]> git.meshlink.io Git - meshlink/blobdiff - src/libmeshlink.c
Remove everything GPL that is not copyright Guus Sliepen, update copyright statements.
[meshlink] / src / libmeshlink.c
index c05d17813a3fbe6e63bee1062222e712f83c5c6d..a1fef4cc784320326dea481e1fb0aa7919347661 100644 (file)
@@ -1,6 +1,6 @@
 /*
     libmeshlink.h -- Tincd Library
-    Copyright (C) 2014 Guus Sliepen <guus@tinc-vpn.org> Saverio Proto <zioproto@gmail.com>
+    Copyright (C) 2014 Guus Sliepen <guus@meshlink.io> Saverio Proto <zioproto@gmail.com>
 
     This program is free software; you can redistribute it and/or modify
     it under the terms of the GNU General Public License as published by
 */
 
 #include "libmeshlink.h"
+#ifdef HAVE_SYS_MMAN_H
+#include <sys/mman.h>
+#endif
 #include "crypto.h"
 #include "ecdsagen.h"
 char *hosts_dir = NULL;
 static char *name = NULL;
+char *tinc_conf = NULL;
+static bool tty = false;
 
+#ifdef HAVE_MLOCKALL
+/* If nonzero, disable swapping for this process. */
+static bool do_mlock = false;
+#endif
+
+/*
+  initialize network
+*/
+bool setup_meshlink_network(void) {
+       init_connections();
+       init_nodes();
+       init_edges();
+       init_requests();
+
+       if(get_config_int(lookup_config(config_tree, "PingInterval"), &pinginterval)) {
+               if(pinginterval < 1) {
+                       pinginterval = 86400;
+               }
+       } else
+               pinginterval = 60;
+
+       if(!get_config_int(lookup_config(config_tree, "PingTimeout"), &pingtimeout))
+               pingtimeout = 5;
+       if(pingtimeout < 1 || pingtimeout > pinginterval)
+               pingtimeout = pinginterval;
+
+       //TODO: check if this makes sense in libmeshlink
+       if(!get_config_int(lookup_config(config_tree, "MaxOutputBufferSize"), &maxoutbufsize))
+               maxoutbufsize = 10 * MTU;
+
+       if(!setup_myself())
+               return false;
+
+       return true;
+}
+
+/* Open a file with the desired permissions, minus the umask.
+   Also, if we want to create an executable file, we call fchmod()
+   to set the executable bits. */
+
+FILE *fopenmask(const char *filename, const char *mode, mode_t perms) {
+       mode_t mask = umask(0);
+       perms &= ~mask;
+       umask(~perms);
+       FILE *f = fopen(filename, mode);
+#ifdef HAVE_FCHMOD
+       if((perms & 0444) && f)
+               fchmod(fileno(f), perms);
+#endif
+       umask(mask);
+       return f;
+}
+
+static void disable_old_keys(const char *filename, const char *what) {
+       char tmpfile[PATH_MAX] = "";
+       char buf[1024];
+       bool disabled = false;
+       bool block = false;
+       bool error = false;
+       FILE *r, *w;
+
+       r = fopen(filename, "r");
+       if(!r)
+               return;
+
+       snprintf(tmpfile, sizeof tmpfile, "%s.tmp", filename);
+
+       struct stat st = {.st_mode = 0600};
+       fstat(fileno(r), &st);
+       w = fopenmask(tmpfile, "w", st.st_mode);
+
+       while(fgets(buf, sizeof buf, r)) {
+               if(!block && !strncmp(buf, "-----BEGIN ", 11)) {
+                       if((strstr(buf, " EC ") && strstr(what, "ECDSA")) || (strstr(buf, " RSA ") && strstr(what, "RSA"))) {
+                               disabled = true;
+                               block = true;
+                       }
+               }
+
+               bool ecdsapubkey = !strncasecmp(buf, "ECDSAPublicKey", 14) && strchr(" \t=", buf[14]) && strstr(what, "ECDSA");
+
+               if(ecdsapubkey)
+                       disabled = true;
+
+               if(w) {
+                       if(block || ecdsapubkey)
+                               fputc('#', w);
+                       if(fputs(buf, w) < 0) {
+                               error = true;
+                               break;
+                       }
+               }
+
+               if(block && !strncmp(buf, "-----END ", 9))
+                       block = false;
+       }
+
+       if(w)
+               if(fclose(w) < 0)
+                       error = true;
+       if(ferror(r) || fclose(r) < 0)
+               error = true;
+
+       if(disabled) {
+               if(!w || error) {
+                       fprintf(stderr, "Warning: old key(s) found, remove them by hand!\n");
+                       if(w)
+                               unlink(tmpfile);
+                       return;
+               }
+
+#ifdef HAVE_MINGW
+               // We cannot atomically replace files on Windows.
+               char bakfile[PATH_MAX] = "";
+               snprintf(bakfile, sizeof bakfile, "%s.bak", filename);
+               if(rename(filename, bakfile) || rename(tmpfile, filename)) {
+                       rename(bakfile, filename);
+#else
+               if(rename(tmpfile, filename)) {
+#endif
+                       fprintf(stderr, "Warning: old key(s) found, remove them by hand!\n");
+               } else  {
+#ifdef HAVE_MINGW
+                       unlink(bakfile);
+#endif
+                       fprintf(stderr, "Warning: old key(s) found and disabled.\n");
+               }
+       }
+
+       unlink(tmpfile);
+}
+
+static FILE *ask_and_open(const char *filename, const char *what, const char *mode, bool ask, mode_t perms) {
+       FILE *r;
+       char *directory;
+       char buf[PATH_MAX];
+       char buf2[PATH_MAX];
+
+       /* Check stdin and stdout */
+       if(ask && tty) {
+               /* Ask for a file and/or directory name. */
+               fprintf(stderr, "Please enter a file to save %s to [%s]: ", what, filename);
+
+               if(fgets(buf, sizeof buf, stdin) == NULL) {
+                       fprintf(stderr, "Error while reading stdin: %s\n", strerror(errno));
+                       return NULL;
+               }
+
+               size_t len = strlen(buf);
+               if(len)
+                       buf[--len] = 0;
+
+               if(len)
+                       filename = buf;
+       }
+
+#ifdef HAVE_MINGW
+       if(filename[0] != '\\' && filename[0] != '/' && !strchr(filename, ':')) {
+#else
+       if(filename[0] != '/') {
+#endif
+               /* The directory is a relative path or a filename. */
+               directory = get_current_dir_name();
+               snprintf(buf2, sizeof buf2, "%s" SLASH "%s", directory, filename);
+               filename = buf2;
+       }
+
+       disable_old_keys(filename, what);
+
+       /* Open it first to keep the inode busy */
+
+       r = fopenmask(filename, mode, perms);
+
+       if(!r) {
+               fprintf(stderr, "Error opening file `%s': %s\n", filename, strerror(errno));
+               return NULL;
+       }
+
+       return r;
+}
 
 /*
   Generate a public/private ECDSA keypair, and ask for a file to store
@@ -42,7 +227,7 @@ bool ecdsa_keygen(bool ask) {
                fprintf(stderr, "Done.\n");
 
        xasprintf(&privname, "%s" SLASH "ecdsa_key.priv", confbase);
-       //f = ask_and_open(privname, "private ECDSA key", "a", ask, 0600); //this function is not ported to lib because makes no sense
+       f = ask_and_open(privname, "private ECDSA key", "a", ask, 0600);
        free(privname);
 
        if(!f)
@@ -62,7 +247,7 @@ bool ecdsa_keygen(bool ask) {
        else
                xasprintf(&pubname, "%s" SLASH "ecdsa_key.pub", confbase);
 
-       //f = ask_and_open(pubname, "public ECDSA key", "a", ask, 0666);
+       f = ask_and_open(pubname, "public ECDSA key", "a", ask, 0666);
        free(pubname);
 
        if(!f)
@@ -96,7 +281,7 @@ bool rsa_keygen(int bits, bool ask) {
                fprintf(stderr, "Done.\n");
 
        xasprintf(&privname, "%s" SLASH "rsa_key.priv", confbase);
-       //f = ask_and_open(privname, "private RSA key", "a", ask, 0600);
+       f = ask_and_open(privname, "private RSA key", "a", ask, 0600);
        free(privname);
 
        if(!f)
@@ -116,7 +301,7 @@ bool rsa_keygen(int bits, bool ask) {
        else
                xasprintf(&pubname, "%s" SLASH "rsa_key.pub", confbase);
 
-       //f = ask_and_open(pubname, "public RSA key", "a", ask, 0666);
+       f = ask_and_open(pubname, "public RSA key", "a", ask, 0666);
        free(pubname);
 
        if(!f)
@@ -193,7 +378,10 @@ int check_port(char *name) {
        return 0;
 }
 //tinc_setup() should basically do what cmd_init() from src/tincctl.c does, except it doesn't have to generate a tinc-up script.
-bool tinc_setup(const char* tinc_conf, const char* name) {
+bool tinc_setup(const char* confbaseapi, const char* name) {
+       confbase = xstrdup(confbaseapi);
+        xasprintf(&tinc_conf, "%s" SLASH "tinc.conf", confbase);
+        xasprintf(&hosts_dir, "%s" SLASH "hosts", confbase);
        if(!access(tinc_conf, F_OK)) {
                fprintf(stderr, "Configuration file %s already exists!\n", tinc_conf);
                return false;
@@ -204,11 +392,6 @@ bool tinc_setup(const char* tinc_conf, const char* name) {
                return false;
        }
 
-       if(!confbase_given && mkdir(confdir, 0755) && errno != EEXIST) {
-               fprintf(stderr, "Could not create directory %s: %s\n", confdir, strerror(errno));
-               return false;
-       }
-
        if(mkdir(confbase, 0777) && errno != EEXIST) {
                fprintf(stderr, "Could not create directory %s: %s\n", confbase, strerror(errno));
                return false;
@@ -238,12 +421,162 @@ bool tinc_setup(const char* tinc_conf, const char* name) {
 }
 
 
-bool tinc_start(const char* path);
+bool tinc_start(const char* confbaseapi) {
+       pthread_t tincThread;
+       confbase = confbaseapi;
+       pthread_create(&tincThread,NULL,tinc_main_thread,confbaseapi);
+       pthread_detach(tincThread);
+return true;
+}
+
+bool tinc_main_thread(void * in) {
+       static bool status = false;
+
+       /* If nonzero, write log entries to a separate file. */
+       bool use_logfile = false;
+
+       confbase = (char*) in;
+
+       openlogger("tinc", LOGMODE_STDERR);
+
+       init_configuration(&config_tree);
+
+       /* Slllluuuuuuurrrrp! */
+
+       gettimeofday(&now, NULL);
+       srand(now.tv_sec + now.tv_usec);
+       crypto_init();
+
+       if(!read_server_config())
+               return false;
+
+       //char *priority = NULL; //shoud be not needed in libmeshlink
+
+#ifdef HAVE_MLOCKALL
+       /* Lock all pages into memory if requested.
+        * This has to be done after daemon()/fork() so it works for child.
+        * No need to do that in parent as it's very short-lived. */
+       if(do_mlock && mlockall(MCL_CURRENT | MCL_FUTURE) != 0) {
+               logger(DEBUG_ALWAYS, LOG_ERR, "System call `%s' failed: %s", "mlockall",
+                  strerror(errno));
+               return 1;
+       }
+#endif
+
+       /* Setup sockets and open device. */
+
+       if(!setup_meshlink_network())
+               goto end;
+
+       /* Change process priority */
+       //should be not needed in libmeshlink
+       //if(get_config_string(lookup_config(config_tree, "ProcessPriority"), &priority)) {
+       //      if(!strcasecmp(priority, "Normal")) {
+       //              if (setpriority(NORMAL_PRIORITY_CLASS) != 0) {
+       //                      logger(DEBUG_ALWAYS, LOG_ERR, "System call `%s' failed: %s", "setpriority", strerror(errno));
+       //                      goto end;
+       //              }
+       //      } else if(!strcasecmp(priority, "Low")) {
+       //              if (setpriority(BELOW_NORMAL_PRIORITY_CLASS) != 0) {
+       //                             logger(DEBUG_ALWAYS, LOG_ERR, "System call `%s' failed: %s", "setpriority", strerror(errno));
+       //                      goto end;
+       //              }
+       //      } else if(!strcasecmp(priority, "High")) {
+       //              if (setpriority(HIGH_PRIORITY_CLASS) != 0) {
+       //                      logger(DEBUG_ALWAYS, LOG_ERR, "System call `%s' failed: %s", "setpriority", strerror(errno));
+       //                      goto end;
+       //              }
+       //      } else {
+       //              logger(DEBUG_ALWAYS, LOG_ERR, "Invalid priority `%s`!", priority);
+       //              goto end;
+       //      }
+       //}
+
+       /* drop privileges */
+       //if (!drop_privs())
+       //      goto end;
+
+       /* Start main loop. It only exits when tinc is killed. */
+
+       logger(DEBUG_ALWAYS, LOG_NOTICE, "Ready");
+
+       try_outgoing_connections();
+
+       status = main_loop();
+
+       /* Shutdown properly. */
+
+end:
+       close_network_connections();
+
+       logger(DEBUG_ALWAYS, LOG_NOTICE, "Terminating");
+
+       //free(priority);
+
+       crypto_exit();
+
+       exit_configuration(&config_tree);
+
+       return status;
+
+}
 
 bool tinc_stop();
 
+bool route_meshlink(node_t *source,vpn_packet_t *packet) {
+
+       printf("data %s\n",packet->data);
+       printf("data 16%s\n",packet->data+16);
+       printf("data 32%s\n",packet->data+32);
+       node_t* owner = NULL;
+
+       tincpackethdr* hdr = (tincpackethdr*)packet->data;
+       owner = lookup_node(hdr->destination);
+
+       if (owner == NULL) {
+       //Lookup failed
+       printf("NULL\n");
+       return false;
+       }
+       printf("lookupnode %s\n",owner->name);
+
+       if(!owner->status.reachable) {
+       //Do some here
+       return false;
+       }
+
+       //TODO: I skipped here a lot of checks !
+
+       send_packet(owner,packet);
+
+}
 // can be called from any thread
-bool tinc_send_packet(node_t *receiver, const char* buf, unsigned int len);
+bool tinc_send_packet(node_t *receiver, const char* buf, unsigned int len) {
+
+       vpn_packet_t packet;
+       tincpackethdr* hdr = malloc(sizeof(tincpackethdr));
+
+       if (sizeof(hdr) + len > MAXSIZE) {
+
+       //log something
+       return false;
+       }
+
+       memcpy(hdr->destination,receiver->name,sizeof(hdr->destination));
+       memcpy(hdr->source,myself->name,sizeof(hdr->source));
+
+       packet.priority = 0;
+       packet.len = len + 32;
+
+       memcpy(packet.data,hdr,32);
+       memcpy(packet.data+32,buf,len);
+
+        myself->in_packets++;
+        myself->in_bytes += packet.len;
+        route_meshlink(myself, &packet);
+
+return true;
+}
 
 // handler runs in tinc thread and should return immediately
 bool tinc_set_packet_receive_handler(void (*handler)(const char* sender, const char* buf, unsigned int len));
@@ -252,7 +585,11 @@ bool tinc_set_packet_receive_handler(void (*handler)(const char* sender, const c
 //It might also be a good idea to add the option of looking up hosts by public
 //key (fingerprints) instead of names.
 
-node_t *tinc_get_host(const char *name);
+node_t *tinc_get_host(const char *name) {
+
+
+
+};
 
 bool tinc_get_hosts(node_t** hosts);