Blob


1 /*
2 * Copyright (c) 2016, 2019, 2020-2021 Tracey Emery <tracey@traceyemery.net>
3 * Copyright (c) 2015 Mike Larkin <mlarkin@openbsd.org>
4 * Copyright (c) 2013 David Gwynne <dlg@openbsd.org>
5 * Copyright (c) 2013 Florian Obser <florian@openbsd.org>
6 *
7 * Permission to use, copy, modify, and distribute this software for any
8 * purpose with or without fee is hereby granted, provided that the above
9 * copyright notice and this permission notice appear in all copies.
10 *
11 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18 */
20 #include <sys/param.h>
21 #include <sys/ioctl.h>
22 #include <sys/queue.h>
23 #include <sys/wait.h>
24 #include <sys/uio.h>
25 #include <sys/resource.h>
26 #include <sys/socket.h>
27 #include <sys/stat.h>
28 #include <sys/time.h>
29 #include <sys/types.h>
30 #include <sys/mman.h>
31 #include <sys/un.h>
33 #include <net/if.h>
34 #include <netinet/in.h>
36 #include <errno.h>
37 #include <event.h>
38 #include <fcntl.h>
39 #include <ifaddrs.h>
40 #include <imsg.h>
41 #include <limits.h>
42 #include <netdb.h>
43 #include <poll.h>
44 #include <pwd.h>
45 #include <stddef.h>
46 #include <stdio.h>
47 #include <stdlib.h>
48 #include <string.h>
49 #include <unistd.h>
50 #include <util.h>
52 #include "got_error.h"
53 #include "got_opentemp.h"
54 #include "got_reference.h"
55 #include "got_repository.h"
56 #include "got_privsep.h"
58 #include "gotwebd.h"
59 #include "tmpl.h"
61 #define SOCKS_BACKLOG 5
62 #define MAXIMUM(a, b) (((a) > (b)) ? (a) : (b))
64 volatile int client_cnt;
66 static struct timeval timeout = { TIMEOUT_DEFAULT, 0 };
68 static void sockets_sighdlr(int, short, void *);
69 static void sockets_shutdown(void);
70 static void sockets_launch(void);
71 static void sockets_purge(struct gotwebd *);
72 static void sockets_accept_paused(int, short, void *);
73 static void sockets_rlimit(int);
75 static void sockets_dispatch_main(int, short, void *);
76 static int sockets_unix_socket_listen(struct gotwebd *, struct socket *);
77 static int sockets_create_socket(struct address *);
78 static int sockets_accept_reserve(int, struct sockaddr *, socklen_t *,
79 int, volatile int *);
81 static struct socket *sockets_conf_new_socket_unix(struct gotwebd *,
82 struct server *, int);
83 static struct socket *sockets_conf_new_socket_fcgi(struct gotwebd *,
84 struct server *, int, struct address *);
86 int cgi_inflight = 0;
88 void
89 sockets(struct gotwebd *env, int fd)
90 {
91 struct event sighup, sigpipe, sigusr1, sigchld;
93 event_init();
95 sockets_rlimit(-1);
97 if (config_init(env) == -1)
98 fatal("failed to initialize configuration");
100 if ((env->iev_parent = malloc(sizeof(*env->iev_parent))) == NULL)
101 fatal("malloc");
102 imsg_init(&env->iev_parent->ibuf, fd);
103 env->iev_parent->handler = sockets_dispatch_main;
104 env->iev_parent->data = env->iev_parent;
105 event_set(&env->iev_parent->ev, fd, EV_READ, sockets_dispatch_main,
106 env->iev_parent);
107 event_add(&env->iev_parent->ev, NULL);
109 signal_set(&sighup, SIGCHLD, sockets_sighdlr, env);
110 signal_add(&sighup, NULL);
111 signal_set(&sigpipe, SIGCHLD, sockets_sighdlr, env);
112 signal_add(&sigpipe, NULL);
113 signal_set(&sigusr1, SIGCHLD, sockets_sighdlr, env);
114 signal_add(&sigusr1, NULL);
115 signal_set(&sigchld, SIGCHLD, sockets_sighdlr, env);
116 signal_add(&sigchld, NULL);
118 #ifndef PROFILE
119 if (pledge("stdio rpath inet recvfd proc exec sendfd unveil",
120 NULL) == -1)
121 fatal("pledge");
122 #endif
124 event_dispatch();
125 sockets_shutdown();
128 void
129 sockets_parse_sockets(struct gotwebd *env)
131 struct server *srv;
132 struct address *a;
133 struct socket *new_sock = NULL;
134 int sock_id = 1;
136 TAILQ_FOREACH(srv, &env->servers, entry) {
137 if (srv->unix_socket) {
138 new_sock = sockets_conf_new_socket_unix(env, srv,
139 sock_id);
140 if (new_sock) {
141 sock_id++;
142 TAILQ_INSERT_TAIL(&env->sockets, new_sock,
143 entry);
147 if (srv->fcgi_socket) {
148 if (TAILQ_EMPTY(&srv->al)) {
149 fatalx("%s: server %s has no IP addresses to "
150 "listen for FCGI connections", __func__,
151 srv->name);
153 TAILQ_FOREACH(a, &srv->al, entry) {
154 if (a->ss.ss_family != AF_INET &&
155 a->ss.ss_family != AF_INET6)
156 continue;
157 new_sock = sockets_conf_new_socket_fcgi(env,
158 srv, sock_id, a);
159 if (new_sock) {
160 sock_id++;
161 TAILQ_INSERT_TAIL(&env->sockets,
162 new_sock, entry);
169 static struct socket *
170 sockets_conf_new_socket_unix(struct gotwebd *env, struct server *srv, int id)
172 struct socket *sock;
173 int n;
175 if ((sock = calloc(1, sizeof(*sock))) == NULL)
176 fatalx("%s: calloc", __func__);
178 sock->conf.id = id;
179 sock->fd = -1;
180 sock->conf.af_type = AF_UNIX;
182 if (strlcpy(sock->conf.unix_socket_name,
183 srv->unix_socket_name,
184 sizeof(sock->conf.unix_socket_name)) >=
185 sizeof(sock->conf.unix_socket_name)) {
186 free(sock);
187 fatalx("%s: strlcpy", __func__);
190 n = snprintf(sock->conf.name, GOTWEBD_MAXTEXT, "%s_parent",
191 srv->name);
192 if (n < 0 || (size_t)n >= GOTWEBD_MAXTEXT) {
193 free(sock);
194 fatalx("%s: snprintf", __func__);
197 if (strlcpy(sock->conf.srv_name, srv->name,
198 sizeof(sock->conf.srv_name)) >= sizeof(sock->conf.srv_name)) {
199 free(sock);
200 fatalx("%s: strlcpy", __func__);
203 return sock;
206 static struct socket *
207 sockets_conf_new_socket_fcgi(struct gotwebd *env, struct server *srv, int id,
208 struct address *a)
210 struct socket *sock;
211 struct address *acp;
212 int n;
214 if ((sock = calloc(1, sizeof(*sock))) == NULL)
215 fatalx("%s: calloc", __func__);
217 sock->conf.id = id;
218 sock->fd = -1;
219 sock->conf.af_type = a->ss.ss_family;
221 sock->conf.fcgi_socket_port = a->port;
223 n = snprintf(sock->conf.name, GOTWEBD_MAXTEXT, "%s_parent",
224 srv->name);
225 if (n < 0 || (size_t)n >= GOTWEBD_MAXTEXT) {
226 free(sock);
227 fatalx("%s: snprintf", __func__);
230 if (strlcpy(sock->conf.srv_name, srv->name,
231 sizeof(sock->conf.srv_name)) >= sizeof(sock->conf.srv_name)) {
232 free(sock);
233 fatalx("%s: strlcpy", __func__);
236 acp = &sock->conf.addr;
238 memcpy(&acp->ss, &a->ss, sizeof(acp->ss));
239 acp->slen = a->slen;
240 acp->ai_family = a->ai_family;
241 acp->ai_socktype = a->ai_socktype;
242 acp->ai_protocol = a->ai_protocol;
243 acp->port = a->port;
244 if (*a->ifname != '\0') {
245 if (strlcpy(acp->ifname, a->ifname,
246 sizeof(acp->ifname)) >= sizeof(acp->ifname)) {
247 fatalx("%s: interface name truncated",
248 __func__);
252 return (sock);
255 static void
256 sockets_launch(void)
258 struct socket *sock;
259 struct server *srv;
260 const struct got_error *error;
262 TAILQ_FOREACH(sock, &gotwebd_env->sockets, entry) {
263 log_debug("%s: configuring socket %d (%d)", __func__,
264 sock->conf.id, sock->fd);
266 event_set(&sock->ev, sock->fd, EV_READ | EV_PERSIST,
267 sockets_socket_accept, sock);
269 if (event_add(&sock->ev, NULL))
270 fatalx("event add sock");
272 evtimer_set(&sock->pause, sockets_accept_paused, sock);
274 log_debug("%s: running socket listener %d", __func__,
275 sock->conf.id);
278 TAILQ_FOREACH(srv, &gotwebd_env->servers, entry) {
279 if (unveil(srv->repos_path, "r") == -1)
280 fatal("unveil %s", srv->repos_path);
283 error = got_privsep_unveil_exec_helpers();
284 if (error)
285 fatal("%s", error->msg);
287 if (unveil(NULL, NULL) == -1)
288 fatal("unveil");
291 static void
292 sockets_purge(struct gotwebd *env)
294 struct socket *sock, *tsock;
296 /* shutdown and remove sockets */
297 TAILQ_FOREACH_SAFE(sock, &env->sockets, entry, tsock) {
298 if (event_initialized(&sock->ev))
299 event_del(&sock->ev);
300 if (evtimer_initialized(&sock->evt))
301 evtimer_del(&sock->evt);
302 if (evtimer_initialized(&sock->pause))
303 evtimer_del(&sock->pause);
304 if (sock->fd != -1)
305 close(sock->fd);
306 TAILQ_REMOVE(&env->sockets, sock, entry);
310 static void
311 sockets_dispatch_main(int fd, short event, void *arg)
313 struct imsgev *iev = arg;
314 struct imsgbuf *ibuf;
315 struct imsg imsg;
316 struct gotwebd *env = gotwebd_env;
317 ssize_t n;
318 int shut = 0;
320 ibuf = &iev->ibuf;
322 if (event & EV_READ) {
323 if ((n = imsg_read(ibuf)) == -1 && errno != EAGAIN)
324 fatal("imsg_read error");
325 if (n == 0) /* Connection closed */
326 shut = 1;
328 if (event & EV_WRITE) {
329 if ((n = msgbuf_write(&ibuf->w)) == -1 && errno != EAGAIN)
330 fatal("msgbuf_write");
331 if (n == 0) /* Connection closed */
332 shut = 1;
335 for (;;) {
336 if ((n = imsg_get(ibuf, &imsg)) == -1)
337 fatal("imsg_get");
338 if (n == 0) /* No more messages. */
339 break;
341 switch (imsg.hdr.type) {
342 case IMSG_CFG_SRV:
343 config_getserver(env, &imsg);
344 break;
345 case IMSG_CFG_SOCK:
346 config_getsock(env, &imsg);
347 break;
348 case IMSG_CFG_FD:
349 config_getfd(env, &imsg);
350 break;
351 case IMSG_CFG_DONE:
352 config_getcfg(env, &imsg);
353 break;
354 case IMSG_CTL_START:
355 sockets_launch();
356 break;
357 default:
358 fatalx("%s: unknown imsg type %d", __func__,
359 imsg.hdr.type);
362 imsg_free(&imsg);
365 if (!shut)
366 imsg_event_add(iev);
367 else {
368 /* This pipe is dead. Remove its event handler */
369 event_del(&iev->ev);
370 event_loopexit(NULL);
374 static void
375 sockets_sighdlr(int sig, short event, void *arg)
377 switch (sig) {
378 case SIGHUP:
379 log_info("%s: ignoring SIGHUP", __func__);
380 break;
381 case SIGPIPE:
382 log_info("%s: ignoring SIGPIPE", __func__);
383 break;
384 case SIGUSR1:
385 log_info("%s: ignoring SIGUSR1", __func__);
386 break;
387 case SIGCHLD:
388 break;
389 default:
390 log_info("SIGNAL: %d", sig);
391 fatalx("unexpected signal");
395 static void
396 sockets_shutdown(void)
398 struct server *srv, *tsrv;
399 struct socket *sock, *tsock;
400 int i;
402 sockets_purge(gotwebd_env);
404 /* clean sockets */
405 TAILQ_FOREACH_SAFE(sock, &gotwebd_env->sockets, entry, tsock) {
406 TAILQ_REMOVE(&gotwebd_env->sockets, sock, entry);
407 close(sock->fd);
408 free(sock);
411 /* clean servers */
412 TAILQ_FOREACH_SAFE(srv, &gotwebd_env->servers, entry, tsrv) {
413 for (i = 0; i < srv->ncached_repos; i++)
414 got_repo_close(srv->cached_repos[i].repo);
415 free(srv);
418 free(gotwebd_env);
421 int
422 sockets_privinit(struct gotwebd *env, struct socket *sock)
424 if (sock->conf.af_type == AF_UNIX) {
425 log_debug("%s: initializing unix socket %s", __func__,
426 sock->conf.unix_socket_name);
427 sock->fd = sockets_unix_socket_listen(env, sock);
428 if (sock->fd == -1) {
429 log_warnx("%s: create unix socket failed", __func__);
430 return -1;
434 if (sock->conf.af_type == AF_INET || sock->conf.af_type == AF_INET6) {
435 log_debug("%s: initializing %s FCGI socket on port %d for %s",
436 __func__, sock->conf.af_type == AF_INET ? "inet" : "inet6",
437 sock->conf.fcgi_socket_port, sock->conf.name);
438 sock->fd = sockets_create_socket(&sock->conf.addr);
439 if (sock->fd == -1) {
440 log_warnx("%s: create FCGI socket failed", __func__);
441 return -1;
445 return 0;
448 static int
449 sockets_unix_socket_listen(struct gotwebd *env, struct socket *sock)
451 struct sockaddr_un sun;
452 struct socket *tsock;
453 int u_fd = -1;
454 mode_t old_umask, mode;
456 TAILQ_FOREACH(tsock, &env->sockets, entry) {
457 if (strcmp(tsock->conf.unix_socket_name,
458 sock->conf.unix_socket_name) == 0 &&
459 tsock->fd != -1)
460 return (tsock->fd);
463 u_fd = socket(AF_UNIX, SOCK_STREAM | SOCK_NONBLOCK| SOCK_CLOEXEC, 0);
464 if (u_fd == -1) {
465 log_warn("%s: socket", __func__);
466 return -1;
469 sun.sun_family = AF_UNIX;
470 if (strlcpy(sun.sun_path, sock->conf.unix_socket_name,
471 sizeof(sun.sun_path)) >= sizeof(sun.sun_path)) {
472 log_warn("%s: %s name too long", __func__,
473 sock->conf.unix_socket_name);
474 close(u_fd);
475 return -1;
478 if (unlink(sock->conf.unix_socket_name) == -1) {
479 if (errno != ENOENT) {
480 log_warn("%s: unlink %s", __func__,
481 sock->conf.unix_socket_name);
482 close(u_fd);
483 return -1;
487 old_umask = umask(S_IXUSR|S_IXGRP|S_IWOTH|S_IROTH|S_IXOTH);
488 mode = S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP;
490 if (bind(u_fd, (struct sockaddr *)&sun, sizeof(sun)) == -1) {
491 log_warn("%s: bind: %s", __func__, sock->conf.unix_socket_name);
492 close(u_fd);
493 (void)umask(old_umask);
494 return -1;
497 (void)umask(old_umask);
499 if (chmod(sock->conf.unix_socket_name, mode) == -1) {
500 log_warn("%s: chmod", __func__);
501 close(u_fd);
502 (void)unlink(sock->conf.unix_socket_name);
503 return -1;
506 if (chown(sock->conf.unix_socket_name, env->pw->pw_uid,
507 env->pw->pw_gid) == -1) {
508 log_warn("%s: chown", __func__);
509 close(u_fd);
510 (void)unlink(sock->conf.unix_socket_name);
511 return -1;
514 if (listen(u_fd, SOCKS_BACKLOG) == -1) {
515 log_warn("%s: listen", __func__);
516 return -1;
519 return u_fd;
522 static int
523 sockets_create_socket(struct address *a)
525 int fd = -1, o_val = 1, flags;
527 fd = socket(a->ai_family, a->ai_socktype, a->ai_protocol);
528 if (fd == -1)
529 return -1;
531 log_debug("%s: opened socket (%d) for %s", __func__,
532 fd, a->ifname);
534 if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &o_val,
535 sizeof(int)) == -1) {
536 log_warn("%s: setsockopt error", __func__);
537 close(fd);
538 return -1;
541 /* non-blocking */
542 flags = fcntl(fd, F_GETFL);
543 flags |= O_NONBLOCK;
544 if (fcntl(fd, F_SETFL, flags) == -1) {
545 log_info("%s: could not enable non-blocking I/O", __func__);
546 close(fd);
547 return -1;
550 if (bind(fd, (struct sockaddr *)&a->ss, a->slen) == -1) {
551 close(fd);
552 log_info("%s: can't bind to port %d", __func__, a->port);
553 return -1;
556 if (listen(fd, SOMAXCONN) == -1) {
557 log_warn("%s, unable to listen on socket", __func__);
558 close(fd);
559 return -1;
562 return (fd);
565 static int
566 sockets_accept_reserve(int sockfd, struct sockaddr *addr, socklen_t *addrlen,
567 int reserve, volatile int *counter)
569 int ret;
571 if (getdtablecount() + reserve +
572 ((*counter + 1) * FD_NEEDED) >= getdtablesize()) {
573 log_debug("inflight fds exceeded");
574 errno = EMFILE;
575 return -1;
578 if ((ret = accept4(sockfd, addr, addrlen,
579 SOCK_NONBLOCK | SOCK_CLOEXEC)) > -1) {
580 (*counter)++;
581 log_debug("inflight incremented, now %d", *counter);
584 return ret;
587 static void
588 sockets_accept_paused(int fd, short events, void *arg)
590 struct socket *sock = (struct socket *)arg;
592 event_add(&sock->ev, NULL);
595 void
596 sockets_socket_accept(int fd, short event, void *arg)
598 struct socket *sock = (struct socket *)arg;
599 struct sockaddr_storage ss;
600 struct timeval backoff;
601 struct request *c = NULL;
602 socklen_t len;
603 int s;
605 backoff.tv_sec = 1;
606 backoff.tv_usec = 0;
608 event_add(&sock->ev, NULL);
609 if (event & EV_TIMEOUT)
610 return;
612 len = sizeof(ss);
614 s = sockets_accept_reserve(fd, (struct sockaddr *)&ss, &len,
615 FD_RESERVE, &cgi_inflight);
617 if (s == -1) {
618 switch (errno) {
619 case EINTR:
620 case EWOULDBLOCK:
621 case ECONNABORTED:
622 return;
623 case EMFILE:
624 case ENFILE:
625 event_del(&sock->ev);
626 evtimer_add(&sock->pause, &backoff);
627 return;
628 default:
629 log_warn("%s: accept", __func__);
633 if (client_cnt > GOTWEBD_MAXCLIENTS)
634 goto err;
636 c = calloc(1, sizeof(struct request));
637 if (c == NULL) {
638 log_warn("%s", __func__);
639 close(s);
640 cgi_inflight--;
641 return;
644 c->tp = template(c, &fcgi_write, c->outbuf, sizeof(c->outbuf));
645 if (c->tp == NULL) {
646 log_warn("%s", __func__);
647 close(s);
648 cgi_inflight--;
649 free(c);
650 return;
653 c->fd = s;
654 c->sock = sock;
655 memcpy(c->priv_fd, sock->priv_fd, sizeof(c->priv_fd));
656 c->buf_pos = 0;
657 c->buf_len = 0;
658 c->request_started = 0;
659 c->sock->client_status = CLIENT_CONNECT;
661 event_set(&c->ev, s, EV_READ|EV_PERSIST, fcgi_request, c);
662 event_add(&c->ev, NULL);
664 evtimer_set(&c->tmo, fcgi_timeout, c);
665 evtimer_add(&c->tmo, &timeout);
667 client_cnt++;
669 return;
670 err:
671 cgi_inflight--;
672 close(s);
673 if (c != NULL)
674 free(c);
677 static void
678 sockets_rlimit(int maxfd)
680 struct rlimit rl;
682 if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
683 fatal("%s: failed to get resource limit", __func__);
684 log_debug("%s: max open files %llu", __func__,
685 (unsigned long long)rl.rlim_max);
687 /*
688 * Allow the maximum number of open file descriptors for this
689 * login class (which should be the class "daemon" by default).
690 */
691 if (maxfd == -1)
692 rl.rlim_cur = rl.rlim_max;
693 else
694 rl.rlim_cur = MAXIMUM(rl.rlim_max, (rlim_t)maxfd);
695 if (setrlimit(RLIMIT_NOFILE, &rl) == -1)
696 fatal("%s: failed to set resource limit", __func__);