#include #include #include #include #include #include #include #include #include #include #include #include #include #include typedef enum { KTP_SESSION_STATE_DISCONNECTED = 'd', KTP_SESSION_STATE_UNAUTHORIZED = 'a', KTP_SESSION_STATE_IDLE = 'i', KTP_SESSION_STATE_WAIT_FOR_COMPLETION = 'v', KTP_SESSION_STATE_WAIT_FOR_HELP = 'h', KTP_SESSION_STATE_WAIT_FOR_CMD = 'c', } ktp_session_state_e; struct ktp_session_s { ktp_session_state_e state; faux_async_t *async; faux_hdr_t *hdr; // Service var: engine will receive header and then msg bool_t done; faux_eloop_t *eloop; ktp_session_stdout_cb_fn stdout_cb; void *stdout_udata; ktp_session_stdout_cb_fn stderr_cb; void *stderr_udata; faux_error_t *error; // Internal bool_t request_done; int cmd_retcode; // Internal bool_t cmd_retcode_available; ktp_status_e cmd_features; bool_t cmd_features_available; }; static bool_t stop_loop_ev(faux_eloop_t *eloop, faux_eloop_type_e type, void *associated_data, void *user_data); static bool_t server_ev(faux_eloop_t *eloop, faux_eloop_type_e type, void *associated_data, void *user_data); static bool_t ktp_session_read_cb(faux_async_t *async, faux_buf_t *buf, size_t len, void *user_data); ktp_session_t *ktp_session_new(int sock) { ktp_session_t *ktp = NULL; if (sock < 0) return NULL; ktp = faux_zmalloc(sizeof(*ktp)); assert(ktp); if (!ktp) return NULL; // Init ktp->state = KTP_SESSION_STATE_IDLE; ktp->done = BOOL_FALSE; // Event loop ktp->eloop = faux_eloop_new(NULL); // Async object ktp->async = faux_async_new(sock); assert(ktp->async); // Receive message header first faux_async_set_read_limits(ktp->async, sizeof(faux_hdr_t), sizeof(faux_hdr_t)); faux_async_set_read_cb(ktp->async, ktp_session_read_cb, ktp); ktp->hdr = NULL; faux_async_set_stall_cb(ktp->async, ktp_stall_cb, ktp->eloop); // Event loop handlers faux_eloop_add_signal(ktp->eloop, SIGINT, stop_loop_ev, ktp); faux_eloop_add_signal(ktp->eloop, SIGTERM, stop_loop_ev, ktp); faux_eloop_add_signal(ktp->eloop, SIGQUIT, stop_loop_ev, ktp); faux_eloop_add_fd(ktp->eloop, ktp_session_fd(ktp), POLLIN, server_ev, ktp); // Callbacks ktp->stdout_cb = NULL; ktp->stdout_udata = NULL; ktp->stderr_cb = NULL; ktp->stderr_udata = NULL; ktp->error = NULL; ktp->cmd_retcode = -1; ktp->cmd_retcode_available = BOOL_FALSE; ktp->request_done = BOOL_FALSE; ktp->cmd_features = KTP_STATUS_NONE; ktp->cmd_features_available = BOOL_FALSE; return ktp; } void ktp_session_free(ktp_session_t *ktp) { if (!ktp) return; faux_free(ktp->hdr); close(ktp_session_fd(ktp)); faux_async_free(ktp->async); faux_eloop_free(ktp->eloop); faux_free(ktp); } bool_t ktp_session_done(const ktp_session_t *ktp) { assert(ktp); if (!ktp) return BOOL_TRUE; // Done flag return ktp->done; } bool_t ktp_session_set_done(ktp_session_t *ktp, bool_t done) { assert(ktp); if (!ktp) return BOOL_FALSE; ktp->done = done; return BOOL_TRUE; } ktp_status_e ktp_session_cmd_features(const ktp_session_t *ktp) { assert(ktp); if (!ktp) return KTP_STATUS_NONE; return ktp->cmd_features; } faux_error_t *ktp_session_error(const ktp_session_t *ktp) { assert(ktp); if (!ktp) return BOOL_FALSE; return ktp->error; } bool_t ktp_session_set_stdout_cb(ktp_session_t *ktp, ktp_session_stdout_cb_fn stdout_cb, void *stdout_udata) { assert(ktp); if (!ktp) return BOOL_FALSE; ktp->stdout_cb = stdout_cb; ktp->stdout_udata = stdout_udata; return BOOL_TRUE; } bool_t ktp_session_set_stderr_cb(ktp_session_t *ktp, ktp_session_stdout_cb_fn stderr_cb, void *stderr_udata) { assert(ktp); if (!ktp) return BOOL_FALSE; ktp->stderr_cb = stderr_cb; ktp->stderr_udata = stderr_udata; return BOOL_TRUE; } bool_t ktp_session_connected(ktp_session_t *ktp) { assert(ktp); if (!ktp) return BOOL_FALSE; if (KTP_SESSION_STATE_DISCONNECTED == ktp->state) return BOOL_FALSE; return BOOL_TRUE; } int ktp_session_fd(const ktp_session_t *ktp) { assert(ktp); if (!ktp) return BOOL_FALSE; return faux_async_fd(ktp->async); } #if 0 static void ktp_session_bad_socket(ktp_session_t *ktp) { assert(ktp); if (!ktp) return; ktp->state = KTP_SESSION_STATE_DISCONNECTED; } #endif static bool_t stop_loop_ev(faux_eloop_t *eloop, faux_eloop_type_e type, void *associated_data, void *user_data) { ktp_session_t *ktp = (ktp_session_t *)user_data; if (!ktp) return BOOL_FALSE; ktp_session_set_done(ktp, BOOL_TRUE); // Happy compiler eloop = eloop; type = type; associated_data = associated_data; return BOOL_FALSE; // Stop Event Loop } static bool_t server_ev(faux_eloop_t *eloop, faux_eloop_type_e type, void *associated_data, void *user_data) { faux_eloop_info_fd_t *info = (faux_eloop_info_fd_t *)associated_data; ktp_session_t *ktp = (ktp_session_t *)user_data; assert(ktp); // Write data if (info->revents & POLLOUT) { faux_eloop_exclude_fd_event(eloop, info->fd, POLLOUT); if (faux_async_out(ktp->async) < 0) { // Someting went wrong faux_eloop_del_fd(eloop, info->fd); syslog(LOG_ERR, "Problem with async output"); return BOOL_FALSE; // Stop event loop } } // Read data if (info->revents & POLLIN) { if (faux_async_in(ktp->async) < 0) { // Someting went wrong faux_eloop_del_fd(eloop, info->fd); syslog(LOG_ERR, "Problem with async input"); return BOOL_FALSE; // Stop event loop } } // EOF if (info->revents & POLLHUP) { faux_eloop_del_fd(eloop, info->fd); syslog(LOG_DEBUG, "Close connection %d", info->fd); return BOOL_FALSE; // Stop event loop } type = type; // Happy compiler if (ktp->request_done) return BOOL_FALSE; // Stop event loop on receiving answer return BOOL_TRUE; } static bool_t ktp_session_process_stdout(ktp_session_t *ktp, const faux_msg_t *msg) { char *line = NULL; unsigned int len = 0; assert(ktp); assert(msg); if (!ktp->stdout_cb) return BOOL_TRUE; // Just ignore stdout. It's not a bug if (!ktp->cmd_features_available) return BOOL_TRUE; // Drop message if (!faux_msg_get_param_by_type(msg, KTP_PARAM_LINE, (void **)&line, &len)) return BOOL_TRUE; // It's strange but not a bug return ktp->stdout_cb(ktp, line, len, ktp->stdout_udata); } static bool_t ktp_session_process_stderr(ktp_session_t *ktp, const faux_msg_t *msg) { char *line = NULL; unsigned int len = 0; assert(ktp); assert(msg); if (!ktp->stderr_cb) return BOOL_TRUE; // Just ignore message. It's not a bug if (!ktp->cmd_features_available) return BOOL_TRUE; // Drop message if (!faux_msg_get_param_by_type(msg, KTP_PARAM_LINE, (void **)&line, &len)) return BOOL_TRUE; // It's strange but not a bug return ktp->stderr_cb(ktp, line, len, ktp->stderr_udata); } static bool_t ktp_session_process_cmd_ack(ktp_session_t *ktp, const faux_msg_t *msg) { uint8_t *retcode8bit = NULL; ktp_status_e status = KTP_STATUS_NONE; char *error_str = NULL; assert(ktp); assert(msg); status = faux_msg_get_status(msg); // cmd_ack with flag 'incompleted' if (KTP_STATUS_IS_INCOMPLETED(status)) { // Only first 'incompleted' cmd ack sets cmd features if (!ktp->cmd_features_available) { ktp->cmd_features_available = BOOL_TRUE; ktp->cmd_features = status & KTP_STATUS_INTERACTIVE; } return BOOL_TRUE; } if (faux_msg_get_param_by_type(msg, KTP_PARAM_RETCODE, (void **)&retcode8bit, NULL)) ktp->cmd_retcode = (int)(*retcode8bit); error_str = faux_msg_get_str_param_by_type(msg, KTP_PARAM_ERROR); if (error_str) { faux_error_add(ktp->error, error_str); faux_str_free(error_str); } ktp->cmd_retcode_available = BOOL_TRUE; // Answer from server was received ktp->request_done = BOOL_TRUE; // Stop the loop return BOOL_TRUE; } static bool_t ktp_session_dispatch(ktp_session_t *ktp, faux_msg_t *msg) { uint16_t cmd = 0; bool_t rc = BOOL_TRUE; assert(ktp); if (!ktp) return BOOL_FALSE; assert(msg); if (!msg) return BOOL_FALSE; cmd = faux_msg_get_cmd(msg); switch (cmd) { case KTP_CMD_ACK: rc = ktp_session_process_cmd_ack(ktp, msg); break; case KTP_STDOUT: rc = ktp_session_process_stdout(ktp, msg); break; case KTP_STDERR: rc = ktp_session_process_stderr(ktp, msg); break; default: syslog(LOG_WARNING, "Unsupported command: 0x%04u\n", cmd); // Ignore break; } return rc; } static bool_t ktp_session_read_cb(faux_async_t *async, faux_buf_t *buf, size_t len, void *user_data) { ktp_session_t *ktp = (ktp_session_t *)user_data; faux_msg_t *completed_msg = NULL; char *data = NULL; assert(async); assert(buf); assert(ktp); // Linearize buffer data = malloc(len); faux_buf_read(buf, data, len); // Receive header if (!ktp->hdr) { size_t whole_len = 0; size_t msg_wo_hdr = 0; ktp->hdr = (faux_hdr_t *)data; // Check for broken header if (!ktp_check_header(ktp->hdr)) { faux_free(ktp->hdr); ktp->hdr = NULL; return BOOL_FALSE; } whole_len = faux_hdr_len(ktp->hdr); // msg_wo_hdr >= 0 because ktp_check_header() validates whole_len msg_wo_hdr = whole_len - sizeof(faux_hdr_t); // Plan to receive message body if (msg_wo_hdr > 0) { faux_async_set_read_limits(async, msg_wo_hdr, msg_wo_hdr); return BOOL_TRUE; } // Here message is completed (msg body has zero length) completed_msg = faux_msg_deserialize_parts(ktp->hdr, NULL, 0); // Receive message body } else { completed_msg = faux_msg_deserialize_parts(ktp->hdr, data, len); faux_free(data); } // Plan to receive msg header faux_async_set_read_limits(ktp->async, sizeof(faux_hdr_t), sizeof(faux_hdr_t)); faux_free(ktp->hdr); ktp->hdr = NULL; // Ready to recv new header // Here message is completed #ifdef DEBUG // faux_msg_debug(completed_msg); #endif ktp_session_dispatch(ktp, completed_msg); faux_msg_free(completed_msg); return BOOL_TRUE; } bool_t ktp_session_req_cmd(ktp_session_t *ktp, const char *line, int *retcode, faux_error_t *error, bool_t dry_run) { faux_msg_t *req = NULL; ktp_status_e status = KTP_STATUS_NONE; assert(ktp); if (!ktp) return BOOL_FALSE; if (ktp->state != KTP_SESSION_STATE_IDLE) { faux_error_sprintf(error, "Can't execute command. Session state is not suitable"); return BOOL_FALSE; } // Set dry-run flag if (dry_run) status |= KTP_STATUS_DRY_RUN; req = ktp_msg_preform(KTP_CMD, status); faux_msg_add_param(req, KTP_PARAM_LINE, line, strlen(line)); faux_msg_send_async(req, ktp->async); faux_msg_free(req); // Prepare for loop ktp->state = KTP_SESSION_STATE_WAIT_FOR_CMD; ktp->error = error; ktp->cmd_retcode = -1; ktp->cmd_retcode_available = BOOL_FALSE; ktp->request_done = BOOL_FALSE; // Be pessimistic ktp->cmd_features = KTP_STATUS_NONE; ktp->cmd_features_available = BOOL_FALSE; faux_eloop_loop(ktp->eloop); ktp->state = KTP_SESSION_STATE_IDLE; ktp->error = NULL; if (ktp->cmd_retcode_available && retcode) *retcode = ktp->cmd_retcode; return ktp->cmd_retcode_available; // Sign of server answer }