mirror of https://github.com/lukechilds/node.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
241 lines
6.6 KiB
241 lines
6.6 KiB
/* Copyright StrongLoop, Inc. All rights reserved.
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
* of this software and associated documentation files (the "Software"), to
|
|
* deal in the Software without restriction, including without limitation the
|
|
* rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
|
* sell copies of the Software, and to permit persons to whom the Software is
|
|
* furnished to do so, subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be included in
|
|
* all copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
|
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
|
* IN THE SOFTWARE.
|
|
*/
|
|
|
|
#include "defs.h"
|
|
#include <netinet/in.h> /* INET6_ADDRSTRLEN */
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#ifndef INET6_ADDRSTRLEN
|
|
# define INET6_ADDRSTRLEN 63
|
|
#endif
|
|
|
|
typedef struct {
|
|
uv_getaddrinfo_t getaddrinfo_req;
|
|
server_config config;
|
|
server_ctx *servers;
|
|
uv_loop_t *loop;
|
|
} server_state;
|
|
|
|
static void do_bind(uv_getaddrinfo_t *req, int status, struct addrinfo *ai);
|
|
static void on_connection(uv_stream_t *server, int status);
|
|
|
|
int server_run(const server_config *cf, uv_loop_t *loop) {
|
|
struct addrinfo hints;
|
|
server_state state;
|
|
int err;
|
|
|
|
memset(&state, 0, sizeof(state));
|
|
state.servers = NULL;
|
|
state.config = *cf;
|
|
state.loop = loop;
|
|
|
|
/* Resolve the address of the interface that we should bind to.
|
|
* The getaddrinfo callback starts the server and everything else.
|
|
*/
|
|
memset(&hints, 0, sizeof(hints));
|
|
hints.ai_family = AF_UNSPEC;
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
hints.ai_protocol = IPPROTO_TCP;
|
|
|
|
err = uv_getaddrinfo(loop,
|
|
&state.getaddrinfo_req,
|
|
do_bind,
|
|
cf->bind_host,
|
|
NULL,
|
|
&hints);
|
|
if (err != 0) {
|
|
pr_err("getaddrinfo: %s", uv_strerror(err));
|
|
return err;
|
|
}
|
|
|
|
/* Start the event loop. Control continues in do_bind(). */
|
|
if (uv_run(loop, UV_RUN_DEFAULT)) {
|
|
abort();
|
|
}
|
|
|
|
/* Please Valgrind. */
|
|
uv_loop_delete(loop);
|
|
free(state.servers);
|
|
return 0;
|
|
}
|
|
|
|
/* Bind a server to each address that getaddrinfo() reported. */
|
|
static void do_bind(uv_getaddrinfo_t *req, int status, struct addrinfo *addrs) {
|
|
char addrbuf[INET6_ADDRSTRLEN + 1];
|
|
unsigned int ipv4_naddrs;
|
|
unsigned int ipv6_naddrs;
|
|
server_state *state;
|
|
server_config *cf;
|
|
struct addrinfo *ai;
|
|
const void *addrv;
|
|
const char *what;
|
|
uv_loop_t *loop;
|
|
server_ctx *sx;
|
|
unsigned int n;
|
|
int err;
|
|
union {
|
|
struct sockaddr addr;
|
|
struct sockaddr_in addr4;
|
|
struct sockaddr_in6 addr6;
|
|
} s;
|
|
|
|
state = CONTAINER_OF(req, server_state, getaddrinfo_req);
|
|
loop = state->loop;
|
|
cf = &state->config;
|
|
|
|
if (status < 0) {
|
|
pr_err("getaddrinfo(\"%s\"): %s", cf->bind_host, uv_strerror(status));
|
|
uv_freeaddrinfo(addrs);
|
|
return;
|
|
}
|
|
|
|
ipv4_naddrs = 0;
|
|
ipv6_naddrs = 0;
|
|
for (ai = addrs; ai != NULL; ai = ai->ai_next) {
|
|
if (ai->ai_family == AF_INET) {
|
|
ipv4_naddrs += 1;
|
|
} else if (ai->ai_family == AF_INET6) {
|
|
ipv6_naddrs += 1;
|
|
}
|
|
}
|
|
|
|
if (ipv4_naddrs == 0 && ipv6_naddrs == 0) {
|
|
pr_err("%s has no IPv4/6 addresses", cf->bind_host);
|
|
uv_freeaddrinfo(addrs);
|
|
return;
|
|
}
|
|
|
|
state->servers =
|
|
xmalloc((ipv4_naddrs + ipv6_naddrs) * sizeof(state->servers[0]));
|
|
|
|
n = 0;
|
|
for (ai = addrs; ai != NULL; ai = ai->ai_next) {
|
|
if (ai->ai_family != AF_INET && ai->ai_family != AF_INET6) {
|
|
continue;
|
|
}
|
|
|
|
if (ai->ai_family == AF_INET) {
|
|
s.addr4 = *(const struct sockaddr_in *) ai->ai_addr;
|
|
s.addr4.sin_port = htons(cf->bind_port);
|
|
addrv = &s.addr4.sin_addr;
|
|
} else if (ai->ai_family == AF_INET6) {
|
|
s.addr6 = *(const struct sockaddr_in6 *) ai->ai_addr;
|
|
s.addr6.sin6_port = htons(cf->bind_port);
|
|
addrv = &s.addr6.sin6_addr;
|
|
} else {
|
|
UNREACHABLE();
|
|
}
|
|
|
|
if (uv_inet_ntop(s.addr.sa_family, addrv, addrbuf, sizeof(addrbuf))) {
|
|
UNREACHABLE();
|
|
}
|
|
|
|
sx = state->servers + n;
|
|
sx->loop = loop;
|
|
sx->idle_timeout = state->config.idle_timeout;
|
|
CHECK(0 == uv_tcp_init(loop, &sx->tcp_handle));
|
|
|
|
what = "uv_tcp_bind";
|
|
err = uv_tcp_bind(&sx->tcp_handle, &s.addr, 0);
|
|
if (err == 0) {
|
|
what = "uv_listen";
|
|
err = uv_listen((uv_stream_t *) &sx->tcp_handle, 128, on_connection);
|
|
}
|
|
|
|
if (err != 0) {
|
|
pr_err("%s(\"%s:%hu\"): %s",
|
|
what,
|
|
addrbuf,
|
|
cf->bind_port,
|
|
uv_strerror(err));
|
|
while (n > 0) {
|
|
n -= 1;
|
|
uv_close((uv_handle_t *) (state->servers + n), NULL);
|
|
}
|
|
break;
|
|
}
|
|
|
|
pr_info("listening on %s:%hu", addrbuf, cf->bind_port);
|
|
n += 1;
|
|
}
|
|
|
|
uv_freeaddrinfo(addrs);
|
|
}
|
|
|
|
static void on_connection(uv_stream_t *server, int status) {
|
|
server_ctx *sx;
|
|
client_ctx *cx;
|
|
|
|
CHECK(status == 0);
|
|
sx = CONTAINER_OF(server, server_ctx, tcp_handle);
|
|
cx = xmalloc(sizeof(*cx));
|
|
CHECK(0 == uv_tcp_init(sx->loop, &cx->incoming.handle.tcp));
|
|
CHECK(0 == uv_accept(server, &cx->incoming.handle.stream));
|
|
client_finish_init(sx, cx);
|
|
}
|
|
|
|
int can_auth_none(const server_ctx *sx, const client_ctx *cx) {
|
|
return 1;
|
|
}
|
|
|
|
int can_auth_passwd(const server_ctx *sx, const client_ctx *cx) {
|
|
return 0;
|
|
}
|
|
|
|
int can_access(const server_ctx *sx,
|
|
const client_ctx *cx,
|
|
const struct sockaddr *addr) {
|
|
const struct sockaddr_in6 *addr6;
|
|
const struct sockaddr_in *addr4;
|
|
const uint32_t *p;
|
|
uint32_t a;
|
|
uint32_t b;
|
|
uint32_t c;
|
|
uint32_t d;
|
|
|
|
/* TODO(bnoordhuis) Implement proper access checks. For now, just reject
|
|
* traffic to localhost.
|
|
*/
|
|
if (addr->sa_family == AF_INET) {
|
|
addr4 = (const struct sockaddr_in *) addr;
|
|
d = ntohl(addr4->sin_addr.s_addr);
|
|
return (d >> 24) != 0x7F;
|
|
}
|
|
|
|
if (addr->sa_family == AF_INET6) {
|
|
addr6 = (const struct sockaddr_in6 *) addr;
|
|
p = (const uint32_t *) &addr6->sin6_addr.s6_addr;
|
|
a = ntohl(p[0]);
|
|
b = ntohl(p[1]);
|
|
c = ntohl(p[2]);
|
|
d = ntohl(p[3]);
|
|
if (a == 0 && b == 0 && c == 0 && d == 1) {
|
|
return 0; /* "::1" style address. */
|
|
}
|
|
if (a == 0 && b == 0 && c == 0xFFFF && (d >> 24) == 0x7F) {
|
|
return 0; /* "::ffff:127.x.x.x" style address. */
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|