2 * Copyright (c) 2016, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
24 * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
25 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
26 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
27 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
29 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
31 * OF THE POSSIBILITY OF SUCH DAMAGE.
37 #include <trust_router/tr_dh.h>
38 #include <tid_internal.h>
39 #include <tr_filter.h>
43 #include <tr_rp_client.h>
47 #include <trp_route.h>
48 #include <trp_internal.h>
49 #include <tr_config.h>
55 /* Structure to hold data for the tid response callback */
56 typedef struct tr_resp_cookie {
61 /* hold a tids instance and a config manager */
62 struct tr_tids_event_cookie {
68 static void tr_tidc_resp_handler(TIDC_INSTANCE *tidc,
73 TR_RESP_COOKIE *cookie=talloc_get_type_abort(resp_cookie, TR_RESP_COOKIE);
75 tr_debug("tr_tidc_resp_handler: Response received! Realm = %s, Community = %s, result = %s.",
78 (TID_SUCCESS==resp->result)?"success":"error");
80 if (resp->error_path!=NULL)
81 tr_debug("tr_tids_resp_handler: error_path is set.");
82 cookie->resp=tid_resp_dup(cookie, resp);
85 /* data for AAA req forwarding threads */
86 struct tr_tids_fwd_cookie {
88 pthread_mutex_t mutex; /* lock on the mq (separate from the locking within the mq, see below) */
89 TR_MQ *mq; /* messages from thread to main process; set to NULL to disable response */
90 TR_NAME *aaa_hostname;
92 TID_REQ *fwd_req; /* the req to duplicate */
95 static int tr_tids_fwd_cookie_destructor(void *obj)
97 struct tr_tids_fwd_cookie *c=talloc_get_type_abort(obj, struct tr_tids_fwd_cookie);
98 if (c->aaa_hostname!=NULL)
99 tr_free_name(c->aaa_hostname);
100 if (c->dh_params!=NULL)
101 tr_destroy_dh_params(c->dh_params);
105 /* Block until we get the lock, returns 0 on success.
106 * The mutex is used to protect changes to the mq pointer in
107 * a thread's cookie. The master thread sets this to null to indicate
108 * that it has abandoned the thread and the message queue is no longer
109 * valid. This is unrelated to the locking in the message queue
110 * implementation itself. */
111 static int tr_tids_fwd_get_mutex(struct tr_tids_fwd_cookie *cookie)
116 return (pthread_mutex_lock(&(cookie->mutex)));
119 static int tr_tids_fwd_release_mutex(struct tr_tids_fwd_cookie *cookie)
124 return (pthread_mutex_unlock(&(cookie->mutex)));
127 /* values for messages */
128 #define TR_TID_MQMSG_SUCCESS "tid success"
129 #define TR_TID_MQMSG_FAILURE "tid failure"
131 /* Thread main for sending and receiving a request to a single AAA server */
132 static void *tr_tids_req_fwd_thread(void *arg)
134 TALLOC_CTX *tmp_ctx=talloc_new(NULL);
135 struct tr_tids_fwd_cookie *args=talloc_get_type_abort(arg, struct tr_tids_fwd_cookie);
136 TIDC_INSTANCE *tidc=tidc_create();
138 TR_RESP_COOKIE *cookie=NULL;
142 talloc_steal(tmp_ctx, args); /* take responsibility for the cookie */
145 talloc_steal(tmp_ctx, tidc);
147 /* create the cookie we will use for our response */
148 cookie=talloc(tmp_ctx, TR_RESP_COOKIE);
150 tr_notice("tr_tids_req_fwd_thread: unable to allocate response cookie.");
154 cookie->thread_id=args->thread_id;
155 tr_debug("tr_tids_req_fwd_thread: thread %d started.", cookie->thread_id);
157 /* Create a TID client instance */
159 tr_crit("tr_tids_req_fwd_thread: Unable to allocate TIDC instance.");
160 /*tids_send_err_response(tids, orig_req, "Memory allocation failure");*/
161 /* TODO: encode reason for failure */
166 /* Set-up TID connection */
167 if (-1==(args->fwd_req->conn = tidc_open_connection(tidc,
168 args->aaa_hostname->buf,
169 TID_PORT, /* TODO: make this configurable */
170 &(args->fwd_req->gssctx)))) {
171 tr_notice("tr_tids_req_fwd_thread: Error in tidc_open_connection.");
172 /* tids_send_err_response(tids, orig_req, "Can't open connection to next hop TIDS"); */
173 /* TODO: encode reason for failure */
177 tr_debug("tr_tids_req_fwd_thread: thread %d opened TID connection to %s.",
179 args->aaa_hostname->buf);
181 /* Send a TID request. */
182 if (0 > (rc = tidc_fwd_request(tidc, args->fwd_req, tr_tidc_resp_handler, (void *)cookie))) {
183 tr_notice("Error from tidc_fwd_request, rc = %d.", rc);
187 /* cookie->resp should now contain our copy of the response */
189 tr_debug("tr_tids_req_fwd_thread: thread %d received response.", cookie->thread_id);
192 /* Notify parent thread of the response, if it's still listening. */
193 if (0!=tr_tids_fwd_get_mutex(args)) {
194 tr_notice("tr_tids_req_fwd_thread: thread %d unable to acquire mutex.", cookie->thread_id);
195 } else if (NULL!=args->mq) {
196 /* mq is still valid, so we can queue our response */
197 tr_debug("tr_tids_req_fwd_thread: thread %d using valid msg queue.", cookie->thread_id);
199 msg=tr_mq_msg_new(tmp_ctx, TR_TID_MQMSG_SUCCESS, TR_MQ_PRIO_NORMAL);
201 msg=tr_mq_msg_new(tmp_ctx, TR_TID_MQMSG_FAILURE, TR_MQ_PRIO_NORMAL);
204 tr_notice("tr_tids_req_fwd_thread: thread %d unable to allocate response msg.", cookie->thread_id);
206 tr_mq_msg_set_payload(msg, (void *)cookie, NULL);
208 talloc_steal(msg, cookie); /* attach this to the msg so we can forget about it */
209 tr_mq_add(args->mq, msg);
210 talloc_steal(NULL, args); /* take out of our tmp_ctx; master thread now responsible for freeing */
211 tr_debug("tr_tids_req_fwd_thread: thread %d queued response message.", cookie->thread_id);
212 if (0!=tr_tids_fwd_release_mutex(args))
213 tr_notice("tr_tids_req_fwd_thread: Error releasing mutex.");
216 talloc_free(tmp_ctx);
220 /* Merges r2 into r1 if they are compatible. */
221 static TID_RC tr_tids_merge_resps(TID_RESP *r1, TID_RESP *r2)
223 /* ensure these are compatible replies */
224 if ((r1->result!=TID_SUCCESS) || (r2->result!=TID_SUCCESS))
227 if ((0 == tr_name_cmp(r1->rp_realm, r2->rp_realm))
228 && (0 == tr_name_cmp(r1->realm, r2->realm))
229 && ( (0 == tr_name_cmp(r1->comm, r2->comm))
230 || (0 == tr_name_cmp(r1->comm, r2->orig_coi))
231 || (0 == tr_name_cmp(r1->orig_coi, r2->comm)))) {
233 tid_srvr_blk_add(r1->servers, tid_srvr_blk_dup(r1, r2->servers));
240 enum map_coi_result {
242 MAP_COI_MAP_NOT_REQUIRED,
243 MAP_COI_ALREADY_MAPPED,
246 MAP_COI_UNKNOWN_COMM,
250 static enum map_coi_result map_coi(TR_COMM_TABLE *ctable, TID_REQ *req)
257 if (tid_req_get_orig_coi(req) != NULL)
258 return MAP_COI_ALREADY_MAPPED;
260 /* look up the community */
261 orig_comm = tr_comm_table_find_comm(ctable, tid_req_get_comm(req));
262 if (orig_comm == NULL)
263 return MAP_COI_UNKNOWN_COMM;
265 if (tr_comm_get_type(orig_comm) == TR_COMM_APC)
266 return MAP_COI_MAP_NOT_REQUIRED; /* it was already an APC, no mapping to do */
268 /* use first (only) APC. These are just APC names */
269 apcs = tr_comm_get_apcs(orig_comm);
270 if ((!apcs) || (!tr_apc_get_id(apcs)))
271 return MAP_COI_NO_APC;
273 /* get our own copy of the APC name */
274 apc_name = tr_dup_name(tr_apc_get_id(apcs));
275 if (apc_name == NULL) {
276 tr_err("map_coi: Error allocating apc_name");
277 return MAP_COI_ERROR;
280 /* Check that the APC is configured */
281 apc = tr_comm_table_find_comm(ctable, apc_name);
283 tr_free_name(apc_name);
284 return MAP_COI_INVALID_APC;
287 tid_req_set_orig_coi(req, tid_req_get_comm(req)); /* was null, so no need to free anything */
288 tid_req_set_comm(req, apc_name); /* original contents will be freed via orig_coi */
290 return MAP_COI_SUCCESS; /* successfully mapped */
294 * Process a TID request
296 * Return value of -1 means to send a TID_ERROR response. Fill in resp->err_msg or it will
297 * be returned as a generic error.
305 static int tr_tids_req_handler(TIDS_INSTANCE *tids,
310 TALLOC_CTX *tmp_ctx=talloc_new(NULL);
311 TR_AAA_SERVER *aaa_servers=NULL, *this_aaa=NULL;
314 TR_AAA_SERVER_ITER *aaa_iter=NULL;
315 pthread_t aaa_thread[TR_TID_MAX_AAA_SERVERS];
316 struct tr_tids_fwd_cookie *aaa_cookie[TR_TID_MAX_AAA_SERVERS]={NULL};
317 TID_RESP *aaa_resp[TR_TID_MAX_AAA_SERVERS]={NULL};
318 TR_RP_CLIENT *rp_client=NULL;
319 TR_RP_CLIENT_ITER *rpc_iter=NULL;
320 TID_REQ *fwd_req = NULL;
321 TR_COMM *cfg_comm = NULL;
322 TR_COMM *cfg_apc = NULL;
323 TR_FILTER_ACTION oaction = TR_FILTER_ACTION_REJECT;
324 time_t expiration_interval=0;
325 struct tr_tids_event_cookie *cookie=talloc_get_type_abort(cookie_in, struct tr_tids_event_cookie);
326 TR_CFG_MGR *cfg_mgr=cookie->cfg_mgr;
327 TRPS_INSTANCE *trps=cookie->trps;
328 TRP_ROUTE *route=NULL;
331 unsigned int n_responses=0;
332 unsigned int n_failed=0;
333 struct timespec ts_abort={0};
334 unsigned int resp_frac_numer=cfg_mgr->active->internal->tid_resp_numer;
335 unsigned int resp_frac_denom=cfg_mgr->active->internal->tid_resp_denom;
336 TR_RESP_COOKIE *payload=NULL;
337 TR_FILTER_TARGET *target=NULL;
341 if ((!tids) || (!orig_req) || (!resp)) {
342 tr_debug("tr_tids_req_handler: Bad parameters");
347 tr_debug("tr_tids_req_handler: Request received (conn = %d)! Realm = %s, Comm = %s", orig_req->conn,
348 orig_req->realm->buf, orig_req->comm->buf);
350 /* Duplicate the request, so we can modify and forward it */
351 if (NULL == (fwd_req=tid_dup_req(orig_req))) {
352 tr_debug("tr_tids_req_handler: Unable to duplicate request.");
353 retval=-1; /* response will be a generic internal error */
356 talloc_steal(tmp_ctx, fwd_req);
358 /* cfg_comm is now the community (APC or CoI) of the incoming request */
359 if (NULL == (cfg_comm=tr_comm_table_find_comm(cfg_mgr->active->ctable, orig_req->comm))) {
360 tr_notice("tr_tids_req_hander: Request for unknown comm: %s.", orig_req->comm->buf);
361 tid_resp_set_err_msg(resp, tr_new_name("Unknown community"));
366 /* We now need to apply the filters associated with the RP client handing us the request.
367 * It is possible (or even likely) that more than one client is associated with the GSS
368 * name we got from the authentication. We will apply all of them in an arbitrary order.
369 * For this to result in well-defined behavior, either only accept or only reject filter
370 * lines should be used, or a unique GSS name must be given for each RP realm. */
372 if (!tids->gss_name) {
373 tr_notice("tr_tids_req_handler: No GSS name for incoming request.");
374 tid_resp_set_err_msg(resp, tr_new_name("No GSS name for request"));
379 /* Keep original constraints, may add more from the filter. These will be added to orig_req as
380 * well. Need to verify that this is acceptable behavior, but it's what we've always done. */
381 fwd_req->cons=orig_req->cons;
383 target=tr_filter_target_tid_req(tmp_ctx, orig_req);
385 tr_crit("tid_req_handler: Unable to allocate filter target, cannot apply filter!");
386 tid_resp_set_err_msg(resp, tr_new_name("Incoming TID request filter error"));
391 rpc_iter=tr_rp_client_iter_new(tmp_ctx);
392 if (rpc_iter==NULL) {
393 tr_err("tid_req_handler: Unable to allocate RP client iterator.");
397 for (rp_client=tr_rp_client_iter_first(rpc_iter, cfg_mgr->active->rp_clients);
399 rp_client=tr_rp_client_iter_next(rpc_iter)) {
401 if (!tr_gss_names_matches(rp_client->gss_names, tids->gss_name))
402 continue; /* skip any that don't match the GSS name */
404 if (TR_FILTER_MATCH == tr_filter_apply(target,
405 tr_filter_set_get(rp_client->filters,
406 TR_FILTER_TYPE_TID_INBOUND),
409 break; /* Stop looking, oaction is set */
412 /* We get here whether or not a filter matched. If tr_filter_apply() doesn't match, it returns
413 * a default action of reject, so we don't have to check why we exited the loop. */
414 if (oaction != TR_FILTER_ACTION_ACCEPT) {
415 tr_notice("tr_tids_req_handler: Incoming TID request rejected by RP client filter for GSS name %.*s",
416 tids->gss_name->len, tids->gss_name->buf);
417 tid_resp_set_err_msg(resp, tr_new_name("Incoming TID request filter error"));
422 /* Check that the rp_realm is a member of the community in the request */
423 if (NULL == tr_comm_find_rp(cfg_mgr->active->ctable, cfg_comm, orig_req->rp_realm)) {
424 tr_notice("tr_tids_req_handler: RP Realm (%s) not member of community (%s).",
425 orig_req->rp_realm->buf, orig_req->comm->buf);
426 tid_resp_set_err_msg(resp, tr_new_name("RP community membership error"));
431 switch(map_coi(cfg_mgr->active->ctable, fwd_req)) {
432 case MAP_COI_MAP_NOT_REQUIRED:
436 case MAP_COI_SUCCESS:
437 cfg_apc = tr_comm_table_find_comm(cfg_mgr->active->ctable, tid_req_get_comm(fwd_req));
438 tr_debug("tr_tids_req_handler: Community %.*s is a COI, mapping to APC %.*s.",
439 tid_req_get_orig_coi(fwd_req)->len, tid_req_get_orig_coi(fwd_req)->buf,
440 tr_comm_get_id(cfg_apc)->len, tr_comm_get_id(cfg_apc)->buf);
443 case MAP_COI_ALREADY_MAPPED:
444 tr_notice("tr_tids_req_handler: community %.*s is COI but COI to APC mapping already occurred. Dropping request.",
445 tid_req_get_comm(orig_req)->len, tid_req_get_comm(orig_req)->buf);
446 tid_resp_set_err_msg(resp, tr_new_name("Second COI to APC mapping would result, permitted only once."));
451 tr_notice("No valid APC for COI %.*s.",
452 tid_req_get_comm(orig_req)->len, tid_req_get_comm(orig_req)->buf);
453 tid_resp_set_err_msg(resp, tr_new_name("No valid APC for community"));
457 case MAP_COI_INVALID_APC:
458 tr_notice("tr_tids_req_hander: Request for unknown APC.");
459 tid_resp_set_err_msg(resp, tr_new_name("Unknown APC"));
464 tr_notice("tr_tids_req_hander: Unexpected error mapping COI to APC.");
469 /* cfg_comm is now the original community, and cfg_apc is the APC it belongs to. These
470 * may both be the same. If not, check that rp_realm is a member of the mapped APC */
471 if ((cfg_apc != cfg_comm)
472 && (NULL == tr_comm_find_rp(cfg_mgr->active->ctable,
474 tid_req_get_rp_realm(fwd_req)))) {
475 tr_notice("tr_tids_req_hander: RP Realm (%.*s) not member of mapped APC (%.*s).",
476 tid_req_get_rp_realm(fwd_req)->len, tid_req_get_rp_realm(fwd_req)->buf,
477 tr_comm_get_id(cfg_apc)->len, tr_comm_get_id(cfg_apc)->buf);
478 tid_resp_set_err_msg(resp, tr_new_name("RP community membership error"));
483 /* Look up the route for forwarding request's community/realm. */
484 tr_debug("tr_tids_req_handler: looking up route.");
485 route=trps_get_selected_route(trps, fwd_req->comm, fwd_req->realm);
487 /* No route. Use default AAA servers if we have them. */
488 tr_debug("tr_tids_req_handler: No route for realm %s, defaulting.", fwd_req->realm->buf);
489 if (NULL == (aaa_servers = tr_default_server_lookup(cfg_mgr->active->default_servers,
491 tr_notice("tr_tids_req_handler: No default AAA servers, discarded.");
492 tid_resp_set_err_msg(resp, tr_new_name("No path to AAA Server(s) for realm"));
498 /* Found a route. Determine the AAA servers or next hop address for the request we are forwarding. */
499 tr_debug("tr_tids_req_handler: found route.");
500 if (trp_route_is_local(route)) {
501 tr_debug("tr_tids_req_handler: route is local.");
502 aaa_servers = tr_idp_aaa_server_lookup(cfg_mgr->active->ctable->idp_realms,
507 tr_debug("tr_tids_req_handler: route not local.");
508 aaa_servers = tr_aaa_server_new(tmp_ctx, trp_route_get_next_hop(route));
512 /* Since we aren't defaulting, check idp coi and apc membership of the original request */
513 if (NULL == (tr_comm_find_idp(cfg_mgr->active->ctable, cfg_comm, orig_req->realm))) {
514 tr_notice("tr_tids_req_handler: IDP Realm (%s) not member of community (%s).", orig_req->realm->buf, cfg_comm->id->buf);
515 tid_resp_set_err_msg(resp, tr_new_name("IDP community membership error"));
519 if ( cfg_apc && (NULL == (tr_comm_find_idp(cfg_mgr->active->ctable, cfg_apc, orig_req->realm)))) {
520 tr_notice("tr_tids_req_handler: IDP Realm (%s) not member of APC (%s).", orig_req->realm->buf, cfg_apc->id->buf);
521 tid_resp_set_err_msg(resp, tr_new_name("IDP APC membership error"));
527 /* Make sure we came through with a AAA server. If not, we can't handle the request.
528 * Report using the original request, not translated values. */
529 if (NULL == aaa_servers) {
530 tr_notice("tr_tids_req_handler: no route or AAA server for realm (%s) in community (%s).",
531 orig_req->realm->buf, orig_req->comm->buf);
532 tid_resp_set_err_msg(resp, tr_new_name("Missing trust route error"));
537 /* send a TID request to the AAA server(s), and get the answer(s) */
538 tr_debug("tr_tids_req_handler: sending TID request(s).");
539 /* Use the smaller of the APC's expiration interval and the expiration interval of the incoming request */
540 expiration_interval = cfg_apc->expiration_interval;
541 if (fwd_req->expiration_interval)
542 fwd_req->expiration_interval = (expiration_interval < fwd_req->expiration_interval) ? expiration_interval : fwd_req->expiration_interval;
544 fwd_req->expiration_interval = expiration_interval;
546 /* Set up message queue for replies from req forwarding threads */
547 mq=tr_mq_new(tmp_ctx);
549 tr_notice("tr_tids_req_handler: unable to allocate message queue.");
553 tr_debug("tr_tids_req_handler: message queue allocated.");
556 aaa_iter=tr_aaa_server_iter_new(tmp_ctx);
557 if (aaa_iter==NULL) {
558 tr_notice("tr_tids_req_handler: unable to allocate AAA server iterator.");
562 for (n_aaa=0, this_aaa=tr_aaa_server_iter_first(aaa_iter, aaa_servers);
564 n_aaa++, this_aaa=tr_aaa_server_iter_next(aaa_iter)) {
565 tr_debug("tr_tids_req_handler: Preparing to start thread %d.", n_aaa);
567 aaa_cookie[n_aaa]=talloc(tmp_ctx, struct tr_tids_fwd_cookie);
568 if (aaa_cookie[n_aaa]==NULL) {
569 tr_notice("tr_tids_req_handler: unable to allocate cookie for AAA thread %d.", n_aaa);
573 talloc_set_destructor((void *)(aaa_cookie[n_aaa]), tr_tids_fwd_cookie_destructor);
574 /* fill in the cookie. To ensure the thread has valid data even if we exit first and
575 * abandon it, duplicate anything pointed to (except the mq). */
576 aaa_cookie[n_aaa]->thread_id=n_aaa;
577 if (0!=pthread_mutex_init(&(aaa_cookie[n_aaa]->mutex), NULL)) {
578 tr_notice("tr_tids_req_handler: unable to init mutex for AAA thread %d.", n_aaa);
582 aaa_cookie[n_aaa]->mq=mq;
583 aaa_cookie[n_aaa]->aaa_hostname=tr_dup_name(this_aaa->hostname);
584 aaa_cookie[n_aaa]->dh_params=tr_dh_dup(orig_req->tidc_dh);
585 aaa_cookie[n_aaa]->fwd_req=tid_dup_req(fwd_req);
586 talloc_steal(aaa_cookie[n_aaa], aaa_cookie[n_aaa]->fwd_req);
587 tr_debug("tr_tids_req_handler: cookie %d initialized.", n_aaa);
589 /* Take the cookie out of tmp_ctx before starting thread. If thread starts, it becomes
590 * responsible for freeing it until it queues a response. If we did not do this, the possibility
591 * exists that this function exits, freeing the cookie, before the thread takes the cookie
592 * out of our tmp_ctx. This would cause a segfault or talloc error in the thread. */
593 talloc_steal(NULL, aaa_cookie[n_aaa]);
594 if (0!=pthread_create(&(aaa_thread[n_aaa]), NULL, tr_tids_req_fwd_thread, aaa_cookie[n_aaa])) {
595 talloc_steal(tmp_ctx, aaa_cookie[n_aaa]); /* thread start failed; steal this back */
596 tr_notice("tr_tids_req_handler: unable to start AAA thread %d.", n_aaa);
600 tr_debug("tr_tids_req_handler: thread %d started.", n_aaa);
603 /* determine expiration time */
604 if (0!=tr_mq_pop_timeout(cfg_mgr->active->internal->tid_req_timeout, &ts_abort)) {
605 tr_notice("tr_tids_req_handler: unable to read clock for timeout.");
610 /* wait for responses */
611 tr_debug("tr_tids_req_handler: waiting for response(s).");
614 while (((n_responses+n_failed)<n_aaa) &&
615 (NULL!=(msg=tr_mq_pop(mq, &ts_abort)))) {
616 /* process message */
617 if (0==strcmp(tr_mq_msg_get_message(msg), TR_TID_MQMSG_SUCCESS)) {
618 payload=talloc_get_type_abort(tr_mq_msg_get_payload(msg), TR_RESP_COOKIE);
619 talloc_steal(tmp_ctx, payload); /* put this back in our context */
620 aaa_resp[payload->thread_id]=payload->resp; /* save pointers to these */
622 if (payload->resp->result==TID_SUCCESS) {
623 tr_tids_merge_resps(resp, payload->resp);
627 tr_notice("tr_tids_req_handler: TID error received from AAA server %d: %.*s",
629 payload->resp->err_msg->len,
630 payload->resp->err_msg->buf);
632 } else if (0==strcmp(tr_mq_msg_get_message(msg), TR_TID_MQMSG_FAILURE)) {
635 payload=talloc_get_type(tr_mq_msg_get_payload(msg), TR_RESP_COOKIE);
637 talloc_steal(tmp_ctx, payload); /* put this back in our context */
639 /* this means the thread was unable to allocate a response cookie, and we thus cannot determine which thread it was. This is bad and should never happen in a working system.. Give up. */
640 tr_notice("tr_tids_req_handler: TID request thread sent invalid reply. Aborting!");
644 tr_notice("tr_tids_req_handler: TID request for AAA server %d failed.",
647 /* unexpected message */
648 tr_err("tr_tids_req_handler: Unexpected message received. Aborting!");
653 /* Set the cookie pointer to NULL so we know we've dealt with this one. The
654 * cookie itself is in our tmp_ctx, which we'll free before exiting. Let it hang
655 * around in case we are still using pointers to elements of the cookie. */
656 aaa_cookie[payload->thread_id]=NULL;
660 /* check whether we've received enough responses to exit */
661 if ((idp_shared && (n_responses>0)) ||
662 (resp_frac_denom*n_responses>=resp_frac_numer*n_aaa))
666 tr_debug("tr_tids_req_handler: done waiting for responses. %d responses, %d failures.",
667 n_responses, n_failed);
668 /* Inform any remaining threads that we will no longer handle their responses. */
669 for (ii=0; ii<n_aaa; ii++) {
670 if (aaa_cookie[ii]!=NULL) {
671 if (0!=tr_tids_fwd_get_mutex(aaa_cookie[ii]))
672 tr_notice("tr_tids_req_handler: unable to get mutex for AAA thread %d.", ii);
674 aaa_cookie[ii]->mq=NULL; /* threads will not try to respond through a null mq */
676 if (0!=tr_tids_fwd_release_mutex(aaa_cookie[ii]))
677 tr_notice("tr_tids_req_handler: unable to release mutex for AAA thread %d.", ii);
681 /* Now all threads have either replied (and aaa_cookie[ii] is null) or have been told not to
682 * reply (by setting their mq pointer to null). However, some may have responded by placing
683 * a message on the mq after we last checked but before we set their mq pointer to null. These
684 * will not know that we gave up on them, so we must free their cookies for them. We can just
685 * go through any remaining messages on the mq to identify these threads. By putting them in
686 * our context instead of freeing them directly, we ensure we don't accidentally invalidate
687 * any of our own pointers into the structure before this function exits. */
688 while (NULL!=(msg=tr_mq_pop(mq, NULL))) {
689 payload=(TR_RESP_COOKIE *)tr_mq_msg_get_payload(msg);
690 if (aaa_cookie[payload->thread_id]!=NULL)
691 talloc_steal(tmp_ctx, aaa_cookie[payload->thread_id]);
696 if (n_responses==0) {
697 /* No requests succeeded, so this will be an error */
700 /* If we got any error responses, send an arbitrarily chosen one. */
701 for (ii=0; ii<n_aaa; ii++) {
702 if (aaa_resp[ii] != NULL) {
703 tid_resp_cpy(resp, aaa_resp[ii]);
707 /* No error responses at all, so generate our own error. */
708 tid_resp_set_err_msg(resp, tr_new_name("Unable to contact AAA server(s)."));
716 talloc_free(tmp_ctx);
720 static int tr_tids_gss_handler(gss_name_t client_name, TR_NAME *gss_name,
723 struct tr_tids_event_cookie *cookie=talloc_get_type_abort(data, struct tr_tids_event_cookie);
724 TIDS_INSTANCE *tids = cookie->tids;
725 TR_CFG_MGR *cfg_mgr = cookie->cfg_mgr;
727 if ((!client_name) || (!gss_name) || (!tids) || (!cfg_mgr)) {
728 tr_debug("tr_tidc_gss_handler: Bad parameters.");
732 /* Ensure at least one client exists using this GSS name */
733 if (NULL == tr_rp_client_lookup(cfg_mgr->active->rp_clients, gss_name)) {
734 tr_debug("tr_tids_gss_handler: Unknown GSS name %.*s", gss_name->len, gss_name->buf);
738 /* Store the GSS name */
739 tids->gss_name = tr_dup_name(gss_name);
740 tr_debug("Client's GSS Name: %.*s", gss_name->len, gss_name->buf);
746 /***** TIDS event handling *****/
748 /* called when a connection to the TIDS port is received */
749 static void tr_tids_event_cb(int listener, short event, void *arg)
751 TIDS_INSTANCE *tids = talloc_get_type_abort(arg, TIDS_INSTANCE);
753 if (0==(event & EV_READ))
754 tr_debug("tr_tids_event_cb: unexpected event on TIDS socket (event=0x%X)", event);
756 tids_accept(tids, listener);
759 /* called when it's time to sweep for completed TID child processes */
760 static void tr_tids_sweep_cb(int listener, short event, void *arg)
762 TIDS_INSTANCE *tids = talloc_get_type_abort(arg, TIDS_INSTANCE);
764 if (0==(event & EV_TIMEOUT))
765 tr_debug("tr_tids_event_cb: unexpected event on TID process sweep timer (event=0x%X)", event);
767 tids_sweep_procs(tids);
770 /* Configure the tids instance and set up its event handlers.
771 * Returns 0 on success, nonzero on failure. Fills in
772 * *tids_event (which should be allocated by caller). */
773 int tr_tids_event_init(struct event_base *base, TIDS_INSTANCE *tids, TR_CFG_MGR *cfg_mgr, TRPS_INSTANCE *trps,
774 struct tr_socket_event *tids_ev, struct event **sweep_ev)
776 TALLOC_CTX *tmp_ctx=talloc_new(NULL);
777 struct tr_tids_event_cookie *cookie=NULL;
778 struct timeval sweep_interval;
782 if (tids_ev == NULL) {
783 tr_debug("tr_tids_event_init: Null tids_ev.");
788 if (sweep_ev == NULL) {
789 tr_debug("tr_tids_event_init: Null sweep_ev.");
794 /* Create the cookie for callbacks. We'll put it in the tids context, so it will
795 * be cleaned up when tids is freed by talloc_free. */
796 cookie=talloc(tmp_ctx, struct tr_tids_event_cookie);
797 if (cookie == NULL) {
798 tr_debug("tr_tids_event_init: Unable to allocate cookie.");
803 cookie->cfg_mgr=cfg_mgr;
805 talloc_steal(tids, cookie);
807 /* get a tids listener */
808 tids_ev->n_sock_fd = (int)tids_get_listener(tids,
811 cfg_mgr->active->internal->hostname,
812 cfg_mgr->active->internal->tids_port,
816 if (tids_ev->n_sock_fd==0) {
817 tr_crit("Error opening TID server socket.");
822 /* Set up listener events */
823 for (ii=0; ii<tids_ev->n_sock_fd; ii++) {
824 tids_ev->ev[ii]=event_new(base,
825 tids_ev->sock_fd[ii],
829 event_add(tids_ev->ev[ii], NULL);
832 /* Set up a periodic check for completed TID handler processes */
833 *sweep_ev = event_new(base, -1, EV_TIMEOUT|EV_PERSIST, tr_tids_sweep_cb, tids);
834 sweep_interval.tv_sec = 10;
835 sweep_interval.tv_usec = 0;
836 event_add(*sweep_ev, &sweep_interval);
839 talloc_free(tmp_ctx);