2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
17 /*******************************************************************
19 * DESCRIPTION: æÁÊÌ Ó ÏÓÎÏ×ÎÙÍÉ ÆÕÎËÃÉÑÍÉ ÄÌÑ ÓÅÔÅ×ÏÇÏ ÏÂÍÅÎÁ ÄÁÎÎÙÍÉ
20 * Ó ÍÅÎÅÄÖÅÒÏÍ ËÌÉÅÎÔÏ×. ðÒÉÅÍ, ÐÅÒÅÄÁÞÁ É ÛÉÆÒÏ×ÁÎÉÅ ÓÏÏÂÝÅÎÉÊ.
22 * AUTHOR: Boris Mikhailenko <stg34@stargazer.dp.ua>
25 * $Date: 2010/10/04 20:24:54 $
27 *******************************************************************/
29 #include <unistd.h> // close
33 #include <cstdio> // snprintf
35 #include "stg/blowfish.h"
36 #include "configproto.h"
57 //-----------------------------------------------------------------------------
58 int CONFIGPROTO::Prepare()
60 list<string> ansList; //óÀÄÁ ÂÕÄÅÔ ÐÏÍÅÝÅÎ ÏÔ×ÅÔ ÄÌÑ ÍÅÎÅÄÖÅÒÁ ËÌÉÅÎÔÏ×
62 struct sockaddr_in listenAddr;
64 sigset_t sigmask, oldmask;
65 sigemptyset(&sigmask);
66 sigaddset(&sigmask, SIGINT);
67 sigaddset(&sigmask, SIGTERM);
68 sigaddset(&sigmask, SIGUSR1);
69 sigaddset(&sigmask, SIGHUP);
70 pthread_sigmask(SIG_BLOCK, &sigmask, &oldmask);
72 listenSocket = socket(PF_INET, SOCK_STREAM, 0);
76 errorStr = "Create NET_CONFIGURATOR socket failed.";
80 listenAddr.sin_family = PF_INET;
81 listenAddr.sin_port = htons(port);
82 listenAddr.sin_addr.s_addr = inet_addr("0.0.0.0");
86 if (0 != setsockopt(listenSocket, SOL_SOCKET, SO_REUSEADDR, &lng, 4))
88 errorStr = "Setsockopt failed. " + string(strerror(errno));
92 res = bind(listenSocket, (struct sockaddr*)&listenAddr, sizeof(listenAddr));
96 errorStr = "Bind admin socket failed";
100 res = listen(listenSocket, 0);
103 errorStr = "Listen admin socket failed";
111 //-----------------------------------------------------------------------------
112 int CONFIGPROTO::Stop()
118 struct sockaddr_in addr;
120 addr.sin_family = PF_INET;
121 addr.sin_port = htons(port);
122 addr.sin_addr.s_addr = inet_addr("127.0.0.1");
124 addrLen = sizeof(addr);
125 sock = socket(PF_INET, SOCK_STREAM, 0);
126 connect(sock, (sockaddr*)&addr, addrLen);
131 //-----------------------------------------------------------------------------
132 void CONFIGPROTO::Run()
139 struct sockaddr_in outerAddr;
140 socklen_t outerAddrLen(sizeof(outerAddr));
141 int outerSocket = accept(listenSocket,
142 (struct sockaddr*)(&outerAddr),
150 if (outerSocket == -1)
152 printfd(__FILE__, "accept failed\n");
156 adminIP = *(unsigned int*)&(outerAddr.sin_addr);
158 printfd(__FILE__, "Connection accepted from %s\n", inet_ntostring(outerAddr.sin_addr.s_addr).c_str());
160 if (state == confHdr)
162 if (RecvHdr(outerSocket) < 0)
167 if (state == confLogin)
169 if (SendHdrAnswer(outerSocket, ans_ok) < 0)
174 if (RecvLogin(outerSocket) < 0)
179 if (state == confLoginCipher)
181 if (SendLoginAnswer(outerSocket) < 0)
186 if (RecvLoginS(outerSocket) < 0)
191 if (state == confData)
193 if (SendLoginSAnswer(outerSocket, ans_ok) < 0)
198 if (RecvData(outerSocket) < 0)
207 if (SendLoginSAnswer(outerSocket, ans_err) < 0)
212 WriteLogAccessFailed(adminIP);
217 WriteLogAccessFailed(adminIP);
222 WriteLogAccessFailed(adminIP);
223 if (SendHdrAnswer(outerSocket, ans_err) < 0)
232 WriteLogAccessFailed(adminIP);
237 //-----------------------------------------------------------------------------
238 int CONFIGPROTO::RecvHdr(int sock)
240 char buf[sizeof(STG_HEADER)];
241 memset(buf, 0, sizeof(STG_HEADER));
242 size_t stgHdrLen = sizeof(STG_HEADER) - 1; // Without 0-char
244 while (pos < stgHdrLen)
246 if (!WaitPackets(sock))
249 SendError("Bad request");
252 int ret = recv(sock, &buf[pos], stgHdrLen - pos, 0);
261 if (0 == strncmp(buf, STG_HEADER, strlen(STG_HEADER)))
268 SendError("Bad request");
274 //-----------------------------------------------------------------------------
275 int CONFIGPROTO::SendHdrAnswer(int sock, int err)
279 if (send(sock, ERR_HEADER, sizeof(ERR_HEADER) - 1, 0) < 0)
281 logger("send ERR_HEADER error in SendHdrAnswer.");
287 if (send(sock, OK_HEADER, sizeof(OK_HEADER) - 1, 0) < 0)
289 logger("send OK_HEADER error in SendHdrAnswer.");
296 //-----------------------------------------------------------------------------
297 int CONFIGPROTO::RecvLogin(int sock)
299 char login[ADM_LOGIN_LEN + 1];
301 memset(login, 0, ADM_LOGIN_LEN + 1);
304 while (pos < ADM_LOGIN_LEN) {
305 if (!WaitPackets(sock))
311 int ret = recv(sock, &login[pos], ADM_LOGIN_LEN - pos, 0);
323 if (admins->Find(login, &currAdmin))
330 currAdmin->SetIP(adminIP);
332 state = confLoginCipher;
335 //-----------------------------------------------------------------------------
336 int CONFIGPROTO::SendLoginAnswer(int sock)
338 if (send(sock, OK_LOGIN, sizeof(OK_LOGIN) - 1, 0) < 0)
340 logger("Send OK_LOGIN error in SendLoginAnswer.");
345 //-----------------------------------------------------------------------------
346 int CONFIGPROTO::RecvLoginS(int sock)
348 char loginS[ADM_LOGIN_LEN + 1];
349 memset(loginS, 0, ADM_LOGIN_LEN + 1);
352 while (pos < ADM_LOGIN_LEN)
354 if (!WaitPackets(sock))
360 int ret = recv(sock, &loginS[pos], ADM_LOGIN_LEN - pos, 0);
365 printfd(__FILE__, "recv error: '%s'\n", strerror(errno));
373 if (currAdmin->GetLogin().empty())
380 EnDecodeInit(currAdmin->GetPassword().c_str(), ADM_PASSWD_LEN, &ctx);
382 char login[ADM_LOGIN_LEN + 1];
383 for (size_t i = 0; i < ADM_LOGIN_LEN / 8; i++)
385 DecodeString(login + i * 8, loginS + i * 8, &ctx);
388 if (currAdmin == admins->GetNoAdmin())
390 // If there are no admins registered in the system - give access with any password
395 if (strncmp(currAdmin->GetLogin().c_str(), login, ADM_LOGIN_LEN) != 0)
404 //-----------------------------------------------------------------------------
405 int CONFIGPROTO::SendLoginSAnswer(int sock, int err)
409 if (send(sock, ERR_LOGINS, sizeof(ERR_LOGINS) - 1, 0) < 0)
411 logger("send ERR_LOGIN error in SendLoginAnswer.");
417 if (send(sock, OK_LOGINS, sizeof(OK_LOGINS) - 1, 0) < 0)
419 logger("send OK_LOGINS error in SendLoginSAnswer.");
425 //-----------------------------------------------------------------------------
426 int CONFIGPROTO::RecvData(int sock)
431 EnDecodeInit(currAdmin->GetPassword().c_str(), ADM_PASSWD_LEN, &ctx);
438 while (pos < sizeof(bufferS))
440 if (!WaitPackets(sock))
446 int ret = recv(sock, &bufferS[pos], sizeof(bufferS) - pos, 0);
450 printfd(__FILE__, "recv error: '%s'\n", strerror(errno));
466 DecodeString(buffer, bufferS, &ctx);
467 requestList.push_back(std::string(buffer, pos));
469 if (done || memchr(buffer, 0, pos) != NULL)
474 SendError("Bad command");
476 return SendDataAnswer(sock);
481 //-----------------------------------------------------------------------------
482 int CONFIGPROTO::SendDataAnswer(int sock)
484 list<string>::iterator li;
485 li = answerList.begin();
494 EnDecodeInit(currAdmin->GetPassword().c_str(), ADM_PASSWD_LEN, &ctx);
496 while (li != answerList.end())
498 while ((*li).c_str()[k])
500 buff[n % 8] = (*li).c_str()[k];
506 EncodeString(buffS, buff, &ctx);
507 int ret = send(sock, buffS, 8, 0);
518 if (answerList.empty()) {
523 EncodeString(buffS, buff, &ctx);
527 return send(sock, buffS, 8, 0);
529 //-----------------------------------------------------------------------------
530 void CONFIGPROTO::SendError(const char * text)
534 snprintf(s, 255, "<Error value=\"%s\"/>", text);
535 answerList.push_back(s);
537 //-----------------------------------------------------------------------------
538 void CONFIGPROTO::WriteLogAccessFailed(uint32_t ip)
540 logger("Admin's connect failed. IP %s", inet_ntostring(ip).c_str());
542 //-----------------------------------------------------------------------------