main.cc 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673
  1. // Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. // $Id$
  15. #include "config.h"
  16. #include <sys/types.h>
  17. #include <sys/socket.h>
  18. #include <sys/select.h>
  19. #include <netdb.h>
  20. #include <netinet/in.h>
  21. #include <stdlib.h>
  22. #include <errno.h>
  23. #include <cassert>
  24. #include <iostream>
  25. #include <boost/foreach.hpp>
  26. #ifdef HAVE_BOOSTLIB
  27. #include <boost/bind.hpp>
  28. #include <boost/asio.hpp>
  29. #endif
  30. #include <exceptions/exceptions.h>
  31. #include <dns/buffer.h>
  32. #include <dns/message.h>
  33. #include <dns/messagerenderer.h>
  34. #include <cc/session.h>
  35. #include <cc/data.h>
  36. #include <config/ccsession.h>
  37. #include "spec_config.h"
  38. #include "common.h"
  39. #include "auth_srv.h"
  40. using namespace std;
  41. #ifdef HAVE_BOOSTLIB
  42. using namespace boost::asio;
  43. using ip::udp;
  44. using ip::tcp;
  45. #endif
  46. using namespace isc::data;
  47. using namespace isc::cc;
  48. using namespace isc::config;
  49. using namespace isc::dns;
  50. namespace {
  51. static bool verbose_mode = false;
  52. }
  53. namespace {
  54. const string PROGRAM = "Auth";
  55. const char* DNSPORT = "5300";
  56. }
  57. /* need global var for config/command handlers.
  58. * todo: turn this around, and put handlers in the authserver
  59. * class itself? */
  60. namespace {
  61. AuthSrv *auth_server;
  62. #ifdef HAVE_BOOSTLIB
  63. // TODO: this should be a property of AuthSrv, and AuthSrv needs
  64. // a stop() method (so the shutdown command can be handled)
  65. boost::asio::io_service io_service_;
  66. #else
  67. bool running;
  68. #endif
  69. }
  70. static ElementPtr
  71. my_config_handler(ElementPtr new_config) {
  72. return auth_server->updateConfig(new_config);
  73. }
  74. static ElementPtr
  75. my_command_handler(const string& command, const ElementPtr args) {
  76. ElementPtr answer = createAnswer();
  77. if (command == "print_message") {
  78. cout << args << endl;
  79. /* let's add that message to our answer as well */
  80. answer->get("result")->add(args);
  81. } else if (command == "shutdown") {
  82. #ifdef HAVE_BOOSTLIB
  83. io_service_.stop();
  84. #else
  85. running = false;
  86. #endif
  87. }
  88. return answer;
  89. }
  90. #ifdef HAVE_BOOSTLIB
  91. //
  92. // Helper classes for asynchronous I/O using boost::asio
  93. //
  94. namespace {
  95. class TCPClient {
  96. public:
  97. TCPClient(io_service& io_service) :
  98. socket_(io_service),
  99. response_buffer_(0),
  100. responselen_buffer_(TCP_MESSAGE_LENGTHSIZE),
  101. response_renderer_(response_buffer_),
  102. dns_message_(Message::PARSE)
  103. {}
  104. void start() {
  105. async_read(socket_, boost::asio::buffer(data_, TCP_MESSAGE_LENGTHSIZE),
  106. boost::bind(&TCPClient::headerRead, this,
  107. placeholders::error,
  108. placeholders::bytes_transferred));
  109. }
  110. tcp::socket& getSocket() { return (socket_); }
  111. void headerRead(const boost::system::error_code& error,
  112. size_t bytes_transferred)
  113. {
  114. if (!error) {
  115. InputBuffer dnsbuffer(data_, bytes_transferred);
  116. uint16_t msglen = dnsbuffer.readUint16();
  117. async_read(socket_, boost::asio::buffer(data_, msglen),
  118. boost::bind(&TCPClient::requestRead, this,
  119. placeholders::error,
  120. placeholders::bytes_transferred));
  121. } else {
  122. delete this;
  123. }
  124. }
  125. void requestRead(const boost::system::error_code& error,
  126. size_t bytes_transferred)
  127. {
  128. if (!error) {
  129. InputBuffer dnsbuffer(data_, bytes_transferred);
  130. if (auth_server->processMessage(dnsbuffer, dns_message_,
  131. response_renderer_, false,
  132. verbose_mode)) {
  133. responselen_buffer_.writeUint16(response_buffer_.getLength());
  134. async_write(socket_,
  135. boost::asio::buffer(
  136. responselen_buffer_.getData(),
  137. responselen_buffer_.getLength()),
  138. boost::bind(&TCPClient::responseWrite, this,
  139. placeholders::error));
  140. } else {
  141. delete this;
  142. }
  143. } else {
  144. delete this;
  145. }
  146. }
  147. void responseWrite(const boost::system::error_code& error)
  148. {
  149. if (!error) {
  150. async_write(socket_,
  151. boost::asio::buffer(response_buffer_.getData(),
  152. response_buffer_.getLength()),
  153. boost::bind(&TCPClient::handleWrite, this,
  154. placeholders::error));
  155. } else {
  156. delete this;
  157. }
  158. }
  159. void handleWrite(const boost::system::error_code& error)
  160. {
  161. if (!error) {
  162. start(); // handle next request, if any.
  163. } else {
  164. delete this;
  165. }
  166. }
  167. private:
  168. tcp::socket socket_;
  169. OutputBuffer response_buffer_;
  170. OutputBuffer responselen_buffer_;
  171. MessageRenderer response_renderer_;
  172. Message dns_message_;
  173. enum { MAX_LENGTH = 65535 };
  174. static const size_t TCP_MESSAGE_LENGTHSIZE = 2;
  175. char data_[MAX_LENGTH];
  176. };
  177. class TCPServer
  178. {
  179. private:
  180. public:
  181. TCPServer(io_service& io_service, int af, short port) :
  182. io_service_(io_service),
  183. acceptor_(io_service,
  184. tcp::endpoint(af == AF_INET6 ? tcp::v6() : tcp::v4(), port)),
  185. listening_(new TCPClient(io_service_))
  186. {
  187. // XXX: isn't the following exception free? Need to check it.
  188. acceptor_.async_accept(listening_->getSocket(),
  189. boost::bind(&TCPServer::handleAccept, this,
  190. listening_, placeholders::error));
  191. }
  192. ~TCPServer() { delete listening_; }
  193. void handleAccept(TCPClient* new_client,
  194. const boost::system::error_code& error)
  195. {
  196. if (!error) {
  197. assert(new_client == listening_);
  198. new_client->start();
  199. listening_ = new TCPClient(io_service_);
  200. acceptor_.async_accept(new_client->getSocket(),
  201. boost::bind(&TCPServer::handleAccept,
  202. this, listening_,
  203. placeholders::error));
  204. listening_ = new_client;
  205. } else {
  206. delete new_client;
  207. }
  208. }
  209. private:
  210. io_service& io_service_;
  211. tcp::acceptor acceptor_;
  212. TCPClient* listening_;
  213. };
  214. class UDPServer {
  215. public:
  216. UDPServer(io_service& io_service, int af, short port) :
  217. io_service_(io_service),
  218. socket_(io_service,
  219. udp::endpoint(af == AF_INET6 ? udp::v6() : udp::v4(), port)),
  220. response_buffer_(0),
  221. response_renderer_(response_buffer_),
  222. dns_message_(Message::PARSE)
  223. {
  224. startReceive();
  225. }
  226. void handleRequest(const boost::system::error_code& error,
  227. size_t bytes_recvd)
  228. {
  229. if (!error && bytes_recvd > 0) {
  230. InputBuffer request_buffer(data_, bytes_recvd);
  231. dns_message_.clear(Message::PARSE);
  232. response_renderer_.clear();
  233. if (auth_server->processMessage(request_buffer, dns_message_,
  234. response_renderer_, true,
  235. verbose_mode)) {
  236. socket_.async_send_to(
  237. boost::asio::buffer(response_buffer_.getData(),
  238. response_buffer_.getLength()),
  239. sender_endpoint_,
  240. boost::bind(&UDPServer::sendCompleted,
  241. this,
  242. placeholders::error,
  243. placeholders::bytes_transferred));
  244. } else {
  245. startReceive();
  246. }
  247. } else {
  248. startReceive();
  249. }
  250. }
  251. void sendCompleted(const boost::system::error_code& error UNUSED_PARAM,
  252. size_t bytes_sent UNUSED_PARAM)
  253. {
  254. // Even if error occurred there's nothing to do. Simply handle
  255. // the next request.
  256. startReceive();
  257. }
  258. private:
  259. void startReceive() {
  260. socket_.async_receive_from(
  261. boost::asio::buffer(data_, MAX_LENGTH), sender_endpoint_,
  262. boost::bind(&UDPServer::handleRequest, this,
  263. placeholders::error,
  264. placeholders::bytes_transferred));
  265. }
  266. private:
  267. io_service& io_service_;
  268. udp::socket socket_;
  269. OutputBuffer response_buffer_;
  270. MessageRenderer response_renderer_;
  271. Message dns_message_;
  272. udp::endpoint sender_endpoint_;
  273. enum { MAX_LENGTH = 4096 };
  274. char data_[MAX_LENGTH];
  275. };
  276. struct ServerSet {
  277. ServerSet() : udp4_server(NULL), udp6_server(NULL),
  278. tcp4_server(NULL), tcp6_server(NULL)
  279. {}
  280. ~ServerSet()
  281. {
  282. delete udp4_server;
  283. delete udp6_server;
  284. delete tcp4_server;
  285. delete tcp6_server;
  286. }
  287. UDPServer* udp4_server;
  288. UDPServer* udp6_server;
  289. TCPServer* tcp4_server;
  290. TCPServer* tcp6_server;
  291. };
  292. static void
  293. run_server(const char* port, const bool use_ipv4, const bool use_ipv6,
  294. const string& specfile)
  295. {
  296. ServerSet servers;
  297. short portnum = atoi(port);
  298. ModuleCCSession cs(specfile, io_service_, my_config_handler,
  299. my_command_handler);
  300. if (use_ipv4) {
  301. servers.udp4_server = new UDPServer(io_service_, AF_INET, portnum);
  302. servers.tcp4_server = new TCPServer(io_service_, AF_INET, portnum);
  303. }
  304. if (use_ipv6) {
  305. servers.udp6_server = new UDPServer(io_service_, AF_INET6, portnum);
  306. servers.tcp6_server = new TCPServer(io_service_, AF_INET6, portnum);
  307. }
  308. cout << "Server started." << endl;
  309. io_service_.run();
  310. }
  311. }
  312. #else // !HAVE_BOOSTLIB
  313. struct SocketSet {
  314. SocketSet() : ups4(-1), tps4(-1), ups6(-1), tps6(-1) {}
  315. ~SocketSet()
  316. {
  317. if (ups4 >= 0) {
  318. close(ups4);
  319. }
  320. if (tps4 >= 0) {
  321. close(tps4);
  322. }
  323. if (ups6 >= 0) {
  324. close(ups6);
  325. }
  326. if (tps4 >= 0) {
  327. close(tps6);
  328. }
  329. }
  330. int ups4, tps4, ups6, tps6;
  331. };
  332. static int
  333. getUDPSocket(int af, const char* port) {
  334. struct addrinfo hints, *res;
  335. memset(&hints, 0, sizeof(hints));
  336. hints.ai_family = af;
  337. hints.ai_socktype = SOCK_DGRAM;
  338. hints.ai_flags = AI_PASSIVE;
  339. hints.ai_protocol = IPPROTO_UDP;
  340. int error = getaddrinfo(NULL, port, &hints, &res);
  341. if (error != 0) {
  342. isc_throw(FatalError, "getaddrinfo failed: " << gai_strerror(error));
  343. }
  344. int s = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
  345. if (s < 0) {
  346. isc_throw(FatalError, "failed to open socket");
  347. }
  348. if (af == AF_INET6) {
  349. int on = 1;
  350. if (setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, &on, sizeof(on)) < 0) {
  351. cerr << "couldn't set IPV6_V6ONLY socket option" << endl;
  352. // proceed anyway
  353. }
  354. }
  355. if (bind(s, res->ai_addr, res->ai_addrlen) < 0) {
  356. isc_throw(FatalError, "binding socket failure");
  357. }
  358. return (s);
  359. }
  360. static int
  361. getTCPSocket(int af, const char* port) {
  362. struct addrinfo hints, *res;
  363. memset(&hints, 0, sizeof(hints));
  364. hints.ai_family = af;
  365. hints.ai_socktype = SOCK_STREAM;
  366. hints.ai_flags = AI_PASSIVE;
  367. hints.ai_protocol = IPPROTO_TCP;
  368. int error = getaddrinfo(NULL, port, &hints, &res);
  369. if (error != 0) {
  370. isc_throw(FatalError, "getaddrinfo failed: " << gai_strerror(error));
  371. }
  372. int s = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
  373. if (s < 0) {
  374. isc_throw(FatalError, "failed to open socket");
  375. }
  376. int on = 1;
  377. if (af == AF_INET6) {
  378. if (setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, &on, sizeof(on)) < 0) {
  379. cerr << "couldn't set IPV6_V6ONLY socket option" << endl;
  380. }
  381. }
  382. if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)) < 0) {
  383. cerr << "couldn't set SO_REUSEADDR socket option" << endl;
  384. }
  385. if (bind(s, res->ai_addr, res->ai_addrlen) < 0) {
  386. isc_throw(FatalError, "binding socket failure");
  387. }
  388. listen(s, 100);
  389. return (s);
  390. }
  391. static void
  392. processMessageUDP(const int fd, Message& dns_message,
  393. MessageRenderer& response_renderer)
  394. {
  395. struct sockaddr_storage ss;
  396. socklen_t sa_len = sizeof(ss);
  397. struct sockaddr* sa = static_cast<struct sockaddr*>((void*)&ss);
  398. char recvbuf[4096];
  399. int cc;
  400. dns_message.clear(Message::PARSE);
  401. response_renderer.clear();
  402. if ((cc = recvfrom(fd, recvbuf, sizeof(recvbuf), 0, sa, &sa_len)) > 0) {
  403. InputBuffer buffer(recvbuf, cc);
  404. if (auth_server->processMessage(buffer, dns_message, response_renderer,
  405. true, verbose_mode)) {
  406. sendto(fd, response_renderer.getData(),
  407. response_renderer.getLength(), 0, sa, sa_len);
  408. }
  409. }
  410. }
  411. static void
  412. processMessageTCP(const int fd, Message& dns_message,
  413. MessageRenderer& response_renderer)
  414. {
  415. struct sockaddr_storage ss;
  416. socklen_t sa_len = sizeof(ss);
  417. struct sockaddr* sa = static_cast<struct sockaddr*>((void*)&ss);
  418. char sizebuf[2];
  419. int cc;
  420. int ts = accept(fd, sa, &sa_len);
  421. if (verbose_mode) {
  422. cerr << "[XX] process TCP" << endl;
  423. }
  424. cc = recv(ts, sizebuf, 2, 0);
  425. if (verbose_mode) {
  426. cerr << "[XX] got: " << cc << endl;
  427. }
  428. uint16_t size, size_n;
  429. memcpy(&size_n, sizebuf, 2);
  430. size = ntohs(size_n);
  431. if (verbose_mode) {
  432. cerr << "[XX] got: " << size << endl;
  433. }
  434. vector<char> message_buffer;
  435. message_buffer.reserve(size);
  436. cc = 0;
  437. while (cc < size) {
  438. if (verbose_mode) {
  439. cerr << "[XX] cc now: " << cc << " of " << size << endl;
  440. }
  441. cc += recv(ts, &message_buffer[0] + cc, size - cc, 0);
  442. }
  443. InputBuffer buffer(&message_buffer[0], size);
  444. dns_message.clear(Message::PARSE);
  445. response_renderer.clear();
  446. if (auth_server->processMessage(buffer, dns_message, response_renderer,
  447. false, verbose_mode)) {
  448. size = response_renderer.getLength();
  449. size_n = htons(size);
  450. if (send(ts, &size_n, 2, 0) == 2) {
  451. cc = send(ts, response_renderer.getData(),
  452. response_renderer.getLength(), 0);
  453. if (cc == -1) {
  454. if (verbose_mode) {
  455. cerr << "[AuthSrv] error in sending TCP response message" <<
  456. endl;
  457. }
  458. } else {
  459. if (verbose_mode) {
  460. cerr << "[XX] sent TCP response: " << cc << " bytes"
  461. << endl;
  462. }
  463. }
  464. }
  465. }
  466. // TODO: we don't check for more queries on the stream atm
  467. close(ts);
  468. }
  469. static void
  470. run_server(const char* port, const bool use_ipv4, const bool use_ipv6,
  471. const string& specfile)
  472. {
  473. SocketSet socket_set;
  474. fd_set fds_base;
  475. int nfds = -1;
  476. FD_ZERO(&fds_base);
  477. if (use_ipv4) {
  478. socket_set.ups4 = getUDPSocket(AF_INET, port);
  479. FD_SET(socket_set.ups4, &fds_base);
  480. nfds = max(nfds, socket_set.ups4);
  481. socket_set.tps4 = getTCPSocket(AF_INET, port);
  482. FD_SET(socket_set.tps4, &fds_base);
  483. nfds = max(nfds, socket_set.tps4);
  484. }
  485. if (use_ipv6) {
  486. socket_set.ups6 = getUDPSocket(AF_INET6, port);
  487. FD_SET(socket_set.ups6, &fds_base);
  488. nfds = max(nfds, socket_set.ups6);
  489. socket_set.tps6 = getTCPSocket(AF_INET6, port);
  490. FD_SET(socket_set.tps6, &fds_base);
  491. nfds = max(nfds, socket_set.tps6);
  492. }
  493. ++nfds;
  494. ModuleCCSession cs(specfile, my_config_handler, my_command_handler);
  495. cout << "Server started." << endl;
  496. int ss = cs.getSocket();
  497. Message dns_message(Message::PARSE);
  498. OutputBuffer resonse_buffer(0);
  499. MessageRenderer response_renderer(resonse_buffer);
  500. running = true;
  501. while (running) {
  502. fd_set fds = fds_base;
  503. FD_SET(ss, &fds);
  504. ++nfds;
  505. int n = select(nfds, &fds, NULL, NULL, NULL);
  506. if (n < 0) {
  507. if (errno != EINTR) {
  508. isc_throw(FatalError, "select error");
  509. }
  510. continue;
  511. }
  512. if (socket_set.ups4 >= 0 && FD_ISSET(socket_set.ups4, &fds)) {
  513. processMessageUDP(socket_set.ups4, dns_message, response_renderer);
  514. }
  515. if (socket_set.ups6 >= 0 && FD_ISSET(socket_set.ups6, &fds)) {
  516. processMessageUDP(socket_set.ups6, dns_message, response_renderer);
  517. }
  518. if (socket_set.tps4 >= 0 && FD_ISSET(socket_set.tps4, &fds)) {
  519. processMessageTCP(socket_set.tps4, dns_message, response_renderer);
  520. }
  521. if (socket_set.tps6 >= 0 && FD_ISSET(socket_set.tps6, &fds)) {
  522. processMessageTCP(socket_set.tps6, dns_message, response_renderer);
  523. }
  524. if (FD_ISSET(ss, &fds)) {
  525. cs.checkCommand();
  526. }
  527. }
  528. }
  529. #endif // HAVE_BOOSTLIB
  530. static void
  531. usage() {
  532. cerr << "Usage: b10-auth [-p port] [-4|-6]" << endl;
  533. exit(1);
  534. }
  535. int
  536. main(int argc, char* argv[]) {
  537. int ch;
  538. const char* port = DNSPORT;
  539. bool ipv4_only = false, ipv6_only = false;
  540. bool use_ipv4 = false, use_ipv6 = false;
  541. while ((ch = getopt(argc, argv, "46p:v")) != -1) {
  542. switch (ch) {
  543. case '4':
  544. ipv4_only = true;
  545. break;
  546. case '6':
  547. ipv6_only = true;
  548. break;
  549. case 'p':
  550. port = optarg;
  551. break;
  552. case 'v':
  553. verbose_mode = true;
  554. break;
  555. case '?':
  556. default:
  557. usage();
  558. }
  559. }
  560. if (argc - optind > 0) {
  561. usage();
  562. }
  563. if (ipv4_only && ipv6_only) {
  564. cerr << "-4 and -6 can't coexist" << endl;
  565. usage();
  566. }
  567. if (!ipv6_only) {
  568. use_ipv4 = true;
  569. }
  570. if (!ipv4_only) {
  571. use_ipv4 = true;
  572. }
  573. auth_server = new AuthSrv;
  574. // initialize command channel
  575. int ret = 0;
  576. try {
  577. string specfile;
  578. if (getenv("B10_FROM_SOURCE")) {
  579. specfile = string(getenv("B10_FROM_SOURCE")) +
  580. "/src/bin/auth/auth.spec";
  581. } else {
  582. specfile = string(AUTH_SPECFILE_LOCATION);
  583. }
  584. run_server(port, use_ipv4, use_ipv6, specfile);
  585. } catch (const std::exception& ex) {
  586. cerr << ex.what() << endl;
  587. ret = 1;
  588. }
  589. delete auth_server;
  590. return (ret);
  591. }