39struct port_share *port_share = NULL;
42#define PROXY_CONNECTION_BUFFER_SIZE 1500
45#define COMMAND_REDIRECT 10
46#define COMMAND_EXIT 11
49#define RESPONSE_INIT_SUCCEEDED 20
50#define RESPONSE_INIT_FAILED 21
56#define IOSTAT_EAGAIN_ON_READ 0
57#define IOSTAT_EAGAIN_ON_WRITE 1
58#define IOSTAT_READ_ERROR 2
59#define IOSTAT_WRITE_ERROR 3
66struct proxy_connection
69 struct proxy_connection *next;
70 struct proxy_connection *counterpart;
113 for (
i = 3;
i <= 100; ++
i)
147 if (size ==
sizeof(
c))
162 if (size ==
sizeof(
c))
199 head ?
BLEN(head) : -1);
205 iov[0].iov_base = &cmd;
206 iov[0].iov_len =
sizeof(cmd);
211 iov[1].iov_base =
BPTR(head);
212 iov[1].iov_len =
BLENZ(head);
218 mesg.msg_controllen = cmsg_size();
219 mesg.msg_control = (
char *)malloc(mesg.msg_controllen);
223 h = CMSG_FIRSTHDR(&mesg);
224 h->cmsg_level = SOL_SOCKET;
225 h->cmsg_type = SCM_RIGHTS;
230 memcpy(CMSG_DATA(h), &sd_send,
sizeof(sd_send));
234 socketpair(PF_UNIX, SOCK_DGRAM, 0, sd_null);
235 memcpy(CMSG_DATA(h), &sd_null[0],
sizeof(sd_null[0]));
242 "PORT SHARE: sendmsg failed -- unable to communicate with background process (%d,%d,%d,%d)",
243 sd, sd_send, sd_null[0], sd_null[1]);
246 close_socket_if_defined(sd_null[0]);
247 close_socket_if_defined(sd_null[1]);
248 free(mesg.msg_control);
253proxy_entry_close_sd(
struct proxy_connection *pc,
struct event_set *
es)
271proxy_entry_mark_for_close(
struct proxy_connection *pc,
struct event_set *
es)
275 struct proxy_connection *cp = pc->counterpart;
276 proxy_entry_close_sd(pc,
es);
278 pc->buffer_initial =
false;
287 if (cp && cp->defined && cp->counterpart == pc)
289 proxy_entry_mark_for_close(cp,
es);
299proxy_list_housekeeping(
struct proxy_connection **list)
303 struct proxy_connection *prev = NULL;
304 struct proxy_connection *pc = *list;
308 struct proxy_connection *next = pc->next;
335journal_add(
const char *journal_dir,
struct proxy_connection *pc,
struct proxy_connection *cp)
339 socklen_t slen =
sizeof(from.addr);
340 socklen_t dlen =
sizeof(to.addr);
341 if (!getpeername(pc->sd, (
struct sockaddr *)&from.addr.sa, &slen)
342 && !getsockname(cp->sd, (
struct sockaddr *)&to.addr.sa, &dlen))
347 size_t fnlen = strlen(journal_dir) + strlen(t) + 2;
348 char *jfn = (
char *)malloc(fnlen);
350 snprintf(jfn, fnlen,
"%s/%s", journal_dir, t);
352 int fd =
platform_open(jfn, O_CREAT | O_TRUNC | O_WRONLY, S_IRUSR | S_IWUSR | S_IRGRP);
355 ssize_t write_len = strlen(f);
356 if (
write(fd, f, write_len) != write_len)
358 msg(
M_WARN,
"PORT SHARE: writing to journal file (%s) failed", jfn);
365 msg(
M_WARN |
M_ERRNO,
"PORT SHARE: unable to write journal file in %s", jfn);
376proxy_list_close(
struct proxy_connection **
list)
380 struct proxy_connection *pc = *list;
383 proxy_entry_mark_for_close(pc, NULL);
386 proxy_list_housekeeping(list);
391proxy_connection_io_requeue(
struct proxy_connection *pc,
const unsigned int rwflags_new,
399 pc->rwflags = rwflags_new;
411proxy_entry_new(
struct proxy_connection **list,
struct event_set *
es,
413 struct buffer *initial_data,
const char *journal_dir)
417 struct proxy_connection *pc;
418 struct proxy_connection *cp;
421 if ((sd_server = socket(server_addr.
addr.
sa.sa_family, SOCK_STREAM, IPPROTO_TCP)) < 0)
429 msg(
M_WARN,
"PORT SHARE PROXY: connect to port-share server failed");
445 pc->counterpart = cp;
446 pc->buf = *initial_data;
447 pc->buffer_initial =
true;
454 cp->counterpart = pc;
455 cp->buf =
alloc_buf(PROXY_CONNECTION_BUFFER_SIZE);
456 cp->buffer_initial =
false;
466 journal_add(journal_dir, pc, cp);
486control_message_from_parent(
const socket_descriptor_t sd_control,
struct proxy_connection **list,
488 const int max_initial_buf,
const char *journal_dir)
503 iov[0].iov_base = &command;
504 iov[0].iov_len =
sizeof(command);
505 iov[1].iov_base =
BPTR(&buf);
506 iov[1].iov_len =
BCAP(&buf);
510 mesg.msg_controllen = cmsg_size();
511 mesg.msg_control = (
char *)malloc(mesg.msg_controllen);
515 h = CMSG_FIRSTHDR(&mesg);
517 h->cmsg_level = SOL_SOCKET;
518 h->cmsg_type = SCM_RIGHTS;
520 memcpy(CMSG_DATA(h), &socket_undefined,
sizeof(socket_undefined));
526 || h->cmsg_level != SOL_SOCKET || h->cmsg_type != SCM_RIGHTS)
528 msg(
M_WARN,
"PORT SHARE PROXY: received unknown message");
533 memcpy(&received_fd, CMSG_DATA(h),
sizeof(received_fd));
536 if (
status >= 2 && command == COMMAND_REDIRECT)
539 if (proxy_entry_new(list,
es, server_addr, received_fd, &buf, journal_dir))
556 free(mesg.msg_control);
562proxy_connection_io_recv(
struct proxy_connection *pc)
568 return (errno == EAGAIN) ? IOSTAT_EAGAIN_ON_READ : IOSTAT_READ_ERROR;
574 return IOSTAT_READ_ERROR;
577 pc->buf.len = (int)
status;
583proxy_connection_io_send(
struct proxy_connection *pc,
int *bytes_sent)
591 return (e == EAGAIN) ? IOSTAT_EAGAIN_ON_WRITE : IOSTAT_WRITE_ERROR;
595 *bytes_sent += (int)
status;
596 if (
status != pc->buf.len)
601 return IOSTAT_EAGAIN_ON_WRITE;
612 if (pc->buffer_initial)
615 pc->buf =
alloc_buf(PROXY_CONNECTION_BUFFER_SIZE);
616 pc->buffer_initial =
false;
626proxy_connection_io_xfer(
struct proxy_connection *pc,
const int max_transfer)
629 while (transferred < max_transfer)
633 const int status = proxy_connection_io_recv(pc);
634 if (
status != IOSTAT_GOOD)
642 const int status = proxy_connection_io_send(pc, &transferred);
643 if (
status != IOSTAT_GOOD)
649 return IOSTAT_EAGAIN_ON_READ;
656proxy_connection_io_status(
const int status,
unsigned int *rwflags_pc,
unsigned int *rwflags_cp)
660 case IOSTAT_EAGAIN_ON_READ:
662 *rwflags_cp &= ~EVENT_WRITE;
665 case IOSTAT_EAGAIN_ON_WRITE:
666 *rwflags_pc &= ~EVENT_READ;
670 case IOSTAT_READ_ERROR:
673 case IOSTAT_WRITE_ERROR:
687proxy_connection_io_dispatch(
struct proxy_connection *pc,
const unsigned int rwflags,
690 const int max_transfer_per_iteration = 10000;
691 struct proxy_connection *cp = pc->counterpart;
692 unsigned int rwflags_pc = pc->rwflags;
693 unsigned int rwflags_cp = cp->rwflags;
695 ASSERT(pc->defined && cp->defined && cp->counterpart == pc);
699 const int status = proxy_connection_io_xfer(pc, max_transfer_per_iteration);
700 if (!proxy_connection_io_status(
status, &rwflags_pc, &rwflags_cp))
707 const int status = proxy_connection_io_xfer(cp, max_transfer_per_iteration);
708 if (!proxy_connection_io_status(
status, &rwflags_cp, &rwflags_pc))
713 proxy_connection_io_requeue(pc, rwflags_pc,
es);
714 proxy_connection_io_requeue(cp, rwflags_cp,
es);
719 proxy_entry_mark_for_close(pc,
es);
728 const int max_initial_buf,
const char *journal_dir)
732 void *sd_control_marker = (
void *)1;
736 struct proxy_connection *list = NULL;
737 time_t last_housekeeping = 0;
753 current = time(NULL);
757 for (i = 0; i < n_events; ++i)
760 if (e->
arg == sd_control_marker)
762 if (!control_message_from_parent(sd_control, &list,
es, hostaddr,
763 max_initial_buf, journal_dir))
770 struct proxy_connection *pc = (
struct proxy_connection *)e->
arg;
773 proxy_connection_io_dispatch(pc, e->
rwflags,
es);
778 else if (n_events < 0)
782 if (current > last_housekeeping)
784 proxy_list_housekeeping(&list);
785 last_housekeeping = current;
790 proxy_list_close(&list);
793 msg(
M_INFO,
"PORT SHARE PROXY: proxy exiting");
801port_share_open(
const char *host,
const char *port,
const int max_initial_buf,
802 const char *journal_dir)
806 struct port_share *ps;
809 ps->foreground_fd = -1;
810 ps->background_pid = -1;
817 0, NULL, AF_UNSPEC, &ai);
819 ASSERT(
sizeof(hostaddr.
addr) >= ai->ai_addrlen);
820 memcpy(&hostaddr.
addr.
sa, ai->ai_addr, ai->ai_addrlen);
835 if (socketpair(PF_UNIX, SOCK_DGRAM, 0, fd) == -1)
857 ps->background_pid = pid;
873 ps->foreground_fd = fd[0];
878 msg(
M_ERR,
"PORT SHARE: unexpected init recv_control status=%d",
status);
893#ifdef ENABLE_MANAGEMENT
905 port_share_proxy(hostaddr, fd[1], max_initial_buf, journal_dir);
914 port_share_close(ps);
919port_share_close(
struct port_share *ps)
923 if (ps->foreground_fd >= 0)
930 if (ps->background_pid > 0)
932 waitpid(ps->background_pid, NULL, 0);
937 ps->foreground_fd = -1;
945port_share_abort(
struct port_share *ps)
950 if (ps->foreground_fd >= 0)
954 ps->foreground_fd = -1;
965is_openvpn_protocol(
const struct buffer *buf)
967 const unsigned char *p = (
const unsigned char *)
BSTR(buf);
968 const int len =
BLEN(buf);
971 int plen = (p[0] << 8) | p[1];
989 return (plen >= 336 && plen < (1024 + 255));
995 return plen >= 14 && plen <= 255
1001 int plen = (p[0] << 8) | p[1];
1002 return plen >= 14 && plen <= 255;
1020 port_share_sendmsg(ps->foreground_fd, COMMAND_REDIRECT, head, sd);
static void set_signals(void)
#define RESPONSE_INIT_SUCCEEDED
static int recv_control(int fd)
static int send_control(int fd, int code)
static void close_fds_except(int keep)
void free_buf(struct buffer *buf)
struct buffer alloc_buf(size_t size)
static bool buf_advance(struct buffer *buf, ssize_t size)
static void check_malloc_return(void *p)
static void gc_free(struct gc_arena *a)
#define ALLOC_OBJ_CLEAR(dptr, type)
static struct gc_arena gc_new(void)
Data Channel Cryptography Module.
struct event_set * event_set_init(int *maxevents, unsigned int flags)
static void event_free(struct event_set *es)
static void event_del(struct event_set *es, event_t event)
static int event_wait(struct event_set *es, const struct timeval *tv, struct event_set_return *out, int outlen)
static void event_ctl(struct event_set *es, event_t event, unsigned int rwflags, void *arg)
void set_nonblock(socket_descriptor_t fd)
void set_cloexec(socket_descriptor_t fd)
static SERVICE_STATUS status
static bool msg_test(msglvl_t flags)
Return true if flags represent an enabled, not muted log level.
int openvpn_connect(socket_descriptor_t sd, const struct sockaddr *remote, int connect_timeout, volatile int *signal_received)
#define openvpn_close_socket(s)
int openvpn_getaddrinfo(unsigned int flags, const char *hostname, const char *servname, int resolve_retry_seconds, struct signal_info *sig_info, int ai_family, struct addrinfo **res)
static const char * print_openvpn_sockaddr(const struct openvpn_sockaddr *addr, struct gc_arena *gc)
#define P_CONTROL_HARD_RESET_CLIENT_V2
#define P_CONTROL_HARD_RESET_CLIENT_V3
Wrapper structure for dynamically allocated memory.
int len
Length in bytes of the actual content within the allocated memory.
Garbage collection arena used to keep track of dynamically allocated memory.
struct gc_entry * list
First element of the linked list of gc_entry structures.
union openvpn_sockaddr::@27 addr
SOCKET socket_descriptor_t
static int socket_defined(const socket_descriptor_t sd)