(TRUE, plugin->ServerChannelsInit, plugin, pdata, custom);
break;
case HOOK_TYPE_SERVER_CHANNELS_FREE:
ok = IFCALLRESULT(TRUE, plugin->ServerChannelsFree, plugin, pdata, custom);
break;
case HOOK_TYPE_SERVER_SESSION_END:
ok = IFCALLRESULT(TRUE, plugin->ServerSessionEnd, plugin, pdata, custom);
break;
2019-08-19 16:05:59 +03:00
2021-06-16 13:59:25 +03:00
case HOOK_LAST:
default:
WLog_ERR(TAG, "invalid hook called");
2019-08-19 16:05:59 +03:00
}
if (!ok)
{
WLog_INFO(TAG, "plugin %s, hook %s failed!", plugin->name,
pf_modules_get_hook_type_string(type));
return FALSE;
}
2019-08-19 16:05:59 +03:00
return TRUE;
}
/*
* runs all hooks of type `type`.
2019-08-19 16:05:59 +03:00
*
* @type: hook type to run.
2019-08-19 16:05:59 +03:00
* @server: pointer of server's rdpContext struct of the current session.
*/
BOOL pf_modules_run_hook(proxyModule* module, PF_HOOK_TYPE type, proxyData* pdata, void* custom)
2019-08-19 16:05:59 +03:00
{
WINPR_ASSERT(module);
WINPR_ASSERT(module->plugins);
return ArrayList_ForEach(module->plugins, pf_modules_proxy_ArrayList_ForEachFkt, type, pdata,
custom);
}
2019-08-19 16:05:59 +03:00
static BOOL pf_modules_ArrayList_ForEachFkt(void* data, size_t index, va_list ap)
{
proxyPlugin* plugin = (proxyPlugin*)data;
2020-11-10 10:14:56 +03:00
PF_FILTER_TYPE type;
proxyData* pdata;
void* param;
BOOL result = FALSE;
2019-08-19 16:05:59 +03:00
2020-11-10 10:14:56 +03:00
WINPR_UNUSED(index);
type = va_arg(ap, PF_FILTER_TYPE);
pdata = va_arg(ap, proxyData*);
param = va_arg(ap, void*);
2019-08-19 16:05:59 +03:00
WLog_VRB(TAG, "[%s]: running filter: %s", __FUNCTION__, plugin->name);
switch (type)
{
case FILTER_TYPE_KEYBOARD:
result = IFCALLRESULT(TRUE, plugin->KeyboardEvent, plugin, pdata, param);
break;
case FILTER_TYPE_MOUSE:
result = IFCALLRESULT(TRUE, plugin->MouseEvent, plugin, pdata, param);
break;
case FILTER_TYPE_CLIENT_PASSTHROUGH_CHANNEL_DATA:
result = IFCALLRESULT(TRUE, plugin->ClientChannelData, plugin, pdata, param);
break;
case FILTER_TYPE_SERVER_PASSTHROUGH_CHANNEL_DATA:
result = IFCALLRESULT(TRUE, plugin->ServerChannelData, plugin, pdata, param);
break;
case FILTER_TYPE_CLIENT_PASSTHROUGH_DYN_CHANNEL_CREATE:
result = IFCALLRESULT(TRUE, plugin->DynamicChannelCreate, plugin, pdata, param);
break;
2019-08-19 16:05:59 +03:00
case FILTER_TYPE_SERVER_FETCH_TARGET_ADDR:
result = IFCALLRESULT(TRUE, plugin->ServerFetchTargetAddr, plugin, pdata, param);
break;
case FILTER_TYPE_SERVER_PEER_LOGON:
result = IFCALLRESULT(TRUE, plugin->ServerPeerLogon, plugin, pdata, param);
break;
2021-06-16 13:59:25 +03:00
case FILTER_LAST:
default:
WLog_ERR(TAG, "invalid filter called");
2019-08-19 16:05:59 +03:00
}
if (!result)
{
/* current filter return FALSE, no need to run other filters. */
WLog_DBG(TAG, "plugin %s, filter type [%s] returned FALSE", plugin->name,
pf_modules_get_filter_type_string(type));
}
return result;
}
/*
* runs all filters of type `type`.
*
* @type: filter type to run.
* @server: pointer of server's rdpContext struct of the current session.
*/
BOOL pf_modules_run_filter(proxyModule* module, PF_FILTER_TYPE type, proxyData* pdata, void* param)
{
WINPR_ASSERT(module);
WINPR_ASSERT(module->plugins);
return ArrayList_ForEach(module->plugins, pf_modules_ArrayList_ForEachFkt, type, pdata, param);
2019-08-19 16:05:59 +03:00
}
/*
* stores per-session data needed by a plugin.
*
* @context: current session server's rdpContext instance.
* @info: pointer to per-session data.
*/
static BOOL pf_modules_set_plugin_data(proxyPluginsManager* mgr, const char* plugin_name,
proxyData* pdata, void* data)
2019-08-19 16:05:59 +03:00
{
2021-02-24 15:53:43 +03:00
union {
2020-02-19 12:09:32 +03:00
const char* ccp;
char* cp;
} ccharconv;
2021-06-09 15:03:34 +03:00
WINPR_ASSERT(plugin_name);
2019-08-19 16:05:59 +03:00
2020-02-19 12:09:32 +03:00
ccharconv.ccp = plugin_name;
if (data == NULL) /* no need to store anything */
return FALSE;
2019-08-19 16:05:59 +03:00
if (!HashTable_Insert(pdata->modules_info, ccharconv.cp, data))
2019-08-19 16:05:59 +03:00
{
WLog_ERR(TAG, "[%s]: HashTable_Insert failed!");
return FALSE;
2019-08-19 16:05:59 +03:00
}
return TRUE;
2019-08-19 16:05:59 +03:00
}
/*
* returns per-session data needed a plugin.
*
* @context: current session server's rdpContext instance.
* if there's no data related to `plugin_name` in `context` (current session), a NULL will be
* returned.
*/
static void* pf_modules_get_plugin_data(proxyPluginsManager* mgr, const char* plugin_name,
proxyData* pdata)
2019-08-19 16:05:59 +03:00
{
2021-02-24 15:53:43 +03:00
union {
2020-02-19 12:09:32 +03:00
const char* ccp;
char* cp;
} ccharconv;
2021-06-09 15:03:34 +03:00
WINPR_ASSERT(plugin_name);
WINPR_ASSERT(pdata);
2020-02-19 12:09:32 +03:00
ccharconv.ccp = plugin_name;
2019-08-19 16:05:59 +03:00
2020-02-19 12:09:32 +03:00
return HashTable_GetItemValue(pdata->modules_info, ccharconv.cp);
}
2019-08-19 16:05:59 +03:00
static void pf_modules_abort_connect(proxyPluginsManager* mgr, proxyData* pdata)
{
2021-06-09 15:03:34 +03:00
WINPR_ASSERT(pdata);
WLog_DBG(TAG, "%s is called!", __FUNCTION__);
proxy_data_abort_connect(pdata);
2019-08-19 16:05:59 +03:00
}
static BOOL pf_modules_register_ArrayList_ForEachFkt(void* data, size_t index, va_list ap)
2019-08-19 16:05:59 +03:00
{
proxyPlugin* plugin = (proxyPlugin*)data;
proxyPlugin* plugin_to_register = va_arg(ap, proxyPlugin*);
2019-08-19 16:05:59 +03:00
WINPR_UNUSED(index);
if (strcmp(plugin->name, plugin_to_register->name) == 0)
{
WLog_ERR(TAG, "can not register plugin '%s', it is already registered!", plugin->name);
return FALSE;
}
return TRUE;
}
static BOOL pf_modules_register_plugin(proxyPluginsManager* mgr,
const proxyPlugin* plugin_to_register)
{
proxyPlugin internal = { 0 };
proxyModule* module = (proxyModule*)mgr;
WINPR_ASSERT(module);
2020-01-23 10:53:40 +03:00
if (!plugin_to_register)
return FALSE;
2019-08-19 16:05:59 +03:00
internal = *plugin_to_register;
internal.mgr = mgr;
/* make sure there's no other loaded plugin with the same name of `plugin_to_register`. */
if (!ArrayList_ForEach(module->plugins, pf_modules_register_ArrayList_ForEachFkt, &internal))
return FALSE;
2019-08-19 16:05:59 +03:00
if (!ArrayList_Append(module->plugins, &internal))
2019-08-19 16:05:59 +03:00
{
2020-01-23 10:53:40 +03:00
WLog_ERR(TAG, "[%s]: failed adding plugin to list: %s", __FUNCTION__,
plugin_to_register->name);
2019-08-19 16:05:59 +03:00
return FALSE;
}
return TRUE;
}
static BOOL pf_modules_load_ArrayList_ForEachFkt(void* data, size_t index, va_list ap)
2019-08-19 16:05:59 +03:00
{
proxyPlugin* plugin = (proxyPlugin*)data;
const char* plugin_name = va_arg(ap, const char*);
WINPR_UNUSED(index);
WINPR_UNUSED(ap);
if (strcmp(plugin->name, plugin_name) == 0)
return TRUE;
return FALSE;
}
BOOL pf_modules_is_plugin_loaded(proxyModule* module, const char* plugin_name)
{
WINPR_ASSERT(module);
if (ArrayList_Count(module->plugins) < 1)
return FALSE;
return ArrayList_ForEach(module->plugins, pf_modules_load_ArrayList_ForEachFkt, plugin_name);
}
2019-08-19 16:05:59 +03:00
static BOOL pf_modules_print_ArrayList_ForEachFkt(void* data, size_t index, va_list ap)
{
proxyPlugin* plugin = (proxyPlugin*)data;
WINPR_UNUSED(index);
WINPR_UNUSED(ap);
WLog_INFO(TAG, "\tName: %s", plugin->name);
WLog_INFO(TAG, "\tDescription: %s", plugin->description);
return TRUE;
2019-08-19 16:05:59 +03:00
}
void pf_modules_list_loaded_plugins(proxyModule* module)
2019-08-19 16:05:59 +03:00
{
size_t count;
2019-08-19 16:05:59 +03:00
WINPR_ASSERT(module);
WINPR_ASSERT(module->plugins);
2019-08-19 16:05:59 +03:00
count = ArrayList_Count(module->plugins);
2019-08-19 16:05:59 +03:00
if (count > 0)
WLog_INFO(TAG, "Loaded plugins:");
ArrayList_ForEach(module->plugins, pf_modules_print_ArrayList_ForEachFkt);
2019-08-19 16:05:59 +03:00
}
static BOOL pf_modules_load_module(const char* module_path, proxyModule* module, void* userdata)
2019-08-19 16:05:59 +03:00
{
HMODULE handle = NULL;
proxyModuleEntryPoint pEntryPoint;
WINPR_ASSERT(module);
handle = LoadLibraryX(module_path);
2019-08-19 16:05:59 +03:00
if (handle == NULL)
{
WLog_ERR(TAG, "[%s]: failed loading external library: %s", __FUNCTION__, module_path);
2019-08-19 16:05:59 +03:00
return FALSE;
}
pEntryPoint = (proxyModuleEntryPoint)GetProcAddress(handle, MODULE_ENTRY_POINT);
if (!pEntryPoint)
2019-08-19 16:05:59 +03:00
{
WLog_ERR(TAG, "[%s]: GetProcAddress failed while loading %s", __FUNCTION__, module_path);
2019-08-19 16:05:59 +03:00
goto error;
}
if (!ArrayList_Append(module->handles, handle))
{
WLog_ERR(TAG, "ArrayList_Append failed!");
goto error;
}
return pf_modules_add(module, pEntryPoint, userdata);
2019-08-19 16:05:59 +03:00
error:
FreeLibrary(handle);
return FALSE;
}
static void free_handle(void* obj)
{
HANDLE handle = (HANDLE)obj;
if (handle)
FreeLibrary(handle);
}
static void free_plugin(void* obj)
{
proxyPlugin* plugin = (proxyPlugin*)obj;
WINPR_ASSERT(plugin);
if (!IFCALLRESULT(TRUE, plugin->PluginUnload, plugin))
WLog_WARN(TAG, "PluginUnload failed for plugin '%s'", plugin->name);
free(plugin);
}
2019-08-19 16:05:59 +03:00
static void* new_plugin(const void* obj)
{
const proxyPlugin* src = obj;
proxyPlugin* proxy = calloc(1, sizeof(proxyPlugin));
if (!proxy)
return NULL;
*proxy = *src;
return proxy;
}
2019-08-19 16:05:59 +03:00
proxyModule* pf_modules_new(const char* root_dir, const char** modules, size_t count)
{
size_t i;
wObject* obj;
char* path = NULL;
proxyModule* module = calloc(1, sizeof(proxyModule));
if (!module)
return NULL;
module->mgr.RegisterPlugin = pf_modules_register_plugin;
module->mgr.SetPluginData = pf_modules_set_plugin_data;
module->mgr.GetPluginData = pf_modules_get_plugin_data;
module->mgr.AbortConnect = pf_modules_abort_connect;
module->plugins = ArrayList_New(FALSE);
if (module->plugins == NULL)
2019-08-19 16:05:59 +03:00
{
WLog_ERR(TAG, "[%s]: ArrayList_New failed!", __FUNCTION__);
2020-01-14 12:02:04 +03:00
goto error;
2019-08-19 16:05:59 +03:00
}
obj = ArrayList_Object(module->plugins);
WINPR_ASSERT(obj);
2019-08-19 16:05:59 +03:00
obj->fnObjectFree = free_plugin;
obj->fnObjectNew = new_plugin;
module->handles = ArrayList_New(FALSE);
if (module->handles == NULL)
2019-08-19 16:05:59 +03:00
{
WLog_ERR(TAG, "[%s]: ArrayList_New failed!", __FUNCTION__);
2020-01-14 12:02:04 +03:00
goto error;
2019-08-19 16:05:59 +03:00
}
ArrayList_Object(module->handles)->fnObjectFree = free_handle;
2019-08-19 16:05:59 +03:00
if (count > 0)
{
WINPR_ASSERT(root_dir);
if (!winpr_PathFileExists(root_dir))
path = GetCombinedPath(FREERDP_INSTALL_PREFIX, root_dir);
else
path = _strdup(root_dir);
if (!winpr_PathFileExists(path))
{
if (!winpr_PathMakePath(path, NULL))
{
WLog_ERR(TAG, "error occurred while creating modules directory: %s", root_dir);
goto error;
}
}
2020-01-14 12:02:04 +03:00
if (winpr_PathFileExists(path))
WLog_DBG(TAG, "modules root directory: %s", path);
for (i = 0; i < count; i++)
{
char name[8192] = { 0 };
char* fullpath;
_snprintf(name, sizeof(name), "proxy-%s-plugin%s", modules[i],
FREERDP_SHARED_LIBRARY_SUFFIX);
fullpath = GetCombinedPath(path, name);
pf_modules_load_module(fullpath, module, NULL);
free(fullpath);
}
}
2019-08-19 16:05:59 +03:00
free(path);
return module;
error:
free(path);
pf_modules_free(module);
return NULL;
}
void pf_modules_free(proxyModule* module)
{
if (!module)
return;
ArrayList_Free(module->plugins);
ArrayList_Free(module->handles);
free(module);
}
BOOL pf_modules_add(proxyModule* module, proxyModuleEntryPoint ep, void* userdata)
{
WINPR_ASSERT(module);
WINPR_ASSERT(ep);
2019-08-19 16:05:59 +03:00
return ep(&module->mgr, userdata);
}