listen.c 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <auth.h>
  4. #define NAMELEN 64 /* reasonable upper limit for name elements */
  5. typedef struct Service Service;
  6. struct Service
  7. {
  8. char serv[NAMELEN]; /* name of the service */
  9. char remote[3*NAMELEN]; /* address of remote system */
  10. char prog[5*NAMELEN+1]; /* program to execute */
  11. };
  12. typedef struct Announce Announce;
  13. struct Announce
  14. {
  15. Announce *next;
  16. char *a;
  17. int announced;
  18. };
  19. int readstr(char*, char*, char*, int);
  20. void dolisten(char*, char*, int, char*);
  21. void newcall(int, char*, char*, Service*);
  22. int findserv(char*, char*, Service*, char*);
  23. int getserv(char*, char*, Service*);
  24. void error(char*);
  25. void scandir(char*, char*, char*);
  26. void becomenone(void);
  27. void listendir(char*, char*, int);
  28. char listenlog[] = "listen";
  29. int quiet;
  30. char *cpu;
  31. char *proto;
  32. Announce *announcements;
  33. #define SEC 1000
  34. char *namespace;
  35. void
  36. usage(void)
  37. {
  38. error("usage: listen [-q] [-n namespace] [-d servdir] [-t trustdir] [proto [name]]");
  39. }
  40. void
  41. main(int argc, char *argv[])
  42. {
  43. Service *s;
  44. char *protodir;
  45. char *trustdir;
  46. char *servdir;
  47. servdir = 0;
  48. trustdir = 0;
  49. proto = "il";
  50. quiet = 0;
  51. argv0 = argv[0];
  52. cpu = getenv("cputype");
  53. if(cpu == 0)
  54. error("can't get cputype");
  55. ARGBEGIN{
  56. case 'd':
  57. servdir = ARGF();
  58. break;
  59. case 'q':
  60. quiet = 1;
  61. break;
  62. case 't':
  63. trustdir = ARGF();
  64. break;
  65. case 'n':
  66. namespace = ARGF();
  67. break;
  68. default:
  69. usage();
  70. }ARGEND;
  71. if(!servdir && !trustdir)
  72. servdir = "/bin/service";
  73. if(servdir && strlen(servdir) + NAMELEN >= sizeof(s->prog))
  74. error("service directory too long");
  75. if(trustdir && strlen(trustdir) + NAMELEN >= sizeof(s->prog))
  76. error("trusted service directory too long");
  77. switch(argc){
  78. case 1:
  79. proto = argv[0];
  80. break;
  81. case 0:
  82. break;
  83. default:
  84. usage();
  85. }
  86. syslog(0, listenlog, "started");
  87. protodir = proto;
  88. proto = strrchr(proto, '/');
  89. if(proto == 0)
  90. proto = protodir;
  91. else
  92. proto++;
  93. listendir(protodir, servdir, 0);
  94. listendir(protodir, trustdir, 1);
  95. /* command returns */
  96. exits(0);
  97. }
  98. static void
  99. dingdong(void*, char *msg)
  100. {
  101. if(strstr(msg, "alarm") != nil)
  102. noted(NCONT);
  103. noted(NDFLT);
  104. }
  105. void
  106. listendir(char *protodir, char *srvdir, int trusted)
  107. {
  108. int ctl, pid, start;
  109. Announce *a;
  110. char dir[40];
  111. if (srvdir == 0)
  112. return;
  113. /*
  114. * insulate ourselves from later
  115. * changing of console environment variables
  116. * erase privileged crypt state
  117. */
  118. switch(rfork(RFNOTEG|RFPROC|RFFDG|RFNOWAIT|RFENVG|RFNAMEG)) {
  119. case -1:
  120. error("fork");
  121. case 0:
  122. break;
  123. default:
  124. return;
  125. }
  126. if (!trusted)
  127. becomenone();
  128. notify(dingdong);
  129. pid = getpid();
  130. for(;;){
  131. /*
  132. * loop through announcements and process trusted services in
  133. * invoker's ns and untrusted in none's.
  134. */
  135. scandir(proto, protodir, srvdir);
  136. for(a = announcements; a; a = a->next){
  137. if(a->announced > 0)
  138. continue;
  139. sleep((pid*10)%200);
  140. /* a process per service */
  141. switch(pid = rfork(RFFDG|RFPROC)){
  142. case -1:
  143. syslog(1, listenlog, "couldn't fork for %s", a->a);
  144. break;
  145. case 0:
  146. for(;;){
  147. ctl = announce(a->a, dir);
  148. if(ctl < 0) {
  149. syslog(1, listenlog, "giving up on %s: %r", a->a);
  150. exits("ctl");
  151. }
  152. dolisten(proto, dir, ctl, srvdir);
  153. close(ctl);
  154. }
  155. default:
  156. a->announced = pid;
  157. break;
  158. }
  159. }
  160. /* pick up any children that gave up and sleep for at least 60 seconds */
  161. start = time(0);
  162. alarm(60*1000);
  163. while((pid = waitpid()) > 0)
  164. for(a = announcements; a; a = a->next)
  165. if(a->announced == pid)
  166. a->announced = 0;
  167. alarm(0);
  168. start = 60 - (time(0)-start);
  169. if(start > 0)
  170. sleep(start*1000);
  171. }
  172. /* not reached */
  173. }
  174. /*
  175. * make a list of all services to announce for
  176. */
  177. void
  178. addannounce(char *fmt, ...)
  179. {
  180. Announce *a, **l;
  181. char str[128];
  182. va_list arg;
  183. va_start(arg, fmt);
  184. vseprint(str, str+sizeof(str), fmt, arg);
  185. va_end(arg);
  186. /* look for duplicate */
  187. l = &announcements;
  188. for(a = announcements; a; a = a->next){
  189. if(strcmp(str, a->a) == 0)
  190. return;
  191. l = &a->next;
  192. }
  193. /* accept it */
  194. a = mallocz(sizeof(*a) + strlen(str) + 1, 1);
  195. if(a == 0)
  196. return;
  197. a->a = ((char*)a)+sizeof(*a);
  198. strcpy(a->a, str);
  199. a->announced = 0;
  200. *l = a;
  201. }
  202. void
  203. scandir(char *proto, char *protodir, char *dname)
  204. {
  205. int fd, i, n, nlen;
  206. Dir *db;
  207. fd = open(dname, OREAD);
  208. if(fd < 0)
  209. return;
  210. nlen = strlen(proto);
  211. while((n=dirread(fd, &db)) > 0){
  212. for(i=0; i<n; i++){
  213. if(db[i].qid.type&QTDIR)
  214. continue;
  215. if(strncmp(db[i].name, proto, nlen) != 0)
  216. continue;
  217. addannounce("%s!*!%s", protodir, db[i].name+nlen);
  218. }
  219. free(db);
  220. }
  221. close(fd);
  222. }
  223. void
  224. becomenone(void)
  225. {
  226. int fd;
  227. fd = open("#c/user", OWRITE);
  228. if(fd < 0 || write(fd, "none", strlen("none")) < 0)
  229. error("can't become none");
  230. close(fd);
  231. if(newns("none", namespace) < 0)
  232. error("can't build namespace");
  233. }
  234. void
  235. dolisten(char *proto, char *dir, int ctl, char *srvdir)
  236. {
  237. Service s;
  238. char ndir[40];
  239. int nctl, data;
  240. for(;;){
  241. /*
  242. * wait for a call (or an error)
  243. */
  244. nctl = listen(dir, ndir);
  245. if(nctl < 0){
  246. if(!quiet)
  247. syslog(1, listenlog, "listen: %r");
  248. return;
  249. }
  250. /*
  251. * start a subprocess for the connection
  252. */
  253. switch(rfork(RFFDG|RFPROC|RFNOWAIT|RFENVG|RFNAMEG|RFNOTEG)){
  254. case -1:
  255. reject(nctl, ndir, "host overloaded");
  256. close(nctl);
  257. continue;
  258. case 0:
  259. /*
  260. * see if we know the service requested
  261. */
  262. memset(&s, 0, sizeof s);
  263. if(!findserv(proto, ndir, &s, srvdir)){
  264. if(!quiet)
  265. syslog(1, listenlog, "%s: unknown service '%s' from '%s': %r",
  266. proto, s.serv, s.remote);
  267. reject(nctl, ndir, "connection refused");
  268. exits(0);
  269. }
  270. data = accept(nctl, ndir);
  271. if(data < 0){
  272. syslog(1, listenlog, "can't open %s/data: %r", ndir);
  273. exits(0);
  274. }
  275. fprint(nctl, "keepalive");
  276. close(ctl);
  277. close(nctl);
  278. newcall(data, proto, ndir, &s);
  279. exits(0);
  280. default:
  281. close(nctl);
  282. break;
  283. }
  284. }
  285. }
  286. /*
  287. * look in the service directory for the service
  288. */
  289. int
  290. findserv(char *proto, char *dir, Service *s, char *srvdir)
  291. {
  292. if(!getserv(proto, dir, s))
  293. return 0;
  294. sprint(s->prog, "%s/%s", srvdir, s->serv);
  295. if(access(s->prog, AEXIST) >= 0)
  296. return 1;
  297. return 0;
  298. }
  299. /*
  300. * get the service name out of the local address
  301. */
  302. int
  303. getserv(char *proto, char *dir, Service *s)
  304. {
  305. char addr[128], *serv, *p;
  306. long n;
  307. readstr(dir, "remote", s->remote, sizeof(s->remote)-1);
  308. if(p = utfrune(s->remote, L'\n'))
  309. *p = '\0';
  310. n = readstr(dir, "local", addr, sizeof(addr)-1);
  311. if(n <= 0)
  312. return 0;
  313. if(p = utfrune(addr, L'\n'))
  314. *p = '\0';
  315. serv = utfrune(addr, L'!');
  316. if(!serv)
  317. serv = "login";
  318. else
  319. serv++;
  320. /*
  321. * disallow service names like
  322. * ../../usr/user/bin/rc/su
  323. */
  324. if(strlen(serv) +strlen(proto) >= NAMELEN || utfrune(serv, L'/') || *serv == '.')
  325. return 0;
  326. sprint(s->serv, "%s%s", proto, serv);
  327. return 1;
  328. }
  329. char *
  330. remoteaddr(char *dir)
  331. {
  332. char buf[128], *p;
  333. int n, fd;
  334. snprint(buf, sizeof buf, "%s/remote", dir);
  335. fd = open(buf, OREAD);
  336. if(fd < 0)
  337. return strdup("");
  338. n = read(fd, buf, sizeof(buf));
  339. close(fd);
  340. if(n > 0){
  341. buf[n] = 0;
  342. p = strchr(buf, '!');
  343. if(p)
  344. *p = 0;
  345. return strdup(buf);
  346. }
  347. return strdup("");
  348. }
  349. void
  350. newcall(int fd, char *proto, char *dir, Service *s)
  351. {
  352. char data[4*NAMELEN];
  353. char *p;
  354. if(!quiet){
  355. if(dir != nil){
  356. p = remoteaddr(dir);
  357. syslog(0, listenlog, "%s call for %s on chan %s (%s)", proto, s->serv, dir, p);
  358. free(p);
  359. } else
  360. syslog(0, listenlog, "%s call for %s on chan %s", proto, s->serv, dir);
  361. }
  362. sprint(data, "%s/data", dir);
  363. bind(data, "/dev/cons", MREPL);
  364. dup(fd, 0);
  365. dup(fd, 1);
  366. dup(fd, 2);
  367. close(fd);
  368. /*
  369. * close all the fds
  370. */
  371. for(fd=3; fd<20; fd++)
  372. close(fd);
  373. execl(s->prog, s->prog, s->serv, proto, dir, nil);
  374. error(s->prog);
  375. }
  376. void
  377. error(char *s)
  378. {
  379. syslog(1, listenlog, "%s: %s: %r", proto, s);
  380. exits(0);
  381. }
  382. /*
  383. * read a string from a device
  384. */
  385. int
  386. readstr(char *dir, char *info, char *s, int len)
  387. {
  388. int n, fd;
  389. char buf[3*NAMELEN+4];
  390. snprint(buf, sizeof buf, "%s/%s", dir, info);
  391. fd = open(buf, OREAD);
  392. if(fd<0)
  393. return 0;
  394. n = read(fd, s, len-1);
  395. if(n<=0){
  396. close(fd);
  397. return -1;
  398. }
  399. s[n] = 0;
  400. close(fd);
  401. return n+1;
  402. }