X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=tr%2Ftr_tid.c;h=b0f66022d941861722061e91c66ab6e63146351c;hb=87d0426d2e8c8da5b28ae326e414e0b4535b3097;hp=bb2d97a5ed0d0de2e9e333b8bfcdf9ecea4c1e34;hpb=4c86caeb37789f1cd95500899af4affead62070b;p=trust_router.git diff --git a/tr/tr_tid.c b/tr/tr_tid.c index bb2d97a..b0f6602 100644 --- a/tr/tr_tid.c +++ b/tr/tr_tid.c @@ -40,9 +40,11 @@ #include #include #include +#include #include #include #include +#include #include #include #include @@ -194,9 +196,9 @@ cleanup: /* mq is still valid, so we can queue our response */ tr_debug("tr_tids_req_fwd_thread: thread %d using valid msg queue.", cookie->thread_id); if (success) - msg=tr_mq_msg_new(tmp_ctx, TR_TID_MQMSG_SUCCESS, TR_MQ_PRIO_NORMAL); + msg= tr_mq_msg_new(tmp_ctx, TR_TID_MQMSG_SUCCESS); else - msg=tr_mq_msg_new(tmp_ctx, TR_TID_MQMSG_FAILURE, TR_MQ_PRIO_NORMAL); + msg= tr_mq_msg_new(tmp_ctx, TR_TID_MQMSG_FAILURE); if (msg==NULL) tr_notice("tr_tids_req_fwd_thread: thread %d unable to allocate response msg.", cookie->thread_id); @@ -288,6 +290,18 @@ static enum map_coi_result map_coi(TR_COMM_TABLE *ctable, TID_REQ *req) return MAP_COI_SUCCESS; /* successfully mapped */ } +/** + * Process a TID request + * + * Return value of -1 means to send a TID_ERROR response. Fill in resp->err_msg or it will + * be returned as a generic error. + * + * @param tids + * @param orig_req + * @param resp + * @param cookie_in + * @return + */ static int tr_tids_req_handler(TIDS_INSTANCE *tids, TID_REQ *orig_req, TID_RESP *resp, @@ -332,12 +346,17 @@ static int tr_tids_req_handler(TIDS_INSTANCE *tids, tr_debug("tr_tids_req_handler: Request received (conn = %d)! Realm = %s, Comm = %s", orig_req->conn, orig_req->realm->buf, orig_req->comm->buf); + if (orig_req->request_id) + tr_debug("tr_tids_req_handler: TID request ID: %.*s", orig_req->request_id->len, orig_req->request_id->buf); + else + tr_debug("tr_tids_req_handler: TID request ID: none"); + tids->req_count++; /* Duplicate the request, so we can modify and forward it */ if (NULL == (fwd_req=tid_dup_req(orig_req))) { tr_debug("tr_tids_req_handler: Unable to duplicate request."); - retval=-1; + retval=-1; /* response will be a generic internal error */ goto cleanup; } talloc_steal(tmp_ctx, fwd_req); @@ -345,7 +364,7 @@ static int tr_tids_req_handler(TIDS_INSTANCE *tids, /* cfg_comm is now the community (APC or CoI) of the incoming request */ if (NULL == (cfg_comm=tr_comm_table_find_comm(cfg_mgr->active->ctable, orig_req->comm))) { tr_notice("tr_tids_req_hander: Request for unknown comm: %s.", orig_req->comm->buf); - tids_send_err_response(tids, orig_req, "Unknown community"); + tid_resp_set_err_msg(resp, tr_new_name("Unknown community")); retval=-1; goto cleanup; } @@ -358,7 +377,7 @@ static int tr_tids_req_handler(TIDS_INSTANCE *tids, if (!tids->gss_name) { tr_notice("tr_tids_req_handler: No GSS name for incoming request."); - tids_send_err_response(tids, orig_req, "No GSS name for request"); + tid_resp_set_err_msg(resp, tr_new_name("No GSS name for request")); retval=-1; goto cleanup; } @@ -370,7 +389,7 @@ static int tr_tids_req_handler(TIDS_INSTANCE *tids, target=tr_filter_target_tid_req(tmp_ctx, orig_req); if (target==NULL) { tr_crit("tid_req_handler: Unable to allocate filter target, cannot apply filter!"); - tids_send_err_response(tids, orig_req, "Incoming TID request filter error"); + tid_resp_set_err_msg(resp, tr_new_name("Incoming TID request filter error")); retval=-1; goto cleanup; } @@ -399,8 +418,9 @@ static int tr_tids_req_handler(TIDS_INSTANCE *tids, /* We get here whether or not a filter matched. If tr_filter_apply() doesn't match, it returns * a default action of reject, so we don't have to check why we exited the loop. */ if (oaction != TR_FILTER_ACTION_ACCEPT) { - tr_notice("tr_tids_req_handler: Incoming TID request rejected by filter for GSS name", orig_req->rp_realm->buf); - tids_send_err_response(tids, orig_req, "Incoming TID request filter error"); + tr_notice("tr_tids_req_handler: Incoming TID request rejected by RP client filter for GSS name %.*s", + tids->gss_name->len, tids->gss_name->buf); + tid_resp_set_err_msg(resp, tr_new_name("Incoming TID request filter error")); retval = -1; goto cleanup; } @@ -409,7 +429,7 @@ static int tr_tids_req_handler(TIDS_INSTANCE *tids, if (NULL == tr_comm_find_rp(cfg_mgr->active->ctable, cfg_comm, orig_req->rp_realm)) { tr_notice("tr_tids_req_handler: RP Realm (%s) not member of community (%s).", orig_req->rp_realm->buf, orig_req->comm->buf); - tids_send_err_response(tids, orig_req, "RP community membership error"); + tid_resp_set_err_msg(resp, tr_new_name("RP community membership error")); retval=-1; goto cleanup; } @@ -429,20 +449,20 @@ static int tr_tids_req_handler(TIDS_INSTANCE *tids, case MAP_COI_ALREADY_MAPPED: tr_notice("tr_tids_req_handler: community %.*s is COI but COI to APC mapping already occurred. Dropping request.", tid_req_get_comm(orig_req)->len, tid_req_get_comm(orig_req)->buf); - tids_send_err_response(tids, orig_req, "Second COI to APC mapping would result, permitted only once."); + tid_resp_set_err_msg(resp, tr_new_name("Second COI to APC mapping would result, permitted only once.")); retval = -1; goto cleanup; case MAP_COI_NO_APC: tr_notice("No valid APC for COI %.*s.", tid_req_get_comm(orig_req)->len, tid_req_get_comm(orig_req)->buf); - tids_send_err_response(tids, orig_req, "No valid APC for community"); + tid_resp_set_err_msg(resp, tr_new_name("No valid APC for community")); retval = -1; goto cleanup; case MAP_COI_INVALID_APC: tr_notice("tr_tids_req_hander: Request for unknown APC."); - tids_send_err_response(tids, orig_req, "Unknown APC"); + tid_resp_set_err_msg(resp, tr_new_name("Unknown APC")); retval = -1; goto cleanup; @@ -461,7 +481,7 @@ static int tr_tids_req_handler(TIDS_INSTANCE *tids, tr_notice("tr_tids_req_hander: RP Realm (%.*s) not member of mapped APC (%.*s).", tid_req_get_rp_realm(fwd_req)->len, tid_req_get_rp_realm(fwd_req)->buf, tr_comm_get_id(cfg_apc)->len, tr_comm_get_id(cfg_apc)->buf); - tids_send_err_response(tids, orig_req, "RP community membership error"); + tid_resp_set_err_msg(resp, tr_new_name("RP community membership error")); retval=-1; goto cleanup; } @@ -475,7 +495,7 @@ static int tr_tids_req_handler(TIDS_INSTANCE *tids, if (NULL == (aaa_servers = tr_default_server_lookup(cfg_mgr->active->default_servers, fwd_req->comm))) { tr_notice("tr_tids_req_handler: No default AAA servers, discarded."); - tids_send_err_response(tids, orig_req, "No path to AAA Server(s) for realm"); + tid_resp_set_err_msg(resp, tr_new_name("No path to AAA Server(s) for realm")); retval = -1; goto cleanup; } @@ -491,20 +511,25 @@ static int tr_tids_req_handler(TIDS_INSTANCE *tids, &idp_shared); } else { tr_debug("tr_tids_req_handler: route not local."); - aaa_servers = tr_aaa_server_new(tmp_ctx, trp_route_get_next_hop(route)); + aaa_servers = tr_aaa_server_from_name(tmp_ctx, trp_route_get_next_hop(route)); /* cleaned up via talloc */ + if (aaa_servers == NULL) { + tr_err("tr_tids_req_handler: error allocating next hop"); + retval=-1; + goto cleanup; + } idp_shared = 0; } /* Since we aren't defaulting, check idp coi and apc membership of the original request */ if (NULL == (tr_comm_find_idp(cfg_mgr->active->ctable, cfg_comm, orig_req->realm))) { tr_notice("tr_tids_req_handler: IDP Realm (%s) not member of community (%s).", orig_req->realm->buf, cfg_comm->id->buf); - tids_send_err_response(tids, orig_req, "IDP community membership error"); + tid_resp_set_err_msg(resp, tr_new_name("IDP community membership error")); retval=-1; goto cleanup; } if ( cfg_apc && (NULL == (tr_comm_find_idp(cfg_mgr->active->ctable, cfg_apc, orig_req->realm)))) { tr_notice("tr_tids_req_handler: IDP Realm (%s) not member of APC (%s).", orig_req->realm->buf, cfg_apc->id->buf); - tids_send_err_response(tids, orig_req, "IDP APC membership error"); + tid_resp_set_err_msg(resp, tr_new_name("IDP APC membership error")); retval=-1; goto cleanup; } @@ -515,7 +540,7 @@ static int tr_tids_req_handler(TIDS_INSTANCE *tids, if (NULL == aaa_servers) { tr_notice("tr_tids_req_handler: no route or AAA server for realm (%s) in community (%s).", orig_req->realm->buf, orig_req->comm->buf); - tids_send_err_response(tids, orig_req, "Missing trust route error"); + tid_resp_set_err_msg(resp, tr_new_name("Missing trust route error")); retval = -1; goto cleanup; } @@ -680,13 +705,19 @@ static int tr_tids_req_handler(TIDS_INSTANCE *tids, } if (n_responses==0) { - /* No requests succeeded. Forward an error if we got any error responses. */ + /* No requests succeeded, so this will be an error */ + retval = -1; + + /* If we got any error responses, send an arbitrarily chosen one. */ for (ii=0; iin_sock_fd=tids_get_listener(tids, - tr_tids_req_handler, - tr_tids_gss_handler, - cfg_mgr->active->internal->hostname, - cfg_mgr->active->internal->tids_port, - (void *)cookie, - tids_ev->sock_fd, - TR_MAX_SOCKETS); + tids_ev->n_sock_fd = (int)tids_get_listener(tids, + tr_tids_req_handler, + tr_tids_gss_handler, + cfg_mgr->active->internal->hostname, + cfg_mgr->active->internal->tids_port, + (void *)cookie, + tids_ev->sock_fd, + TR_MAX_SOCKETS); if (tids_ev->n_sock_fd==0) { tr_crit("Error opening TID server socket."); retval=1; goto cleanup; } - /* Set up events */ + /* Set up listener events */ for (ii=0; iin_sock_fd; ii++) { tids_ev->ev[ii]=event_new(base, tids_ev->sock_fd[ii], @@ -794,6 +840,12 @@ int tr_tids_event_init(struct event_base *base, event_add(tids_ev->ev[ii], NULL); } + /* Set up a periodic check for completed TID handler processes */ + *sweep_ev = event_new(base, -1, EV_TIMEOUT|EV_PERSIST, tr_tids_sweep_cb, tids); + sweep_interval.tv_sec = 10; + sweep_interval.tv_usec = 0; + event_add(*sweep_ev, &sweep_interval); + cleanup: talloc_free(tmp_ctx); return retval;