* NETCONF Call Home Call Home RFC 8071
* Solution description using openssh and utility functions, no changes to core clixon * Example: test/test_netconf_ssh_callhome.sh * RESTCONF Call home not done
This commit is contained in:
parent
40008f182e
commit
73414e2ece
6 changed files with 466 additions and 23 deletions
2
.gitignore
vendored
2
.gitignore
vendored
|
|
@ -64,6 +64,8 @@ util/clixon_util_xml
|
||||||
util/clixon_util_xml_mod
|
util/clixon_util_xml_mod
|
||||||
util/clixon_util_xpath
|
util/clixon_util_xpath
|
||||||
util/clixon_util_yang
|
util/clixon_util_yang
|
||||||
|
util/clixon_netconf_ssh_callhome
|
||||||
|
util/clixon_netconf_ssh_callhome_client
|
||||||
|
|
||||||
test/config.sh
|
test/config.sh
|
||||||
test/site.sh
|
test/site.sh
|
||||||
|
|
|
||||||
|
|
@ -31,7 +31,12 @@ Expected: February 2021
|
||||||
|
|
||||||
### New features
|
### New features
|
||||||
|
|
||||||
|
* NETCONF Call Home Call Home RFC 8071
|
||||||
|
* Solution description using openssh and utility functions, no changes to core clixon
|
||||||
|
* Example: test/test_netconf_ssh_callhome.sh
|
||||||
|
* RESTCONF Call home not done
|
||||||
* New clixon_client API for external access
|
* New clixon_client API for external access
|
||||||
|
* See [client api docs](https://clixon-docs.readthedocs.io/en/latest/client.html)
|
||||||
|
|
||||||
### C/CLI-API changes on existing features
|
### C/CLI-API changes on existing features
|
||||||
|
|
||||||
|
|
|
||||||
99
test/test_netconf_ssh_callhome.sh
Executable file
99
test/test_netconf_ssh_callhome.sh
Executable file
|
|
@ -0,0 +1,99 @@
|
||||||
|
#!/usr/bin/env bash
|
||||||
|
# Netconf callhome RFC 8071
|
||||||
|
|
||||||
|
# Magic line must be first in script (see README.md)
|
||||||
|
s="$_" ; . ./lib.sh || if [ "$s" = $0 ]; then exit 0; else return 0; fi
|
||||||
|
|
||||||
|
# Skip it no openssh
|
||||||
|
if ! [ -x "$(command -v ssh)" ]; then
|
||||||
|
echo "...ssh not installed"
|
||||||
|
if [ "$s" = $0 ]; then exit 0; else return 0; fi # skip
|
||||||
|
fi
|
||||||
|
|
||||||
|
: ${clixon_netconf_ssh_callhome:="clixon_netconf_ssh_callhome"}
|
||||||
|
: ${clixon_netconf_ssh_callhome_client:="clixon_netconf_ssh_callhome_client"}
|
||||||
|
|
||||||
|
APPNAME=example
|
||||||
|
cfg=$dir/conf_yang.xml
|
||||||
|
sshdcfg=$dir/sshd.conf
|
||||||
|
rpccmd=$dir/rpccmd.xml
|
||||||
|
|
||||||
|
# Use yang in example
|
||||||
|
|
||||||
|
cat <<EOF > $cfg
|
||||||
|
<clixon-config xmlns="http://clicon.org/config">
|
||||||
|
<CLICON_CONFIGFILE>$cfg</CLICON_CONFIGFILE>
|
||||||
|
<CLICON_MODULE_SET_ID>42</CLICON_MODULE_SET_ID>
|
||||||
|
<CLICON_YANG_DIR>/usr/local/share/clixon</CLICON_YANG_DIR>
|
||||||
|
<CLICON_YANG_DIR>$IETFRFC</CLICON_YANG_DIR>
|
||||||
|
<CLICON_YANG_MODULE_MAIN>clixon-example</CLICON_YANG_MODULE_MAIN>
|
||||||
|
<CLICON_CLISPEC_DIR>/usr/local/lib/$APPNAME/clispec</CLICON_CLISPEC_DIR>
|
||||||
|
<CLICON_BACKEND_DIR>/usr/local/lib/$APPNAME/backend</CLICON_BACKEND_DIR>
|
||||||
|
<CLICON_BACKEND_REGEXP>example_backend.so$</CLICON_BACKEND_REGEXP>
|
||||||
|
<CLICON_NETCONF_DIR>/usr/local/lib/$APPNAME/netconf</CLICON_NETCONF_DIR>
|
||||||
|
<CLICON_SOCK>$dir/$APPNAME.sock</CLICON_SOCK>
|
||||||
|
<CLICON_BACKEND_PIDFILE>/usr/local/var/$APPNAME/$APPNAME.pidfile</CLICON_BACKEND_PIDFILE>
|
||||||
|
<CLICON_XMLDB_DIR>/usr/local/var/$APPNAME</CLICON_XMLDB_DIR>
|
||||||
|
</clixon-config>
|
||||||
|
EOF
|
||||||
|
|
||||||
|
cat <<EOF > $rpccmd
|
||||||
|
<rpc $DEFAULTNS>
|
||||||
|
<get-config>
|
||||||
|
<source><candidate/></source>
|
||||||
|
</get-config>
|
||||||
|
</rpc>]]>]]>
|
||||||
|
<rpc $DEFAULTNS>
|
||||||
|
<close-session/>
|
||||||
|
</rpc>]]>]]>
|
||||||
|
EOF
|
||||||
|
|
||||||
|
# Make the callback after a sleep in separate thread simulating the server
|
||||||
|
# The result is not checked, only the client-side
|
||||||
|
function callhomefn()
|
||||||
|
{
|
||||||
|
sleep 1
|
||||||
|
|
||||||
|
new "Start Callhome in background"
|
||||||
|
expectpart "$(sudo ${clixon_netconf_ssh_callhome} -a 127.0.0.1 -c $cfg)" 255 ""
|
||||||
|
}
|
||||||
|
|
||||||
|
new "test params: -f $cfg"
|
||||||
|
# Bring your own backend
|
||||||
|
if [ $BE -ne 0 ]; then
|
||||||
|
# kill old backend (if any)
|
||||||
|
new "kill old backend"
|
||||||
|
sudo clixon_backend -zf $cfg
|
||||||
|
if [ $? -ne 0 ]; then
|
||||||
|
err
|
||||||
|
fi
|
||||||
|
new "start backend -s init -f $cfg"
|
||||||
|
start_backend -s init -f $cfg
|
||||||
|
|
||||||
|
new "waiting"
|
||||||
|
wait_backend
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Start callhome server-side in background thread
|
||||||
|
callhomefn &
|
||||||
|
|
||||||
|
new "Start Listener client"
|
||||||
|
expectpart "$(ssh -s -v -o ProxyUseFdpass=yes -o ProxyCommand="${clixon_netconf_ssh_callhome_client} -a 127.0.0.1" . netconf < $rpccmd)" 0 "<hello $DEFAULTNS><capabilities><capability>urn:ietf:params:netconf:base:1.0</capability><capability>urn:ietf:params:netconf:capability:yang-library:1.0?revision=2019-01-04&module-set-id=42</capability><capability>urn:ietf:params:netconf:capability:candidate:1.0</capability><capability>urn:ietf:params:netconf:capability:validate:1.1</capability><capability>urn:ietf:params:netconf:capability:startup:1.0</capability><capability>urn:ietf:params:netconf:capability:xpath:1.0</capability><capability>urn:ietf:params:netconf:capability:notification:1.0</capability></capabilities><session-id>2</session-id></hello>]]>]]>" "<rpc-reply $DEFAULTNS><data/></rpc-reply>]]>]]>"
|
||||||
|
|
||||||
|
# Wait
|
||||||
|
wait
|
||||||
|
|
||||||
|
if [ $BE -ne 0 ]; then
|
||||||
|
new "Kill backend"
|
||||||
|
# Check if premature kill
|
||||||
|
pid=$(pgrep -u root -f clixon_backend)
|
||||||
|
if [ -z "$pid" ]; then
|
||||||
|
err "backend already dead"
|
||||||
|
fi
|
||||||
|
# kill backend
|
||||||
|
stop_backend -f $cfg
|
||||||
|
fi
|
||||||
|
|
||||||
|
new "Endtest"
|
||||||
|
endtest
|
||||||
|
rm -rf $dir
|
||||||
|
|
@ -90,6 +90,8 @@ ifdef with_restconf
|
||||||
APPSRC += clixon_util_stream.c # Needs curl
|
APPSRC += clixon_util_stream.c # Needs curl
|
||||||
endif
|
endif
|
||||||
APPSRC += clixon_util_socket.c
|
APPSRC += clixon_util_socket.c
|
||||||
|
APPSRC += clixon_netconf_ssh_callhome.c
|
||||||
|
APPSRC += clixon_netconf_ssh_callhome_client.c
|
||||||
#APPSRC += clixon_util_ssl.c
|
#APPSRC += clixon_util_ssl.c
|
||||||
#APPSRC += clixon_util_grpc.c
|
#APPSRC += clixon_util_grpc.c
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -54,10 +54,16 @@
|
||||||
|
|
||||||
Example sshd-config (-c option):n
|
Example sshd-config (-c option):n
|
||||||
Port 2592
|
Port 2592
|
||||||
UsePrivilegeSeparation no
|
|
||||||
TCPKeepAlive yes
|
TCPKeepAlive yes
|
||||||
AuthorizedKeysFile ~.ssh/authorized_keys
|
AuthorizedKeysFile ~.ssh/authorized_keys
|
||||||
Subsystem netconf /usr/local/bin/clixon_netconf
|
Subsystem netconf /usr/local/bin/clixon_netconf
|
||||||
|
|
||||||
|
|
||||||
|
ssh -s -v -o ProxyUseFdpass=yes -o ProxyCommand="clixon_netconf_ssh_callhome_client -a 127.0.0.1" . netconf
|
||||||
|
sudo clixon_netconf_ssh_callhome -a 127.0.0.1 -c /var/tmp/./test_netconf_ssh_callhome.sh/conf_yang.xml
|
||||||
|
|
||||||
|
ssh -s -v -o ProxyUseFdpass=yes -o ProxyCommand='/home/olof/src/clixon/util/clixon_netconf_ssh_callhome_client -a 0.0.0.0' -l olof . netconf
|
||||||
|
sudo ./clixon_netconf_ssh_callhome -a 127.0.0.1 -c ./sshdcfg
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
|
@ -71,7 +77,7 @@ Example sshd-config (-c option):n
|
||||||
|
|
||||||
#define NETCONF_CH_SSH 4334
|
#define NETCONF_CH_SSH 4334
|
||||||
#define SSHDBIN_DEFAULT "/usr/sbin/sshd"
|
#define SSHDBIN_DEFAULT "/usr/sbin/sshd"
|
||||||
#define UTIL_OPTS "hD:f:a:p:s:c:"
|
#define UTIL_OPTS "hD:f:a:p:s:c:C:"
|
||||||
|
|
||||||
static int
|
static int
|
||||||
callhome_connect(struct sockaddr *sa,
|
callhome_connect(struct sockaddr *sa,
|
||||||
|
|
@ -99,12 +105,17 @@ callhome_connect(struct sockaddr *sa,
|
||||||
static int
|
static int
|
||||||
exec_sshd(int s,
|
exec_sshd(int s,
|
||||||
char *sshdbin,
|
char *sshdbin,
|
||||||
char *configfile)
|
char *sshdconfigfile,
|
||||||
|
char *clixonconfigfile,
|
||||||
|
int dbg)
|
||||||
{
|
{
|
||||||
int retval = -1;
|
int retval = -1;
|
||||||
char **argv = NULL;
|
char **argv = NULL;
|
||||||
int i;
|
int i;
|
||||||
int nr;
|
int nr;
|
||||||
|
char *optstr = NULL;
|
||||||
|
size_t len;
|
||||||
|
const char *formatstr = "Subsystem netconf /usr/local/bin/clixon_netconf -f %s";
|
||||||
|
|
||||||
if (s < 0){
|
if (s < 0){
|
||||||
errno = EINVAL;
|
errno = EINVAL;
|
||||||
|
|
@ -116,29 +127,52 @@ exec_sshd(int s,
|
||||||
perror("sshdbin");
|
perror("sshdbin");
|
||||||
goto done;
|
goto done;
|
||||||
}
|
}
|
||||||
if (configfile == NULL){
|
if (sshdconfigfile == NULL){
|
||||||
errno = EINVAL;
|
errno = EINVAL;
|
||||||
perror("configfile");
|
perror("sshdconfigfile");
|
||||||
goto done;
|
goto done;
|
||||||
}
|
}
|
||||||
nr = 7; // XXX
|
if (clixonconfigfile == NULL){
|
||||||
|
errno = EINVAL;
|
||||||
|
perror("clixonconfigfile");
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
/* Construct subsystem string */
|
||||||
|
len = strlen(formatstr)+strlen(clixonconfigfile)+1;
|
||||||
|
if ((optstr = malloc(len)) == NULL){
|
||||||
|
perror("malloc");
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
snprintf(optstr, len, formatstr, clixonconfigfile);
|
||||||
|
|
||||||
|
nr = 9; /* See below */
|
||||||
|
if (dbg)
|
||||||
|
nr++;
|
||||||
if ((argv = calloc(nr, sizeof(char *))) == NULL){
|
if ((argv = calloc(nr, sizeof(char *))) == NULL){
|
||||||
perror("calloc");
|
perror("calloc");
|
||||||
goto done;
|
goto done;
|
||||||
}
|
}
|
||||||
|
|
||||||
i = 0;
|
i = 0;
|
||||||
|
/* Note if you change here, also change in nr = above */
|
||||||
argv[i++] = sshdbin;
|
argv[i++] = sshdbin;
|
||||||
argv[i++] = "-i"; /* Specifies that sshd is being run from inetd(8) */
|
argv[i++] = "-i"; /* Specifies that sshd is being run from inetd(8) */
|
||||||
argv[i++] = "-d";
|
argv[i++] = "-D"; /* Foreground ? */
|
||||||
argv[i++] = "-e";
|
if (dbg)
|
||||||
argv[i++] = "-f";
|
argv[i++] = "-d"; /* Debug mode */
|
||||||
argv[i++] = configfile;
|
argv[i++] = "-e"; /* write debug logs to stderr */
|
||||||
|
argv[i++] = "-o"; /* option */
|
||||||
|
argv[i++] = optstr;
|
||||||
|
argv[i++] = "-f"; /* config file */
|
||||||
|
argv[i++] = sshdconfigfile;
|
||||||
argv[i++] = NULL;
|
argv[i++] = NULL;
|
||||||
assert(i==nr);
|
assert(i==nr);
|
||||||
if (setreuid(0, 0) < 0){
|
if (setreuid(0, 0) < 0){
|
||||||
perror("setreuid");
|
perror("setreuid");
|
||||||
goto done;
|
goto done;
|
||||||
}
|
}
|
||||||
|
close(0);
|
||||||
|
close(1);
|
||||||
if (dup2(s, STDIN_FILENO) < 0){
|
if (dup2(s, STDIN_FILENO) < 0){
|
||||||
perror("dup2");
|
perror("dup2");
|
||||||
return -1;
|
return -1;
|
||||||
|
|
@ -167,7 +201,8 @@ usage(char *argv0)
|
||||||
"\t-f ipv4|ipv6 \tSocket address family(ipv4 default)\n"
|
"\t-f ipv4|ipv6 \tSocket address family(ipv4 default)\n"
|
||||||
"\t-a <addrstr> \tIP address (eg 1.2.3.4) - mandatory\n"
|
"\t-a <addrstr> \tIP address (eg 1.2.3.4) - mandatory\n"
|
||||||
"\t-p <port> \tPort (default 4334)\n"
|
"\t-p <port> \tPort (default 4334)\n"
|
||||||
"\t-c <file> \tSSHD config file - mandatory\n"
|
"\t-c <file> \tCLixon config file - (default /usr/local/etc/clixon.xml)\n"
|
||||||
|
"\t-C <file> \tSSHD config file - (default /dev/null)\n"
|
||||||
"\t-s <sshd> \tPath to sshd binary, default %s\n"
|
"\t-s <sshd> \tPath to sshd binary, default %s\n"
|
||||||
,
|
,
|
||||||
argv0, SSHDBIN_DEFAULT);
|
argv0, SSHDBIN_DEFAULT);
|
||||||
|
|
@ -186,11 +221,12 @@ main(int argc,
|
||||||
struct sockaddr_in6 sin6 = { 0 };
|
struct sockaddr_in6 sin6 = { 0 };
|
||||||
struct sockaddr_in sin = { 0 };
|
struct sockaddr_in sin = { 0 };
|
||||||
size_t sin_len;
|
size_t sin_len;
|
||||||
int debug = 0;
|
int dbg = 0;
|
||||||
uint16_t port = NETCONF_CH_SSH;
|
uint16_t port = NETCONF_CH_SSH;
|
||||||
int s = -1;
|
int s = -1;
|
||||||
char *sshdbin = SSHDBIN_DEFAULT;
|
char *sshdbin = SSHDBIN_DEFAULT;
|
||||||
char *configfile = NULL;
|
char *sshdconfigfile = "/dev/null";
|
||||||
|
char *clixonconfigfile = "/usr/local/etc/clixon.xml";
|
||||||
|
|
||||||
optind = 1;
|
optind = 1;
|
||||||
opterr = 0;
|
opterr = 0;
|
||||||
|
|
@ -200,7 +236,7 @@ main(int argc,
|
||||||
usage(argv[0]);
|
usage(argv[0]);
|
||||||
break;
|
break;
|
||||||
case 'D':
|
case 'D':
|
||||||
debug++;
|
dbg++;
|
||||||
break;
|
break;
|
||||||
case 'f':
|
case 'f':
|
||||||
family = optarg;
|
family = optarg;
|
||||||
|
|
@ -211,8 +247,11 @@ main(int argc,
|
||||||
case 'p':
|
case 'p':
|
||||||
port = atoi(optarg);
|
port = atoi(optarg);
|
||||||
break;
|
break;
|
||||||
|
case 'C':
|
||||||
|
sshdconfigfile = optarg;
|
||||||
|
break;
|
||||||
case 'c':
|
case 'c':
|
||||||
configfile = optarg;
|
clixonconfigfile = optarg;
|
||||||
break;
|
break;
|
||||||
case 's':
|
case 's':
|
||||||
sshdbin = optarg;
|
sshdbin = optarg;
|
||||||
|
|
@ -231,11 +270,6 @@ main(int argc,
|
||||||
usage(argv[0]);
|
usage(argv[0]);
|
||||||
goto done;
|
goto done;
|
||||||
}
|
}
|
||||||
if (configfile == NULL){
|
|
||||||
fprintf(stderr, "-c <file> is NULL\n");
|
|
||||||
usage(argv[0]);
|
|
||||||
goto done;
|
|
||||||
}
|
|
||||||
if (strcmp(family, "ipv6") == 0){
|
if (strcmp(family, "ipv6") == 0){
|
||||||
sin_len = sizeof(struct sockaddr_in6);
|
sin_len = sizeof(struct sockaddr_in6);
|
||||||
sin6.sin6_port = htons(port);
|
sin6.sin6_port = htons(port);
|
||||||
|
|
@ -256,13 +290,13 @@ main(int argc,
|
||||||
}
|
}
|
||||||
if (callhome_connect(sa, sin_len, &s) < 0)
|
if (callhome_connect(sa, sin_len, &s) < 0)
|
||||||
goto done;
|
goto done;
|
||||||
if (exec_sshd(s, sshdbin, configfile) < 0)
|
/* For some reason this sshd returns -1 which is unclear why */
|
||||||
|
if (exec_sshd(s, sshdbin, sshdconfigfile, clixonconfigfile, dbg) < 0)
|
||||||
goto done;
|
goto done;
|
||||||
|
/* Should not reach here */
|
||||||
if (s >= 0)
|
if (s >= 0)
|
||||||
close(s);
|
close(s);
|
||||||
retval = 0;
|
retval = 0;
|
||||||
done:
|
done:
|
||||||
return retval;
|
return retval;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
301
util/clixon_netconf_ssh_callhome_client.c
Normal file
301
util/clixon_netconf_ssh_callhome_client.c
Normal file
|
|
@ -0,0 +1,301 @@
|
||||||
|
/*
|
||||||
|
*
|
||||||
|
***** BEGIN LICENSE BLOCK *****
|
||||||
|
|
||||||
|
Copyright (C) 2009-2016 Olof Hagsand and Benny Holmgren
|
||||||
|
Copyright (C) 2017-2019 Olof Hagsand
|
||||||
|
Copyright (C) 2020-2021 Olof Hagsand and Rubicon Communications, LLC (Netgate)
|
||||||
|
|
||||||
|
This file is part of CLIXON.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
|
||||||
|
Alternatively, the contents of this file may be used under the terms of
|
||||||
|
the GNU General Public License Version 3 or later (the "GPL"),
|
||||||
|
in which case the provisions of the GPL are applicable instead
|
||||||
|
of those above. If you wish to allow use of your version of this file only
|
||||||
|
under the terms of the GPL, and not to allow others to
|
||||||
|
use your version of this file under the terms of Apache License version 2,
|
||||||
|
indicate your decision by deleting the provisions above and replace them with
|
||||||
|
the notice and other provisions required by the GPL. If you do not delete
|
||||||
|
the provisions above, a recipient may use your version of this file under
|
||||||
|
the terms of any one of the Apache License version 2 or the GPL.
|
||||||
|
|
||||||
|
***** END LICENSE BLOCK *****
|
||||||
|
|
||||||
|
* Create stream listen socket, bind to address, then exec ssh client
|
||||||
|
device client
|
||||||
|
+-----------------+ tcp 4321 +-----------------+
|
||||||
|
| util_netconf_ssh| <----------------> | xxx |
|
||||||
|
| | | +-----------------+
|
||||||
|
| exec v | 4322 | tcp
|
||||||
|
| | ssh +-----------------+
|
||||||
|
| sshd -e | <----------------> | ssh |
|
||||||
|
+-----------------+ +-----------------+
|
||||||
|
| stdio | stdio
|
||||||
|
+-----------------+
|
||||||
|
| clixon_netconf |
|
||||||
|
+-----------------+
|
||||||
|
|
|
||||||
|
+-----------------+
|
||||||
|
| clixon_backend |
|
||||||
|
+-----------------+
|
||||||
|
|
||||||
|
Example sshd-config (-c option):n
|
||||||
|
ssh -s -v -o ProxyUseFdpass=yes -o ProxyCommand='/home/olof/src/clixon/util/clixon_netconf_ssh_callhome_client -a 0.0.0.0' -l olof . netconf
|
||||||
|
sudo ./clixon_netconf_ssh_callhome -a 127.0.0.1 -c ./sshdcfg
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
#include <poll.h>
|
||||||
|
#include <errno.h>
|
||||||
|
#include <assert.h>
|
||||||
|
#include <netinet/in.h>
|
||||||
|
#include <arpa/inet.h>
|
||||||
|
|
||||||
|
#define NETCONF_CH_SSH 4334
|
||||||
|
#define UTIL_OPTS "hD:f:a:p:"
|
||||||
|
|
||||||
|
/*
|
||||||
|
* fdpass()
|
||||||
|
* Pass the connected file descriptor to stdout and exit.
|
||||||
|
* This is taken from:
|
||||||
|
* https://github.com/openbsd/src/blob/master/usr.bin/nc/netcat.c
|
||||||
|
* Copyright (c) 2001 Eric Jackson <ericj@monkey.org>
|
||||||
|
* Copyright (c) 2015 Bob Beck. All rights reserved.
|
||||||
|
*/
|
||||||
|
static int
|
||||||
|
fdpass(int nfd)
|
||||||
|
{
|
||||||
|
struct msghdr mh;
|
||||||
|
union {
|
||||||
|
struct cmsghdr hdr;
|
||||||
|
char buf[CMSG_SPACE(sizeof(int))];
|
||||||
|
} cmsgbuf;
|
||||||
|
struct cmsghdr *cmsg;
|
||||||
|
struct iovec iov;
|
||||||
|
char c = '\0';
|
||||||
|
ssize_t r;
|
||||||
|
struct pollfd pfd;
|
||||||
|
|
||||||
|
/* Avoid obvious stupidity */
|
||||||
|
if (isatty(STDOUT_FILENO)){
|
||||||
|
perror("Cannot pass file descriptor to tty");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
memset(&mh, 0, sizeof(mh));
|
||||||
|
memset(&cmsgbuf, 0, sizeof(cmsgbuf));
|
||||||
|
memset(&iov, 0, sizeof(iov));
|
||||||
|
|
||||||
|
mh.msg_control = (char*)&cmsgbuf.buf;
|
||||||
|
mh.msg_controllen = sizeof(cmsgbuf.buf);
|
||||||
|
cmsg = CMSG_FIRSTHDR(&mh);
|
||||||
|
cmsg->cmsg_len = CMSG_LEN(sizeof(int));
|
||||||
|
cmsg->cmsg_level = SOL_SOCKET;
|
||||||
|
cmsg->cmsg_type = SCM_RIGHTS;
|
||||||
|
*(int *)CMSG_DATA(cmsg) = nfd;
|
||||||
|
|
||||||
|
iov.iov_base = &c;
|
||||||
|
iov.iov_len = 1;
|
||||||
|
mh.msg_iov = &iov;
|
||||||
|
mh.msg_iovlen = 1;
|
||||||
|
|
||||||
|
memset(&pfd, 0, sizeof(pfd));
|
||||||
|
pfd.fd = STDOUT_FILENO;
|
||||||
|
pfd.events = POLLOUT;
|
||||||
|
for (;;) {
|
||||||
|
r = sendmsg(STDOUT_FILENO, &mh, 0);
|
||||||
|
if (r == -1) {
|
||||||
|
if (errno == EAGAIN || errno == EINTR) {
|
||||||
|
if (poll(&pfd, 1, -1) == -1){
|
||||||
|
perror("poll");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
perror("sendmsg");
|
||||||
|
return -1;
|
||||||
|
} else if (r != 1){
|
||||||
|
perror("sendmsg: unexpected return value");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
// exit(0);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*! Create and bind stream socket
|
||||||
|
* @param[in] sa Socketaddress
|
||||||
|
* @param[in] sa_len Length of sa. Tecynicaliyu to be independent of sockaddr sa_len
|
||||||
|
* @param[in] backlog Listen backlog, queie of pending connections
|
||||||
|
* @param[out] sock Server socket (bound for accept)
|
||||||
|
*/
|
||||||
|
int
|
||||||
|
callhome_bind(struct sockaddr *sa,
|
||||||
|
size_t sin_len,
|
||||||
|
int backlog,
|
||||||
|
int *sock)
|
||||||
|
{
|
||||||
|
int retval = -1;
|
||||||
|
int s = -1;
|
||||||
|
int on = 1;
|
||||||
|
|
||||||
|
if (sock == NULL){
|
||||||
|
errno = EINVAL;
|
||||||
|
perror("sock");
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
/* create inet socket */
|
||||||
|
if ((s = socket(sa->sa_family, SOCK_STREAM, 0)) < 0) {
|
||||||
|
perror("socket");
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
if (setsockopt(s, SOL_SOCKET, SO_KEEPALIVE, (void *)&on, sizeof(on)) == -1) {
|
||||||
|
perror("setsockopt SO_KEEPALIVE");
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (void *)&on, sizeof(on)) == -1) {
|
||||||
|
perror("setsockopt SO_REUSEADDR");
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
/* only bind ipv6, otherwise it may bind to ipv4 as well which is strange but seems default */
|
||||||
|
if (sa->sa_family == AF_INET6 &&
|
||||||
|
setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, &on, sizeof(on)) == -1) {
|
||||||
|
perror("setsockopt IPPROTO_IPV6");
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
if (bind(s, sa, sin_len) == -1) {
|
||||||
|
perror("bind");
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
if (listen(s, backlog) < 0){
|
||||||
|
perror("listen");
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
if (sock)
|
||||||
|
*sock = s;
|
||||||
|
retval = 0;
|
||||||
|
done:
|
||||||
|
if (retval != 0 && s != -1)
|
||||||
|
close(s);
|
||||||
|
return retval;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int
|
||||||
|
usage(char *argv0)
|
||||||
|
{
|
||||||
|
fprintf(stderr, "usage:%s [options]\n"
|
||||||
|
"where options are\n"
|
||||||
|
"\t-h \tHelp\n"
|
||||||
|
"\t-D <level> \tDebug\n"
|
||||||
|
"\t-f ipv4|ipv6 \tSocket address family(ipv4 default)\n"
|
||||||
|
"\t-a <addrstr> \tIP address (eg 1.2.3.4) - mandatory\n"
|
||||||
|
"\t-p <port> \tPort (default 4334)\n"
|
||||||
|
,
|
||||||
|
argv0);
|
||||||
|
exit(0);
|
||||||
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
main(int argc,
|
||||||
|
char **argv)
|
||||||
|
{
|
||||||
|
int retval = -1;
|
||||||
|
int c;
|
||||||
|
char *family = "ipv4";
|
||||||
|
char *addr = NULL;
|
||||||
|
struct sockaddr *sa;
|
||||||
|
struct sockaddr_in6 sin6 = { 0 };
|
||||||
|
struct sockaddr_in sin = { 0 };
|
||||||
|
struct sockaddr from = {0,};
|
||||||
|
socklen_t len;
|
||||||
|
size_t sin_len;
|
||||||
|
int dbg = 0;
|
||||||
|
uint16_t port = NETCONF_CH_SSH;
|
||||||
|
int ss = -1; /* server socket */
|
||||||
|
int s = -1; /* accepted session socket */
|
||||||
|
|
||||||
|
optind = 1;
|
||||||
|
opterr = 0;
|
||||||
|
while ((c = getopt(argc, argv, UTIL_OPTS)) != -1)
|
||||||
|
switch (c) {
|
||||||
|
case 'h':
|
||||||
|
usage(argv[0]);
|
||||||
|
break;
|
||||||
|
case 'D':
|
||||||
|
dbg++; /* not used */
|
||||||
|
break;
|
||||||
|
case 'f':
|
||||||
|
family = optarg;
|
||||||
|
break;
|
||||||
|
case 'a':
|
||||||
|
addr = optarg;
|
||||||
|
break;
|
||||||
|
case 'p':
|
||||||
|
port = atoi(optarg);
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
usage(argv[0]);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
if (port == 0){
|
||||||
|
fprintf(stderr, "-p <port> is invalid\n");
|
||||||
|
usage(argv[0]);
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
if (addr == NULL){
|
||||||
|
fprintf(stderr, "-a <addr> is NULL\n");
|
||||||
|
usage(argv[0]);
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
if (strcmp(family, "ipv6") == 0){
|
||||||
|
sin_len = sizeof(struct sockaddr_in6);
|
||||||
|
sin6.sin6_port = htons(port);
|
||||||
|
sin6.sin6_family = AF_INET6;
|
||||||
|
inet_pton(AF_INET6, addr, &sin6.sin6_addr);
|
||||||
|
sa = (struct sockaddr *)&sin6;
|
||||||
|
}
|
||||||
|
else if (strcmp(family, "ipv4") == 0){
|
||||||
|
sin_len = sizeof(struct sockaddr_in);
|
||||||
|
sin.sin_family = AF_INET;
|
||||||
|
sin.sin_port = htons(port);
|
||||||
|
sin.sin_addr.s_addr = inet_addr(addr);
|
||||||
|
sa = (struct sockaddr *)&sin;
|
||||||
|
}
|
||||||
|
else{
|
||||||
|
fprintf(stderr, "-f <%s> is invalid family\n", family);
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
/* Bind port */
|
||||||
|
if (callhome_bind(sa, sin_len, 1, &ss) < 0)
|
||||||
|
goto done;
|
||||||
|
/* Wait until connect */
|
||||||
|
len = sizeof(from);
|
||||||
|
if ((s = accept(ss, &from, &len)) < 0){
|
||||||
|
perror("accept");
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
/* s Pass the first connected socket using sendmsg(2) to stdout and exit. */
|
||||||
|
if (fdpass(s) < 0)
|
||||||
|
goto done;
|
||||||
|
retval = 0;
|
||||||
|
done:
|
||||||
|
return retval;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue