mirror of
https://git.proxmox.com/git/mirror_corosync-qdevice
synced 2025-04-28 16:33:21 +00:00

getopt will return pointer to argv so there is no need to dup optarg. Signed-off-by: Jan Friesse <jfriesse@redhat.com>
507 lines
13 KiB
C
507 lines
13 KiB
C
/*
|
|
* Copyright (c) 2015-2020 Red Hat, Inc.
|
|
*
|
|
* All rights reserved.
|
|
*
|
|
* Author: Jan Friesse (jfriesse@redhat.com)
|
|
*
|
|
* This software licensed under BSD license, the text of which follows:
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions are met:
|
|
*
|
|
* - Redistributions of source code must retain the above copyright notice,
|
|
* this list of conditions and the following disclaimer.
|
|
* - Redistributions in binary form must reproduce the above copyright notice,
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
* and/or other materials provided with the distribution.
|
|
* - Neither the name of the Red Hat, Inc. nor the names of its
|
|
* contributors may be used to endorse or promote products derived from this
|
|
* software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
|
|
* THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <err.h>
|
|
#include <errno.h>
|
|
#include <getopt.h>
|
|
#include <limits.h>
|
|
#include <signal.h>
|
|
#include <unistd.h>
|
|
|
|
#include "qnet-config.h"
|
|
|
|
#include "dynar.h"
|
|
#include "dynar-str.h"
|
|
#include "dynar-getopt-lex.h"
|
|
#include "log.h"
|
|
#include "nss-sock.h"
|
|
#include "pr-poll-array.h"
|
|
#include "qnetd-advanced-settings.h"
|
|
#include "qnetd-algorithm.h"
|
|
#include "qnetd-instance.h"
|
|
#include "qnetd-ipc.h"
|
|
#include "qnetd-client-net.h"
|
|
#include "qnetd-client-msg-received.h"
|
|
#include "utils.h"
|
|
#include "msg.h"
|
|
|
|
#ifdef HAVE_LIBSYSTEMD
|
|
#include <systemd/sd-daemon.h>
|
|
#endif
|
|
|
|
/*
|
|
* This is global variable used for comunication with main loop and signal (calls close)
|
|
*/
|
|
struct qnetd_instance *global_instance;
|
|
|
|
enum tlv_decision_algorithm_type
|
|
qnetd_static_supported_decision_algorithms[QNETD_STATIC_SUPPORTED_DECISION_ALGORITHMS_SIZE] = {
|
|
TLV_DECISION_ALGORITHM_TYPE_TEST,
|
|
TLV_DECISION_ALGORITHM_TYPE_FFSPLIT,
|
|
TLV_DECISION_ALGORITHM_TYPE_2NODELMS,
|
|
TLV_DECISION_ALGORITHM_TYPE_LMS,
|
|
};
|
|
|
|
static void
|
|
qnetd_err_nss(void)
|
|
{
|
|
|
|
log_nss(LOG_CRIT, "NSS error");
|
|
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
static void
|
|
qnetd_warn_nss(void)
|
|
{
|
|
|
|
log_nss(LOG_WARNING, "NSS warning");
|
|
}
|
|
|
|
static int
|
|
server_socket_poll_loop_read_cb(PRFileDesc *prfd, const PRPollDesc *pd, void *user_data1, void *user_data2)
|
|
{
|
|
struct qnetd_instance *instance = (struct qnetd_instance *)user_data1;
|
|
|
|
qnetd_client_net_accept(instance);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
server_socket_poll_loop_err_cb(PRFileDesc *prfd, short revents, const PRPollDesc *pd,
|
|
void *user_data1, void *user_data2)
|
|
{
|
|
|
|
if (revents != POLLNVAL) {
|
|
/*
|
|
* Poll ERR on listening socket is fatal error.
|
|
* POLL_NVAL is used as a signal to quit poll loop.
|
|
*/
|
|
log(LOG_CRIT, "POLL_ERR (%u) on listening socket", revents);
|
|
} else {
|
|
log(LOG_DEBUG, "Listening socket is closed");
|
|
}
|
|
|
|
return (-1);
|
|
}
|
|
|
|
static void
|
|
signal_int_handler(int sig)
|
|
{
|
|
|
|
log(LOG_DEBUG, "SIGINT received - closing server IPC socket");
|
|
|
|
qnetd_ipc_close(global_instance);
|
|
}
|
|
|
|
static void
|
|
signal_term_handler(int sig)
|
|
{
|
|
|
|
log(LOG_DEBUG, "SIGTERM received - closing server IPC socket");
|
|
|
|
qnetd_ipc_close(global_instance);
|
|
}
|
|
|
|
static void
|
|
signal_handlers_register(void)
|
|
{
|
|
struct sigaction act;
|
|
|
|
act.sa_handler = signal_int_handler;
|
|
sigemptyset(&act.sa_mask);
|
|
act.sa_flags = SA_RESTART;
|
|
|
|
sigaction(SIGINT, &act, NULL);
|
|
|
|
act.sa_handler = signal_term_handler;
|
|
sigemptyset(&act.sa_mask);
|
|
act.sa_flags = SA_RESTART;
|
|
|
|
sigaction(SIGTERM, &act, NULL);
|
|
}
|
|
|
|
static int
|
|
qnetd_run_main_loop(struct qnetd_instance *instance)
|
|
{
|
|
int poll_res;
|
|
|
|
while ((poll_res = pr_poll_loop_exec(&instance->main_poll_loop)) == 0) {
|
|
}
|
|
|
|
if (poll_res == -2) {
|
|
log(LOG_CRIT, "pr_poll_loop_exec returned -2 - internal error");
|
|
return (-1);
|
|
} else if (poll_res == -3) {
|
|
log_nss(LOG_CRIT, "pr_poll_loop_exec returned -3 - PR_Poll error");
|
|
return (-1);
|
|
}
|
|
|
|
return (qnetd_ipc_is_closed(instance) ? 0 : -1);
|
|
}
|
|
|
|
static void
|
|
usage(void)
|
|
{
|
|
|
|
printf("usage: %s [-46dfhv] [-l listen_addr] [-p listen_port] [-s tls]\n", QNETD_PROGRAM_NAME);
|
|
printf("%14s[-c client_cert_required] [-m max_clients] [-S option=value[,option2=value2,...]]\n", "");
|
|
}
|
|
|
|
static void
|
|
display_version(void)
|
|
{
|
|
enum msg_type *supported_messages;
|
|
size_t no_supported_messages;
|
|
size_t zi;
|
|
|
|
msg_get_supported_messages(&supported_messages, &no_supported_messages);
|
|
printf("Corosync Qdevice Network Daemon, version '%s'\n\n", VERSION);
|
|
printf("Supported algorithms: ");
|
|
for (zi = 0; zi < QNETD_STATIC_SUPPORTED_DECISION_ALGORITHMS_SIZE; zi++) {
|
|
if (zi != 0) {
|
|
printf(", ");
|
|
}
|
|
printf("%s (%u)",
|
|
tlv_decision_algorithm_type_to_str(qnetd_static_supported_decision_algorithms[zi]),
|
|
qnetd_static_supported_decision_algorithms[zi]);
|
|
}
|
|
printf("\n");
|
|
printf("Supported message types: ");
|
|
for (zi = 0; zi < no_supported_messages; zi++) {
|
|
if (zi != 0) {
|
|
printf(", ");
|
|
}
|
|
printf("%s (%u)", msg_type_to_str(supported_messages[zi]), supported_messages[zi]);
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
static void
|
|
cli_parse_long_opt(struct qnetd_advanced_settings *advanced_settings, const char *long_opt)
|
|
{
|
|
struct dynar_getopt_lex lex;
|
|
struct dynar dynar_long_opt;
|
|
const char *opt;
|
|
const char *val;
|
|
int res;
|
|
|
|
dynar_init(&dynar_long_opt, strlen(long_opt) + 1);
|
|
if (dynar_str_cpy(&dynar_long_opt, long_opt) != 0) {
|
|
errx(EXIT_FAILURE, "Can't alloc memory for long option");
|
|
}
|
|
|
|
dynar_getopt_lex_init(&lex, &dynar_long_opt);
|
|
|
|
while (dynar_getopt_lex_token_next(&lex) == 0 && strcmp(dynar_data(&lex.option), "") != 0) {
|
|
opt = dynar_data(&lex.option);
|
|
val = dynar_data(&lex.value);
|
|
|
|
res = qnetd_advanced_settings_set(advanced_settings, opt, val);
|
|
switch (res) {
|
|
case -1:
|
|
errx(EXIT_FAILURE, "Unknown option '%s'", opt);
|
|
break;
|
|
case -2:
|
|
errx(EXIT_FAILURE, "Invalid value '%s' for option '%s'", val, opt);
|
|
break;
|
|
case -3:
|
|
warnx("Option '%s' is deprecated and has no effect anymore", opt);
|
|
break;
|
|
}
|
|
}
|
|
|
|
dynar_getopt_lex_destroy(&lex);
|
|
dynar_destroy(&dynar_long_opt);
|
|
}
|
|
|
|
static void
|
|
cli_parse(int argc, char * const argv[], char **host_addr, uint16_t *host_port, int *foreground,
|
|
int *debug_log, int *bump_log_priority, enum tlv_tls_supported *tls_supported,
|
|
int *client_cert_required, size_t *max_clients, PRIntn *address_family,
|
|
struct qnetd_advanced_settings *advanced_settings)
|
|
{
|
|
int ch;
|
|
long long int tmpll;
|
|
|
|
*host_addr = NULL;
|
|
*host_port = QNETD_DEFAULT_HOST_PORT;
|
|
*foreground = 0;
|
|
*debug_log = 0;
|
|
*bump_log_priority = 0;
|
|
*tls_supported = QNETD_DEFAULT_TLS_SUPPORTED;
|
|
*client_cert_required = QNETD_DEFAULT_TLS_CLIENT_CERT_REQUIRED;
|
|
*max_clients = QNETD_DEFAULT_MAX_CLIENTS;
|
|
*address_family = PR_AF_UNSPEC;
|
|
|
|
while ((ch = getopt(argc, argv, "46dfhvc:l:m:p:S:s:")) != -1) {
|
|
switch (ch) {
|
|
case '4':
|
|
*address_family = PR_AF_INET;
|
|
break;
|
|
case '6':
|
|
*address_family = PR_AF_INET6;
|
|
break;
|
|
case 'f':
|
|
*foreground = 1;
|
|
break;
|
|
case 'd':
|
|
if (*debug_log) {
|
|
*bump_log_priority = 1;
|
|
}
|
|
*debug_log = 1;
|
|
break;
|
|
case 'c':
|
|
if ((*client_cert_required = utils_parse_bool_str(optarg)) == -1) {
|
|
errx(EXIT_FAILURE, "client_cert_required should be on/yes/1, off/no/0");
|
|
}
|
|
break;
|
|
case 'l':
|
|
*host_addr = optarg;
|
|
break;
|
|
case 'm':
|
|
if (utils_strtonum(optarg, 0, LLONG_MAX, &tmpll) == -1) {
|
|
errx(EXIT_FAILURE, "max clients value %s is invalid", optarg);
|
|
}
|
|
|
|
*max_clients = (size_t)tmpll;
|
|
break;
|
|
case 'p':
|
|
if (utils_strtonum(optarg, 1, UINT16_MAX, &tmpll) == -1) {
|
|
errx(EXIT_FAILURE, "host port must be in range 1-%u", UINT16_MAX);
|
|
}
|
|
|
|
*host_port = tmpll;
|
|
break;
|
|
case 'S':
|
|
cli_parse_long_opt(advanced_settings, optarg);
|
|
break;
|
|
case 's':
|
|
if (strcasecmp(optarg, "on") == 0) {
|
|
*tls_supported = QNETD_DEFAULT_TLS_SUPPORTED;
|
|
} else if (strcasecmp(optarg, "off") == 0) {
|
|
*tls_supported = TLV_TLS_UNSUPPORTED;
|
|
} else if (strcasecmp(optarg, "req") == 0) {
|
|
*tls_supported = TLV_TLS_REQUIRED;
|
|
} else {
|
|
errx(EXIT_FAILURE, "tls must be one of on, off, req");
|
|
}
|
|
break;
|
|
case 'v':
|
|
display_version();
|
|
exit(EXIT_FAILURE);
|
|
break;
|
|
case 'h':
|
|
case '?':
|
|
usage();
|
|
exit(EXIT_FAILURE);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
int
|
|
main(int argc, char * const argv[])
|
|
{
|
|
struct qnetd_instance instance;
|
|
struct qnetd_advanced_settings advanced_settings;
|
|
char *host_addr;
|
|
uint16_t host_port;
|
|
int foreground;
|
|
int debug_log;
|
|
int bump_log_priority;
|
|
enum tlv_tls_supported tls_supported;
|
|
int client_cert_required;
|
|
size_t max_clients;
|
|
PRIntn address_family;
|
|
int lock_file;
|
|
int another_instance_running;
|
|
int log_target;
|
|
int main_loop_res;
|
|
|
|
if (qnetd_advanced_settings_init(&advanced_settings) != 0) {
|
|
errx(EXIT_FAILURE, "Can't alloc memory for advanced settings");
|
|
}
|
|
|
|
cli_parse(argc, argv, &host_addr, &host_port, &foreground, &debug_log, &bump_log_priority,
|
|
&tls_supported, &client_cert_required, &max_clients, &address_family, &advanced_settings);
|
|
|
|
log_target = LOG_TARGET_SYSLOG;
|
|
if (foreground) {
|
|
log_target |= LOG_TARGET_STDERR;
|
|
}
|
|
|
|
if (log_init(QNETD_PROGRAM_NAME, log_target, LOG_DAEMON) == -1) {
|
|
errx(EXIT_FAILURE, "Can't initialize logging");
|
|
}
|
|
|
|
log_set_debug(debug_log);
|
|
log_set_priority_bump(bump_log_priority);
|
|
|
|
/*
|
|
* Check that it's possible to open NSS dir if needed
|
|
*/
|
|
if (nss_sock_check_db_dir((tls_supported != TLV_TLS_UNSUPPORTED ?
|
|
advanced_settings.nss_db_dir : NULL)) != 0) {
|
|
log_err(LOG_ERR, "Can't open NSS DB directory");
|
|
|
|
return (EXIT_FAILURE);
|
|
}
|
|
|
|
/*
|
|
* Daemonize
|
|
*/
|
|
if (!foreground) {
|
|
utils_tty_detach();
|
|
}
|
|
|
|
if ((lock_file = utils_flock(advanced_settings.lock_file, getpid(),
|
|
&another_instance_running)) == -1) {
|
|
if (another_instance_running) {
|
|
log(LOG_ERR, "Another instance is running");
|
|
} else {
|
|
log_err(LOG_ERR, "Can't acquire lock");
|
|
}
|
|
|
|
return (EXIT_FAILURE);
|
|
}
|
|
|
|
log(LOG_DEBUG, "Initializing nss");
|
|
if (nss_sock_init_nss((tls_supported != TLV_TLS_UNSUPPORTED ?
|
|
advanced_settings.nss_db_dir : NULL)) != 0) {
|
|
qnetd_err_nss();
|
|
}
|
|
|
|
if (SSL_ConfigServerSessionIDCache(0, 0, 0, NULL) != SECSuccess) {
|
|
qnetd_err_nss();
|
|
}
|
|
|
|
if (qnetd_instance_init(&instance, tls_supported, client_cert_required,
|
|
max_clients, &advanced_settings) == -1) {
|
|
log(LOG_ERR, "Can't initialize qnetd");
|
|
return (EXIT_FAILURE);
|
|
}
|
|
instance.host_addr = host_addr;
|
|
instance.host_port = host_port;
|
|
|
|
if (tls_supported != TLV_TLS_UNSUPPORTED && qnetd_instance_init_certs(&instance) == -1) {
|
|
qnetd_err_nss();
|
|
}
|
|
|
|
log(LOG_DEBUG, "Initializing local socket");
|
|
if (qnetd_ipc_init(&instance) != 0) {
|
|
return (EXIT_FAILURE);
|
|
}
|
|
|
|
log(LOG_DEBUG, "Creating listening socket");
|
|
instance.server.socket = nss_sock_create_listen_socket(instance.host_addr,
|
|
instance.host_port, address_family);
|
|
if (instance.server.socket == NULL) {
|
|
qnetd_err_nss();
|
|
}
|
|
|
|
if (nss_sock_set_non_blocking(instance.server.socket) != 0) {
|
|
qnetd_err_nss();
|
|
}
|
|
|
|
if (PR_Listen(instance.server.socket, instance.advanced_settings->listen_backlog) !=
|
|
PR_SUCCESS) {
|
|
qnetd_err_nss();
|
|
}
|
|
|
|
if (pr_poll_loop_add_prfd(&instance.main_poll_loop, instance.server.socket, POLLIN,
|
|
NULL,
|
|
server_socket_poll_loop_read_cb,
|
|
NULL,
|
|
server_socket_poll_loop_err_cb,
|
|
&instance, NULL) != 0) {
|
|
log(LOG_ERR, "Can't add server socket to main poll loop");
|
|
|
|
return (EXIT_FAILURE);
|
|
}
|
|
|
|
global_instance = &instance;
|
|
signal_handlers_register();
|
|
|
|
log(LOG_DEBUG, "Registering algorithms");
|
|
if (qnetd_algorithm_register_all() != 0) {
|
|
return (EXIT_FAILURE);
|
|
}
|
|
|
|
log(LOG_DEBUG, "QNetd ready to provide service");
|
|
|
|
#ifdef HAVE_LIBSYSTEMD
|
|
sd_notify(0, "READY=1");
|
|
#endif
|
|
|
|
log(LOG_DEBUG, "Running QNetd main loop");
|
|
main_loop_res = qnetd_run_main_loop(&instance);
|
|
|
|
/*
|
|
* Cleanup
|
|
*/
|
|
log(LOG_DEBUG, "Destroying qnetd ipc");
|
|
qnetd_ipc_destroy(&instance);
|
|
|
|
log(LOG_DEBUG, "Closing server socket");
|
|
if (PR_Close(instance.server.socket) != PR_SUCCESS) {
|
|
qnetd_warn_nss();
|
|
}
|
|
|
|
CERT_DestroyCertificate(instance.server.cert);
|
|
SECKEY_DestroyPrivateKey(instance.server.private_key);
|
|
|
|
SSL_ClearSessionCache();
|
|
|
|
SSL_ShutdownServerSessionIDCache();
|
|
|
|
qnetd_instance_destroy(&instance);
|
|
|
|
qnetd_advanced_settings_destroy(&advanced_settings);
|
|
|
|
if (NSS_Shutdown() != SECSuccess) {
|
|
qnetd_warn_nss();
|
|
}
|
|
|
|
if (PR_Cleanup() != PR_SUCCESS) {
|
|
qnetd_warn_nss();
|
|
}
|
|
|
|
log(LOG_DEBUG, "Closing log");
|
|
log_close();
|
|
|
|
return (main_loop_res == 0 ? EXIT_SUCCESS : EXIT_FAILURE);
|
|
}
|