2016-01-06 09:31:11 +01:00
|
|
|
/* authd/authd.c - main code for authd
|
|
|
|
* Copyright (c) 2016 William Pitcock <nenolod@dereferenced.org>
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and/or distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice is present in all copies.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
|
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
* DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
|
|
|
|
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
|
|
|
|
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
2016-01-06 10:11:20 +01:00
|
|
|
#include "authd.h"
|
|
|
|
#include "dns.h"
|
2016-03-17 22:25:58 +01:00
|
|
|
#include "provider.h"
|
2016-03-26 03:29:44 +01:00
|
|
|
#include "notice.h"
|
2016-01-06 09:31:11 +01:00
|
|
|
|
|
|
|
#define MAXPARA 10
|
|
|
|
|
2016-06-01 22:27:19 +02:00
|
|
|
static void error_cb(rb_helper *helper) __attribute__((noreturn));
|
2016-03-09 10:46:04 +01:00
|
|
|
static void handle_reload(int parc, char *parv[]);
|
2016-03-08 09:53:25 +01:00
|
|
|
static void handle_stat(int parc, char *parv[]);
|
2016-03-26 05:04:00 +01:00
|
|
|
static void handle_options(int parc, char *parv[]);
|
2016-03-08 09:53:25 +01:00
|
|
|
|
2016-01-06 10:11:20 +01:00
|
|
|
rb_helper *authd_helper = NULL;
|
2016-07-23 00:11:39 +02:00
|
|
|
std::array<authd_cmd_handler, 256> authd_cmd_handlers =
|
|
|
|
[]{
|
2016-07-13 07:17:21 +02:00
|
|
|
std::array<authd_cmd_handler, 256> ret;
|
|
|
|
ret['C'] = handle_new_connection;
|
|
|
|
ret['D'] = handle_resolve_dns;
|
|
|
|
ret['E'] = handle_cancel_connection;
|
|
|
|
ret['O'] = handle_options;
|
|
|
|
ret['R'] = handle_reload;
|
|
|
|
ret['S'] = handle_stat;
|
|
|
|
return ret;
|
2016-07-23 00:11:39 +02:00
|
|
|
}();
|
2016-07-13 07:17:21 +02:00
|
|
|
|
2016-07-23 00:11:39 +02:00
|
|
|
std::array<authd_stat_handler, 256> authd_stat_handlers =
|
|
|
|
[]{
|
2016-07-13 07:17:21 +02:00
|
|
|
std::array<authd_stat_handler, 256> ret;
|
|
|
|
ret['D'] = enumerate_nameservers;
|
|
|
|
return ret;
|
2016-07-23 00:11:39 +02:00
|
|
|
}();
|
2016-07-13 07:17:21 +02:00
|
|
|
|
2016-07-23 00:11:39 +02:00
|
|
|
std::array<authd_reload_handler, 256> authd_reload_handlers =
|
|
|
|
[]{
|
2016-07-13 07:17:21 +02:00
|
|
|
std::array<authd_reload_handler, 256> ret;
|
|
|
|
ret['D'] = reload_nameservers;
|
|
|
|
return ret;
|
2016-07-23 00:11:39 +02:00
|
|
|
}();
|
2016-03-09 10:46:04 +01:00
|
|
|
|
2016-03-26 05:04:00 +01:00
|
|
|
rb_dictionary *authd_option_handlers;
|
|
|
|
|
2016-03-08 09:53:25 +01:00
|
|
|
static void
|
|
|
|
handle_stat(int parc, char *parv[])
|
|
|
|
{
|
|
|
|
authd_stat_handler handler;
|
2016-05-01 12:12:34 +02:00
|
|
|
unsigned long long rid;
|
2016-03-08 09:53:25 +01:00
|
|
|
|
|
|
|
if(parc < 3)
|
2016-03-25 01:36:41 +01:00
|
|
|
{
|
|
|
|
warn_opers(L_CRIT, "BUG: handle_stat received too few parameters (at least 3 expected, got %d)", parc);
|
2016-03-08 09:53:25 +01:00
|
|
|
return;
|
2016-03-25 01:36:41 +01:00
|
|
|
}
|
2016-03-08 09:53:25 +01:00
|
|
|
|
2016-05-01 12:12:34 +02:00
|
|
|
if((rid = strtoull(parv[1], NULL, 16)) > UINT32_MAX)
|
2016-03-28 00:28:26 +02:00
|
|
|
{
|
2016-05-01 12:12:34 +02:00
|
|
|
warn_opers(L_CRIT, "BUG: handle_stat got a rid that was too large: %s", parv[1]);
|
2016-03-28 00:28:26 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-03-22 02:52:40 +01:00
|
|
|
if (!(handler = authd_stat_handlers[(unsigned char)parv[2][0]]))
|
2016-03-08 09:53:25 +01:00
|
|
|
return;
|
|
|
|
|
2016-05-01 12:12:34 +02:00
|
|
|
handler((uint32_t)rid, parv[2][0]);
|
2016-03-08 09:53:25 +01:00
|
|
|
}
|
|
|
|
|
2016-03-26 05:04:00 +01:00
|
|
|
static void
|
|
|
|
handle_options(int parc, char *parv[])
|
|
|
|
{
|
|
|
|
struct auth_opts_handler *handler;
|
|
|
|
|
2016-04-03 03:42:20 +02:00
|
|
|
if(parc < 2)
|
2016-03-26 05:04:00 +01:00
|
|
|
{
|
2016-04-03 03:42:20 +02:00
|
|
|
warn_opers(L_CRIT, "BUG: handle_options received too few parameters (at least 2 expected, got %d)", parc);
|
2016-03-26 05:04:00 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-07-13 07:17:21 +02:00
|
|
|
if((handler = (auth_opts_handler *)rb_dictionary_retrieve(authd_option_handlers, parv[1])) == NULL)
|
2016-03-26 05:04:00 +01:00
|
|
|
{
|
|
|
|
warn_opers(L_CRIT, "BUG: handle_options got a bad option type %s", parv[1]);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if((parc - 2) < handler->min_parc)
|
|
|
|
{
|
|
|
|
warn_opers(L_CRIT, "BUG: handle_options received too few parameters (at least %d expected, got %d)", handler->min_parc, parc);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-03-27 01:50:09 +01:00
|
|
|
handler->handler(parv[1], parc - 2, (const char **)&parv[2]);
|
2016-03-26 05:04:00 +01:00
|
|
|
}
|
|
|
|
|
2016-03-09 10:46:04 +01:00
|
|
|
static void
|
|
|
|
handle_reload(int parc, char *parv[])
|
|
|
|
{
|
|
|
|
authd_reload_handler handler;
|
|
|
|
|
2016-04-03 03:10:17 +02:00
|
|
|
if(parc <= 2)
|
2016-03-25 01:36:41 +01:00
|
|
|
{
|
2016-03-26 03:00:13 +01:00
|
|
|
/* Reload all handlers */
|
2016-03-26 05:04:00 +01:00
|
|
|
for(size_t i = 0; i < 256; i++)
|
2016-03-26 03:10:34 +01:00
|
|
|
{
|
|
|
|
if ((handler = authd_reload_handlers[(unsigned char) i]) != NULL)
|
2016-04-03 03:10:17 +02:00
|
|
|
handler('\0');
|
2016-03-26 03:10:34 +01:00
|
|
|
}
|
2016-03-26 03:00:13 +01:00
|
|
|
|
2016-03-09 10:46:04 +01:00
|
|
|
return;
|
2016-03-25 01:36:41 +01:00
|
|
|
}
|
2016-03-09 10:46:04 +01:00
|
|
|
|
2016-03-22 02:52:40 +01:00
|
|
|
if (!(handler = authd_reload_handlers[(unsigned char)parv[1][0]]))
|
2016-03-09 10:46:04 +01:00
|
|
|
return;
|
|
|
|
|
|
|
|
handler(parv[1][0]);
|
|
|
|
}
|
|
|
|
|
2016-01-06 09:31:11 +01:00
|
|
|
static void
|
|
|
|
parse_request(rb_helper *helper)
|
|
|
|
{
|
|
|
|
static char *parv[MAXPARA + 1];
|
|
|
|
static char readbuf[READBUF_SIZE];
|
|
|
|
int parc;
|
|
|
|
int len;
|
2016-01-06 10:11:20 +01:00
|
|
|
authd_cmd_handler handler;
|
2016-01-06 09:31:11 +01:00
|
|
|
|
|
|
|
while((len = rb_helper_read(helper, readbuf, sizeof(readbuf))) > 0)
|
|
|
|
{
|
|
|
|
parc = rb_string_to_array(readbuf, parv, MAXPARA);
|
|
|
|
|
|
|
|
if(parc < 1)
|
|
|
|
continue;
|
|
|
|
|
2016-03-22 02:52:40 +01:00
|
|
|
handler = authd_cmd_handlers[(unsigned char)parv[0][0]];
|
2016-01-06 10:11:20 +01:00
|
|
|
if (handler != NULL)
|
|
|
|
handler(parc, parv);
|
2016-01-06 09:31:11 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
error_cb(rb_helper *helper)
|
|
|
|
{
|
2016-03-29 02:22:02 +02:00
|
|
|
exit(EX_ERROR);
|
2016-01-06 09:31:11 +01:00
|
|
|
}
|
|
|
|
|
2016-03-20 07:19:46 +01:00
|
|
|
#ifndef _WIN32
|
2016-01-06 09:31:11 +01:00
|
|
|
static void
|
|
|
|
dummy_handler(int sig)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static void
|
|
|
|
setup_signals(void)
|
|
|
|
{
|
2016-03-20 07:19:46 +01:00
|
|
|
#ifndef _WIN32
|
2016-01-06 09:31:11 +01:00
|
|
|
struct sigaction act;
|
|
|
|
|
|
|
|
act.sa_flags = 0;
|
|
|
|
act.sa_handler = SIG_IGN;
|
|
|
|
sigemptyset(&act.sa_mask);
|
|
|
|
sigaddset(&act.sa_mask, SIGPIPE);
|
|
|
|
sigaddset(&act.sa_mask, SIGALRM);
|
|
|
|
#ifdef SIGTRAP
|
|
|
|
sigaddset(&act.sa_mask, SIGTRAP);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef SIGWINCH
|
|
|
|
sigaddset(&act.sa_mask, SIGWINCH);
|
|
|
|
sigaction(SIGWINCH, &act, 0);
|
|
|
|
#endif
|
|
|
|
sigaction(SIGPIPE, &act, 0);
|
|
|
|
#ifdef SIGTRAP
|
|
|
|
sigaction(SIGTRAP, &act, 0);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
act.sa_handler = dummy_handler;
|
|
|
|
sigaction(SIGALRM, &act, 0);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
main(int argc, char *argv[])
|
|
|
|
{
|
|
|
|
setup_signals();
|
|
|
|
|
|
|
|
authd_helper = rb_helper_child(parse_request, error_cb, NULL, NULL, NULL, 256, 256, 256); /* XXX fix me */
|
|
|
|
if(authd_helper == NULL)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "authd is not meant to be invoked by end users\n");
|
2016-03-29 02:22:02 +02:00
|
|
|
exit(EX_ERROR);
|
2016-01-06 09:31:11 +01:00
|
|
|
}
|
|
|
|
|
2016-01-06 10:52:37 +01:00
|
|
|
rb_set_time();
|
|
|
|
setup_signals();
|
2016-03-26 05:04:00 +01:00
|
|
|
|
2016-07-13 07:17:21 +02:00
|
|
|
authd_option_handlers = rb_dictionary_create("authd options handlers", reinterpret_cast<int (*)(const void *, const void *)>(rb_strcasecmp));
|
2016-03-26 05:04:00 +01:00
|
|
|
|
2016-01-06 10:52:37 +01:00
|
|
|
init_resolver();
|
2016-03-17 22:25:58 +01:00
|
|
|
init_providers();
|
2016-01-06 10:52:37 +01:00
|
|
|
rb_init_prng(NULL, RB_PRNG_DEFAULT);
|
|
|
|
|
2016-03-29 02:38:43 +02:00
|
|
|
rb_helper_loop(authd_helper, 0);
|
2016-03-27 06:39:22 +02:00
|
|
|
|
2016-06-01 22:27:19 +02:00
|
|
|
/*
|
|
|
|
* XXX this function will never be called from here -- is it necessary?
|
|
|
|
*/
|
2016-04-30 07:46:18 +02:00
|
|
|
destroy_providers();
|
|
|
|
|
2016-01-06 09:31:11 +01:00
|
|
|
return 0;
|
|
|
|
}
|