main.cc 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646
  1. // Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. // $Id$
  15. #include "config.h"
  16. #include <sys/types.h>
  17. #include <sys/socket.h>
  18. #include <sys/select.h>
  19. #include <netdb.h>
  20. #include <stdlib.h>
  21. #include <errno.h>
  22. #include <set>
  23. #include <iostream>
  24. #include <boost/foreach.hpp>
  25. #ifdef HAVE_BOOSTLIB
  26. #include <boost/bind.hpp>
  27. #include <boost/asio.hpp>
  28. #endif
  29. #include <exceptions/exceptions.h>
  30. #include <dns/buffer.h>
  31. #include <dns/name.h>
  32. #include <dns/message.h>
  33. #include <dns/rrset.h>
  34. #include <dns/message.h>
  35. #include <dns/messagerenderer.h>
  36. #include <cc/session.h>
  37. #include <cc/data.h>
  38. #include <config/ccsession.h>
  39. #include "spec_config.h"
  40. #include "common.h"
  41. #include "auth_srv.h"
  42. #include <boost/foreach.hpp>
  43. using namespace std;
  44. #ifdef HAVE_BOOSTLIB
  45. using namespace boost::asio;
  46. using ip::udp;
  47. using ip::tcp;
  48. #endif
  49. using namespace isc::data;
  50. using namespace isc::cc;
  51. using namespace isc::config;
  52. using namespace isc::dns;
  53. namespace {
  54. const string PROGRAM = "Auth";
  55. const char* DNSPORT = "5300";
  56. }
  57. /* need global var for config/command handlers.
  58. * todo: turn this around, and put handlers in the authserver
  59. * class itself? */
  60. namespace {
  61. AuthSrv *auth_server;
  62. }
  63. static ElementPtr
  64. my_config_handler(ElementPtr new_config)
  65. {
  66. return auth_server->updateConfig(new_config);
  67. }
  68. static ElementPtr
  69. my_command_handler(const string& command, const ElementPtr args) {
  70. ElementPtr answer = createAnswer(0);
  71. if (command == "print_message")
  72. {
  73. cout << args << endl;
  74. /* let's add that message to our answer as well */
  75. answer->get("result")->add(args);
  76. }
  77. return answer;
  78. }
  79. #ifdef HAVE_BOOSTLIB
  80. //
  81. // Helper classes for asynchronous I/O using boost::asio
  82. //
  83. namespace {
  84. class Completed {
  85. public:
  86. Completed(size_t len) : len_(len) {}
  87. bool operator()(const boost::system::error_code& error,
  88. size_t bytes_transferred) const
  89. {
  90. return (error != 0 || bytes_transferred >= len_);
  91. }
  92. private:
  93. size_t len_;
  94. };
  95. class TCPClient {
  96. public:
  97. TCPClient(io_service& io_service) :
  98. socket_(io_service),
  99. response_buffer_(0),
  100. responselen_buffer_(TCP_MESSAGE_LENGTHSIZE),
  101. response_renderer_(response_buffer_),
  102. dns_message_(Message::PARSE)
  103. {}
  104. void start() {
  105. async_read(socket_, boost::asio::buffer(data_, TCP_MESSAGE_LENGTHSIZE),
  106. Completed(TCP_MESSAGE_LENGTHSIZE),
  107. boost::bind(&TCPClient::headerRead, this,
  108. placeholders::error,
  109. placeholders::bytes_transferred));
  110. }
  111. tcp::socket& getSocket() { return (socket_); }
  112. void headerRead(const boost::system::error_code& error,
  113. size_t bytes_transferred)
  114. {
  115. if (!error) {
  116. assert(bytes_transferred == TCP_MESSAGE_LENGTHSIZE);
  117. InputBuffer dnsbuffer(data_, TCP_MESSAGE_LENGTHSIZE);
  118. uint16_t msglen = dnsbuffer.readUint16();
  119. async_read(socket_, boost::asio::buffer(data_, msglen),
  120. Completed(msglen),
  121. boost::bind(&TCPClient::requestRead, this,
  122. placeholders::error,
  123. placeholders::bytes_transferred));
  124. } else {
  125. delete this;
  126. }
  127. }
  128. void requestRead(const boost::system::error_code& error,
  129. size_t bytes_transferred)
  130. {
  131. if (!error) {
  132. InputBuffer dnsbuffer(data_, bytes_transferred);
  133. if (auth_server->processMessage(dnsbuffer, dns_message_,
  134. response_renderer_, false) == 0) {
  135. responselen_buffer_.writeUint16(response_buffer_.getLength());
  136. async_write(socket_,
  137. boost::asio::buffer(
  138. responselen_buffer_.getData(),
  139. responselen_buffer_.getLength()),
  140. boost::bind(&TCPClient::responseWrite, this,
  141. placeholders::error));
  142. } else {
  143. delete this;
  144. }
  145. } else {
  146. delete this;
  147. }
  148. }
  149. void responseWrite(const boost::system::error_code& error)
  150. {
  151. if (!error) {
  152. async_write(socket_,
  153. boost::asio::buffer(response_buffer_.getData(),
  154. response_buffer_.getLength()),
  155. boost::bind(&TCPClient::handleWrite, this,
  156. placeholders::error));
  157. }
  158. }
  159. void handleWrite(const boost::system::error_code& error)
  160. {
  161. if (!error) {
  162. start(); // handle next request, if any.
  163. } else {
  164. delete this;
  165. }
  166. }
  167. private:
  168. tcp::socket socket_;
  169. OutputBuffer response_buffer_;
  170. OutputBuffer responselen_buffer_;
  171. MessageRenderer response_renderer_;
  172. Message dns_message_;
  173. enum { MAX_LENGTH = 65535 };
  174. static const size_t TCP_MESSAGE_LENGTHSIZE = 2;
  175. char data_[MAX_LENGTH];
  176. };
  177. class TCPServer
  178. {
  179. public:
  180. TCPServer(io_service& io_service, int af, short port) :
  181. io_service_(io_service),
  182. acceptor_(io_service,
  183. tcp::endpoint(af == AF_INET6 ? tcp::v6() : tcp::v4(), port))
  184. {
  185. TCPClient* new_client = new TCPClient(io_service_);
  186. // XXX: isn't the following exception free? Need to check it.
  187. acceptor_.async_accept(new_client->getSocket(),
  188. boost::bind(&TCPServer::handleAccept, this,
  189. new_client, placeholders::error));
  190. }
  191. void handleAccept(TCPClient* new_client,
  192. const boost::system::error_code& error)
  193. {
  194. if (!error) {
  195. new_client->start();
  196. new_client = new TCPClient(io_service_);
  197. acceptor_.async_accept(new_client->getSocket(),
  198. boost::bind(&TCPServer::handleAccept,
  199. this, new_client,
  200. placeholders::error));
  201. } else {
  202. delete new_client;
  203. }
  204. }
  205. private:
  206. io_service& io_service_;
  207. tcp::acceptor acceptor_;
  208. };
  209. class UDPServer {
  210. public:
  211. UDPServer(io_service& io_service, int af, short port) :
  212. io_service_(io_service),
  213. socket_(io_service,
  214. udp::endpoint(af == AF_INET6 ? udp::v6() : udp::v4(), port)),
  215. response_buffer_(0),
  216. response_renderer_(response_buffer_),
  217. dns_message_(Message::PARSE)
  218. {
  219. startReceive();
  220. }
  221. void handleRequest(const boost::system::error_code& error,
  222. size_t bytes_recvd)
  223. {
  224. if (!error && bytes_recvd > 0) {
  225. InputBuffer request_buffer(data_, bytes_recvd);
  226. dns_message_.clear(Message::PARSE);
  227. response_renderer_.clear();
  228. if (auth_server->processMessage(request_buffer, dns_message_,
  229. response_renderer_, true) == 0) {
  230. socket_.async_send_to(
  231. boost::asio::buffer(response_buffer_.getData(),
  232. response_buffer_.getLength()),
  233. sender_endpoint_,
  234. boost::bind(&UDPServer::sendCompleted,
  235. this,
  236. placeholders::error,
  237. placeholders::bytes_transferred));
  238. } else {
  239. startReceive();
  240. }
  241. } else {
  242. startReceive();
  243. }
  244. }
  245. void sendCompleted(const boost::system::error_code& error,
  246. size_t bytes_sent)
  247. {
  248. startReceive();
  249. }
  250. private:
  251. void startReceive() {
  252. socket_.async_receive_from(
  253. boost::asio::buffer(data_, MAX_LENGTH), sender_endpoint_,
  254. boost::bind(&UDPServer::handleRequest, this,
  255. placeholders::error,
  256. placeholders::bytes_transferred));
  257. }
  258. private:
  259. io_service& io_service_;
  260. udp::socket socket_;
  261. OutputBuffer response_buffer_;
  262. MessageRenderer response_renderer_;
  263. Message dns_message_;
  264. udp::endpoint sender_endpoint_;
  265. enum { MAX_LENGTH = 4096 };
  266. char data_[MAX_LENGTH];
  267. };
  268. struct ServerSet {
  269. ServerSet() : udp4_server(NULL), udp6_server(NULL),
  270. tcp4_server(NULL), tcp6_server(NULL)
  271. {}
  272. ~ServerSet()
  273. {
  274. delete udp4_server;
  275. delete udp6_server;
  276. delete tcp4_server;
  277. delete tcp6_server;
  278. }
  279. UDPServer* udp4_server;
  280. UDPServer* udp6_server;
  281. TCPServer* tcp4_server;
  282. TCPServer* tcp6_server;
  283. };
  284. static void
  285. run_server(const char* port, const bool use_ipv4, const bool use_ipv6,
  286. const string& specfile)
  287. {
  288. ServerSet servers;
  289. boost::asio::io_service io_service;
  290. short portnum = atoi(port);
  291. ModuleCCSession cs(specfile, io_service, my_config_handler,
  292. my_command_handler);
  293. if (use_ipv4) {
  294. servers.udp4_server = new UDPServer(io_service, AF_INET, portnum);
  295. servers.tcp4_server = new TCPServer(io_service, AF_INET, portnum);
  296. }
  297. if (use_ipv6) {
  298. servers.udp6_server = new UDPServer(io_service, AF_INET6, portnum);
  299. servers.tcp6_server = new TCPServer(io_service, AF_INET6, portnum);
  300. }
  301. cout << "Server started." << endl;
  302. io_service.run();
  303. }
  304. }
  305. #else // !HAVE_BOOSTLIB
  306. struct SocketSet {
  307. SocketSet() : ups4(-1), tps4(-1), ups6(-1), tps6(-1) {}
  308. ~SocketSet()
  309. {
  310. if (ups4 >= 0) {
  311. close(ups4);
  312. }
  313. if (tps4 >= 0) {
  314. close(tps4);
  315. }
  316. if (ups6 >= 0) {
  317. close(ups6);
  318. }
  319. if (tps4 >= 0) {
  320. close(tps6);
  321. }
  322. }
  323. int ups4, tps4, ups6, tps6;
  324. };
  325. static int
  326. getUDPSocket(int af, const char* port) {
  327. struct addrinfo hints, *res;
  328. memset(&hints, 0, sizeof(hints));
  329. hints.ai_family = af;
  330. hints.ai_socktype = SOCK_DGRAM;
  331. hints.ai_flags = AI_PASSIVE;
  332. hints.ai_protocol = IPPROTO_UDP;
  333. int error = getaddrinfo(NULL, port, &hints, &res);
  334. if (error != 0) {
  335. isc_throw(FatalError, "getaddrinfo failed: " << gai_strerror(error));
  336. }
  337. int s = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
  338. if (s < 0) {
  339. isc_throw(FatalError, "failed to open socket");
  340. }
  341. if (af == AF_INET6) {
  342. int on = 1;
  343. if (setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, &on, sizeof(on)) < 0) {
  344. cerr << "couldn't set IPV6_V6ONLY socket option" << endl;
  345. // proceed anyway
  346. }
  347. }
  348. if (bind(s, res->ai_addr, res->ai_addrlen) < 0) {
  349. isc_throw(FatalError, "binding socket failure");
  350. }
  351. return (s);
  352. }
  353. static int
  354. getTCPSocket(int af, const char* port) {
  355. struct addrinfo hints, *res;
  356. memset(&hints, 0, sizeof(hints));
  357. hints.ai_family = af;
  358. hints.ai_socktype = SOCK_STREAM;
  359. hints.ai_flags = AI_PASSIVE;
  360. hints.ai_protocol = IPPROTO_TCP;
  361. int error = getaddrinfo(NULL, port, &hints, &res);
  362. if (error != 0) {
  363. isc_throw(FatalError, "getaddrinfo failed: " << gai_strerror(error));
  364. }
  365. int s = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
  366. if (s < 0) {
  367. isc_throw(FatalError, "failed to open socket");
  368. }
  369. int on = 1;
  370. if (af == AF_INET6) {
  371. if (setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, &on, sizeof(on)) < 0) {
  372. cerr << "couldn't set IPV6_V6ONLY socket option" << endl;
  373. }
  374. }
  375. if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)) < 0) {
  376. cerr << "couldn't set SO_REUSEADDR socket option" << endl;
  377. }
  378. if (bind(s, res->ai_addr, res->ai_addrlen) < 0) {
  379. isc_throw(FatalError, "binding socket failure");
  380. }
  381. listen(s, 100);
  382. return (s);
  383. }
  384. static void
  385. processMessageUDP(const int fd, Message& dns_message,
  386. MessageRenderer& response_renderer)
  387. {
  388. struct sockaddr_storage ss;
  389. socklen_t sa_len = sizeof(ss);
  390. struct sockaddr* sa = static_cast<struct sockaddr*>((void*)&ss);
  391. char recvbuf[4096];
  392. int cc;
  393. dns_message.clear(Message::PARSE);
  394. response_renderer.clear();
  395. if ((cc = recvfrom(fd, recvbuf, sizeof(recvbuf), 0, sa, &sa_len)) > 0) {
  396. InputBuffer buffer(recvbuf, cc);
  397. if (auth_server->processMessage(buffer, dns_message, response_renderer,
  398. true) == 0) {
  399. sendto(fd, response_renderer.getData(),
  400. response_renderer.getLength(), 0, sa, sa_len);
  401. }
  402. }
  403. }
  404. static void
  405. processMessageTCP(const int fd, Message& dns_message,
  406. MessageRenderer& response_renderer)
  407. {
  408. struct sockaddr_storage ss;
  409. socklen_t sa_len = sizeof(ss);
  410. struct sockaddr* sa = static_cast<struct sockaddr*>((void*)&ss);
  411. char sizebuf[2];
  412. int cc;
  413. int ts = accept(fd, sa, &sa_len);
  414. cout << "[XX] process TCP" << endl;
  415. cc = recv(ts, sizebuf, 2, 0);
  416. cout << "[XX] got: " << cc << endl;
  417. uint16_t size, size_n;
  418. memcpy(&size_n, sizebuf, 2);
  419. size = ntohs(size_n);
  420. cout << "[XX] got: " << size << endl;
  421. vector<char> message_buffer;
  422. message_buffer.reserve(size);
  423. cc = 0;
  424. while (cc < size) {
  425. cout << "[XX] cc now: " << cc << " of " << size << endl;
  426. cc += recv(ts, &message_buffer[0] + cc, size - cc, 0);
  427. }
  428. InputBuffer buffer(&message_buffer[0], size);
  429. dns_message.clear(Message::PARSE);
  430. response_renderer.clear();
  431. if (auth_server->processMessage(buffer, dns_message, response_renderer,
  432. false) == 0) {
  433. size = response_renderer.getLength();
  434. size_n = htons(size);
  435. if (send(ts, &size_n, 2, 0) == 2) {
  436. cc = send(ts, response_renderer.getData(),
  437. response_renderer.getLength(), 0);
  438. if (cc == -1) {
  439. cerr << "[AuthSrv] error in sending TCP response message" <<
  440. endl;
  441. } else {
  442. cout << "[XX] sent TCP response: " << cc << " bytes" << endl;
  443. }
  444. }
  445. }
  446. // TODO: we don't check for more queries on the stream atm
  447. close(ts);
  448. }
  449. static void
  450. run_server(const char* port, const bool use_ipv4, const bool use_ipv6,
  451. const string& specfile)
  452. {
  453. SocketSet socket_set;
  454. fd_set fds_base;
  455. int nfds = -1;
  456. FD_ZERO(&fds_base);
  457. if (use_ipv4) {
  458. socket_set.ups4 = getUDPSocket(AF_INET, port);
  459. FD_SET(socket_set.ups4, &fds_base);
  460. nfds = max(nfds, socket_set.ups4);
  461. socket_set.tps4 = getTCPSocket(AF_INET, port);
  462. FD_SET(socket_set.tps4, &fds_base);
  463. nfds = max(nfds, socket_set.tps4);
  464. }
  465. if (use_ipv6) {
  466. socket_set.ups6 = getUDPSocket(AF_INET6, port);
  467. FD_SET(socket_set.ups6, &fds_base);
  468. nfds = max(nfds, socket_set.ups6);
  469. socket_set.tps6 = getTCPSocket(AF_INET6, port);
  470. FD_SET(socket_set.tps6, &fds_base);
  471. nfds = max(nfds, socket_set.tps6);
  472. }
  473. ++nfds;
  474. ModuleCCSession cs(specfile, my_config_handler, my_command_handler);
  475. cout << "Server started." << endl;
  476. int ss = cs.getSocket();
  477. Message dns_message(Message::PARSE);
  478. OutputBuffer resonse_buffer(0);
  479. MessageRenderer response_renderer(resonse_buffer);
  480. while (true) {
  481. fd_set fds = fds_base;
  482. FD_SET(ss, &fds);
  483. int n = select(nfds, &fds, NULL, NULL, NULL);
  484. if (n < 0) {
  485. if (errno != EINTR) {
  486. isc_throw(FatalError, "select error");
  487. }
  488. continue;
  489. }
  490. if (socket_set.ups4 >= 0 && FD_ISSET(socket_set.ups4, &fds)) {
  491. processMessageUDP(socket_set.ups4, dns_message, response_renderer);
  492. }
  493. if (socket_set.ups6 >= 0 && FD_ISSET(socket_set.ups6, &fds)) {
  494. processMessageUDP(socket_set.ups6, dns_message, response_renderer);
  495. }
  496. if (socket_set.tps4 >= 0 && FD_ISSET(socket_set.tps4, &fds)) {
  497. processMessageTCP(socket_set.tps4, dns_message, response_renderer);
  498. }
  499. if (socket_set.tps6 >= 0 && FD_ISSET(socket_set.tps6, &fds)) {
  500. processMessageTCP(socket_set.tps6, dns_message, response_renderer);
  501. }
  502. if (FD_ISSET(ss, &fds)) {
  503. cs.check_command();
  504. }
  505. }
  506. }
  507. #endif // HAVE_BOOSTLIB
  508. static void
  509. usage() {
  510. cerr << "Usage: b10-auth [-p port] [-4|-6]" << endl;
  511. exit(1);
  512. }
  513. int
  514. main(int argc, char* argv[]) {
  515. int ch;
  516. const char* port = DNSPORT;
  517. bool ipv4_only = false, ipv6_only = false;
  518. bool use_ipv4 = false, use_ipv6 = false;
  519. while ((ch = getopt(argc, argv, "46p:")) != -1) {
  520. switch (ch) {
  521. case '4':
  522. ipv4_only = true;
  523. break;
  524. case '6':
  525. ipv6_only = true;
  526. break;
  527. case 'p':
  528. port = optarg;
  529. break;
  530. case '?':
  531. default:
  532. usage();
  533. }
  534. }
  535. if (argc - optind > 0) {
  536. usage();
  537. }
  538. if (ipv4_only && ipv6_only) {
  539. cerr << "-4 and -6 can't coexist" << endl;
  540. usage();
  541. }
  542. if (!ipv6_only) {
  543. use_ipv4 = true;
  544. }
  545. if (!ipv4_only) {
  546. use_ipv4 = true;
  547. }
  548. auth_server = new AuthSrv;
  549. // initialize command channel
  550. int ret = 0;
  551. try {
  552. string specfile;
  553. if (getenv("B10_FROM_SOURCE")) {
  554. specfile = string(getenv("B10_FROM_SOURCE")) +
  555. "/src/bin/auth/auth.spec";
  556. } else {
  557. specfile = string(AUTH_SPECFILE_LOCATION);
  558. }
  559. run_server(port, use_ipv4, use_ipv6, specfile);
  560. } catch (const std::exception& ex) {
  561. cerr << ex.what() << endl;
  562. ret = 1;
  563. }
  564. delete auth_server;
  565. return (ret);
  566. }