index 940f61b493c0c0f284eb36fec4ae4d26ae07822e..777775053af71f0c6ec2fb88d788d47d9f06592d 100644 (file)
*/
#include "sysdb.h"
-#include "frontend/connection.h"
+#include "core/object.h"
+#include "core/plugin.h"
+#include "frontend/connection-private.h"
+#include "frontend/parser.h"
+#include "utils/error.h"
#include "utils/strbuf.h"
+#include "utils/proto.h"
#include <assert.h>
#include <errno.h>
#include <arpa/inet.h>
+#include <fcntl.h>
+#include <stdlib.h>
#include <string.h>
+#include <pthread.h>
+
+/*
+ * private variables
+ */
+
+static pthread_key_t conn_ctx_key;
+static _Bool conn_ctx_key_initialized = 0;
+
+/*
+ * private types
+ */
+
+/* name of connection objects */
+#define CONN_FD_PREFIX "conn#"
+#define CONN_FD_PLACEHOLDER "XXXXXXX"
+
+static int
+connection_init(sdb_object_t *obj, va_list ap)
+{
+ sdb_conn_t *conn;
+ int sock_fd;
+ int sock_fl;
+
+ assert(obj);
+ conn = CONN(obj);
+
+ sock_fd = va_arg(ap, int);
+
+ conn->buf = sdb_strbuf_create(/* size = */ 128);
+ if (! conn->buf) {
+ sdb_log(SDB_LOG_ERR, "frontend: Failed to allocate a read buffer "
+ "for a new connection");
+ return -1;
+ }
+ conn->errbuf = sdb_strbuf_create(0);
+ if (! conn->errbuf) {
+ sdb_log(SDB_LOG_ERR, "frontend: Failed to allocate an error buffer "
+ "for a new connection");
+ return -1;
+ }
+
+ conn->client_addr_len = sizeof(conn->client_addr);
+ conn->fd = accept(sock_fd, (struct sockaddr *)&conn->client_addr,
+ &conn->client_addr_len);
+
+ if (conn->fd < 0) {
+ char buf[1024];
+ sdb_log(SDB_LOG_ERR, "frontend: Failed to accept remote "
+ "connection: %s", sdb_strerror(errno,
+ buf, sizeof(buf)));
+ return -1;
+ }
+
+ if (conn->client_addr.ss_family != AF_UNIX) {
+ sdb_log(SDB_LOG_ERR, "frontend: Accepted connection using "
+ "unexpected family type %d", conn->client_addr.ss_family);
+ return -1;
+ }
+
+ sock_fl = fcntl(conn->fd, F_GETFL);
+ if (fcntl(conn->fd, F_SETFL, sock_fl | O_NONBLOCK)) {
+ char buf[1024];
+ sdb_log(SDB_LOG_ERR, "frontend: Failed to switch connection conn#%i "
+ "to non-blocking mode: %s", conn->fd,
+ sdb_strerror(errno, buf, sizeof(buf)));
+ return -1;
+ }
+
+ sdb_log(SDB_LOG_DEBUG, "frontend: Accepted connection on fd=%i",
+ conn->fd);
+
+ conn->cmd = CONNECTION_IDLE;
+ conn->cmd_len = 0;
+ conn->skip_len = 0;
+
+ /* update the object name */
+ snprintf(obj->name + strlen(CONN_FD_PREFIX),
+ strlen(CONN_FD_PLACEHOLDER), "%i", conn->fd);
+ return 0;
+} /* connection_init */
+
+static void
+connection_destroy(sdb_object_t *obj)
+{
+ sdb_conn_t *conn;
+ size_t len;
+
+ assert(obj);
+ conn = CONN(obj);
+
+ if (conn->buf) {
+ len = sdb_strbuf_len(conn->buf);
+ if (len)
+ sdb_log(SDB_LOG_INFO, "frontend: Discarding incomplete command "
+ "(%zu byte%s left in buffer)", len, len == 1 ? "" : "s");
+ }
+
+ sdb_log(SDB_LOG_DEBUG, "frontend: Closing connection %s", obj->name);
+ if (conn->fd >= 0)
+ close(conn->fd);
+ conn->fd = -1;
+
+ if (conn->username)
+ free(conn->username);
+ conn->username = NULL;
+
+ sdb_strbuf_destroy(conn->buf);
+ conn->buf = NULL;
+ sdb_strbuf_destroy(conn->errbuf);
+ conn->errbuf = NULL;
+} /* connection_destroy */
+
+static sdb_type_t connection_type = {
+ /* size = */ sizeof(sdb_conn_t),
+ /* init = */ connection_init,
+ /* destroy = */ connection_destroy,
+};
+
+/*
+ * private helper functions
+ */
+
+static void
+sdb_conn_ctx_destructor(void *c)
+{
+ sdb_object_t *conn = c;
+
+ if (! conn)
+ return;
+ sdb_object_deref(conn);
+} /* sdb_conn_ctx_destructor */
+
+static void
+sdb_conn_ctx_init(void)
+{
+ if (conn_ctx_key_initialized)
+ return;
+
+ pthread_key_create(&conn_ctx_key, sdb_conn_ctx_destructor);
+ conn_ctx_key_initialized = 1;
+} /* sdb_conn_ctx_init */
+
+static void
+sdb_conn_set_ctx(sdb_conn_t *conn)
+{
+ sdb_conn_t *old;
+
+ sdb_conn_ctx_init();
+
+ old = pthread_getspecific(conn_ctx_key);
+ if (old)
+ sdb_object_deref(SDB_OBJ(old));
+ if (conn)
+ sdb_object_ref(SDB_OBJ(conn));
+ pthread_setspecific(conn_ctx_key, conn);
+} /* sdb_conn_set_ctx */
+
+static sdb_conn_t *
+sdb_conn_get_ctx(void)
+{
+ if (! conn_ctx_key_initialized)
+ return NULL;
+ return pthread_getspecific(conn_ctx_key);
+} /* sdb_conn_get_ctx */
+
/*
* connection handler functions
*/
+/*
+ * connection_log:
+ * Send a log message originating from the current thread to the client.
+ */
+static int
+connection_log(int prio, const char *msg,
+ sdb_object_t __attribute__((unused)) *user_data)
+{
+ sdb_conn_t *conn;
+
+ conn = sdb_conn_get_ctx();
+ /* no connection associated to this thread
+ * or user not authenticated yet => don't leak any information */
+ if ((! conn) || (! conn->username))
+ return 0;
+
+ /* XXX: make the log-level configurable by the client at runtime */
+ if (prio >= SDB_LOG_DEBUG)
+ return 0;
+
+ /* TODO: Use CONNECTION_LOG_<prio>? */
+ if (sdb_connection_send(conn, CONNECTION_LOG,
+ (uint32_t)strlen(msg), msg) < 0)
+ return -1;
+ return 0;
+} /* connection_log */
+
static uint32_t
connection_get_int32(sdb_conn_t *conn, size_t offset)
{
static int
command_handle(sdb_conn_t *conn)
{
- assert(conn && conn->cmd && conn->cmd_len);
- /* XXX */
- sdb_strbuf_skip(conn->buf, conn->cmd_len);
- conn->cmd = conn->cmd_len = 0;
- return 0;
+ int status = -1;
+
+ assert(conn && (conn->cmd != CONNECTION_IDLE));
+ assert(! conn->skip_len);
+
+ sdb_log(SDB_LOG_DEBUG, "frontend: Handling command %u (len: %u)",
+ conn->cmd, conn->cmd_len);
+
+ switch (conn->cmd) {
+ case CONNECTION_PING:
+ status = sdb_connection_ping(conn);
+ break;
+ case CONNECTION_STARTUP:
+ status = sdb_fe_session_start(conn);
+ break;
+
+ case CONNECTION_QUERY:
+ {
+ sdb_llist_t *parsetree;
+ sdb_conn_node_t *node = NULL;
+
+ parsetree = sdb_fe_parse(sdb_strbuf_string(conn->buf),
+ (int)conn->cmd_len);
+ if (! parsetree) {
+ sdb_log(SDB_LOG_ERR, "frontend: Failed to parse query '%s'",
+ sdb_strbuf_string(conn->buf));
+ status = -1;
+ break;
+ }
+
+ switch (sdb_llist_len(parsetree)) {
+ case 0:
+ /* skipping empty command */
+ break;
+ case 1:
+ node = SDB_CONN_NODE(sdb_llist_get(parsetree, 0));
+ break;
+
+ default:
+ sdb_log(SDB_LOG_WARNING, "frontend: Ignoring %d command%s "
+ "in multi-statement query '%s'",
+ sdb_llist_len(parsetree) - 1,
+ sdb_llist_len(parsetree) == 2 ? "" : "s",
+ sdb_strbuf_string(conn->buf));
+ node = SDB_CONN_NODE(sdb_llist_get(parsetree, 0));
+ }
+
+ if (node) {
+ status = sdb_fe_exec(conn, node);
+ sdb_object_deref(SDB_OBJ(node));
+ }
+
+ sdb_llist_destroy(parsetree);
+ break;
+ }
+
+ case CONNECTION_FETCH:
+ status = sdb_fe_fetch(conn, sdb_strbuf_string(conn->buf),
+ /* filter = */ NULL);
+ break;
+ case CONNECTION_LIST:
+ status = sdb_fe_list(conn, /* filter = */ NULL);
+ break;
+ case CONNECTION_LOOKUP:
+ {
+ sdb_store_matcher_t *m;
+
+ m = sdb_fe_parse_matcher(sdb_strbuf_string(conn->buf),
+ (int)conn->cmd_len);
+ if (! m) {
+ sdb_log(SDB_LOG_ERR, "frontend: Failed to parse expression '%s'",
+ sdb_strbuf_string(conn->buf));
+ status = -1;
+ break;
+ }
+
+ status = sdb_fe_lookup(conn, m, /* filter = */ NULL);
+ sdb_object_deref(SDB_OBJ(m));
+ break;
+ }
+
+ default:
+ {
+ sdb_log(SDB_LOG_WARNING, "frontend: Ignoring invalid command %#x",
+ conn->cmd);
+ sdb_strbuf_sprintf(conn->errbuf, "Invalid command %#x", conn->cmd);
+ status = -1;
+ break;
+ }
+ }
+
+ if (status)
+ sdb_connection_send(conn, CONNECTION_ERROR,
+ (uint32_t)sdb_strbuf_len(conn->errbuf),
+ sdb_strbuf_string(conn->errbuf));
+ return status;
} /* command_handle */
/* initialize the connection state information */
static int
command_init(sdb_conn_t *conn)
{
- assert(conn && (! conn->cmd) && (! conn->cmd_len));
+ const char *errmsg = NULL;
+
+ assert(conn && (conn->cmd == CONNECTION_IDLE) && (! conn->cmd_len));
+
+ if (conn->skip_len)
+ return -1;
+
+ /* reset */
+ sdb_strbuf_sprintf(conn->errbuf, "");
conn->cmd = connection_get_int32(conn, 0);
conn->cmd_len = connection_get_int32(conn, sizeof(uint32_t));
- sdb_strbuf_skip(conn->buf, 2 * sizeof(uint32_t));
+
+ sdb_strbuf_skip(conn->buf, 0, 2 * sizeof(uint32_t));
+
+ if ((! conn->username) && (conn->cmd != CONNECTION_STARTUP))
+ errmsg = "Authentication required";
+ else if (conn->cmd == CONNECTION_IDLE)
+ errmsg = "Invalid command 0";
+
+ if (errmsg) {
+ size_t len = sdb_strbuf_len(conn->buf);
+
+ sdb_strbuf_sprintf(conn->errbuf, errmsg);
+ sdb_connection_send(conn, CONNECTION_ERROR,
+ (uint32_t)strlen(errmsg), errmsg);
+ conn->skip_len += conn->cmd_len;
+ conn->cmd = CONNECTION_IDLE;
+ conn->cmd_len = 0;
+
+ if (len > conn->skip_len)
+ len = conn->skip_len;
+ sdb_strbuf_skip(conn->buf, 0, len);
+ conn->skip_len -= len;
+ /* connection_read will handle anything else */
+ }
return 0;
} /* command_init */
{
ssize_t n = 0;
+ if ((! conn) || (conn->fd < 0))
+ return -1;
+
while (42) {
ssize_t status;
if (status < 0) {
if ((errno == EAGAIN) || (errno == EWOULDBLOCK))
break;
+
+ close(conn->fd);
+ conn->fd = -1;
return (int)status;
}
else if (! status) /* EOF */
break;
+ if (conn->skip_len) {
+ size_t len = (size_t)status < conn->skip_len
+ ? (size_t)status : conn->skip_len;
+ sdb_strbuf_skip(conn->buf, 0, len);
+ conn->skip_len -= len;
+ }
+
n += status;
+
+ /* give the main loop a chance to execute commands (and free up buffer
+ * space) on large amounts of incoming traffic */
+ if (n > 1024 * 1024)
+ break;
}
return n;
* public API
*/
+int
+sdb_connection_enable_logging(void)
+{
+ return sdb_plugin_register_log("connection-logger", connection_log,
+ /* user_data = */ NULL);
+} /* sdb_connection_enable_logging */
+
+sdb_conn_t *
+sdb_connection_accept(int fd)
+{
+ if (fd < 0)
+ return NULL;
+
+ /* the placeholder will be replaced with the accepted file
+ * descriptor when initializing the object */
+ return CONN(sdb_object_create(CONN_FD_PREFIX CONN_FD_PLACEHOLDER,
+ connection_type, fd));
+} /* sdb_connection_create */
+
+void
+sdb_connection_close(sdb_conn_t *conn)
+{
+ if (! conn)
+ return;
+
+ /* close the connection even if someone else still references it */
+ if (conn->fd >= 0)
+ close(conn->fd);
+ conn->fd = -1;
+
+ sdb_object_deref(SDB_OBJ(conn));
+} /* sdb_connection_close */
+
ssize_t
sdb_connection_read(sdb_conn_t *conn)
{
ssize_t n = 0;
+ sdb_conn_set_ctx(conn);
+
while (42) {
ssize_t status = connection_read(conn);
- if ((! conn->cmd) && (! conn->cmd_len)
+ if ((conn->cmd == CONNECTION_IDLE) && (! conn->cmd_len)
&& (sdb_strbuf_len(conn->buf) >= 2 * sizeof(int32_t)))
command_init(conn);
- if (conn->cmd_len && (sdb_strbuf_len(conn->buf) >= conn->cmd_len))
+ if ((conn->cmd != CONNECTION_IDLE)
+ && (sdb_strbuf_len(conn->buf) >= conn->cmd_len)) {
command_handle(conn);
+ /* remove the command from the buffer */
+ if (conn->cmd_len)
+ sdb_strbuf_skip(conn->buf, 0, conn->cmd_len);
+ conn->cmd = CONNECTION_IDLE;
+ conn->cmd_len = 0;
+ }
+
if (status <= 0)
break;
n += status;
}
+
+ sdb_conn_set_ctx(NULL);
return n;
} /* sdb_connection_read */
+ssize_t
+sdb_connection_send(sdb_conn_t *conn, uint32_t code,
+ uint32_t msg_len, const char *msg)
+{
+ ssize_t status;
+
+ if ((! conn) || (conn->fd < 0))
+ return -1;
+
+ status = sdb_proto_send_msg(conn->fd, code, msg_len, msg);
+ if (status < 0) {
+ char errbuf[1024];
+
+ /* tell other code that there was a problem and, more importantly,
+ * make sure we don't try to send further logs to the connection */
+ close(conn->fd);
+ conn->fd = -1;
+
+ sdb_log(SDB_LOG_ERR, "frontend: Failed to send msg "
+ "(code: %u, len: %u) to client: %s", code, msg_len,
+ sdb_strerror(errno, errbuf, sizeof(errbuf)));
+ }
+ return status;
+} /* sdb_connection_send */
+
+int
+sdb_connection_ping(sdb_conn_t *conn)
+{
+ if ((! conn) || (conn->cmd != CONNECTION_PING))
+ return -1;
+
+ /* we're alive */
+ sdb_connection_send(conn, CONNECTION_OK, 0, NULL);
+ return 0;
+} /* sdb_connection_ping */
+
/* vim: set tw=78 sw=4 ts=4 noexpandtab : */