File: no_proxy.c

package info (click to toggle)
aws-crt-python 0.28.4%2Bdfsg-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 78,428 kB
  • sloc: ansic: 437,955; python: 27,657; makefile: 5,855; sh: 4,289; ruby: 208; java: 82; perl: 73; cpp: 25; xml: 11
file content (293 lines) | stat: -rw-r--r-- 11,249 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
/**
 * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * SPDX-License-Identifier: Apache-2.0.
 */
#include <aws/common/byte_order.h>
#include <aws/common/environment.h>
#include <aws/http/private/no_proxy.h>
#include <aws/io/socket.h>

enum hostname_type {
    HOSTNAME_TYPE_IPV4,
    HOSTNAME_TYPE_IPV6,
    HOSTNAME_TYPE_REGULAR,
};

/**
 * s_cidr4_match() returns true if the given IPv4 address is within the
 * specified CIDR address range.
 * Based on the curl implementation Curl_cidr4_match().
 *
 * @param bits The number of network bits in the CIDR notation
 * @param network_part The network pattern to match against (e.g., "192.168.0.0")\
 * @param host_addr Pre-parsed binary representation of the host IP, or NULL to parse from host
 * @return true if the IP address matches the CIDR pattern, false otherwise
 */
static bool s_cidr4_match(uint64_t bits, struct aws_string *network_part, uint32_t address) {

    uint32_t check = 0;

    /* Check for valid bits parameter */
    if (bits > 32) {
        /* Invalid netmask bits */
        return false;
    }

    /* Convert network pattern to binary */
    if (aws_parse_ipv4_address(network_part, &check) != AWS_OP_SUCCESS) {
        return false;
    }

    if (bits > 0 && bits < 32) {
        /* Apply the network mask for CIDR comparison */
        uint32_t mask = 0xffffffff << (32 - bits);
        uint32_t host_network = aws_ntoh32(address);
        uint32_t check_network = aws_ntoh32(check);

        /* Compare the masked addresses */
        return (host_network & mask) == (check_network & mask);
    }

    /* For /32 or no bits specified, use exact match */
    return address == check;
}

/**
 * s_cidr6_match() returns true if the given IPv6 address is within the
 * specified CIDR address range.
 * Based on the curl implementation Curl_cidr6_match().
 *
 * @param bits The number of network bits in the CIDR notation
 * @param network_part The network pattern to match against (e.g., "2001:db8::")
 * @param host_addr Pre-parsed binary representation of the host IP, or NULL to parse from host
 * @return true if the IP address matches the CIDR pattern, false otherwise
 */
static bool s_cidr6_match(
    struct aws_allocator *allocator,
    uint64_t bits,
    struct aws_string *network_part,
    struct aws_byte_cursor address) {
    bool result = false;
    struct aws_byte_buf check_buf;
    aws_byte_buf_init(&check_buf, allocator, 16);
    /* If no bits specified, use full 128 bits for IPv6 */
    if (!bits) {
        bits = 128;
    }

    /* Check for valid bits parameter */
    if (bits > 128) {
        goto cleanup;
    }
    /* Convert network pattern to binary */
    if (aws_parse_ipv6_address(network_part, &check_buf) != AWS_OP_SUCCESS) {
        goto cleanup;
    }
    struct aws_byte_cursor check = aws_byte_cursor_from_buf(&check_buf);

    /* Calculate full bytes and remaining bits in the netmask */
    uint64_t bytes = bits / 8;
    uint64_t rest = bits % 8;
    if (bytes > address.len || address.len != check_buf.len || check_buf.len != 16) {
        goto cleanup;
    }
    if (bytes > 0 && !aws_array_eq(address.ptr, (size_t)bytes, check.ptr, (size_t)bytes)) {
        goto cleanup;
    }

    /* If we have remaining bits, compare the partial byte */
    if (rest > 0) {
        /* Create a mask for the remaining bits */
        unsigned char mask = (unsigned char)(0xff << (8 - rest));
        aws_byte_cursor_advance(&check, (size_t)bytes);
        aws_byte_cursor_advance(&address, (size_t)bytes);
        uint8_t address_byte = 0;
        uint8_t check_byte = 0;
        if (aws_byte_cursor_read_u8(&address, &address_byte) == false ||
            aws_byte_cursor_read_u8(&check, &check_byte) == false) {
            goto cleanup;
        }
        /* Check if the masked bits match */
        if ((address_byte & mask) != (check_byte & mask)) {
            goto cleanup;
        }
    }

    /* All checks passed, addresses match within the CIDR range */
    result = true;
cleanup:
    aws_byte_buf_clean_up(&check_buf);
    return result;
}

static bool s_is_dot(uint8_t c) {
    return c == '.';
}

/* The host is expected to be the host result from URL parser. */
bool aws_http_host_matches_no_proxy(
    struct aws_allocator *allocator,
    struct aws_byte_cursor host,
    struct aws_string *no_proxy_str) {
    if (host.len == 0 || no_proxy_str == NULL) {
        return false;
    }
    /* Single "*" wildcard matches all hosts */
    if (aws_string_eq_c_str(no_proxy_str, "*")) {
        AWS_LOGF_DEBUG(AWS_LS_HTTP_CONNECTION, "wildcard no_proxy found, bypassing any proxy");
        return true;
    }
    bool bypass = false;
    struct aws_byte_cursor no_proxy_cur = aws_byte_cursor_from_string(no_proxy_str);
    struct aws_array_list no_proxy_list;
    struct aws_string *host_str = aws_string_new_from_cursor(allocator, &host);
    struct aws_byte_buf ipv6_addr = {0};

    if (aws_array_list_init_dynamic(&no_proxy_list, allocator, 10, sizeof(struct aws_byte_cursor))) {
        goto cleanup;
    }
    /* Split the NO_PROXY string by commas */
    if (aws_byte_cursor_split_on_char(&no_proxy_cur, ',', &no_proxy_list)) {
        goto cleanup;
    }

    /* Store parsed binary addresses for reuse */
    uint32_t ipv4_addr = 0;

    /* Determine host type and parse address if applicable */
    enum hostname_type type = HOSTNAME_TYPE_REGULAR;
    if (aws_parse_ipv4_address(host_str, &ipv4_addr) == AWS_OP_SUCCESS) {
        type = HOSTNAME_TYPE_IPV4;
    } else {
        struct aws_string *host_str_copy = host_str;
        struct aws_byte_cursor host_copy = host;
        if (host_copy.ptr[0] == '[' && host_copy.ptr[host_copy.len - 1] == ']') {
            /* Check if the address is enclosed in brackets and strip them for validation */
            aws_byte_cursor_advance(&host_copy, 1);
            host_copy.len--;
            host_str_copy = aws_string_new_from_cursor(allocator, &host_copy);
        }

        aws_byte_buf_init(&ipv6_addr, allocator, 16);
        if (aws_parse_ipv6_address(host_str_copy, &ipv6_addr) == AWS_OP_SUCCESS) {
            /* Update the host str */
            if (host_str != host_str_copy) {
                aws_string_destroy(host_str);
                host_str = host_str_copy;
            }
            type = HOSTNAME_TYPE_IPV6;
        } else {
            /* Not an IP address, so it's a regular hostname */
            type = HOSTNAME_TYPE_REGULAR;
            /* Ignore the trailing dot in the hostname */
            host = aws_byte_cursor_right_trim_pred(&host, s_is_dot);
        }
        if (host_str != host_str_copy) {
            /* clean up the copy, but don't update the str. */
            aws_string_destroy(host_str_copy);
        }
    }

    for (size_t i = 0; i < aws_array_list_length(&no_proxy_list); i++) {
        struct aws_byte_cursor pattern;
        if (aws_array_list_get_at(&no_proxy_list, &pattern, i)) {
            continue;
        }

        /* Trim whitespace from both ends for the pattern */
        pattern = aws_byte_cursor_trim_pred(&pattern, aws_isspace);
        if (pattern.len == 0) {
            /* If pattern is empty, ignore it. */
            continue;
        }
        switch (type) {
            case HOSTNAME_TYPE_REGULAR: {
                /**
                 * A: example.com matches 'example.com'
                 * B: www.example.com matches 'example.com'
                 * C: nonexample.com DOES NOT match 'example.com'
                 */
                /* Trim dot from both ends for the pattern */
                pattern = aws_byte_cursor_trim_pred(&pattern, s_is_dot);
                if (pattern.len == 0) {
                    /* If pattern is empty, ignore it. */
                    continue;
                }
                if (pattern.len == host.len) {
                    if (aws_byte_cursor_eq_ignore_case(&pattern, &host)) {
                        bypass = true;
                        goto cleanup;
                    } else {
                        continue;
                    }
                } else if (pattern.len < host.len) {
                    /* Check if the pattern is a suffix of the host. All the math is safe since pattern.len <
                     * host.len
                     */
                    struct aws_byte_cursor tail_with_extra_byte = host;
                    /* 1. the byte before the tail should be `.` */
                    aws_byte_cursor_advance(&tail_with_extra_byte, host.len - pattern.len - 1);
                    uint8_t var = 0;
                    /* tail_with_extra_byte will be updated to move over the `.` */
                    aws_byte_cursor_read_u8(&tail_with_extra_byte, &var);
                    if (var != '.') {
                        continue;
                    }
                    /* 2. the tail of the host should match the pattern */
                    if (aws_byte_cursor_eq_ignore_case(&pattern, &tail_with_extra_byte)) {
                        bypass = true;
                        goto cleanup;
                    } else {
                        continue;
                    }
                }
            } break;
            case HOSTNAME_TYPE_IPV4:
            case HOSTNAME_TYPE_IPV6: {
                /* Extract network part and bits from CIDR notation */
                struct aws_byte_cursor substr = {0};
                struct aws_byte_cursor network_part = {0};
                /* CIDR found. parse the bits */
                uint64_t network_bits = 0;
                if (aws_byte_cursor_next_split(&pattern, '/', &substr)) {
                    network_part = substr;
                }
                if (aws_byte_cursor_next_split(&pattern, '/', &substr)) {
                    /* There is a second part of the pattern after `/`. */
                    /* Now, take the rest of the pattern after `/` as the bits */
                    aws_byte_cursor_advance(&pattern, network_part.len + 1);
                    if (aws_byte_cursor_utf8_parse_u64(pattern, &network_bits)) {
                        continue;
                    }
                }
                struct aws_string *network_part_str = aws_string_new_from_cursor(allocator, &network_part);
                if (type == HOSTNAME_TYPE_IPV4) {
                    if (s_cidr4_match(network_bits, network_part_str, ipv4_addr)) {
                        bypass = true;
                        aws_string_destroy(network_part_str);
                        goto cleanup;
                    }
                } else {
                    if (s_cidr6_match(
                            allocator, network_bits, network_part_str, aws_byte_cursor_from_buf(&ipv6_addr))) {
                        bypass = true;
                        aws_string_destroy(network_part_str);
                        goto cleanup;
                    }
                }
                aws_string_destroy(network_part_str);
            } break;

            default:
                /* Invalid stage */
                AWS_FATAL_ASSERT(false);
                break;
        }
    }

cleanup:
    aws_byte_buf_clean_up(&ipv6_addr);
    aws_string_destroy(host_str);
    aws_array_list_clean_up(&no_proxy_list);
    return bypass;
}