chiark / gitweb /
Stuff more randomness into the pool in the interval timer.
[tripe] / admin.c
CommitLineData
410c8acf 1/* -*-c-*-
2 *
3 * $Id: admin.c,v 1.1 2001/02/03 20:26:37 mdw Exp $
4 *
5 * Admin interface for configuration
6 *
7 * (c) 2001 Straylight/Edgeware
8 */
9
10/*----- Licensing notice --------------------------------------------------*
11 *
12 * This file is part of Trivial IP Encryption (TrIPE).
13 *
14 * TrIPE is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
18 *
19 * TrIPE is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
23 *
24 * You should have received a copy of the GNU General Public License
25 * along with TrIPE; if not, write to the Free Software Foundation,
26 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
27 */
28
29/*----- Revision history --------------------------------------------------*
30 *
31 * $Log: admin.c,v $
32 * Revision 1.1 2001/02/03 20:26:37 mdw
33 * Initial checkin.
34 *
35 */
36
37/*----- Header files ------------------------------------------------------*/
38
39#include "tripe.h"
40
41/*----- Global variables --------------------------------------------------*/
42
43#ifndef NTRACE
44
45const trace_opt tr_opts[] = {
46 { 't', T_TUNNEL, "tunnel events" },
47 { 'r', T_PEER, "peer events" },
48 { 'a', T_ADMIN, "admin interface" },
49 { 'p', T_PACKET, "packet contents" },
50 { 'c', T_CRYPTO, "crypto details" },
51 { 's', T_KEYSET, "symmetric keyset management" },
52 { 'x', T_KEYEXCH, "key exchange" },
53 { 'm', T_KEYMGMT, "key management" },
54 { 'A', T_ALL, "all of the above" },
55 { 0, 0, 0 }
56};
57
58unsigned tr_flags = 0;
59#endif
60
61/*----- Static variables --------------------------------------------------*/
62
63static admin *admins;
64static sel_file sock;
65static const char *sockname;
66static unsigned flags = 0;
67static admin *a_stdin = 0;
68static sig s_term, s_int, s_hup;
69
70#define F_DAEMON 1u
71#define F_INIT 2u
72
73#define T_RESOLVE SEC(30)
74
75/*----- Utility functions -------------------------------------------------*/
76
77/* --- @a_write@ --- *
78 *
79 * Arguments: @admin *a@ = admin connection to write to
80 * @const char *fmt@ = pointer to format string
81 * @...@ = other arguments
82 *
83 * Returns: ---
84 *
85 * Use: Sends a message to an admin connection.
86 */
87
88static void a_write(admin *a, const char *fmt, ...)
89{
90 va_list ap;
91 dstr d = DSTR_INIT;
92 va_start(ap, fmt);
93 dstr_vputf(&d, fmt, ap);
94 va_end(ap);
95 write(a->fd, d.buf, d.len);
96 dstr_destroy(&d);
97}
98
99/* --- @a_warn@ --- *
100 *
101 * Arguments: @const char *fmt@ = pointer to format string
102 * @...@ = other arguments
103 *
104 * Returns: ---
105 *
106 * Use: Informs all admin connections of a warning.
107 */
108
109void a_warn(const char *fmt, ...)
110{
111 va_list ap;
112 admin *a;
113 dstr d = DSTR_INIT;
114
115 if (flags & F_INIT)
116 dstr_puts(&d, "WARN ");
117 va_start(ap, fmt);
118 dstr_vputf(&d, fmt, ap);
119 va_end(ap);
120 if (!(flags & F_INIT))
121 moan("%s", d.buf);
122 else {
123 dstr_putc(&d, '\n');
124 for (a = admins; a; a = a->next)
125 write(a->fd, d.buf, d.len);
126 }
127 dstr_destroy(&d);
128}
129
130/* --- @a_trace@ --- *
131 *
132 * Arguments: @const char *p@ = pointer to a buffer
133 * @size_t sz@ = size of the buffer
134 * @void *v@ = uninteresting pointer
135 *
136 * Returns: ---
137 *
138 * Use: Custom trace output handler.
139 */
140
141#ifndef NTRACE
142static void a_trace(const char *p, size_t sz, void *v)
143{
144 dstr d = DSTR_INIT;
145 admin *a;
146
147 dstr_puts(&d, "TRACE ");
148 dstr_putm(&d, p, sz);
149 dstr_putc(&d, '\n');
150 for (a = admins; a; a = a->next)
151 write(a->fd, d.buf, d.len);
152 dstr_destroy(&d);
153}
154#endif
155
156/* --- @a_quit@ --- *
157 *
158 * Arguments: ---
159 *
160 * Returns: ---
161 *
162 * Use: Shuts things down nicely.
163 */
164
165void a_quit(void)
166{
167 close(sock.fd);
168 unlink(sockname);
169 exit(0);
170}
171
172/* --- @a_sigdie@ --- *
173 *
174 * Arguments: @int sig@ = signal number
175 * @void *v@ = an uninteresting argument
176 *
177 * Returns: ---
178 *
179 * Use Shuts down on receipt of a fatal signal.
180 */
181
182static void a_sigdie(int sig, void *v)
183{
184 char *p;
185 char buf[20];
186
187 switch (sig) {
188 case SIGTERM: p = "SIGTERM"; break;
189 case SIGINT: p = "SIGINT"; break;
190 default:
191 sprintf(buf, "signal %i", sig);
192 p = buf;
193 break;
194 }
195 a_warn("shutting down on %s", p);
196 a_quit();
197}
198
199/* --- @a_sighup@ --- *
200 *
201 * Arguments: @int sig@ = signal number
202 * @void *v@ = an uninteresting argument
203 *
204 * Returns: ---
205 *
206 * Use Logs a message about SIGHUP not being useful.
207 */
208
209static void a_sighup(int sig, void *v)
210{
211 a_warn("received SIGHUP: ignoring");
212}
213
214/*----- Adding peers ------------------------------------------------------*/
215
216/* --- @a_resolve@ --- *
217 *
218 * Arguments: @struct hostent *h@ = pointer to resolved hostname
219 * @void *v@ = pointer to admin block
220 *
221 * Returns: ---
222 *
223 * Use: Handles a completed name resolution.
224 */
225
226static void a_resolve(struct hostent *h, void *v)
227{
228 admin *a = v;
229 T( trace(T_ADMIN, "admin: %u resolved", a->seq); )
230 sel_rmtimer(&a->t);
231 if (!h)
232 a_write(a, "ERR couldn't resolve hostname `%s'\n", a->paddr);
233 else if (p_find(a->pname))
234 a_write(a, "ERR peer `%s' already registered\n", a->pname);
235 else {
236 memcpy(&a->peer.sin.sin_addr, h->h_addr, sizeof(struct in_addr));
237 if (!p_create(a->pname, &a->peer.sa, a->sasz))
238 a_write(a, "ERR couldn't create peer\n");
239 else
240 a_write(a, "OK\n");
241 }
242 xfree(a->pname);
243 xfree(a->paddr);
244 a->pname = 0;
245 selbuf_enable(&a->b);
246}
247
248/* --- @a_timer@ --- *
249 *
250 * Arguments: @struct timeval *tv@ = timer
251 * @void *v@ = pointer to admin block
252 *
253 * Returns: ---
254 *
255 * Use: Times out a resolver.
256 */
257
258static void a_timer(struct timeval *tv, void *v)
259{
260 admin *a = v;
261 T( trace(T_ADMIN, "admin: %u resolver timeout", a->seq); )
262 bres_abort(&a->r);
263 a_write(a, "ERR timeout resolving `%s'\n", a->paddr);
264 xfree(a->pname);
265 xfree(a->paddr);
266 a->pname = 0;
267 selbuf_enable(&a->b);
268}
269
270/* --- @acmd_add@ --- *
271 *
272 * Arguments: @admin *a@ = connection which requested the addition
273 * @unsigned ac@ = argument count
274 * @char *av[]@ = pointer to the argument list
275 *
276 * Returns: ---
277 *
278 * Use: Adds a new peer.
279 */
280
281static void acmd_add(admin *a, unsigned ac, char *av[])
282{
283 unsigned long pt;
284 struct timeval tv;
285 char *p;
286
287 /* --- Make sure someone's not got there already --- */
288
289 if (p_find(av[0])) {
290 a_write(a, "ERR peer `%s' already registered\n", av[0]);
291 return;
292 }
293
294 /* --- Fill in the easy bits of address --- */
295
296 BURN(a->peer);
297 a->peer.sin.sin_family = AF_INET;
298 a->sasz = sizeof(a->peer.sin);
299 pt = strtoul(av[2], &p, 0);
300 if (*p) {
301 struct servent *s = getservbyname(av[2], "udp");
302 if (!s) {
303 a_write(a, "ERR service `%s' not known\n", av[2]);
304 return;
305 }
306 pt = ntohs(s->s_port);
307 }
308 if (pt == 0 || pt >= 65536) {
309 a_write(a, "ERR bad port number %lu\n", pt);
310 return;
311 }
312 a->peer.sin.sin_port = htons(pt);
313
314 /* --- If the name is numeric, do it the easy way --- */
315
316 if (inet_aton(av[1], &a->peer.sin.sin_addr)) {
317 if (!p_create(av[0], &a->peer.sa, a->sasz))
318 a_write(a, "ERR couldn't create peer\n");
319 else
320 a_write(a, "OK\n");
321 return;
322 }
323
324 /* --- Store everything for later and crank up the resolver --- *
325 *
326 * We disable the line buffer until the resolver completes (or times out).
327 * This prevents other commands on the same connection (though the rest of
328 * the system continues regardless), but makes life simpler for the client.
329 */
330
331 a->pname = xstrdup(av[0]);
332 a->paddr = xstrdup(av[1]);
333 selbuf_disable(&a->b);
334 gettimeofday(&tv, 0);
335 tv.tv_sec += T_RESOLVE;
336 sel_addtimer(&sel, &a->t, &tv, a_timer, a);
337 bres_byname(&a->r, a->paddr, a_resolve, a);
338 T( trace(T_ADMIN, "admin: %u resolving hostname `%s'",
339 a->seq, a->paddr); )
340}
341
342/*----- Administration commands -------------------------------------------*/
343
344/* --- Miscellaneous commands --- */
345
346#ifndef NTRACE
347
348static void acmd_trace(admin *a, unsigned ac, char *av[])
349{
350 if (!ac || strcmp(av[0], "?") == 0) {
351 const trace_opt *t;
352 a_write(a, "INFO Trace options:\n");
353 for (t = tr_opts; t->ch; t++) {
354 a_write(a, "INFO %c %c %s\n",
355 t->ch, (tr_flags & t->f) == t->f ? '*' : ' ', t->help);
356 }
357 } else {
358 unsigned sense = 1;
359 unsigned f = tr_flags;
360 const trace_opt *tt;
361 char *p = av[0];
362
363 while (*p) {
364 switch (*p) {
365 case '+': sense = 1; break;
366 case '-': sense = 0; break;
367 default:
368 for (tt = tr_opts; tt->ch; tt++) {
369 if (tt->ch == *p) {
370 if (sense) f |= tt->f;
371 else f &= ~tt->f;
372 goto tropt_ok;
373 }
374 }
375 a_write(a, "ERR unknown trace option `%c'\n", *p);
376 return;
377 tropt_ok:;
378 break;
379 }
380 p++;
381 }
382 tr_flags = f;
383 trace_level(tr_flags);
384 }
385 a_write(a, "OK\n");
386}
387
388#endif
389
390static void acmd_port(admin *a, unsigned ac, char *av[])
391{
392 a_write(a, "INFO %u\nOK\n", p_port());
393}
394
395static void a_destroy(admin */*a*/);
396
397static void acmd_daemon(admin *a, unsigned ac, char *av[])
398{
399 if (flags & F_DAEMON)
400 a_write(a, "ERR already running as a daemon\n");
401 else {
402 if (a_stdin) {
403 a_write(a_stdin, "WARN becoming a daemon\n");
404 a_destroy(a_stdin);
405 }
406 if (u_daemon())
407 a_write(a, "ERR error becoming a daemon: %s", strerror(errno));
408 else
409 flags |= F_DAEMON;
410 }
411}
412
413static void acmd_list(admin *a, unsigned ac, char *av[])
414{
415 peer *p;
416 for (p = p_first(); p; p = p_next(p))
417 a_write(a, "INFO %s\n", p_name(p));
418 a_write(a, "OK\n");
419}
420
421static void acmd_ifname(admin *a, unsigned ac, char *av[])
422{
423 peer *p;
424
425 if ((p = p_find(av[0])) == 0)
426 a_write(a, "ERR peer `%s' not found\n", av[0]);
427 else
428 a_write(a, "INFO %s\nOK\n", p_ifname(p));
429}
430
431static void acmd_addr(admin *a, unsigned ac, char *av[])
432{
433 peer *p;
434 const addr *ad;
435
436 if ((p = p_find(av[0])) == 0)
437 a_write(a, "ERR peer `%s' not found\n", av[0]);
438 else {
439 ad = p_addr(p);
440 assert(ad->sa.sa_family == AF_INET);
441 a_write(a, "INFO %s %u\nOK\n",
442 inet_ntoa(ad->sin.sin_addr),
443 (unsigned)ntohs(ad->sin.sin_port));
444 }
445}
446
447static void acmd_kill(admin *a, unsigned ac, char *av[])
448{
449 peer *p;
450 if ((p = p_find(av[0])) == 0)
451 a_write(a, "ERR peer `%s' not found\n", av[0]);
452 else {
453 p_destroy(p);
454 a_write(a, "OK\n");
455 }
456}
457
458static void acmd_quit(admin *a, unsigned ac, char *av[])
459{
460 a_warn("closing down on admin request");
461 a_quit();
462}
463
464/* --- The command table and help --- */
465
466typedef struct acmd {
467 const char *name;
468 const char *help;
469 unsigned argmin, argmax;
470 void (*func)(admin */*a*/, unsigned /*ac*/, char */*av*/[]);
471} acmd;
472
473static void acmd_help(admin */*a*/, unsigned /*ac*/, char */*av*/[]);
474
475static const acmd acmdtab[] = {
476 { "help", "HELP", 0, 0, acmd_help },
477#ifndef NTRACE
478 { "trace", "TRACE [options]", 0, 1, acmd_trace },
479#endif
480 { "port", "PORT", 0, 0, acmd_port },
481 { "daemon", "DAEMON", 0, 0, acmd_daemon },
482 { "list", "LIST", 0, 0, acmd_list },
483 { "ifname", "IFNAME peer", 1, 1, acmd_ifname },
484 { "addr", "ADDR peer", 1, 1, acmd_addr },
485 { "kill", "KILL peer", 1, 1, acmd_kill },
486 { "add", "ADD peer addr port", 3, 3, acmd_add },
487 { "quit", "QUIT", 0, 0, acmd_quit },
488 { 0, 0, 0, 0, 0 }
489};
490
491static void acmd_help(admin *a, unsigned ac, char *av[])
492{
493 const acmd *c;
494 for (c = acmdtab; c->name; c++)
495 a_write(a, "INFO %s\n", c->help);
496 a_write(a, "OK\n");
497}
498
499/*----- Connection handling -----------------------------------------------*/
500
501/* --- @a_destroy@ --- *
502 *
503 * Arguments: @admin *a@ = pointer to an admin block
504 *
505 * Returns: ---
506 *
507 * Use: Destroys an admin block.
508 */
509
510static void a_destroy(admin *a)
511{
512 T( trace(T_ADMIN, "admin: destroying connection %u", a->seq); )
513 selbuf_destroy(&a->b);
514 if (a->b.reader.fd != a->fd)
515 close(a->b.reader.fd);
516 close(a->fd);
517 if (a->pname) {
518 xfree(a->pname);
519 xfree(a->paddr);
520 bres_abort(&a->r);
521 sel_rmtimer(&a->t);
522 }
523 if (a->next)
524 a->next->prev = a->prev;
525 if (a->prev)
526 a->prev->next = a->next;
527 else
528 admins = a->next;
529 if (a_stdin == a)
530 a_stdin = 0;
531 DESTROY(a);
532}
533
534/* --- @a_line@ --- *
535 *
536 * Arguments: @char *p@ = pointer to the line read
537 * @void *vp@ = pointer to my admin block
538 *
539 * Returns: ---
540 *
541 * Use: Handles a line of input.
542 */
543
544static void a_line(char *p, void *vp)
545{
546 admin *a = vp;
547 const acmd *c;
548 char *av[4];
549 size_t ac;
550
551 if (!p) {
552 a_destroy(a);
553 return;
554 }
555 ac = str_qsplit(p, av, 4, 0, STRF_QUOTE);
556 if (!ac)
557 return;
558 for (p = av[0]; *p; p++) *p = tolower((unsigned char)*p);
559 for (c = acmdtab; c->name; c++) {
560 if (strcmp(av[0], c->name) == 0) {
561 ac--;
562 if (c->argmin > ac || ac > c->argmax)
563 a_write(a, "ERR syntax: %s\n", c->help);
564 else
565 c->func(a, ac, av + 1);
566 return;
567 }
568 }
569 a_write(a, "ERR unknown command `%s'\n", av[0]);
570}
571
572/* --- @a_create@ --- *
573 *
574 * Arguments: @int fd_in, fd_out@ = file descriptors to use
575 *
576 * Returns: ---
577 *
578 * Use: Creates a new admin connection.
579 */
580
581void a_create(int fd_in, int fd_out)
582{
583 admin *a = CREATE(admin);
584 T( static unsigned seq = 0; )
585 a->seq = seq++;
586 T( trace(T_ADMIN, "admin: accepted connection %u", a->seq); )
587 a->pname = 0;
588 if (fd_in == STDIN_FILENO)
589 a_stdin = a;
590 fdflags(fd_in, O_NONBLOCK, O_NONBLOCK, FD_CLOEXEC, FD_CLOEXEC);
591 if (fd_out != fd_in)
592 fdflags(fd_out, O_NONBLOCK, O_NONBLOCK, FD_CLOEXEC, FD_CLOEXEC);
593 a->fd = fd_out;
594 selbuf_init(&a->b, &sel, fd_in, a_line, a);
595 a->next = admins;
596 a->prev = 0;
597 if (admins)
598 admins->prev = a;
599 admins = a;
600}
601
602/* --- @a_accept@ --- *
603 *
604 * Arguments: @int fd@ = file descriptor to accept
605 * @unsigned mode@ = what to do
606 * @void *v@ = uninteresting pointer
607 *
608 * Returns: ---
609 *
610 * Use: Accepts a new admin connection.
611 */
612
613static void a_accept(int fd, unsigned mode, void *v)
614{
615 int nfd;
616 struct sockaddr_un sun;
617 size_t sz = sizeof(sun);
618
619 if ((nfd = accept(fd, (struct sockaddr *)&sun, &sz)) < 0) {
620 a_warn("accept admin connection failed: %s", strerror(errno));
621 return;
622 }
623 a_create(nfd, nfd);
624}
625
626/* --- @a_daemon@ --- *
627 *
628 * Arguments: ---
629 *
630 * Returns: ---
631 *
632 * Use: Informs the admin module that it's a daemon.
633 */
634
635void a_daemon(void)
636{
637 flags |= F_DAEMON;
638}
639
640/* --- @a_init@ --- *
641 *
642 * Arguments: @const char *name@ = socket name to create
643 *
644 * Returns: ---
645 *
646 * Use: Creates the admin listening socket.
647 */
648
649void a_init(const char *name)
650{
651 int fd;
652 int n = 5;
653 struct sockaddr_un sun;
654 struct sigaction sa;
655 size_t sz;
656
657 /* --- Set up the socket address --- */
658
659 sz = strlen(name) + 1;
660 if (sz > sizeof(sun.sun_path))
661 die(EXIT_FAILURE, "socket name `%s' too long", name);
662 BURN(sun);
663 sun.sun_family = AF_UNIX;
664 memcpy(sun.sun_path, name, sz);
665 sz += offsetof(struct sockaddr_un, sun_path);
666
667 /* --- Attempt to bind to the socket --- */
668
669 umask(0077);
670again:
671 if ((fd = socket(PF_UNIX, SOCK_STREAM, 0)) < 0)
672 die(EXIT_FAILURE, "couldn't create socket: %s", strerror(errno));
673 if (bind(fd, (struct sockaddr *)&sun, sz) < 0) {
674 struct stat st;
675 int e = errno;
676 if (errno != EADDRINUSE) {
677 die(EXIT_FAILURE, "couldn't bind to address `%s': %s",
678 sun.sun_path, strerror(e));
679 }
680 if (!n)
681 die(EXIT_FAILURE, "too many retries; giving up");
682 n--;
683 if (!connect(fd, (struct sockaddr *)&sun, sz)) {
684 die(EXIT_FAILURE, "server already listening on admin socket `%s'",
685 sun.sun_path);
686 }
687 if (errno != ECONNREFUSED)
688 die(EXIT_FAILURE, "couldn't bind to address: %s", strerror(e));
689 if (stat(sun.sun_path, &st)) {
690 die(EXIT_FAILURE, "couldn't stat `%s': %s",
691 sun.sun_path, strerror(errno));
692 }
693 if (!S_ISSOCK(st.st_mode))
694 die(EXIT_FAILURE, "object `%s' isn't a socket", sun.sun_path);
695 T( trace(T_ADMIN, "stale socket found; removing it"); )
696 unlink(sun.sun_path);
697 close(fd);
698 goto again;
699 }
700 chmod(sun.sun_path, 0600);
701 fdflags(fd, O_NONBLOCK, O_NONBLOCK, FD_CLOEXEC, FD_CLOEXEC);
702 if (listen(fd, 5))
703 die(EXIT_FAILURE, "couldn't listen on socket: %s", strerror(errno));
704
705 /* --- Listen to the socket --- */
706
707 sel_initfile(&sel, &sock, fd, SEL_READ, a_accept, 0);
708 sel_addfile(&sock);
709 sockname = name;
710 bres_init(&sel);
711 T( trace_custom(a_trace, 0);
712 trace(T_ADMIN, "admin: enabled custom tracing"); )
713 flags |= F_INIT;
714
715 /* --- Set up signal handlers --- */
716
717 sig_add(&s_term, SIGTERM, a_sigdie, 0);
718 sig_add(&s_hup, SIGHUP, a_sighup, 0);
719 sigaction(SIGINT, 0, &sa);
720 if (sa.sa_handler != SIG_IGN)
721 sig_add(&s_int, SIGINT, a_sigdie, 0);
722}
723
724/*----- That's all, folks -------------------------------------------------*/