2 * detail.c Process the detail file
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 * Copyright 2007 The FreeRADIUS server project
21 * Copyright 2007 Alan DeKok <aland@deployingradius.com>
26 #include <freeradius-devel/radiusd.h>
27 #include <freeradius-devel/modules.h>
28 #include <freeradius-devel/detail.h>
29 #include <freeradius-devel/process.h>
30 #include <freeradius-devel/rad_assert.h>
32 #ifdef HAVE_SYS_STAT_H
44 #define USEC (1000000)
46 static FR_NAME_NUMBER state_names[] = {
47 { "unopened", STATE_UNOPENED },
48 { "unlocked", STATE_UNLOCKED },
49 { "header", STATE_HEADER },
50 { "reading", STATE_READING },
51 { "queued", STATE_QUEUED },
52 { "running", STATE_RUNNING },
53 { "no-reply", STATE_NO_REPLY },
54 { "replied", STATE_REPLIED },
60 * If we're limiting outstanding packets, then mark the response
63 int detail_send(rad_listen_t *listener, REQUEST *request)
67 listen_detail_t *data = listener->data;
69 rad_assert(request->listener == listener);
70 rad_assert(listener->send == detail_send);
73 * This request timed out. Remember that, and tell the
74 * caller it's OK to read more "detail" file stuff.
76 if (request->reply->code == 0) {
77 data->delay_time = data->retry_interval * USEC;
79 data->state = STATE_NO_REPLY;
81 RDEBUG("Detail - No response configured for request %d. Will retry in %d seconds",
82 request->number, data->retry_interval);
84 radius_signal_self(RADIUS_SIGNAL_SELF_DETAIL);
89 * We call gettimeofday a lot. But it should be OK,
90 * because there's nothing else to do.
92 gettimeofday(&now, NULL);
95 * If we haven't sent a packet in the last second, reset
99 if (timercmp(&data->last_packet, &now, <)) {
100 data->has_rtt = false;
105 * Only one detail packet may be outstanding at a time,
106 * so it's safe to update some entries in the detail
109 * We keep smoothed round trip time (SRTT), but not round
110 * trip timeout (RTO). We use SRTT to calculate a rough
113 rtt = now.tv_sec - request->packet->timestamp.tv_sec;
116 rtt -= request->packet->timestamp.tv_usec;
119 * If we're proxying, the RTT is our processing time,
120 * plus the network delay there and back, plus the time
121 * on the other end to process the packet. Ideally, we
122 * should remove the network delays from the RTT, but we
123 * don't know what they are.
125 * So, to be safe, we over-estimate the total cost of
126 * processing the packet.
128 if (!data->has_rtt) {
129 data->has_rtt = true;
131 data->rttvar = rtt / 2;
134 data->rttvar -= data->rttvar >> 2;
135 data->rttvar += (data->srtt - rtt);
136 data->srtt -= data->srtt >> 3;
137 data->srtt += rtt >> 3;
141 * Calculate the time we wait before sending the next
144 * rtt / (rtt + delay) = load_factor / 100
146 data->delay_time = (data->srtt * (100 - data->load_factor)) / (data->load_factor);
149 * Cap delay at 4 packets/s. If the end system can't
150 * handle this, then it's very broken.
152 if (data->delay_time > (USEC / 4)) data->delay_time= USEC / 4;
154 RDEBUG3("Received response for request %d. Will read the next packet in %d seconds",
155 request->number, data->delay_time / USEC);
157 data->last_packet = now;
159 data->state = STATE_REPLIED;
161 radius_signal_self(RADIUS_SIGNAL_SELF_DETAIL);
168 * Open the detail file, if we can.
170 * FIXME: create it, if it's not already there, so that the main
171 * server select() will wake us up if there's anything to read.
173 static int detail_open(rad_listen_t *this)
176 listen_detail_t *data = this->data;
178 rad_assert(data->state == STATE_UNOPENED);
179 data->delay_time = USEC;
182 * Open detail.work first, so we don't lose
183 * accounting packets. It's probably better to
184 * duplicate them than to lose them.
186 * Note that we're not writing to the file, but
187 * we've got to open it for writing in order to
188 * establish the lock, to prevent rlm_detail from
191 * This also means that if we're doing globbing,
192 * this file will be read && processed before the
193 * file globbing is done.
195 this->fd = open(data->filename_work, O_RDWR);
203 char const *filename;
206 DEBUG2("Polling for detail file %s", data->filename);
208 memset(&files, 0, sizeof(files));
209 if (glob(data->filename, 0, NULL, &files) != 0) {
215 * Loop over the glob'd files, looking for the
220 for (i = 0; i < files.gl_pathc; i++) {
221 if (stat(files.gl_pathv[i], &st) < 0) continue;
224 (st.st_ctime < chtime)) {
225 chtime = st.st_ctime;
236 * Rename detail to detail.work
238 filename = files.gl_pathv[found];
240 DEBUG("Detail - Renaming %s -> %s", filename, data->filename_work);
241 if (rename(filename, data->filename_work) < 0) {
242 ERROR("Detail - Failed renaming %s to %s: %s",
243 filename, data->filename_work, fr_syserror(errno));
249 * And try to open the filename.
251 this->fd = open(data->filename_work, O_RDWR);
252 if (this->fd < 0) return 0;
254 } /* else detail.work existed, and we opened it */
256 rad_assert(data->vps == NULL);
257 rad_assert(data->fp == NULL);
259 data->state = STATE_UNLOCKED;
261 data->client_ip.af = AF_UNSPEC;
272 * FIXME: add a configuration "exit when done" so that the detail
273 * file reader can be used as a one-off tool to update stuff.
275 * The time sequence for reading from the detail file is:
277 * t_0 signalled that the server is idle, and we
278 * can read from the detail file.
280 * t_rtt the packet has been processed successfully,
281 * wait for t_delay to enforce load factor.
283 * t_rtt + t_delay wait for signal that the server is idle.
286 int detail_recv(rad_listen_t *listener)
288 char key[256], op[8], value[1024];
291 RADIUS_PACKET *packet;
293 listen_detail_t *data = listener->data;
296 * We may be in the main thread. It needs to update the
297 * timers before we try to read from the file again.
299 if (data->signal) return 0;
301 switch (data->state) {
304 rad_assert(listener->fd < 0);
306 if (!detail_open(listener)) return 0;
308 rad_assert(data->state == STATE_UNLOCKED);
309 rad_assert(listener->fd >= 0);
314 * Try to lock fd. If we can't, return.
315 * If we can, continue. This means that
316 * the server doesn't block while waiting
317 * for the lock to open...
321 * Note that we do NOT block waiting for
322 * the lock. We've re-named the file
323 * above, so we've already guaranteed
324 * that any *new* detail writer will not
325 * be opening this file. The only
326 * purpose of the lock is to catch a race
327 * condition where the execution
328 * "ping-pongs" between radiusd &
331 if (rad_lockfd_nonblock(listener->fd, 0) < 0) {
333 * Close the FD. The main loop
334 * will wake up in a second and
339 data->state = STATE_UNOPENED;
343 data->fp = fdopen(listener->fd, "r");
345 ERROR("FATAL: Failed to re-open detail file %s: %s",
346 data->filename, fr_syserror(errno));
351 * Look for the header
353 data->state = STATE_HEADER;
354 data->delay_time = USEC;
363 data->state = STATE_UNOPENED;
370 if (fstat(listener->fd, &buf) < 0) {
371 ERROR("Failed to stat "
372 "detail file %s: %s",
378 if (((off_t) ftell(data->fp)) == buf.st_size) {
384 * End of file. Delete it, and re-set
387 if (feof(data->fp)) {
389 DEBUG("Detail - unlinking %s",
390 data->filename_work);
391 unlink(data->filename_work);
392 if (data->fp) fclose(data->fp);
395 data->state = STATE_UNOPENED;
396 rad_assert(data->vps == NULL);
398 if (data->one_shot) {
399 INFO("Finished reading \"one shot\" detail file - Exiting");
400 radius_signal_self(RADIUS_SIGNAL_SELF_EXIT);
407 * Else go read something.
412 * Read more value-pair's, unless we're
413 * at EOF. In that case, queue whatever
417 if (data->fp && !feof(data->fp)) break;
418 data->state = STATE_QUEUED;
426 * Periodically check what's going on.
427 * If the request is taking too long,
431 if (time(NULL) < (data->running + data->retry_interval)) {
435 DEBUG("No response to detail request. Retrying");
439 * If there's no reply, keep
440 * retransmitting the current packet
444 data->state = STATE_QUEUED;
448 * We have a reply. Clean up the old
449 * request, and go read another one.
452 pairfree(&data->vps);
453 data->state = STATE_HEADER;
457 fr_cursor_init(&cursor, &data->vps);
460 * Read a header, OR a value-pair.
462 while (fgets(buffer, sizeof(buffer), data->fp)) {
463 data->offset = ftell(data->fp); /* for statistics */
466 * Badly formatted file: delete it.
468 * FIXME: Maybe flag an error?
470 if (!strchr(buffer, '\n')) {
471 pairfree(&data->vps);
476 * We're reading VP's, and got a blank line.
479 if ((data->state == STATE_READING) &&
480 (buffer[0] == '\n')) {
481 data->state = STATE_QUEUED;
486 * Look for date/time header, and read VP's if
487 * found. If not, keep reading lines until we
490 if (data->state == STATE_HEADER) {
493 if (sscanf(buffer, "%*s %*s %*d %*d:%*d:%*d %d", &y)) {
494 data->state = STATE_READING;
500 * We have a full "attribute = value" line.
501 * If it doesn't look reasonable, skip it.
503 * FIXME: print an error for badly formatted attributes?
505 if (sscanf(buffer, "%255s %7s %1023s", key, op, value) != 3) {
506 WDEBUG2("Skipping badly formatted line %s",
512 * Should be =, :=, +=, ...
514 if (!strchr(op, '=')) continue;
517 * Skip non-protocol attributes.
519 if (!strcasecmp(key, "Request-Authenticator")) continue;
522 * Set the original client IP address, based on
523 * what's in the detail file.
525 * Hmm... we don't set the server IP address.
528 if (!strcasecmp(key, "Client-IP-Address")) {
529 data->client_ip.af = AF_INET;
530 if (ip_hton(value, AF_INET, &data->client_ip) < 0) {
531 ERROR("Failed parsing Client-IP-Address");
533 pairfree(&data->vps);
540 * The original time at which we received the
541 * packet. We need this to properly calculate
544 if (!strcasecmp(key, "Timestamp")) {
545 data->timestamp = atoi(value);
547 vp = paircreate(data, PW_PACKET_ORIGINAL_TIMESTAMP, 0);
549 vp->vp_date = (uint32_t) data->timestamp;
551 fr_cursor_insert(&cursor, vp);
559 * FIXME: do we want to check for non-protocol
560 * attributes like radsqlrelay does?
563 if ((userparse(data, buffer, &vp) > 0) &&
565 fr_cursor_insert(&cursor, vp);
570 * Some kind of error.
572 * FIXME: Leave the file in-place, and warn the
575 if (ferror(data->fp)) goto cleanup;
581 * Process the packet.
587 * The writer doesn't check that the record was
588 * completely written. If the disk is full, this can
589 * result in a truncated record. When that happens,
592 if (data->state != STATE_QUEUED) {
593 ERROR("Truncated record: treating it as EOF for detail file %s", data->filename_work);
598 * We're done reading the file, but we didn't read
599 * anything. Clean up, and don't return anything.
602 data->state = STATE_HEADER;
603 if (!data->fp || feof(data->fp)) goto cleanup;
608 * Allocate the packet. If we fail, it's a serious
611 packet = rad_alloc(NULL, 1);
613 ERROR("FATAL: Failed allocating memory for detail");
618 memset(packet, 0, sizeof(*packet));
620 packet->src_ipaddr.af = AF_INET;
621 packet->src_ipaddr.ipaddr.ip4addr.s_addr = htonl(INADDR_NONE);
622 packet->code = PW_CODE_ACCOUNTING_REQUEST;
623 gettimeofday(&packet->timestamp, NULL);
626 * Remember where it came from, so that we don't
627 * proxy it to the place it came from...
629 if (data->client_ip.af != AF_UNSPEC) {
630 packet->src_ipaddr = data->client_ip;
633 vp = pairfind(packet->vps, PW_PACKET_SRC_IP_ADDRESS, 0, TAG_ANY);
635 packet->src_ipaddr.af = AF_INET;
636 packet->src_ipaddr.ipaddr.ip4addr.s_addr = vp->vp_ipaddr;
638 vp = pairfind(packet->vps, PW_PACKET_SRC_IPV6_ADDRESS, 0, TAG_ANY);
640 packet->src_ipaddr.af = AF_INET6;
641 memcpy(&packet->src_ipaddr.ipaddr.ip6addr,
642 &vp->vp_ipv6addr, sizeof(vp->vp_ipv6addr));
646 vp = pairfind(packet->vps, PW_PACKET_DST_IP_ADDRESS, 0, TAG_ANY);
648 packet->dst_ipaddr.af = AF_INET;
649 packet->dst_ipaddr.ipaddr.ip4addr.s_addr = vp->vp_ipaddr;
651 vp = pairfind(packet->vps, PW_PACKET_DST_IPV6_ADDRESS, 0, TAG_ANY);
653 packet->dst_ipaddr.af = AF_INET6;
654 memcpy(&packet->dst_ipaddr.ipaddr.ip6addr,
655 &vp->vp_ipv6addr, sizeof(vp->vp_ipv6addr));
660 * Generate packet ID, ports, IP via a counter.
662 packet->id = data->counter & 0xff;
663 packet->src_port = 1024 + ((data->counter >> 8) & 0xff);
664 packet->dst_port = 1024 + ((data->counter >> 16) & 0xff);
666 packet->dst_ipaddr.af = AF_INET;
667 packet->dst_ipaddr.ipaddr.ip4addr.s_addr = htonl((INADDR_LOOPBACK & ~0xffffff) | ((data->counter >> 24) & 0xff));
670 * If everything's OK, this is a waste of memory.
671 * Otherwise, it lets us re-send the original packet
672 * contents, unmolested.
674 packet->vps = paircopy(packet, data->vps);
677 * Prefer the Event-Timestamp in the packet, if it
678 * exists. That is when the event occurred, whereas the
679 * "Timestamp" field is when we wrote the packet to the
680 * detail file, which could have been much later.
682 vp = pairfind(packet->vps, PW_EVENT_TIMESTAMP, 0, TAG_ANY);
684 data->timestamp = vp->vp_integer;
688 * Look for Acct-Delay-Time, and update
689 * based on Acct-Delay-Time += (time(NULL) - timestamp)
691 vp = pairfind(packet->vps, PW_ACCT_DELAY_TIME, 0, TAG_ANY);
693 vp = paircreate(packet, PW_ACCT_DELAY_TIME, 0);
694 rad_assert(vp != NULL);
695 pairadd(&packet->vps, vp);
697 if (data->timestamp != 0) {
698 vp->vp_integer += time(NULL) - data->timestamp;
702 * Set the transmission count.
704 vp = pairfind(packet->vps, PW_PACKET_TRANSMIT_COUNTER, 0, TAG_ANY);
706 vp = paircreate(packet, PW_PACKET_TRANSMIT_COUNTER, 0);
707 rad_assert(vp != NULL);
708 pairadd(&packet->vps, vp);
710 vp->vp_integer = data->tries;
713 fr_printf_log("detail_recv: Read packet from %s\n", data->filename_work);
714 for (vp = fr_cursor_init(&cursor, &packet->vps);
716 vp = fr_cursor_next(&cursor)) {
722 * Don't bother doing limit checks, etc.
724 if (!request_receive(listener, packet, &data->detail_client,
727 data->state = STATE_NO_REPLY; /* try again later */
731 data->state = STATE_RUNNING;
732 data->running = packet->timestamp.tv_sec;
739 * Free detail-specific stuff.
741 void detail_free(rad_listen_t *this)
743 listen_detail_t *data = this->data;
745 talloc_free(data->filename);
746 data->filename = NULL;
747 pairfree(&data->vps);
749 if (data->fp != NULL) {
756 int detail_print(rad_listen_t const *this, char *buffer, size_t bufsize)
759 return snprintf(buffer, bufsize, "%s",
760 ((listen_detail_t *)(this->data))->filename);
763 return snprintf(buffer, bufsize, "detail file %s as server %s",
764 ((listen_detail_t *)(this->data))->filename,
769 * Overloaded to return delay times.
771 int detail_encode(rad_listen_t *this, UNUSED REQUEST *request)
773 listen_detail_t *data = this->data;
776 * We haven't sent a packet... delay things a bit.
779 int delay = (data->poll_interval - 1) * USEC;
782 * Add +/- 0.25s of jitter
784 delay += (USEC * 3) / 4;
785 delay += fr_rand() % (USEC / 2);
787 DEBUG2("Detail listener %s state %s signalled %d waiting %d.%06d sec",
789 fr_int2str(state_names, data->state, "?"), data->signal,
790 (delay / USEC), delay % USEC);
797 DEBUG2("Detail listener %s state %s signalled %d waiting %d.%06d sec",
798 data->filename, fr_int2str(state_names, data->state, "?"),
800 data->delay_time / USEC,
801 data->delay_time % USEC);
803 return data->delay_time;
808 * Overloaded to return "should we fix delay times"
810 int detail_decode(rad_listen_t *this, UNUSED REQUEST *request)
812 listen_detail_t *data = this->data;
818 static const CONF_PARSER detail_config[] = {
819 { "detail", PW_TYPE_FILE_OUTPUT | PW_TYPE_DEPRECATED,
820 offsetof(listen_detail_t, filename), NULL, NULL },
821 { "filename", PW_TYPE_FILE_OUTPUT | PW_TYPE_REQUIRED,
822 offsetof(listen_detail_t, filename), NULL, NULL },
823 { "load_factor", PW_TYPE_INTEGER,
824 offsetof(listen_detail_t, load_factor), NULL, STRINGIFY(10)},
825 { "poll_interval", PW_TYPE_INTEGER,
826 offsetof(listen_detail_t, poll_interval), NULL, STRINGIFY(1)},
827 { "retry_interval", PW_TYPE_INTEGER,
828 offsetof(listen_detail_t, retry_interval), NULL, STRINGIFY(30)},
829 { "one_shot", PW_TYPE_BOOLEAN,
830 offsetof(listen_detail_t, one_shot), NULL, NULL},
831 { "max_outstanding", PW_TYPE_INTEGER,
832 offsetof(listen_detail_t, load_factor), NULL, NULL},
834 { NULL, -1, 0, NULL, NULL } /* end the list */
837 extern bool check_config;
840 * Parse a detail section.
842 int detail_parse(CONF_SECTION *cs, rad_listen_t *this)
845 listen_detail_t *data;
849 if (check_config) return 0;
853 rcode = cf_section_parse(cs, data, detail_config);
855 cf_log_err_cs(cs, "Failed parsing listen section");
860 * We don't do duplicate detection for "detail" sockets.
863 this->synchronous = false;
865 if (!data->filename) {
866 cf_log_err_cs(cs, "No detail file specified in listen section");
870 if ((data->load_factor < 1) || (data->load_factor > 100)) {
871 cf_log_err_cs(cs, "Load factor must be between 1 and 100");
875 if ((data->poll_interval < 1) || (data->poll_interval > 20)) {
876 cf_log_err_cs(cs, "poll_interval must be between 1 and 20");
880 if (data->max_outstanding == 0) data->max_outstanding = 1;
883 * If the filename is a glob, use "detail.work" as the
886 if ((strchr(data->filename, '*') != NULL) ||
887 (strchr(data->filename, '[') != NULL)) {
891 WARN("Detail file \"%s\" appears to use file globbing, but it is not supported on this system.",
894 strlcpy(buffer, data->filename, sizeof(buffer));
895 p = strrchr(buffer, FR_DIR_SEP);
901 strlcat(buffer, "detail.work",
902 sizeof(buffer) - strlen(buffer));
905 snprintf(buffer, sizeof(buffer), "%s.work", data->filename);
908 free(data->filename_work);
909 data->filename_work = strdup(buffer); /* FIXME: leaked */
913 data->state = STATE_UNOPENED;
914 data->delay_time = data->poll_interval * USEC;
918 * Initialize the fake client.
920 client = &data->detail_client;
921 memset(client, 0, sizeof(*client));
922 client->ipaddr.af = AF_INET;
923 client->ipaddr.ipaddr.ip4addr.s_addr = INADDR_NONE;
925 client->longname = client->shortname = data->filename;
926 client->secret = client->shortname;
927 client->nas_type = strdup("none");