chiark / gitweb /
Allow admin clients to filter out async messages. Send notifications
[tripe] / admin.c
CommitLineData
410c8acf 1/* -*-c-*-
2 *
2d752320 3 * $Id$
410c8acf 4 *
5 * Admin interface for configuration
6 *
7 * (c) 2001 Straylight/Edgeware
8 */
9
10/*----- Licensing notice --------------------------------------------------*
11 *
12 * This file is part of Trivial IP Encryption (TrIPE).
13 *
14 * TrIPE is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
18 *
19 * TrIPE is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
23 *
24 * You should have received a copy of the GNU General Public License
25 * along with TrIPE; if not, write to the Free Software Foundation,
26 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
27 */
28
410c8acf 29/*----- Header files ------------------------------------------------------*/
30
31#include "tripe.h"
32
33/*----- Global variables --------------------------------------------------*/
34
35#ifndef NTRACE
36
37const trace_opt tr_opts[] = {
38 { 't', T_TUNNEL, "tunnel events" },
39 { 'r', T_PEER, "peer events" },
40 { 'a', T_ADMIN, "admin interface" },
41 { 'p', T_PACKET, "packet contents" },
42 { 'c', T_CRYPTO, "crypto details" },
43 { 's', T_KEYSET, "symmetric keyset management" },
44 { 'x', T_KEYEXCH, "key exchange" },
45 { 'm', T_KEYMGMT, "key management" },
46 { 'A', T_ALL, "all of the above" },
47 { 0, 0, 0 }
48};
49
50unsigned tr_flags = 0;
51#endif
52
3cdc3f3a 53static const trace_opt w_opts[] = {
54 { 't', AF_TRACE, "trace messages" },
55 { 'n', AF_NOTE, "asynchronous notifications" },
56 { 'w', AF_WARN, "warnings" },
57 { 'A', AF_ALLMSGS, "all of the above" },
58 { 0, 0, 0 }
59};
60
410c8acf 61/*----- Static variables --------------------------------------------------*/
62
63static admin *admins;
64static sel_file sock;
65static const char *sockname;
66static unsigned flags = 0;
67static admin *a_stdin = 0;
68static sig s_term, s_int, s_hup;
69
70#define F_DAEMON 1u
71#define F_INIT 2u
72
73#define T_RESOLVE SEC(30)
74
fd3cf232 75static void a_destroy(admin */*a*/);
76static void a_lock(admin */*a*/);
77static void a_unlock(admin */*a*/);
78
79/*----- Output functions --------------------------------------------------*/
80
3cdc3f3a 81/* --- @mystrieq@ --- *
82 *
83 * Arguments: @const char *x, *y@ = two strings
84 *
85 * Returns: True if @x@ and @y are equal, up to case.
86 */
87
88static int mystrieq(const char *x, const char *y)
89{
90 for (;;) {
91 if (!*x && !*y) return (1);
92 if (tolower((unsigned char)*x) != tolower((unsigned char)*y))
93 return (0);
94 x++; y++;
95 }
96}
97
fd3cf232 98/* --- @trywrite@ --- *
99 *
100 * Arguments: @admin *a@ = pointer to an admin block
101 * @const char *p@ = pointer to buffer to write
102 * @size_t sz@ = size of data to write
103 *
104 * Returns: The number of bytes written, or less than zero on error.
105 *
106 * Use: Attempts to write data to a client.
107 */
108
109static ssize_t trywrite(admin *a, const char *p, size_t sz)
110{
111 ssize_t n, done = 0;
112
113again:
114 if (!sz)
115 return (done);
116 n = write(a->w.fd, p, sz);
117 if (n > 0) {
118 done += n;
119 p += n;
120 sz -= n;
121 goto again;
122 }
123 if (n < 0) {
124 if (errno == EINTR)
125 goto again;
126 if (errno != EAGAIN && errno != EWOULDBLOCK) {
127 a_destroy(a);
3cdc3f3a 128 a_warn("ADMIN client-read-error -- %s", strerror(errno));
fd3cf232 129 return (-1);
130 }
131 }
132 return (done);
133}
134
135/* --- @dosend@ --- *
136 *
137 * Arguemnts: @admin *a@ = pointer to an admin block
138 * @const char *p@ = pointer to buffer to write
139 * @size_t sz@ = size of data to write
140 *
141 * Returns: ---
142 *
143 * Use: Sends data to an admin client.
144 */
145
146static void dosend(admin *a, const char *p, size_t sz)
147{
148 ssize_t n;
149 obuf *o;
150
151 if (a->f & AF_DEAD)
152 return;
153
154 /* --- Try to send the data immediately --- */
155
156 if (!a->o_head) {
157 if ((n = trywrite(a, p, sz)) < 0)
158 return;
159 p += n;
160 sz -= n;
161 if (!sz)
162 return;
163 }
164
165 /* --- Fill buffers with the data until it's all gone --- */
166
167 o = a->o_tail;
168 if (!o)
169 sel_addfile(&a->w);
170 else if (o->p_in < o->buf + OBUFSZ)
171 goto noalloc;
172
173 do {
174 o = xmalloc(sizeof(obuf));
175 o->next = 0;
176 o->p_in = o->p_out = o->buf;
177 if (a->o_tail)
178 a->o_tail->next = o;
179 else
180 a->o_head = o;
181 a->o_tail = o;
182
183 noalloc:
184 n = o->buf + OBUFSZ - o->p_in;
185 if (n > sz)
186 n = sz;
187 memcpy(o->p_in, p, n);
188 o->p_in += n;
189 p += n;
190 sz -= n;
191 } while (sz);
192}
193
194/* --- @a_flush@ --- *
195 *
196 * Arguments: @int fd@ = file descriptor
197 * @unsigned mode@ = what's happening
198 * @void *v@ = pointer to my admin block
199 *
200 * Returns: ---
201 *
202 * Use: Flushes buffers when a client is ready to read again.
203 */
204
205static void a_flush(int fd, unsigned mode, void *v)
206{
207 admin *a = v;
208 obuf *o, *oo;
209 ssize_t n;
210
211 o = a->o_head;
212 while (o) {
213 if ((n = trywrite(a, o->p_out, o->p_in - o->p_out)) < 0)
214 return;
215 o->p_out += n;
216 if (o->p_in < o->p_out)
217 break;
218 oo = o;
219 o = o->next;
220 xfree(oo);
221 }
222 a->o_head = o;
223 if (!o) {
224 a->o_tail = 0;
225 sel_rmfile(&a->w);
226 }
227}
228
410c8acf 229/*----- Utility functions -------------------------------------------------*/
230
3cdc3f3a 231/* --- @a_write@, @a_vwrite@ --- *
410c8acf 232 *
233 * Arguments: @admin *a@ = admin connection to write to
3cdc3f3a 234 * @const char *tag@ = tag prefix string, or null
410c8acf 235 * @const char *fmt@ = pointer to format string
3cdc3f3a 236 * @va_list ap@ = arguments in list
410c8acf 237 * @...@ = other arguments
238 *
239 * Returns: ---
240 *
241 * Use: Sends a message to an admin connection.
242 */
243
3cdc3f3a 244static void a_vwrite(admin *a, const char *tag, const char *fmt, va_list ap)
410c8acf 245{
410c8acf 246 dstr d = DSTR_INIT;
3cdc3f3a 247 if (tag) {
248 dstr_puts(&d, tag);
249 if (fmt)
250 dstr_putc(&d, ' ');
251 }
252 if (fmt)
253 dstr_vputf(&d, fmt, &ap);
254 dstr_putc(&d, '\n');
255 dosend(a, d.buf, d.len);
256 dstr_destroy(&d);
257}
258
259static void a_write(admin *a, const char *tag, const char *fmt, ...)
260{
261 va_list ap;
410c8acf 262 va_start(ap, fmt);
3cdc3f3a 263 a_vwrite(a, tag, fmt, ap);
410c8acf 264 va_end(ap);
3cdc3f3a 265}
266
267/* --- @a_ok@, @a_info@, @a_fail@ --- *
268 *
269 * Arguments: @admin *a@ = connection
270 * @const char *fmt@ = format string
271 * @...@ = other arguments
272 *
273 * Returns: ---
274 *
275 * Use: Convenience functions for @a_write@.
276 */
277
278static void a_ok(admin *a) { a_write(a, "OK", 0); }
279
280static void a_info(admin *a, const char *fmt, ...)
281{
282 va_list ap;
283 va_start(ap, fmt);
284 a_vwrite(a, "INFO", fmt, ap);
285 va_end(ap);
286}
287
288static void a_fail(admin *a, const char *fmt, ...)
289{
290 va_list ap;
291 va_start(ap, fmt);
292 a_vwrite(a, "FAIL", fmt, ap);
293 va_end(ap);
294}
295
296/* --- @a_alert@, @a_valert@, @a_rawalert@ --- *
297 *
298 * Arguments: @unsigned f_and, f_eq@ = filter for connections
299 * @const char *tag@ = tag prefix string
300 * @const char *fmt@ = pointer to format string
301 @ @const char *p@ = pointer to raw string
302 * @size_t sz@ = size of raw string
303 * @va_list ap@ = arguments in list
304 * @...@ = other arguments
305 *
306 * Returns: ---
307 *
308 * Use: Write a message to all admin connections matched by the given
309 * filter.
310 */
311
312static void a_rawalert(unsigned f_and, unsigned f_eq, const char *tag,
313 const char *p, size_t sz)
314{
315 admin *a, *aa;
316 dstr d = DSTR_INIT;
317
318 if (!(flags & F_INIT))
319 return;
320 if (tag) {
321 dstr_puts(&d, tag);
322 if (p)
323 dstr_putc(&d, ' ');
324 }
325 if (p)
326 dstr_putm(&d, p, sz);
327 dstr_putc(&d, '\n');
328 p = d.buf;
329 sz = d.len;
330 for (a = admins; a; a = aa) {
331 aa = a->next;
332 if ((a->f & f_and) == f_eq)
333 dosend(a, d.buf, d.len);
334 }
410c8acf 335 dstr_destroy(&d);
336}
337
3cdc3f3a 338static void a_valert(unsigned f_and, unsigned f_eq, const char *tag,
339 const char *fmt, va_list ap)
340{
341 dstr d = DSTR_INIT;
342
343 if (!(flags & F_INIT))
344 return;
345 if (fmt)
346 dstr_vputf(&d, fmt, &ap);
347 a_rawalert(f_and, f_eq, tag, fmt ? d.buf : 0, fmt ? d.len : 0);
348 dstr_destroy(&d);
349}
350
351#if 0 /*unused*/
352static void a_alert(unsigned f_and, unsigned f_eq, const char *tag,
353 const char *fmt, ...)
354{
355 va_list ap;
356 va_start(ap, fmt);
357 a_valert(f_and, f_eq, tag, fmt, ap);
358 va_end(ap);
359}
360#endif
361
410c8acf 362/* --- @a_warn@ --- *
363 *
364 * Arguments: @const char *fmt@ = pointer to format string
365 * @...@ = other arguments
366 *
367 * Returns: ---
368 *
369 * Use: Informs all admin connections of a warning.
370 */
371
372void a_warn(const char *fmt, ...)
373{
374 va_list ap;
410c8acf 375
410c8acf 376 va_start(ap, fmt);
3cdc3f3a 377 if (flags & F_INIT)
378 a_valert(0, 0, "WARN", fmt, ap);
410c8acf 379 else {
3cdc3f3a 380 fprintf(stderr, "%s: ", QUIS);
381 vfprintf(stderr, fmt, ap);
382 fputc('\n', stderr);
410c8acf 383 }
3cdc3f3a 384 va_end(ap);
410c8acf 385}
386
387/* --- @a_trace@ --- *
388 *
389 * Arguments: @const char *p@ = pointer to a buffer
390 * @size_t sz@ = size of the buffer
391 * @void *v@ = uninteresting pointer
392 *
393 * Returns: ---
394 *
3cdc3f3a 395 * Use: Custom trace output handler. Sends trace messages to
396 * interested admin connections.
410c8acf 397 */
398
399#ifndef NTRACE
400static void a_trace(const char *p, size_t sz, void *v)
401{
3cdc3f3a 402 a_rawalert(AF_TRACE, AF_TRACE, "TRACE", p, sz);
410c8acf 403}
404#endif
405
3cdc3f3a 406/* --- @a_notify@ --- *
407 *
408 * Arguments: @const char *fmt@ = pointer to format string
409 * @...@ = other arguments
410 *
411 * Returns: ---
412 *
413 * Use: Sends a notification to interested admin connections.
414 */
415
416void a_notify(const char *fmt, ...)
417{
418 va_list ap;
419
420 va_start(ap, fmt);
421 a_valert(AF_NOTE, AF_NOTE, "NOTE", fmt, ap);
422 va_end(ap);
423}
424
410c8acf 425/* --- @a_quit@ --- *
426 *
427 * Arguments: ---
428 *
429 * Returns: ---
430 *
431 * Use: Shuts things down nicely.
432 */
433
434void a_quit(void)
435{
436 close(sock.fd);
437 unlink(sockname);
438 exit(0);
439}
440
441/* --- @a_sigdie@ --- *
442 *
443 * Arguments: @int sig@ = signal number
444 * @void *v@ = an uninteresting argument
445 *
446 * Returns: ---
447 *
448 * Use Shuts down on receipt of a fatal signal.
449 */
450
451static void a_sigdie(int sig, void *v)
452{
453 char *p;
454 char buf[20];
455
456 switch (sig) {
457 case SIGTERM: p = "SIGTERM"; break;
458 case SIGINT: p = "SIGINT"; break;
459 default:
3cdc3f3a 460 sprintf(buf, "%i", sig);
410c8acf 461 p = buf;
462 break;
463 }
3cdc3f3a 464 a_warn("SERVER quit signal %s", p);
410c8acf 465 a_quit();
466}
467
468/* --- @a_sighup@ --- *
469 *
470 * Arguments: @int sig@ = signal number
471 * @void *v@ = an uninteresting argument
472 *
473 * Returns: ---
474 *
475 * Use Logs a message about SIGHUP not being useful.
476 */
477
478static void a_sighup(int sig, void *v)
479{
3cdc3f3a 480 a_warn("SERVER ignore signal SIGHUP");
410c8acf 481}
482
483/*----- Adding peers ------------------------------------------------------*/
484
485/* --- @a_resolve@ --- *
486 *
487 * Arguments: @struct hostent *h@ = pointer to resolved hostname
488 * @void *v@ = pointer to admin block
489 *
490 * Returns: ---
491 *
492 * Use: Handles a completed name resolution.
493 */
494
495static void a_resolve(struct hostent *h, void *v)
496{
497 admin *a = v;
fd3cf232 498
499 a_lock(a);
410c8acf 500 T( trace(T_ADMIN, "admin: %u resolved", a->seq); )
8d0c7a83 501 TIMER;
410c8acf 502 sel_rmtimer(&a->t);
503 if (!h)
3cdc3f3a 504 a_fail(a, "resolve-error %s", a->paddr);
410c8acf 505 else if (p_find(a->pname))
3cdc3f3a 506 a_fail(a, "peer-exists %s", a->pname);
410c8acf 507 else {
508 memcpy(&a->peer.sin.sin_addr, h->h_addr, sizeof(struct in_addr));
509 if (!p_create(a->pname, &a->peer.sa, a->sasz))
3cdc3f3a 510 a_fail(a, "peer-create-fail %s" a->pname);
410c8acf 511 else
3cdc3f3a 512 a_ok(a);
410c8acf 513 }
514 xfree(a->pname);
515 xfree(a->paddr);
516 a->pname = 0;
517 selbuf_enable(&a->b);
fd3cf232 518 a_unlock(a);
410c8acf 519}
520
521/* --- @a_timer@ --- *
522 *
523 * Arguments: @struct timeval *tv@ = timer
524 * @void *v@ = pointer to admin block
525 *
526 * Returns: ---
527 *
528 * Use: Times out a resolver.
529 */
530
531static void a_timer(struct timeval *tv, void *v)
532{
533 admin *a = v;
fd3cf232 534
535 a_lock(a);
410c8acf 536 T( trace(T_ADMIN, "admin: %u resolver timeout", a->seq); )
537 bres_abort(&a->r);
3cdc3f3a 538 a_fail(a, "resolver-timeout %s\n", a->paddr);
410c8acf 539 xfree(a->pname);
540 xfree(a->paddr);
541 a->pname = 0;
542 selbuf_enable(&a->b);
fd3cf232 543 a_unlock(a);
410c8acf 544}
545
546/* --- @acmd_add@ --- *
547 *
548 * Arguments: @admin *a@ = connection which requested the addition
549 * @unsigned ac@ = argument count
550 * @char *av[]@ = pointer to the argument list
551 *
552 * Returns: ---
553 *
554 * Use: Adds a new peer.
555 */
556
557static void acmd_add(admin *a, unsigned ac, char *av[])
558{
559 unsigned long pt;
560 struct timeval tv;
3cdc3f3a 561 unsigned i;
410c8acf 562 char *p;
563
564 /* --- Make sure someone's not got there already --- */
565
566 if (p_find(av[0])) {
3cdc3f3a 567 a_fail(a, "peer-exists %s", av[0]);
410c8acf 568 return;
569 }
570
571 /* --- Fill in the easy bits of address --- */
572
573 BURN(a->peer);
3cdc3f3a 574 i = 1;
575 if (mystrieq(av[i], "inet")) i++;
576 if (ac - i != 2) {
577 a_fail(a, "bad-syntax -- add PEER [inet] ADDRESS PORT");
578 return;
579 }
410c8acf 580 a->peer.sin.sin_family = AF_INET;
581 a->sasz = sizeof(a->peer.sin);
3cdc3f3a 582 pt = strtoul(av[i + 1], &p, 0);
410c8acf 583 if (*p) {
3cdc3f3a 584 struct servent *s = getservbyname(av[i + 1], "udp");
410c8acf 585 if (!s) {
3cdc3f3a 586 a_fail(a, "unknown-service %s", av[i + 1]);
410c8acf 587 return;
588 }
589 pt = ntohs(s->s_port);
590 }
591 if (pt == 0 || pt >= 65536) {
3cdc3f3a 592 a_fail(a, "invalid-port %lu", pt);
410c8acf 593 return;
594 }
595 a->peer.sin.sin_port = htons(pt);
596
597 /* --- If the name is numeric, do it the easy way --- */
598
3cdc3f3a 599 if (inet_aton(av[i], &a->peer.sin.sin_addr)) {
410c8acf 600 if (!p_create(av[0], &a->peer.sa, a->sasz))
3cdc3f3a 601 a_fail(a, "peer-create-fail %s", a->pname);
410c8acf 602 else
3cdc3f3a 603 a_ok(a);
410c8acf 604 return;
605 }
606
607 /* --- Store everything for later and crank up the resolver --- *
608 *
609 * We disable the line buffer until the resolver completes (or times out).
610 * This prevents other commands on the same connection (though the rest of
611 * the system continues regardless), but makes life simpler for the client.
612 */
613
614 a->pname = xstrdup(av[0]);
3cdc3f3a 615 a->paddr = xstrdup(av[i]);
410c8acf 616 selbuf_disable(&a->b);
617 gettimeofday(&tv, 0);
618 tv.tv_sec += T_RESOLVE;
619 sel_addtimer(&sel, &a->t, &tv, a_timer, a);
620 bres_byname(&a->r, a->paddr, a_resolve, a);
621 T( trace(T_ADMIN, "admin: %u resolving hostname `%s'",
622 a->seq, a->paddr); )
623}
624
625/*----- Administration commands -------------------------------------------*/
626
627/* --- Miscellaneous commands --- */
628
3cdc3f3a 629/* --- @traceish@ --- *
630 *
631 * Arguments: @admin *a@ = connection to complain on
632 * @unsigned ac@ = number of arguments
633 * @char *av[]@ = vector of arguments
634 * @const char *what@ = what we're messing with
635 * @const trace_opt *tt@ = options table
636 * @unsigned *ff@ = where the flags are
637 *
638 * Returns: Nonzero if anything changed.
639 *
640 * Use: Guts of trace-ish commands like `trace' and `watch'.
641 */
410c8acf 642
3cdc3f3a 643static int traceish(admin *a, unsigned ac, char *av[],
644 const char *what, const trace_opt *tt, unsigned *ff)
410c8acf 645{
3cdc3f3a 646 int ch = 0;
647
410c8acf 648 if (!ac || strcmp(av[0], "?") == 0) {
649 const trace_opt *t;
3cdc3f3a 650 a_info(a, "Current %s status:", what);
651 for (t = tt; t->ch; t++) {
652 a_info(a, "%c %c %s",
653 t->ch, (*ff & t->f) == t->f ? '*' : ' ', t->help);
410c8acf 654 }
655 } else {
656 unsigned sense = 1;
3cdc3f3a 657 unsigned f = *ff;
658 const trace_opt *t;
410c8acf 659 char *p = av[0];
660
661 while (*p) {
662 switch (*p) {
663 case '+': sense = 1; break;
664 case '-': sense = 0; break;
665 default:
3cdc3f3a 666 for (t = tt; t->ch; t++) {
667 if (t->ch == *p) {
668 if (sense) f |= t->f;
669 else f &= ~t->f;
410c8acf 670 goto tropt_ok;
671 }
672 }
3cdc3f3a 673 a_fail(a, "bad-%s-option %c", what, *p);
674 return (0);
410c8acf 675 tropt_ok:;
676 break;
677 }
678 p++;
679 }
3cdc3f3a 680 *ff = f;
681 ch = 1;
410c8acf 682 }
3cdc3f3a 683 a_ok(a);
684 return (ch);
685}
686
687#ifndef NTRACE
688
689static void acmd_trace(admin *a, unsigned ac, char *av[])
690{
691 if (traceish(a, ac, av, "trace", tr_opts, &tr_flags))
692 trace_level(tr_flags);
410c8acf 693}
694
695#endif
696
3cdc3f3a 697static void acmd_watch(admin *a, unsigned ac, char *av[])
698{
699 traceish(a, ac, av, "watch", w_opts, &a->f);
700}
701
702static void quotify(dstr *d, const char *p)
703{
704 if (d->len)
705 dstr_putc(d, ' ');
706 if (*p && !p[strcspn(p, "\"' \t\n\v")])
707 dstr_puts(d, p);
708 else {
709 dstr_putc(d, '\"');
710 while (*p) {
711 if (*p == '\\' || *p == '\"')
712 dstr_putc(d, '\\');
713 dstr_putc(d, *p++);
714 }
715 dstr_putc(d, '\"');
716 }
717}
718
719static void alertcmd(admin *a, unsigned f_and, unsigned f_eq,
720 const char *tag, unsigned ac, char *av[])
721{
722 dstr d = DSTR_INIT;
723 unsigned i;
724
725 dstr_puts(&d, "USER");
726 for (i = 0; i < ac; i++)
727 quotify(&d, av[i]);
728 dstr_putz(&d);
729 a_rawalert(f_and, f_eq, tag, d.buf, d.len);
730 dstr_destroy(&d);
731 a_ok(a);
732}
733
734static void acmd_notify(admin *a, unsigned ac, char *av[])
735 { alertcmd(a, AF_NOTE, AF_NOTE, "NOTE", ac, av); }
736static void acmd_warn(admin *a, unsigned ac, char *av[])
737 { alertcmd(a, AF_WARN, AF_WARN, "WARN", ac, av); }
738
410c8acf 739static void acmd_port(admin *a, unsigned ac, char *av[])
740{
3cdc3f3a 741 a_info(a, "%u", p_port());
742 a_ok(a);
410c8acf 743}
744
410c8acf 745static void acmd_daemon(admin *a, unsigned ac, char *av[])
746{
747 if (flags & F_DAEMON)
3cdc3f3a 748 a_fail(a, "already-daemon");
410c8acf 749 else {
3cdc3f3a 750 a_notify("DAEMON");
93bee2c4 751 if (a_stdin)
410c8acf 752 a_destroy(a_stdin);
410c8acf 753 if (u_daemon())
3cdc3f3a 754 a_fail(a, "daemon-error -- %s", strerror(errno));
93bee2c4 755 else {
410c8acf 756 flags |= F_DAEMON;
3cdc3f3a 757 a_ok(a);
93bee2c4 758 }
410c8acf 759 }
760}
761
762static void acmd_list(admin *a, unsigned ac, char *av[])
763{
764 peer *p;
765 for (p = p_first(); p; p = p_next(p))
3cdc3f3a 766 a_info(a, "%s", p_name(p));
767 a_ok(a);
410c8acf 768}
769
770static void acmd_ifname(admin *a, unsigned ac, char *av[])
771{
772 peer *p;
773
774 if ((p = p_find(av[0])) == 0)
3cdc3f3a 775 a_fail(a, "unknown-peer %s", av[0]);
776 else {
777 a_info(a, "%s", p_ifname(p));
778 a_ok(a);
779 }
410c8acf 780}
781
782static void acmd_addr(admin *a, unsigned ac, char *av[])
783{
784 peer *p;
785 const addr *ad;
786
787 if ((p = p_find(av[0])) == 0)
3cdc3f3a 788 a_fail(a, "unknown-peer %s", av[0]);
410c8acf 789 else {
790 ad = p_addr(p);
791 assert(ad->sa.sa_family == AF_INET);
3cdc3f3a 792 a_info(a, "INET %s %u",
410c8acf 793 inet_ntoa(ad->sin.sin_addr),
794 (unsigned)ntohs(ad->sin.sin_port));
3cdc3f3a 795 a_ok(a);
410c8acf 796 }
797}
798
c7053da9 799static void acmd_stats(admin *a, unsigned ac, char *av[])
800{
801 peer *p;
802 stats *st;
803
804 if ((p = p_find(av[0])) == 0)
3cdc3f3a 805 a_fail(a, "unknown-peer %s", av[0]);
c7053da9 806 else {
807 st = p_stats(p);
3cdc3f3a 808 a_info(a, "start-time=%s", timestr(st->t_start));
809 a_info(a, "last-packet-time=%s", timestr(st->t_last));
810 a_info(a, "last-keyexch-time=%s", timestr(st->t_kx));
811 a_info(a, "packets-in=%lu bytes-in=%lu", st->n_in, st->sz_in);
812 a_info(a, "packets-out=%lu bytes-out=%lu",
c7053da9 813 st->n_out, st->sz_out);
3cdc3f3a 814 a_info(a, "keyexch-packets-in=%lu keyexch-bytes-in=%lu",
c7053da9 815 st->n_kxin, st->sz_kxin);
3cdc3f3a 816 a_info(a, "keyexch-packets-out=%lu keyexch-bytes-out=%lu",
c7053da9 817 st->n_kxout, st->sz_kxout);
3cdc3f3a 818 a_info(a, "ip-packets-in=%lu ip-bytes-in=%lu",
c7053da9 819 st->n_ipin, st->sz_ipin);
3cdc3f3a 820 a_info(a, "ip-packets-out=%lu ip-bytes-out=%lu",
c7053da9 821 st->n_ipout, st->sz_ipout);
3cdc3f3a 822 a_info(a, "rejected-packets=%lu", st->n_reject);
823 a_ok(a);
c7053da9 824 }
825}
826
410c8acf 827static void acmd_kill(admin *a, unsigned ac, char *av[])
828{
829 peer *p;
830 if ((p = p_find(av[0])) == 0)
3cdc3f3a 831 a_fail(a, "unknown-peer %s", av[0]);
410c8acf 832 else {
833 p_destroy(p);
3cdc3f3a 834 a_ok(a);
410c8acf 835 }
836}
837
838static void acmd_quit(admin *a, unsigned ac, char *av[])
839{
3cdc3f3a 840 a_warn("SERVER quit admin-request");
841 a_ok(a);
410c8acf 842 a_quit();
843}
844
3cdc3f3a 845static void acmd_version(admin *a, unsigned ac, char *av[])
846{
847 a_info(a, "%s %s", PACKAGE, VERSION);
848 a_ok(a);
849}
850
410c8acf 851/* --- The command table and help --- */
852
853typedef struct acmd {
854 const char *name;
855 const char *help;
856 unsigned argmin, argmax;
857 void (*func)(admin */*a*/, unsigned /*ac*/, char */*av*/[]);
858} acmd;
859
860static void acmd_help(admin */*a*/, unsigned /*ac*/, char */*av*/[]);
861
862static const acmd acmdtab[] = {
2d752320 863 { "help", "help", 0, 0, acmd_help },
3cdc3f3a 864 { "version", "version", 0, 0, acmd_version },
410c8acf 865#ifndef NTRACE
2d752320 866 { "trace", "trace [OPTIONS]", 0, 1, acmd_trace },
410c8acf 867#endif
3cdc3f3a 868 { "watch", "watch [OPTIONS]", 0, 1, acmd_watch },
869 { "notify", "notify MESSAGE ...", 1, 0xffff, acmd_notify },
870 { "warn", "warn MESSAGE ...", 1, 0xffff, acmd_warn },
2d752320 871 { "port", "port", 0, 0, acmd_port },
872 { "daemon", "daemon", 0, 0, acmd_daemon },
873 { "list", "list", 0, 0, acmd_list },
874 { "ifname", "ifname PEER", 1, 1, acmd_ifname },
875 { "addr", "addr PEER", 1, 1, acmd_addr },
876 { "stats", "stats PEER", 1, 1, acmd_stats },
877 { "kill", "kill PEER", 1, 1, acmd_kill },
3cdc3f3a 878 { "add", "add PEER ADDR ...", 2, 0xffff, acmd_add },
2d752320 879 { "quit", "quit", 0, 0, acmd_quit },
410c8acf 880 { 0, 0, 0, 0, 0 }
881};
882
883static void acmd_help(admin *a, unsigned ac, char *av[])
884{
885 const acmd *c;
886 for (c = acmdtab; c->name; c++)
3cdc3f3a 887 a_info(a, "%s", c->help);
888 a_ok(a);
410c8acf 889}
890
891/*----- Connection handling -----------------------------------------------*/
892
fd3cf232 893/* --- @a_lock@ --- *
410c8acf 894 *
895 * Arguments: @admin *a@ = pointer to an admin block
896 *
897 * Returns: ---
898 *
fd3cf232 899 * Use: Locks an admin block so that it won't be destroyed
900 * immediately.
410c8acf 901 */
902
fd3cf232 903static void a_lock(admin *a) { assert(!(a->f & AF_LOCK)); a->f |= AF_LOCK; }
904
905/* --- @a_unlock@ --- *
906 *
907 * Arguments: @admin *a@ = pointer to an admin block
908 *
909 * Returns: ---
910 *
911 * Use: Unlocks an admin block, allowing its destruction. This is
912 * also the second half of @a_destroy@.
913 */
914
915static void a_unlock(admin *a)
410c8acf 916{
fd3cf232 917 assert(a->f & AF_LOCK);
918 if (!(a->f & AF_DEAD)) {
919 a->f &= ~AF_LOCK;
920 return;
921 }
922
923 T( trace(T_ADMIN, "admin: completing destruction of connection %u",
924 a->seq); )
925
410c8acf 926 selbuf_destroy(&a->b);
410c8acf 927 if (a->pname) {
928 xfree(a->pname);
929 xfree(a->paddr);
930 bres_abort(&a->r);
931 sel_rmtimer(&a->t);
932 }
fd3cf232 933 if (a->b.reader.fd != a->w.fd)
934 close(a->b.reader.fd);
935 close(a->w.fd);
936
937 if (a_stdin == a)
938 a_stdin = 0;
410c8acf 939 if (a->next)
940 a->next->prev = a->prev;
941 if (a->prev)
942 a->prev->next = a->next;
943 else
944 admins = a->next;
410c8acf 945 DESTROY(a);
946}
947
fd3cf232 948/* --- @a_destroy@ --- *
949 *
950 * Arguments: @admin *a@ = pointer to an admin block
951 *
952 * Returns: ---
953 *
954 * Use: Destroys an admin block. This requires a certain amount of
955 * care.
956 */
957
958static void a_destroy(admin *a)
959{
960 /* --- Don't multiply destroy admin blocks --- */
961
962 if (a->f & AF_DEAD)
963 return;
964
965 /* --- Make sure nobody expects it to work --- */
966
967 a->f |= AF_DEAD;
968 T( trace(T_ADMIN, "admin: destroying connection %u", a->seq); )
969
970 /* --- Free the output buffers --- */
971
972 if (a->o_head) {
973 obuf *o, *oo;
974 sel_rmfile(&a->w);
975 for (o = a->o_head; o; o = oo) {
976 oo = o->next;
977 xfree(o);
978 }
979 a->o_head = 0;
980 }
981
982 /* --- If the block is locked, that's all we can manage --- */
983
984 if (a->f & AF_LOCK) {
985 T( trace(T_ADMIN, "admin: deferring destruction..."); )
986 return;
987 }
988 a->f |= AF_LOCK;
989 a_unlock(a);
990}
991
410c8acf 992/* --- @a_line@ --- *
993 *
994 * Arguments: @char *p@ = pointer to the line read
3008eabf 995 * @size_t len@ = length of the line
410c8acf 996 * @void *vp@ = pointer to my admin block
997 *
998 * Returns: ---
999 *
1000 * Use: Handles a line of input.
1001 */
1002
3008eabf 1003static void a_line(char *p, size_t len, void *vp)
410c8acf 1004{
1005 admin *a = vp;
1006 const acmd *c;
3cdc3f3a 1007 char *av[16];
410c8acf 1008 size_t ac;
1009
8d0c7a83 1010 TIMER;
fd3cf232 1011 if (a->f & AF_DEAD)
1012 return;
410c8acf 1013 if (!p) {
1014 a_destroy(a);
1015 return;
1016 }
3cdc3f3a 1017 ac = str_qsplit(p, av, 16, 0, STRF_QUOTE);
410c8acf 1018 if (!ac)
1019 return;
410c8acf 1020 for (c = acmdtab; c->name; c++) {
3cdc3f3a 1021 if (mystrieq(av[0], c->name)) {
410c8acf 1022 ac--;
1023 if (c->argmin > ac || ac > c->argmax)
3cdc3f3a 1024 a_fail(a, "bad-syntax -- %s", c->help);
fd3cf232 1025 else {
1026 a_lock(a);
410c8acf 1027 c->func(a, ac, av + 1);
fd3cf232 1028 a_unlock(a);
1029 }
410c8acf 1030 return;
1031 }
1032 }
3cdc3f3a 1033 a_fail(a, "unknown-command %s", av[0]);
410c8acf 1034}
1035
1036/* --- @a_create@ --- *
1037 *
1038 * Arguments: @int fd_in, fd_out@ = file descriptors to use
3cdc3f3a 1039 * @unsigned f@ = initial flags to set
410c8acf 1040 *
1041 * Returns: ---
1042 *
1043 * Use: Creates a new admin connection.
1044 */
1045
3cdc3f3a 1046void a_create(int fd_in, int fd_out, unsigned f)
410c8acf 1047{
1048 admin *a = CREATE(admin);
3cdc3f3a 1049
93bee2c4 1050 T( static unsigned seq = 0;
1051 a->seq = seq++; )
410c8acf 1052 T( trace(T_ADMIN, "admin: accepted connection %u", a->seq); )
1053 a->pname = 0;
3cdc3f3a 1054 a->f = f;
410c8acf 1055 if (fd_in == STDIN_FILENO)
1056 a_stdin = a;
fd3cf232 1057 fdflags(fd_in, O_NONBLOCK, O_NONBLOCK, FD_CLOEXEC, FD_CLOEXEC);
410c8acf 1058 if (fd_out != fd_in)
fd3cf232 1059 fdflags(fd_out, O_NONBLOCK, O_NONBLOCK, FD_CLOEXEC, FD_CLOEXEC);
410c8acf 1060 selbuf_init(&a->b, &sel, fd_in, a_line, a);
fd3cf232 1061 sel_initfile(&sel, &a->w, fd_out, SEL_WRITE, a_flush, a);
1062 a->o_head = 0;
1063 a->o_tail = 0;
410c8acf 1064 a->next = admins;
1065 a->prev = 0;
1066 if (admins)
1067 admins->prev = a;
1068 admins = a;
1069}
1070
1071/* --- @a_accept@ --- *
1072 *
1073 * Arguments: @int fd@ = file descriptor to accept
1074 * @unsigned mode@ = what to do
1075 * @void *v@ = uninteresting pointer
1076 *
1077 * Returns: ---
1078 *
1079 * Use: Accepts a new admin connection.
1080 */
1081
1082static void a_accept(int fd, unsigned mode, void *v)
1083{
1084 int nfd;
1085 struct sockaddr_un sun;
1086 size_t sz = sizeof(sun);
1087
1088 if ((nfd = accept(fd, (struct sockaddr *)&sun, &sz)) < 0) {
1ecee057 1089 if (errno != EINTR && errno != EAGAIN && errno != EWOULDBLOCK &&
1090 errno != ECONNABORTED && errno != EPROTO)
3cdc3f3a 1091 a_warn("ADMIN accept-error -- %s", strerror(errno));
410c8acf 1092 return;
1093 }
3cdc3f3a 1094 a_create(nfd, nfd, 0);
410c8acf 1095}
1096
1097/* --- @a_daemon@ --- *
1098 *
1099 * Arguments: ---
1100 *
1101 * Returns: ---
1102 *
1103 * Use: Informs the admin module that it's a daemon.
1104 */
1105
1106void a_daemon(void)
1107{
1108 flags |= F_DAEMON;
1109}
1110
1111/* --- @a_init@ --- *
1112 *
1113 * Arguments: @const char *name@ = socket name to create
1114 *
1115 * Returns: ---
1116 *
1117 * Use: Creates the admin listening socket.
1118 */
1119
1120void a_init(const char *name)
1121{
1122 int fd;
1123 int n = 5;
1124 struct sockaddr_un sun;
1125 struct sigaction sa;
1126 size_t sz;
1127
1128 /* --- Set up the socket address --- */
1129
1130 sz = strlen(name) + 1;
1131 if (sz > sizeof(sun.sun_path))
1132 die(EXIT_FAILURE, "socket name `%s' too long", name);
1133 BURN(sun);
1134 sun.sun_family = AF_UNIX;
1135 memcpy(sun.sun_path, name, sz);
1136 sz += offsetof(struct sockaddr_un, sun_path);
1137
1138 /* --- Attempt to bind to the socket --- */
1139
1140 umask(0077);
1141again:
1142 if ((fd = socket(PF_UNIX, SOCK_STREAM, 0)) < 0)
1143 die(EXIT_FAILURE, "couldn't create socket: %s", strerror(errno));
1144 if (bind(fd, (struct sockaddr *)&sun, sz) < 0) {
1145 struct stat st;
1146 int e = errno;
1147 if (errno != EADDRINUSE) {
1148 die(EXIT_FAILURE, "couldn't bind to address `%s': %s",
1149 sun.sun_path, strerror(e));
1150 }
1151 if (!n)
1152 die(EXIT_FAILURE, "too many retries; giving up");
1153 n--;
1154 if (!connect(fd, (struct sockaddr *)&sun, sz)) {
1155 die(EXIT_FAILURE, "server already listening on admin socket `%s'",
1156 sun.sun_path);
1157 }
1158 if (errno != ECONNREFUSED)
1159 die(EXIT_FAILURE, "couldn't bind to address: %s", strerror(e));
1160 if (stat(sun.sun_path, &st)) {
1161 die(EXIT_FAILURE, "couldn't stat `%s': %s",
1162 sun.sun_path, strerror(errno));
1163 }
1164 if (!S_ISSOCK(st.st_mode))
1165 die(EXIT_FAILURE, "object `%s' isn't a socket", sun.sun_path);
c7053da9 1166 T( trace(T_ADMIN, "admin: stale socket found; removing it"); )
410c8acf 1167 unlink(sun.sun_path);
1168 close(fd);
1169 goto again;
1170 }
1171 chmod(sun.sun_path, 0600);
1172 fdflags(fd, O_NONBLOCK, O_NONBLOCK, FD_CLOEXEC, FD_CLOEXEC);
1173 if (listen(fd, 5))
1174 die(EXIT_FAILURE, "couldn't listen on socket: %s", strerror(errno));
1175
1176 /* --- Listen to the socket --- */
1177
1178 sel_initfile(&sel, &sock, fd, SEL_READ, a_accept, 0);
1179 sel_addfile(&sock);
1180 sockname = name;
1181 bres_init(&sel);
1182 T( trace_custom(a_trace, 0);
1183 trace(T_ADMIN, "admin: enabled custom tracing"); )
1184 flags |= F_INIT;
1185
1186 /* --- Set up signal handlers --- */
1187
1188 sig_add(&s_term, SIGTERM, a_sigdie, 0);
1189 sig_add(&s_hup, SIGHUP, a_sighup, 0);
3cdc3f3a 1190 signal(SIGPIPE, SIG_IGN);
410c8acf 1191 sigaction(SIGINT, 0, &sa);
1192 if (sa.sa_handler != SIG_IGN)
1193 sig_add(&s_int, SIGINT, a_sigdie, 0);
1194}
1195
1196/*----- That's all, folks -------------------------------------------------*/