1 | /* |
2 | * socket_ce.c |
3 | * |
4 | * Copyright (C) 2016-2018 Aerospike, Inc. |
5 | * |
6 | * Portions may be licensed to Aerospike, Inc. under one or more contributor |
7 | * license agreements. |
8 | * |
9 | * This program is free software: you can redistribute it and/or modify it under |
10 | * the terms of the GNU Affero General Public License as published by the Free |
11 | * Software Foundation, either version 3 of the License, or (at your option) any |
12 | * later version. |
13 | * |
14 | * This program is distributed in the hope that it will be useful, but WITHOUT |
15 | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS |
16 | * FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more |
17 | * details. |
18 | * |
19 | * You should have received a copy of the GNU Affero General Public License |
20 | * along with this program. If not, see http://www.gnu.org/licenses/ |
21 | */ |
22 | |
23 | #define CF_SOCKET_PRIVATE |
24 | #include "socket.h" |
25 | |
26 | #include <errno.h> |
27 | #include <netdb.h> |
28 | #include <stdbool.h> |
29 | #include <stddef.h> |
30 | #include <stdint.h> |
31 | #include <string.h> |
32 | |
33 | #include <arpa/inet.h> |
34 | #include <netinet/in.h> |
35 | #include <sys/socket.h> |
36 | #include <sys/types.h> |
37 | |
38 | #include "bits.h" |
39 | #include "dns.h" |
40 | #include "fault.h" |
41 | |
42 | #include "citrusleaf/alloc.h" |
43 | |
44 | addrinfo g_cf_ip_addr_dns_hints = { .ai_flags = 0, .ai_family = AF_INET }; |
45 | |
46 | static char * |
47 | safe_strndup(const char *string, size_t length) |
48 | { |
49 | char *res = cf_strndup(string, length); |
50 | |
51 | if (res == NULL) { |
52 | cf_crash(CF_SOCKET, "Out of memory" ); |
53 | } |
54 | |
55 | return res; |
56 | } |
57 | |
58 | void |
59 | cf_socket_set_advertise_ipv6(bool advertise) |
60 | { |
61 | cf_warning(CF_SOCKET, "'advertise-ipv6' is relevant for enterprise only" ); |
62 | } |
63 | |
64 | bool |
65 | cf_socket_advertises_ipv6(void) |
66 | { |
67 | return false; |
68 | } |
69 | |
70 | int32_t |
71 | cf_ip_addr_from_addrinfo(const char *name, const addrinfo *info, |
72 | cf_ip_addr *addrs, uint32_t *n_addrs) |
73 | { |
74 | uint32_t i = 0; |
75 | |
76 | for (const addrinfo *walker = info; walker != NULL; |
77 | walker = walker->ai_next) { |
78 | if (walker->ai_socktype == SOCK_STREAM) { |
79 | if (i >= *n_addrs) { |
80 | cf_warning(CF_SOCKET, "Too many IP addresses for '%s'" , name); |
81 | return -1; |
82 | } |
83 | |
84 | struct sockaddr_in *sai = (struct sockaddr_in *)walker->ai_addr; |
85 | addrs[i].v4 = sai->sin_addr; |
86 | ++i; |
87 | } |
88 | } |
89 | |
90 | if (i == 0) { |
91 | cf_warning(CF_SOCKET, "No valid addresses for '%s'" , name); |
92 | return -1; |
93 | } |
94 | |
95 | cf_ip_addr_sort(addrs, i); |
96 | *n_addrs = i; |
97 | return 0; |
98 | } |
99 | |
100 | bool |
101 | cf_ip_addr_str_is_legacy(const char *string) |
102 | { |
103 | (void)string; |
104 | return true; |
105 | } |
106 | |
107 | bool |
108 | cf_ip_addr_is_legacy(const cf_ip_addr* addr) |
109 | { |
110 | (void)addr; |
111 | return true; |
112 | } |
113 | |
114 | bool |
115 | cf_ip_addr_legacy_only(void) |
116 | { |
117 | return true; |
118 | } |
119 | |
120 | int32_t |
121 | cf_ip_addr_to_string(const cf_ip_addr *addr, char *string, size_t size) |
122 | { |
123 | if (inet_ntop(AF_INET, &addr->v4, string, size) == NULL) { |
124 | cf_warning(CF_SOCKET, "Output buffer overflow" ); |
125 | return -1; |
126 | } |
127 | |
128 | return strlen(string); |
129 | } |
130 | |
131 | int32_t |
132 | cf_ip_addr_from_binary(const uint8_t *binary, size_t size, cf_ip_addr *addr) |
133 | { |
134 | if (size != 4) { |
135 | cf_debug(CF_SOCKET, "Input buffer size incorrect." ); |
136 | return -1; |
137 | } |
138 | |
139 | memcpy(&addr->v4, binary, 4); |
140 | return 4; |
141 | } |
142 | |
143 | int32_t |
144 | cf_ip_addr_to_binary(const cf_ip_addr *addr, uint8_t *binary, size_t size) |
145 | { |
146 | if (size < 4) { |
147 | cf_warning(CF_SOCKET, "Output buffer overflow" ); |
148 | return -1; |
149 | } |
150 | |
151 | memcpy(binary, &addr->v4, 4); |
152 | return 4; |
153 | } |
154 | |
155 | void |
156 | cf_ip_addr_to_rack_aware_id(const cf_ip_addr *addr, uint32_t *id) |
157 | { |
158 | *id = ntohl(addr->v4.s_addr); |
159 | } |
160 | |
161 | int32_t |
162 | cf_ip_addr_compare(const cf_ip_addr *lhs, const cf_ip_addr *rhs) |
163 | { |
164 | return memcmp(&lhs->v4, &rhs->v4, 4); |
165 | } |
166 | |
167 | void |
168 | cf_ip_addr_copy(const cf_ip_addr *from, cf_ip_addr *to) |
169 | { |
170 | to->v4 = from->v4; |
171 | } |
172 | |
173 | void |
174 | cf_ip_addr_set_local(cf_ip_addr *addr) |
175 | { |
176 | addr->v4.s_addr = htonl(0x7f000001); |
177 | } |
178 | |
179 | bool |
180 | cf_ip_addr_is_local(const cf_ip_addr *addr) |
181 | { |
182 | return (ntohl(addr->v4.s_addr) & 0xff000000) == 0x7f000000; |
183 | } |
184 | |
185 | void |
186 | cf_ip_addr_set_any(cf_ip_addr *addr) |
187 | { |
188 | addr->v4.s_addr = 0; |
189 | } |
190 | |
191 | bool |
192 | cf_ip_addr_is_any(const cf_ip_addr *addr) |
193 | { |
194 | return addr->v4.s_addr == 0; |
195 | } |
196 | |
197 | int32_t |
198 | cf_ip_net_from_string(const char *string, cf_ip_net *net) |
199 | { |
200 | size_t len = strlen(string); |
201 | char net_string[len + 1]; |
202 | |
203 | strcpy(net_string, string); |
204 | |
205 | char *slash = strchr(net_string, '/'); |
206 | |
207 | if (slash != NULL) { |
208 | *slash = 0; |
209 | } |
210 | |
211 | if (inet_pton(AF_INET, net_string, &net->addr.v4) != 1) { |
212 | cf_warning(CF_SOCKET, "Invalid IP address %s" , net_string); |
213 | return -1; |
214 | } |
215 | |
216 | net->family = AF_INET; |
217 | |
218 | uint32_t prefix_bits; |
219 | |
220 | if (slash == NULL) { |
221 | prefix_bits = 32; |
222 | } |
223 | else { |
224 | char *end; |
225 | prefix_bits = strtoul(slash + 1, &end, 10); |
226 | |
227 | if (*end != 0 || prefix_bits > 32) { |
228 | cf_warning(CF_SOCKET, "Invalid network address %s" , string); |
229 | return -1; |
230 | } |
231 | } |
232 | |
233 | uint8_t *mask = (uint8_t *)&net->mask; |
234 | |
235 | memset(mask, 0, sizeof(cf_ip_addr)); |
236 | |
237 | while (prefix_bits >= 8) { |
238 | *mask++ = 0xff; |
239 | prefix_bits -= 8; |
240 | } |
241 | |
242 | *mask = (uint8_t)(0xff << (8 - prefix_bits)); |
243 | |
244 | if ((net->addr.v4.s_addr & ~net->mask.v4.s_addr) != 0) { |
245 | cf_warning(CF_SOCKET, "Invalid network address %s" , string); |
246 | return -1; |
247 | } |
248 | |
249 | return 0; |
250 | } |
251 | |
252 | int32_t |
253 | cf_ip_net_to_string(const cf_ip_net *net, char *string, size_t size) |
254 | { |
255 | if (inet_ntop(AF_INET, &net->addr.v4, string, size) == NULL) { |
256 | cf_warning(CF_SOCKET, "Output buffer overflow" ); |
257 | return -1; |
258 | } |
259 | |
260 | size_t len = strlen(string); |
261 | uint32_t prefix_bits = cf_bit_count64(net->mask.v4.s_addr); |
262 | |
263 | if (prefix_bits < 32) { |
264 | size_t room = size - len; |
265 | int added = snprintf(string + len, room, "/%u" , prefix_bits); |
266 | |
267 | if (added >= room) { |
268 | cf_warning(CF_SOCKET, "Output buffer overflow" ); |
269 | return -1; |
270 | } |
271 | |
272 | len += added; |
273 | } |
274 | |
275 | return (int32_t)len; |
276 | } |
277 | |
278 | bool |
279 | cf_ip_net_contains(const cf_ip_net *net, const cf_ip_addr *addr) |
280 | { |
281 | return (addr->v4.s_addr & net->mask.v4.s_addr) == net->addr.v4.s_addr; |
282 | } |
283 | |
284 | int32_t |
285 | cf_sock_addr_to_string(const cf_sock_addr *addr, char *string, size_t size) |
286 | { |
287 | int32_t total = 0; |
288 | int32_t count = cf_ip_addr_to_string(&addr->addr, string, size); |
289 | |
290 | if (count < 0) { |
291 | return -1; |
292 | } |
293 | |
294 | total += count; |
295 | |
296 | if (size - total < 2) { |
297 | cf_warning(CF_SOCKET, "Output buffer overflow" ); |
298 | return -1; |
299 | } |
300 | |
301 | string[total++] = ':'; |
302 | string[total] = 0; |
303 | |
304 | count = cf_ip_port_to_string(addr->port, string + total, size - total); |
305 | |
306 | if (count < 0) { |
307 | return -1; |
308 | } |
309 | |
310 | total += count; |
311 | return total; |
312 | } |
313 | |
314 | int32_t |
315 | cf_sock_addr_from_string(const char *string, cf_sock_addr *addr) |
316 | { |
317 | int32_t res = -1; |
318 | const char *colon = strchr(string, ':'); |
319 | |
320 | if (colon == NULL) { |
321 | cf_warning(CF_SOCKET, "Missing ':' in socket address '%s'" , string); |
322 | goto cleanup0; |
323 | } |
324 | |
325 | const char *host = safe_strndup(string, colon - string); |
326 | |
327 | if (cf_ip_addr_from_string(host, &addr->addr) < 0) { |
328 | cf_warning(CF_SOCKET, "Invalid host address '%s' in socket address '%s'" , host, string); |
329 | goto cleanup1; |
330 | } |
331 | |
332 | if (cf_ip_port_from_string(colon + 1, &addr->port) < 0) { |
333 | cf_warning(CF_SOCKET, "Invalid port '%s' in socket address '%s'" , colon + 1, string); |
334 | goto cleanup1; |
335 | } |
336 | |
337 | res = 0; |
338 | |
339 | cleanup1: |
340 | cf_free((void *)host); |
341 | |
342 | cleanup0: |
343 | return res; |
344 | } |
345 | |
346 | void |
347 | cf_sock_addr_from_native(const struct sockaddr *native, cf_sock_addr *addr) |
348 | { |
349 | if (native->sa_family != AF_INET) { |
350 | cf_crash(CF_SOCKET, "Invalid address family: %d" , native->sa_family); |
351 | } |
352 | |
353 | struct sockaddr_in *sai = (struct sockaddr_in *)native; |
354 | addr->addr.v4 = sai->sin_addr; |
355 | addr->port = ntohs(sai->sin_port); |
356 | } |
357 | |
358 | void |
359 | cf_sock_addr_to_native(const cf_sock_addr *addr, struct sockaddr *native) |
360 | { |
361 | struct sockaddr_in *sai = (struct sockaddr_in *)native; |
362 | memset(sai, 0, sizeof(struct sockaddr_in)); |
363 | sai->sin_family = AF_INET; |
364 | sai->sin_addr = addr->addr.v4; |
365 | sai->sin_port = htons(addr->port); |
366 | } |
367 | |
368 | int32_t |
369 | cf_mserv_cfg_add_combo(cf_mserv_cfg *serv_cfg, cf_sock_owner owner, cf_ip_port port, |
370 | cf_ip_addr *addr, cf_ip_addr *if_addr, uint8_t ttl) |
371 | { |
372 | cf_msock_cfg sock_cfg; |
373 | cf_msock_cfg_init(&sock_cfg, owner); |
374 | sock_cfg.port = port; |
375 | cf_ip_addr_copy(addr, &sock_cfg.addr); |
376 | cf_ip_addr_copy(if_addr, &sock_cfg.if_addr); |
377 | sock_cfg.ttl = ttl; |
378 | |
379 | return cf_mserv_cfg_add_msock_cfg(serv_cfg, &sock_cfg); |
380 | } |
381 | |
382 | int32_t |
383 | cf_socket_mcast_set_inter(cf_socket *sock, const cf_ip_addr *iaddr) |
384 | { |
385 | struct ip_mreqn mr; |
386 | memset(&mr, 0, sizeof(mr)); |
387 | mr.imr_address = iaddr->v4; |
388 | |
389 | if (setsockopt(sock->fd, IPPROTO_IP, IP_MULTICAST_IF, &mr, sizeof(mr)) < 0) { |
390 | cf_warning(CF_SOCKET, "setsockopt(IP_MULTICAST_IF) failed on FD %d: %d (%s)" , |
391 | sock->fd, errno, cf_strerror(errno)); |
392 | return -1; |
393 | } |
394 | |
395 | return 0; |
396 | } |
397 | |
398 | int32_t |
399 | cf_socket_mcast_set_ttl(cf_socket *sock, int32_t ttl) |
400 | { |
401 | if (setsockopt(sock->fd, IPPROTO_IP, IP_MULTICAST_TTL, &ttl, sizeof(ttl)) < 0) { |
402 | cf_warning(CF_SOCKET, "setsockopt(IP_MULTICAST_TTL) failed on FD %d: %d (%s)" , |
403 | sock->fd, errno, cf_strerror(errno)); |
404 | return -1; |
405 | } |
406 | |
407 | return 0; |
408 | } |
409 | |
410 | int32_t |
411 | cf_socket_mcast_join_group(cf_socket *sock, const cf_ip_addr *iaddr, const cf_ip_addr *gaddr) |
412 | { |
413 | struct ip_mreqn mr; |
414 | memset(&mr, 0, sizeof(mr)); |
415 | |
416 | if (!cf_ip_addr_is_any(iaddr)) { |
417 | mr.imr_address = iaddr->v4; |
418 | } |
419 | |
420 | mr.imr_multiaddr = gaddr->v4; |
421 | |
422 | if (setsockopt(sock->fd, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mr, sizeof(mr)) < 0) { |
423 | cf_warning(CF_SOCKET, "setsockopt(IP_ADD_MEMBERSHIP) failed on FD %d: %d (%s)" , |
424 | sock->fd, errno, cf_strerror(errno)); |
425 | return -1; |
426 | } |
427 | |
428 | #ifdef IP_MULTICAST_ALL |
429 | // Only receive traffic from multicast groups this socket actually joins. |
430 | // Note: Bind address filtering takes precedence, so this is simply an extra level of |
431 | // restriction. |
432 | static const int32_t no = 0; |
433 | |
434 | if (setsockopt(sock->fd, IPPROTO_IP, IP_MULTICAST_ALL, &no, sizeof(no)) < 0) { |
435 | cf_warning(CF_SOCKET, "setsockopt(IP_MULTICAST_ALL) failed on FD %d: %d (%s)" , |
436 | sock->fd, errno, cf_strerror(errno)); |
437 | return -1; |
438 | } |
439 | #endif |
440 | |
441 | return 0; |
442 | } |
443 | |
444 | size_t |
445 | cf_socket_addr_len(const struct sockaddr *sa) |
446 | { |
447 | switch (sa->sa_family) { |
448 | case AF_INET: |
449 | return sizeof(struct sockaddr_in); |
450 | |
451 | default: |
452 | cf_crash(CF_SOCKET, "Invalid address family: %d" , sa->sa_family); |
453 | return 0; |
454 | } |
455 | } |
456 | |
457 | int32_t |
458 | cf_socket_parse_netlink(bool allow_ipv6, uint32_t family, uint32_t flags, |
459 | const void *data, size_t len, cf_ip_addr *addr) |
460 | { |
461 | (void)allow_ipv6; |
462 | (void)flags; |
463 | |
464 | if (family != AF_INET || len != 4) { |
465 | return -1; |
466 | } |
467 | |
468 | memcpy(&addr->v4, data, 4); |
469 | return 0; |
470 | } |
471 | |
472 | void |
473 | cf_socket_fix_client(cf_socket *sock) |
474 | { |
475 | (void)sock; |
476 | } |
477 | |
478 | void |
479 | cf_socket_fix_bind(cf_serv_cfg *serv_cfg) |
480 | { |
481 | (void)serv_cfg; |
482 | } |
483 | |
484 | void |
485 | cf_socket_fix_server(cf_socket *sock) |
486 | { |
487 | (void)sock; |
488 | } |
489 | |