123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602 |
- /* vim: set expandtab ts=4 sw=4: */
- /*
- * You may redistribute this program and/or modify it under the terms of
- * the GNU General Public License as published by the Free Software Foundation,
- * either version 3 of the License, or (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <https://www.gnu.org/licenses/>.
- */
- #include "admin/Admin.h"
- #include "benc/String.h"
- #include "benc/Int.h"
- #include "benc/Dict.h"
- #include "benc/serialization/standard/BencMessageWriter.h"
- #include "benc/serialization/standard/BencMessageReader.h"
- #include "memory/Allocator.h"
- #include "util/Assert.h"
- #include "util/Bits.h"
- #include "util/Hex.h"
- #include "util/log/Log.h"
- #include "util/events/Time.h"
- #include "util/events/Timeout.h"
- #include "util/Identity.h"
- #include "util/platform/Sockaddr.h"
- #include "util/Defined.h"
- #include <sodium/crypto_hash_sha256.h>
- #include <sodium/crypto_verify_32.h>
- #include <stdlib.h>
- #include <stdio.h>
- static String* TYPE = String_CONST_SO("type");
- static String* REQUIRED = String_CONST_SO("required");
- static String* STRING = String_CONST_SO("String");
- static String* INTEGER = String_CONST_SO("Int");
- static String* DICT = String_CONST_SO("Dict");
- static String* LIST = String_CONST_SO("List");
- static String* TXID = String_CONST_SO("txid");
- /** Number of milliseconds before a session times out and outgoing messages are failed. */
- #define TIMEOUT_MILLISECONDS 30000
- /** map values for tracking time of last message by source address */
- struct MapValue
- {
- /** time when the last incoming message was received. */
- uint64_t timeOfLastMessage;
- /** used to allocate the memory for the key (Sockaddr) and value (this). */
- struct Allocator* allocator;
- };
- //////// generate time-of-last-message-by-address map
- #define Map_USE_HASH
- #define Map_USE_COMPARATOR
- #define Map_NAME LastMessageTimeByAddr
- #define Map_KEY_TYPE struct Sockaddr*
- #define Map_VALUE_TYPE struct MapValue*
- #include "util/Map.h"
- static inline uint32_t Map_LastMessageTimeByAddr_hash(struct Sockaddr** key)
- {
- return Sockaddr_hash(*key);
- }
- static inline int Map_LastMessageTimeByAddr_compare(struct Sockaddr** keyA, struct Sockaddr** keyB)
- {
- return Sockaddr_compare(*keyA, *keyB);
- }
- /////// end map
- struct Function
- {
- String* name;
- Admin_Function call;
- void* context;
- bool needsAuth;
- Dict* args;
- };
- struct Admin_pvt
- {
- struct Admin pub;
- struct Iface iface;
- struct EventBase* eventBase;
- struct Function* functions;
- int functionCount;
- struct Allocator* allocator;
- String* password;
- struct Log* logger;
- struct Map_LastMessageTimeByAddr map;
- /** non-null if we are currently in an admin request. */
- struct Message* currentRequest;
- /** non-zero if this session able to receive asynchronous messages. */
- int asyncEnabled;
- struct Message* tempSendMsg;
- Identity
- };
- static struct Error_s sendMessage(
- struct Message* message, struct Sockaddr* dest, struct Admin_pvt* admin)
- {
- // stack overflow when used with admin logger.
- //Log_keys(admin->logger, "sending message to angel [%s]", message->bytes);
- Er_assert(Message_epush(message, dest, dest->addrLen));
- return Iface_send(&admin->iface, message);
- }
- static struct Error_s sendBenc(Dict* message,
- struct Sockaddr* dest,
- struct Allocator* alloc,
- struct Admin_pvt* admin,
- int fd)
- {
- Message_reset(admin->tempSendMsg);
- Er_assert(BencMessageWriter_write(message, admin->tempSendMsg));
- struct Message* msg = Message_new(0, admin->tempSendMsg->length + 32, alloc);
- Er_assert(Message_epush(msg, admin->tempSendMsg->bytes, admin->tempSendMsg->length));
- Message_setAssociatedFd(msg, fd);
- return sendMessage(msg, dest, admin);
- }
- /**
- * If no incoming data has been sent by this address in TIMEOUT_MILLISECONDS
- * then Admin_sendMessage() should fail so that it doesn't endlessly send
- * udp packets into outer space after a logging client disconnects.
- */
- static int checkAddress(struct Admin_pvt* admin, int index, uint64_t now)
- {
- uint64_t diff = now - admin->map.values[index]->timeOfLastMessage;
- // check for backwards time
- if (diff > TIMEOUT_MILLISECONDS && diff < ((uint64_t)INT64_MAX)) {
- Allocator_free(admin->map.values[index]->allocator);
- Map_LastMessageTimeByAddr_remove(index, &admin->map);
- return -1;
- }
- return 0;
- }
- static void clearExpiredAddresses(void* vAdmin)
- {
- struct Admin_pvt* admin = Identity_check((struct Admin_pvt*) vAdmin);
- uint64_t now = Time_currentTimeMilliseconds(admin->eventBase);
- int count = 0;
- for (int i = admin->map.count - 1; i >= 0; i--) {
- if (checkAddress(admin, i, now)) {
- count++;
- }
- }
- Log_debug(admin->logger, "Cleared [%d] expired sessions", count);
- }
- static int sendMessage0(Dict* message, String* txid, struct Admin* adminPub, int fd)
- {
- struct Admin_pvt* admin = Identity_check((struct Admin_pvt*) adminPub);
- if (!admin) {
- return 0;
- }
- Assert_true(txid && txid->len >= sizeof(struct Sockaddr));
- uint16_t addrLen = 0;
- Bits_memcpy(&addrLen, txid->bytes, 2);
- Assert_true(txid->len >= addrLen);
- struct Allocator* alloc = NULL;
- if (admin->currentRequest) {
- alloc = admin->currentRequest->alloc;
- } else {
- alloc = Allocator_child(admin->allocator);
- }
- struct Sockaddr* addr = Sockaddr_clone((struct Sockaddr*) txid->bytes, alloc);
- // if this is an async call, check if we've got any input from that client.
- // if the client is nresponsive then fail the call so logs don't get sent
- // out forever after a disconnection.
- if (!admin->currentRequest) {
- int index = Map_LastMessageTimeByAddr_indexForKey(&addr, &admin->map);
- uint64_t now = Time_currentTimeMilliseconds(admin->eventBase);
- if (index < 0 || checkAddress(admin, index, now)) {
- return Admin_sendMessage_CHANNEL_CLOSED;
- }
- }
- // Bounce back the user-supplied txid.
- if (txid->len > addr->addrLen) {
- String* userTxid =
- String_newBinary(&txid->bytes[addr->addrLen], txid->len - addr->addrLen, alloc);
- Dict_putString(message, TXID, userTxid, alloc);
- }
- sendBenc(message, addr, alloc, admin, fd);
- Dict_remove(message, TXID);
- if (!admin->currentRequest) {
- Allocator_free(alloc);
- }
- return 0;
- }
- int Admin_sendMessage(Dict* message, String* txid, struct Admin* adminPub)
- {
- return sendMessage0(message, txid, adminPub, -1);
- }
- static inline bool authValid(Dict* message, struct Message* messageBytes, struct Admin_pvt* admin)
- {
- String* cookieStr = Dict_getStringC(message, "cookie");
- uint32_t cookie = (cookieStr != NULL) ? strtoll(cookieStr->bytes, NULL, 10) : 0;
- if (!cookie) {
- int64_t* cookieInt = Dict_getIntC(message, "cookie");
- cookie = (cookieInt) ? *cookieInt : 0;
- }
- uint64_t nowSecs = Time_currentTimeSeconds(admin->eventBase);
- String* submittedHash = Dict_getStringC(message, "hash");
- if (cookie > nowSecs || cookie < nowSecs - 20 || !submittedHash || submittedHash->len != 64) {
- return false;
- }
- uint8_t* hashPtr = CString_strstr(messageBytes->bytes, submittedHash->bytes);
- if (!hashPtr || !admin->password) {
- return false;
- }
- uint8_t passAndCookie[64];
- snprintf((char*) passAndCookie, 64, "%s%u", admin->password->bytes, cookie);
- uint8_t hash[32];
- crypto_hash_sha256(hash, passAndCookie, CString_strlen((char*) passAndCookie));
- Hex_encode(hashPtr, 64, hash, 32);
- crypto_hash_sha256(hash, messageBytes->bytes, messageBytes->length);
- Hex_encode(hashPtr, 64, hash, 32);
- int res = crypto_verify_32(hashPtr, submittedHash->bytes);
- res |= crypto_verify_32(hashPtr + 32, submittedHash->bytes + 32);
- return res == 0;
- }
- static bool checkArgs(Dict* args,
- struct Function* func,
- String* txid,
- struct Allocator* requestAlloc,
- struct Admin_pvt* admin)
- {
- struct Dict_Entry* entry = *func->args;
- String* error = NULL;
- while (entry != NULL) {
- String* key = (String*) entry->key;
- Assert_ifParanoid(entry->val->type == Object_DICT);
- Dict* value = entry->val->as.dictionary;
- entry = entry->next;
- if (*Dict_getIntC(value, "required") == 0) {
- continue;
- }
- String* type = Dict_getStringC(value, "type");
- if ((type == STRING && !Dict_getString(args, key))
- || (type == DICT && !Dict_getDict(args, key))
- || (type == INTEGER && !Dict_getInt(args, key))
- || (type == LIST && !Dict_getList(args, key)))
- {
- error = String_printf(requestAlloc,
- "Entry [%s] is required and must be of type [%s]",
- key->bytes,
- type->bytes);
- break;
- }
- }
- if (error) {
- Dict d = Dict_CONST(String_CONST("error"), String_OBJ(error), NULL);
- Admin_sendMessage(&d, txid, &admin->pub);
- }
- return !error;
- }
- static void asyncEnabled(Dict* args, void* vAdmin, String* txid, struct Allocator* requestAlloc)
- {
- struct Admin_pvt* admin = Identity_check((struct Admin_pvt*) vAdmin);
- int64_t enabled = admin->asyncEnabled;
- Dict d = Dict_CONST(String_CONST("asyncEnabled"), Int_OBJ(enabled), NULL);
- Admin_sendMessage(&d, txid, &admin->pub);
- }
- #define ENTRIES_PER_PAGE 8
- static void availableFunctions(Dict* args, void* vAdmin, String* txid, struct Allocator* tempAlloc)
- {
- struct Admin_pvt* admin = Identity_check((struct Admin_pvt*) vAdmin);
- int64_t* page = Dict_getIntC(args, "page");
- uint32_t i = (page) ? *page * ENTRIES_PER_PAGE : 0;
- Dict* d = Dict_new(tempAlloc);
- Dict* functions = Dict_new(tempAlloc);
- int count = 0;
- for (; i < (uint32_t)admin->functionCount && count++ < ENTRIES_PER_PAGE; i++) {
- Dict_putDict(functions, admin->functions[i].name, admin->functions[i].args, tempAlloc);
- }
- if (count >= ENTRIES_PER_PAGE) {
- Dict_putIntC(d, "more", 1, tempAlloc);
- }
- Dict_putDictC(d, "availableFunctions", functions, tempAlloc);
- Admin_sendMessage(d, txid, &admin->pub);
- }
- static void handleRequest(Dict* messageDict,
- struct Message* message,
- struct Sockaddr* src,
- struct Allocator* allocator,
- struct Admin_pvt* admin)
- {
- String* query = Dict_getStringC(messageDict, "q");
- if (!query) {
- Log_info(admin->logger, "Got a non-query from admin interface");
- return;
- }
- // txid becomes the user supplied txid combined with the channel num.
- String* userTxid = Dict_getString(messageDict, TXID);
- uint32_t txidlen = ((userTxid) ? userTxid->len : 0) + src->addrLen;
- String* txid = String_newBinary(NULL, txidlen, allocator);
- Bits_memcpy(txid->bytes, src, src->addrLen);
- if (userTxid) {
- Bits_memcpy(txid->bytes + src->addrLen, userTxid->bytes, userTxid->len);
- }
- // If they're asking for a cookie then lets give them one.
- String* cookie = String_CONST("cookie");
- if (String_equals(query, cookie)) {
- //Log_debug(admin->logger, "Got a request for a cookie");
- Dict* d = Dict_new(allocator);
- char bytes[32];
- snprintf(bytes, 32, "%u", (uint32_t) Time_currentTimeSeconds(admin->eventBase));
- String* theCookie = &(String) { .len = CString_strlen(bytes), .bytes = bytes };
- Dict_putString(d, cookie, theCookie, allocator);
- Admin_sendMessage(d, txid, &admin->pub);
- return;
- }
- // If this is a permitted query, make sure the cookie is right.
- String* auth = String_CONST("auth");
- bool authed = false;
- if (String_equals(query, auth)) {
- if (!authValid(messageDict, message, admin)) {
- Dict* d = Dict_new(allocator);
- Dict_putStringCC(d, "error", "Auth failed.", allocator);
- Admin_sendMessage(d, txid, &admin->pub);
- return;
- }
- query = Dict_getStringC(messageDict, "aq");
- authed = true;
- }
- if (String_equals(admin->password, String_CONST("NONE"))) {
- // If there's no password then we'll consider everything to be authed
- authed = true;
- }
- // Then sent a valid authed query, lets track their address so they can receive
- // asynchronous messages.
- int index = Map_LastMessageTimeByAddr_indexForKey(&src, &admin->map);
- uint64_t now = Time_currentTimeMilliseconds(admin->eventBase);
- admin->asyncEnabled = 1;
- if (index >= 0) {
- admin->map.values[index]->timeOfLastMessage = now;
- } else if (authed) {
- struct Allocator* entryAlloc = Allocator_child(admin->allocator);
- struct MapValue* mv = Allocator_calloc(entryAlloc, sizeof(struct MapValue), 1);
- mv->timeOfLastMessage = now;
- mv->allocator = entryAlloc;
- struct Sockaddr* storedAddr = Sockaddr_clone(src, entryAlloc);
- Map_LastMessageTimeByAddr_put(&storedAddr, &mv, &admin->map);
- } else {
- admin->asyncEnabled = 0;
- }
- Dict* args = Dict_getDictC(messageDict, "args");
- bool noFunctionsCalled = true;
- for (int i = 0; i < admin->functionCount; i++) {
- if (String_equals(query, admin->functions[i].name)
- && (authed || !admin->functions[i].needsAuth))
- {
- if (checkArgs(args, &admin->functions[i], txid, message->alloc, admin)) {
- admin->functions[i].call(args, admin->functions[i].context, txid, message->alloc);
- }
- noFunctionsCalled = false;
- }
- }
- if (noFunctionsCalled) {
- Dict d = Dict_CONST(
- String_CONST("error"),
- String_OBJ(String_CONST("No functions matched your request, "
- "try Admin_availableFunctions()")),
- NULL
- );
- Admin_sendMessage(&d, txid, &admin->pub);
- }
- return;
- }
- static void handleMessage(struct Message* message,
- struct Sockaddr* src,
- struct Allocator* alloc,
- struct Admin_pvt* admin)
- {
- if (Defined(Log_KEYS)) {
- uint8_t lastChar = message->bytes[message->length - 1];
- message->bytes[message->length - 1] = '\0';
- Log_keys(admin->logger, "Got message from [%s] [%s]",
- Sockaddr_print(src, alloc), message->bytes);
- message->bytes[message->length - 1] = lastChar;
- }
- // handle non empty message data
- if (message->length > Admin_MAX_REQUEST_SIZE) {
- #define TOO_BIG "d5:error16:Request too big.e"
- #define TOO_BIG_STRLEN (sizeof(TOO_BIG) - 1)
- Bits_memcpy(message->bytes, TOO_BIG, TOO_BIG_STRLEN);
- message->length = TOO_BIG_STRLEN;
- sendMessage(message, src, admin);
- return;
- }
- int origMessageLen = message->length;
- Dict* messageDict = NULL;
- const char* err = BencMessageReader_readNoExcept(message, alloc, &messageDict);
- if (err) {
- Log_warn(admin->logger,
- "Unparsable data from [%s] content: [%s] error: [%s]",
- Sockaddr_print(src, alloc),
- Hex_print(message->bytes, message->length, alloc),
- err);
- return;
- }
- if (message->length) {
- Log_warn(admin->logger,
- "Message from [%s] contained garbage after byte [%d] content: [%s]",
- Sockaddr_print(src, alloc), message->length, message->bytes);
- return;
- }
- // put the data back in the front of the message because it is used by the auth checker.
- Er_assert(Message_eshift(message, origMessageLen));
- handleRequest(messageDict, message, src, alloc, admin);
- }
- static Iface_DEFUN receiveMessage(struct Message* message, struct Iface* iface)
- {
- struct Admin_pvt* admin = Identity_containerOf(iface, struct Admin_pvt, iface);
- struct Allocator* alloc = Allocator_child(admin->allocator);
- struct Sockaddr* addrPtr = Er_assert(AddrIface_popAddr(message));
- admin->currentRequest = message;
- handleMessage(message, Sockaddr_clone(addrPtr, alloc), alloc, admin);
- admin->currentRequest = NULL;
- Allocator_free(alloc);
- // We don't return errors here because the caller can't make use of them
- // instead we reply with anything which went wrong.
- return Error(NONE);
- }
- void Admin_registerFunctionWithArgCount(char* name,
- Admin_Function callback,
- void* callbackContext,
- bool needsAuth,
- struct Admin_FunctionArg* arguments,
- int argCount,
- struct Admin* adminPub)
- {
- struct Admin_pvt* admin = Identity_check((struct Admin_pvt*) adminPub);
- String* str = String_new(name, admin->allocator);
- admin->functions =
- Allocator_realloc(admin->allocator,
- admin->functions,
- sizeof(struct Function) * (admin->functionCount + 1));
- struct Function* fu = &admin->functions[admin->functionCount];
- admin->functionCount++;
- fu->name = str;
- fu->call = callback;
- fu->context = callbackContext;
- fu->needsAuth = needsAuth;
- fu->args = Dict_new(admin->allocator);
- for (int i = 0; arguments && i < argCount; i++) {
- // "type" must be one of: [ "String", "Int", "Dict", "List" ]
- String* type = NULL;
- if (!CString_strcmp(arguments[i].type, STRING->bytes)) {
- type = STRING;
- } else if (!CString_strcmp(arguments[i].type, INTEGER->bytes)) {
- type = INTEGER;
- } else if (!CString_strcmp(arguments[i].type, DICT->bytes)) {
- type = DICT;
- } else if (!CString_strcmp(arguments[i].type, LIST->bytes)) {
- type = LIST;
- } else {
- abort();
- }
- Dict* arg = Dict_new(admin->allocator);
- Dict_putString(arg, TYPE, type, admin->allocator);
- Dict_putInt(arg, REQUIRED, arguments[i].required, admin->allocator);
- String* name = String_new(arguments[i].name, admin->allocator);
- Dict_putDict(fu->args, name, arg, admin->allocator);
- }
- }
- static void importFd(Dict* args, void* vAdmin, String* txid, struct Allocator* requestAlloc)
- {
- struct Admin_pvt* admin = Identity_check((struct Admin_pvt*) vAdmin);
- int fd = admin->currentRequest->associatedFd;
- Dict* res = Dict_new(requestAlloc);
- char* error = "none";
- if (fd < 0) {
- if (Defined(win32)) {
- error = "Admin_importFd() does not support win32";
- } else {
- error = "file descriptor was not attached to message";
- }
- } else {
- Dict_putIntC(res, "fd", fd, requestAlloc);
- }
- Dict_putStringCC(res, "error", error, requestAlloc);
- Admin_sendMessage(res, txid, &admin->pub);
- }
- static void exportFd(Dict* args, void* vAdmin, String* txid, struct Allocator* requestAlloc)
- {
- struct Admin_pvt* admin = Identity_check((struct Admin_pvt*) vAdmin);
- int64_t* fd_p = Dict_getIntC(args, "fd");
- if (!fd_p || *fd_p < 0) {
- Dict* res = Dict_new(requestAlloc);
- Dict_putStringCC(res, "error", "invalid fd", requestAlloc);
- Admin_sendMessage(res, txid, &admin->pub);
- return;
- }
- int fd = *fd_p;
- Dict* res = Dict_new(requestAlloc);
- char* error = "none";
- if (fd < 0) {
- if (Defined(win32)) {
- error = "Admin_exportFd() does not support win32";
- } else {
- error = "file descriptor was not attached to message";
- }
- }
- Dict_putStringCC(res, "error", error, requestAlloc);
- sendMessage0(res, txid, &admin->pub, fd);
- }
- struct Admin* Admin_new(struct AddrIface* ai,
- struct Log* logger,
- struct EventBase* eventBase,
- String* password)
- {
- struct Allocator* alloc = ai->alloc;
- struct Admin_pvt* admin = Allocator_calloc(alloc, sizeof(struct Admin_pvt), 1);
- Identity_set(admin);
- admin->allocator = alloc;
- admin->logger = logger;
- admin->eventBase = eventBase;
- admin->map.allocator = alloc;
- admin->iface.send = receiveMessage;
- Iface_plumb(&admin->iface, &ai->iface);
- admin->tempSendMsg = Message_new(0, Admin_MAX_RESPONSE_SIZE, alloc);
- admin->password = String_clone(password, alloc);
- Timeout_setInterval(clearExpiredAddresses, admin, TIMEOUT_MILLISECONDS * 3, eventBase, alloc);
- Admin_registerFunction("Admin_asyncEnabled", asyncEnabled, admin, false, NULL, &admin->pub);
- Admin_registerFunction("Admin_availableFunctions", availableFunctions, admin, false,
- ((struct Admin_FunctionArg[]) {
- { .name = "page", .required = 0, .type = "Int" }
- }), &admin->pub);
- Admin_registerFunction("Admin_importFd", importFd, admin, true, NULL, &admin->pub);
- Admin_registerFunction("Admin_exportFd", exportFd, admin, true,
- ((struct Admin_FunctionArg[]) {
- { .name = "fd", .required = 1, .type = "Int" }
- }), &admin->pub);
- return &admin->pub;
- }
|