Moved detail structure defs to a public header file
[freeradius.git] / src / main / detail.c
1 /*
2  * detail.c     Process the detail file
3  *
4  * Version:     $Id$
5  *
6  *   This program is free software; you can redistribute it and/or modify
7  *   it under the terms of the GNU General Public License as published by
8  *   the Free Software Foundation; either version 2 of the License, or
9  *   (at your option) any later version.
10  *
11  *   This program is distributed in the hope that it will be useful,
12  *   but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *   GNU General Public License for more details.
15  *
16  *   You should have received a copy of the GNU General Public License
17  *   along with this program; if not, write to the Free Software
18  *   Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19  *
20  * Copyright 2007  The FreeRADIUS server project
21  * Copyright 2007  Alan DeKok <aland@deployingradius.com>
22  */
23
24 #include <freeradius-devel/ident.h>
25 RCSID("$Id$")
26
27 #include <freeradius-devel/radiusd.h>
28 #include <freeradius-devel/modules.h>
29 #include <freeradius-devel/detail.h>
30 #include <freeradius-devel/rad_assert.h>
31
32 #ifdef HAVE_SYS_STAT_H
33 #include <sys/stat.h>
34 #endif
35
36 #ifdef HAVE_GLOB_H
37 #include <glob.h>
38 #endif
39
40 #include <fcntl.h>
41
42 #ifdef WITH_DETAIL
43
44 #define USEC (1000000)
45
46 static FR_NAME_NUMBER state_names[] = {
47         { "unopened", STATE_UNOPENED },
48         { "unlocked", STATE_UNLOCKED },
49         { "header", STATE_HEADER },
50         { "reading", STATE_READING },
51         { "queued", STATE_QUEUED },
52         { "running", STATE_RUNNING },
53         { "no-reply", STATE_NO_REPLY },
54         { "replied", STATE_REPLIED },
55
56         { NULL, 0 }
57 };
58
59 /*
60  *      If we're limiting outstanding packets, then mark the response
61  *      as being sent.
62  */
63 int detail_send(rad_listen_t *listener, REQUEST *request)
64 {
65         int rtt;
66         struct timeval now;
67         listen_detail_t *data = listener->data;
68
69         rad_assert(request->listener == listener);
70         rad_assert(listener->send == detail_send);
71
72         /*
73          *      This request timed out.  Remember that, and tell the
74          *      caller it's OK to read more "detail" file stuff.
75          */
76         if (request->reply->code == 0) {
77                 data->delay_time = data->retry_interval * USEC;
78                 data->signal = 1;
79                 data->state = STATE_NO_REPLY;
80
81                 RDEBUG("Detail - No response configured for request %d.  Will retry in %d seconds",
82                        request->number, data->retry_interval);
83
84                 radius_signal_self(RADIUS_SIGNAL_SELF_DETAIL);
85                 return 0;
86         }
87
88         /*
89          *      We call gettimeofday a lot.  But it should be OK,
90          *      because there's nothing else to do.
91          */
92         gettimeofday(&now, NULL);
93
94         /*
95          *      If we haven't sent a packet in the last second, reset
96          *      the RTT.
97          */
98         now.tv_sec -= 1;
99         if (timercmp(&data->last_packet, &now, <)) {
100                 data->has_rtt = FALSE;
101         }
102         now.tv_sec += 1;
103
104         /*
105          *      Only one detail packet may be outstanding at a time,
106          *      so it's safe to update some entries in the detail
107          *      structure.
108          *
109          *      We keep smoothed round trip time (SRTT), but not round
110          *      trip timeout (RTO).  We use SRTT to calculate a rough
111          *      load factor.
112          */
113         rtt = now.tv_sec - request->received.tv_sec;
114         rtt *= USEC;
115         rtt += now.tv_usec;
116         rtt -= request->received.tv_usec;
117
118         /*
119          *      If we're proxying, the RTT is our processing time,
120          *      plus the network delay there and back, plus the time
121          *      on the other end to process the packet.  Ideally, we
122          *      should remove the network delays from the RTT, but we
123          *      don't know what they are.
124          *
125          *      So, to be safe, we over-estimate the total cost of
126          *      processing the packet.
127          */
128         if (!data->has_rtt) {
129                 data->has_rtt = TRUE;
130                 data->srtt = rtt;
131                 data->rttvar = rtt / 2;
132
133         } else {
134                 data->rttvar -= data->rttvar >> 2;
135                 data->rttvar += (data->srtt - rtt);
136                 data->srtt -= data->srtt >> 3;
137                 data->srtt += rtt >> 3;
138         }
139
140         /*
141          *      Calculate the time we wait before sending the next
142          *      packet.
143          *
144          *      rtt / (rtt + delay) = load_factor / 100
145          */
146         data->delay_time = (data->srtt * (100 - data->load_factor)) / (data->load_factor);
147
148         /*
149          *      Cap delay at 4 packets/s.  If the end system can't
150          *      handle this, then it's very broken.
151          */
152         if (data->delay_time > (USEC / 4)) data->delay_time= USEC / 4;
153         
154         RDEBUG3("Received response for request %d.  Will read the next packet in %d seconds",
155                 request->number, data->delay_time / USEC);
156         
157         data->last_packet = now;
158         data->signal = 1;
159         data->state = STATE_REPLIED;
160         radius_signal_self(RADIUS_SIGNAL_SELF_DETAIL);
161
162         return 0;
163 }
164
165
166 /*
167  *      Open the detail file, if we can.
168  *
169  *      FIXME: create it, if it's not already there, so that the main
170  *      server select() will wake us up if there's anything to read.
171  */
172 static int detail_open(rad_listen_t *this)
173 {
174         struct stat st;
175         listen_detail_t *data = this->data;
176         char *filename = data->filename;
177
178         rad_assert(data->state == STATE_UNOPENED);
179         data->delay_time = USEC;
180
181         /*
182          *      Open detail.work first, so we don't lose
183          *      accounting packets.  It's probably better to
184          *      duplicate them than to lose them.
185          *
186          *      Note that we're not writing to the file, but
187          *      we've got to open it for writing in order to
188          *      establish the lock, to prevent rlm_detail from
189          *      writing to it.
190          *
191          *      This also means that if we're doing globbing,
192          *      this file will be read && processed before the
193          *      file globbing is done.
194          */
195         this->fd = open(data->filename_work, O_RDWR);
196         if (this->fd < 0) {
197                 DEBUG2("Polling for detail file %s", filename);
198
199                 /*
200                  *      Try reading the detail file.  If it
201                  *      doesn't exist, we can't do anything.
202                  *
203                  *      Doing the stat will tell us if the file
204                  *      exists, even if we don't have permissions
205                  *      to read it.
206                  */
207                 if (stat(filename, &st) < 0) {
208 #ifdef HAVE_GLOB_H
209                         unsigned int i;
210                         int found;
211                         time_t chtime;
212                         glob_t files;
213
214                         memset(&files, 0, sizeof(files));
215                         if (glob(filename, 0, NULL, &files) != 0) {
216                                 return 0;
217                         }
218
219                         chtime = 0;
220                         found = -1;
221                         for (i = 0; i < files.gl_pathc; i++) {
222                                 if (stat(files.gl_pathv[i], &st) < 0) continue;
223
224                                 if ((i == 0) ||
225                                     (st.st_ctime < chtime)) {
226                                         chtime = st.st_ctime;
227                                         found = i;
228                                 }
229                         }
230
231                         if (found < 0) {
232                                 globfree(&files);
233                                 return 0;
234                         }
235
236                         filename = strdup(files.gl_pathv[found]);
237                         globfree(&files);
238 #else
239                         return 0;
240 #endif
241                 }
242
243                 /*
244                  *      Open it BEFORE we rename it, just to
245                  *      be safe...
246                  */
247                 this->fd = open(filename, O_RDWR);
248                 if (this->fd < 0) {
249                         radlog(L_ERR, "Detail - Failed to open %s: %s",
250                                filename, strerror(errno));
251                         if (filename != data->filename) free(filename);
252                         return 0;
253                 }
254
255                 /*
256                  *      Rename detail to detail.work
257                  */
258                 DEBUG("Detail - Renaming %s -> %s", filename, data->filename_work);
259                 if (rename(filename, data->filename_work) < 0) {
260                         if (filename != data->filename) free(filename);
261                         close(this->fd);
262                         this->fd = -1;
263                         return 0;
264                 }
265                 if (filename != data->filename) free(filename);
266         } /* else detail.work existed, and we opened it */
267
268         rad_assert(data->vps == NULL);
269         rad_assert(data->fp == NULL);
270
271         data->state = STATE_UNLOCKED;
272
273         data->client_ip.af = AF_UNSPEC;
274         data->timestamp = 0;
275
276         return 1;
277 }
278
279
280 /*
281  *      FIXME: add a configuration "exit when done" so that the detail
282  *      file reader can be used as a one-off tool to update stuff.
283  *
284  *      The time sequence for reading from the detail file is:
285  *
286  *      t_0             signalled that the server is idle, and we
287  *                      can read from the detail file.
288  *
289  *      t_rtt           the packet has been processed successfully,
290  *                      wait for t_delay to enforce load factor.
291  *                      
292  *      t_rtt + t_delay wait for signal that the server is idle.
293  *      
294  */
295 int detail_recv(rad_listen_t *listener,
296                 RAD_REQUEST_FUNP *pfun, REQUEST **prequest)
297 {
298         char            key[256], op[8], value[1024];
299         VALUE_PAIR      *vp, **tail;
300         RADIUS_PACKET   *packet;
301         char            buffer[2048];
302         listen_detail_t *data = listener->data;
303
304         /*
305          *      We may be in the main thread.  It needs to update the
306          *      timers before we try to read from the file again.
307          */
308         if (data->signal) return 0;
309
310         switch (data->state) {
311                 case STATE_UNOPENED:
312         open_file:
313                         rad_assert(listener->fd < 0);
314                         
315                         if (!detail_open(listener)) return 0;
316
317                         rad_assert(data->state == STATE_UNLOCKED);
318                         rad_assert(listener->fd >= 0);
319
320                         /* FALL-THROUGH */
321
322                         /*
323                          *      Try to lock fd.  If we can't, return.
324                          *      If we can, continue.  This means that
325                          *      the server doesn't block while waiting
326                          *      for the lock to open...
327                          */
328                 case STATE_UNLOCKED:
329                         /*
330                          *      Note that we do NOT block waiting for
331                          *      the lock.  We've re-named the file
332                          *      above, so we've already guaranteed
333                          *      that any *new* detail writer will not
334                          *      be opening this file.  The only
335                          *      purpose of the lock is to catch a race
336                          *      condition where the execution
337                          *      "ping-pongs" between radiusd &
338                          *      radrelay.
339                          */
340                         if (rad_lockfd_nonblock(listener->fd, 0) < 0) {
341                                 /*
342                                  *      Close the FD.  The main loop
343                                  *      will wake up in a second and
344                                  *      try again.
345                                  */
346                                 close(listener->fd);
347                                 listener->fd = -1;
348                                 data->state = STATE_UNOPENED;
349                                 return 0;
350                         }
351
352                         data->fp = fdopen(listener->fd, "r");
353                         if (!data->fp) {
354                                 radlog(L_ERR, "FATAL: Failed to re-open detail file %s: %s",
355                                        data->filename, strerror(errno));
356                                 exit(1);
357                         }
358
359                         /*
360                          *      Look for the header
361                          */
362                         data->state = STATE_HEADER;
363                         data->delay_time = USEC;
364                         data->vps = NULL;
365
366                         /* FALL-THROUGH */
367
368                 case STATE_HEADER:
369                 do_header:
370                         if (!data->fp) {
371                                 data->state = STATE_UNOPENED;
372                                 goto open_file;
373                         }
374
375                         {
376                                 struct stat buf;
377                                 
378                                 fstat(listener->fd, &buf);
379                                 if (((off_t) ftell(data->fp)) == buf.st_size) {
380                                         goto cleanup;
381                                 }
382                         }
383
384                         /*
385                          *      End of file.  Delete it, and re-set
386                          *      everything.
387                          */
388                         if (feof(data->fp)) {
389                         cleanup:
390                                 DEBUG("Detail - unlinking %s",
391                                       data->filename_work);
392                                 unlink(data->filename_work);
393                                 if (data->fp) fclose(data->fp);
394                                 data->fp = NULL;
395                                 listener->fd = -1;
396                                 data->state = STATE_UNOPENED;
397                                 rad_assert(data->vps == NULL);
398                                 return 0;
399                         }
400
401                         /*
402                          *      Else go read something.
403                          */
404                         break;
405
406                         /*
407                          *      Read more value-pair's, unless we're
408                          *      at EOF.  In that case, queue whatever
409                          *      we have.
410                          */
411                 case STATE_READING:
412                         if (data->fp && !feof(data->fp)) break;
413                         data->state = STATE_QUEUED;
414
415                         /* FALL-THROUGH */
416
417                 case STATE_QUEUED:
418                         goto alloc_packet;
419
420                         /*
421                          *      Periodically check what's going on.
422                          *      If the request is taking too long,
423                          *      retry it.
424                          */
425                 case STATE_RUNNING:
426                         if (time(NULL) < (data->running + data->retry_interval)) {
427                                 return 0;
428                         }
429
430                         DEBUG("No response to detail request.  Retrying");
431                         data->state = STATE_NO_REPLY;
432                         /* FALL-THROUGH */
433
434                         /*
435                          *      If there's no reply, keep
436                          *      retransmitting the current packet
437                          *      forever.
438                          */
439                 case STATE_NO_REPLY:
440                         data->state = STATE_QUEUED;
441                         goto alloc_packet;
442                                 
443                         /*
444                          *      We have a reply.  Clean up the old
445                          *      request, and go read another one.
446                          */
447                 case STATE_REPLIED:
448                         pairfree(&data->vps);
449                         data->state = STATE_HEADER;
450                         goto do_header;
451         }
452         
453         tail = &data->vps;
454         while (*tail) tail = &(*tail)->next;
455
456         /*
457          *      Read a header, OR a value-pair.
458          */
459         while (fgets(buffer, sizeof(buffer), data->fp)) {
460                 /*
461                  *      Badly formatted file: delete it.
462                  *
463                  *      FIXME: Maybe flag an error?
464                  */
465                 if (!strchr(buffer, '\n')) {
466                         pairfree(&data->vps);
467                         goto cleanup;
468                 }
469
470                 /*
471                  *      We're reading VP's, and got a blank line.
472                  *      Queue the packet.
473                  */
474                 if ((data->state == STATE_READING) &&
475                     (buffer[0] == '\n')) {
476                         data->state = STATE_QUEUED;
477                         break;
478                 }
479
480                 /*
481                  *      Look for date/time header, and read VP's if
482                  *      found.  If not, keep reading lines until we
483                  *      find one.
484                  */
485                 if (data->state == STATE_HEADER) {
486                         int y;
487
488                         if (sscanf(buffer, "%*s %*s %*d %*d:%*d:%*d %d", &y)) {
489                                 data->state = STATE_READING;
490                         }
491                         continue;
492                 }
493
494                 /*
495                  *      We have a full "attribute = value" line.
496                  *      If it doesn't look reasonable, skip it.
497                  *
498                  *      FIXME: print an error for badly formatted attributes?
499                  */
500                 if (sscanf(buffer, "%255s %8s %1023s", key, op, value) != 3) {
501                         DEBUG2("WARNING: Skipping badly formatted line %s",
502                                buffer);
503                         continue;
504                 }
505
506                 /*
507                  *      Should be =, :=, +=, ...
508                  */
509                 if (!strchr(op, '=')) continue;
510
511                 /*
512                  *      Skip non-protocol attributes.
513                  */
514                 if (!strcasecmp(key, "Request-Authenticator")) continue;
515
516                 /*
517                  *      Set the original client IP address, based on
518                  *      what's in the detail file.
519                  *
520                  *      Hmm... we don't set the server IP address.
521                  *      or port.  Oh well.
522                  */
523                 if (!strcasecmp(key, "Client-IP-Address")) {
524                         data->client_ip.af = AF_INET;
525                         ip_hton(value, AF_INET, &data->client_ip);
526                         continue;
527                 }
528
529                 /*
530                  *      The original time at which we received the
531                  *      packet.  We need this to properly calculate
532                  *      Acct-Delay-Time.
533                  */
534                 if (!strcasecmp(key, "Timestamp")) {
535                         data->timestamp = atoi(value);
536
537                         vp = paircreate(PW_PACKET_ORIGINAL_TIMESTAMP,
538                                         PW_TYPE_DATE);
539                         if (vp) {
540                                 vp->vp_date = (uint32_t) data->timestamp;
541                                 *tail = vp;
542                                 tail = &(vp->next);
543                         }
544                         continue;
545                 }
546
547                 /*
548                  *      Read one VP.
549                  *
550                  *      FIXME: do we want to check for non-protocol
551                  *      attributes like radsqlrelay does?
552                  */
553                 vp = NULL;
554                 if ((userparse(buffer, &vp) > 0) &&
555                     (vp != NULL)) {
556                         *tail = vp;
557                         tail = &(vp->next);
558                 }
559         }
560
561         /*
562          *      Some kind of error.
563          *
564          *      FIXME: Leave the file in-place, and warn the
565          *      administrator?
566          */
567         if (ferror(data->fp)) goto cleanup;
568
569         /*
570          *      Process the packet.
571          */
572  alloc_packet:
573         rad_assert(data->state == STATE_QUEUED);
574
575         /*
576          *      We're done reading the file, but we didn't read
577          *      anything.  Clean up, and don't return anything.
578          */
579         if (!data->vps) {
580                 data->state = STATE_HEADER;
581                 if (feof(data->fp)) goto cleanup; 
582                 return 0;
583         }
584
585         /*
586          *      Allocate the packet.  If we fail, it's a serious
587          *      problem.
588          */
589         packet = rad_alloc(1);
590         if (!packet) {
591                 radlog(L_ERR, "FATAL: Failed allocating memory for detail");
592                 exit(1);
593         }
594
595         memset(packet, 0, sizeof(*packet));
596         packet->sockfd = -1;
597         packet->src_ipaddr.af = AF_INET;
598         packet->src_ipaddr.ipaddr.ip4addr.s_addr = htonl(INADDR_NONE);
599         packet->code = PW_ACCOUNTING_REQUEST;
600         packet->timestamp = time(NULL);
601
602         /*
603          *      Remember where it came from, so that we don't
604          *      proxy it to the place it came from...
605          */
606         if (data->client_ip.af != AF_UNSPEC) {
607                 packet->src_ipaddr = data->client_ip;
608         }
609
610         vp = pairfind(packet->vps, PW_PACKET_SRC_IP_ADDRESS);
611         if (vp) {
612                 packet->src_ipaddr.af = AF_INET;
613                 packet->src_ipaddr.ipaddr.ip4addr.s_addr = vp->vp_ipaddr;
614         } else {
615                 vp = pairfind(packet->vps, PW_PACKET_SRC_IPV6_ADDRESS);
616                 if (vp) {
617                         packet->src_ipaddr.af = AF_INET6;
618                         memcpy(&packet->src_ipaddr.ipaddr.ip6addr,
619                                &vp->vp_ipv6addr, sizeof(vp->vp_ipv6addr));
620                 }
621         }
622
623         vp = pairfind(packet->vps, PW_PACKET_DST_IP_ADDRESS);
624         if (vp) {
625                 packet->dst_ipaddr.af = AF_INET;
626                 packet->dst_ipaddr.ipaddr.ip4addr.s_addr = vp->vp_ipaddr;
627         } else {
628                 vp = pairfind(packet->vps, PW_PACKET_DST_IPV6_ADDRESS);
629                 if (vp) {
630                         packet->dst_ipaddr.af = AF_INET6;
631                         memcpy(&packet->dst_ipaddr.ipaddr.ip6addr,
632                                &vp->vp_ipv6addr, sizeof(vp->vp_ipv6addr));
633                 }
634         }
635
636         /*
637          *      We've got to give SOME value for Id & ports, so that
638          *      the packets can be added to the request queue.
639          *      However, we don't want to keep track of used/unused
640          *      id's and ports, as that's a lot of work.  This hack
641          *      ensures that (if we have real random numbers), that
642          *      there will be a collision on every 2^(16+15+15+24 - 1)
643          *      packets, on average.  That means we can read 2^37
644          *      packets before having a collision, which means it's
645          *      effectively impossible.
646          */
647         packet->id = fr_rand() & 0xffff;
648         packet->src_port = 1024 + (fr_rand() & 0x7fff);
649         packet->dst_port = 1024 + (fr_rand() & 0x7fff);
650
651         packet->dst_ipaddr.af = AF_INET;
652         packet->dst_ipaddr.ipaddr.ip4addr.s_addr = htonl((INADDR_LOOPBACK & ~0xffffff) | (fr_rand() & 0xffffff));
653
654         /*
655          *      If everything's OK, this is a waste of memory.
656          *      Otherwise, it lets us re-send the original packet
657          *      contents, unmolested.
658          */
659         packet->vps = paircopy(data->vps);
660
661         /*
662          *      Look for Acct-Delay-Time, and update
663          *      based on Acct-Delay-Time += (time(NULL) - timestamp)
664          */
665         vp = pairfind(packet->vps, PW_ACCT_DELAY_TIME);
666         if (!vp) {
667                 vp = paircreate(PW_ACCT_DELAY_TIME, PW_TYPE_INTEGER);
668                 rad_assert(vp != NULL);
669                 pairadd(&packet->vps, vp);
670         }
671         if (data->timestamp != 0) {
672                 vp->vp_integer += time(NULL) - data->timestamp;
673         }
674
675         *pfun = rad_accounting;
676
677         if (debug_flag) {
678                 fr_printf_log("detail_recv: Read packet from %s\n", data->filename_work);
679                 for (vp = packet->vps; vp; vp = vp->next) {
680                         debug_pair(vp);
681                 }
682         }
683
684         /*
685          *      FIXME: many of these checks may not be necessary when
686          *      reading from the detail file.
687          *
688          *      Try again later...
689          */
690         if (!received_request(listener, packet, prequest,
691                               &data->detail_client)) {
692                 rad_free(&packet);
693                 data->state = STATE_NO_REPLY;   /* try again later */
694                 return 0;
695         }
696
697         data->state = STATE_RUNNING;
698         data->running = packet->timestamp;
699
700         return 1;
701 }
702
703
704 /*
705  *      Free detail-specific stuff.
706  */
707 void detail_free(rad_listen_t *this)
708 {
709         listen_detail_t *data = this->data;
710
711         free(data->filename);
712         pairfree(&data->vps);
713
714         if (data->fp != NULL) fclose(data->fp);
715 }
716
717
718 int detail_print(rad_listen_t *this, char *buffer, size_t bufsize)
719 {
720         if (!this->server) {
721                 return snprintf(buffer, bufsize, "%s",
722                                 ((listen_detail_t *)(this->data))->filename);
723         }
724
725         return snprintf(buffer, bufsize, "detail file %s as server %s",
726                         ((listen_detail_t *)(this->data))->filename,
727                         this->server);
728 }
729
730 /*
731  *      Overloaded to return delay times.
732  */
733 int detail_encode(rad_listen_t *this, UNUSED REQUEST *request)
734 {
735         listen_detail_t *data = this->data;
736
737         /*
738          *      We haven't sent a packet... delay things a bit.
739          */
740         if (!data->signal) {
741                 int delay = (data->poll_interval - 1) * USEC;
742
743                 /*
744                  *      Add +/- 0.25s of jitter
745                  */
746                 delay += (USEC * 3) / 4;
747                 delay += fr_rand() % (USEC / 2);
748
749                 DEBUG2("Detail listener %s state %s signalled %d waiting %d.%06d sec",
750                        data->filename,
751                        fr_int2str(state_names, data->state, "?"), data->signal,
752                        (delay / USEC), delay % USEC);
753
754                 return delay;
755         }
756
757         data->signal = 0;
758         
759         DEBUG2("Detail listener %s state %s signalled %d waiting %d.%06d sec",
760                data->filename, fr_int2str(state_names, data->state, "?"),
761                data->signal,
762                data->delay_time / USEC,
763                data->delay_time % USEC);
764
765         return data->delay_time;
766 }
767
768
769 /*
770  *      Overloaded to return "should we fix delay times"
771  */
772 int detail_decode(rad_listen_t *this, UNUSED REQUEST *request)
773 {
774         listen_detail_t *data = this->data;
775
776         return data->signal;
777 }
778
779
780 static const CONF_PARSER detail_config[] = {
781         { "filename",   PW_TYPE_STRING_PTR,
782           offsetof(listen_detail_t, filename), NULL,  NULL },
783         { "load_factor",   PW_TYPE_INTEGER,
784           offsetof(listen_detail_t, load_factor), NULL, Stringify(10)},
785         { "poll_interval",   PW_TYPE_INTEGER,
786           offsetof(listen_detail_t, poll_interval), NULL, Stringify(1)},
787         { "retry_interval",   PW_TYPE_INTEGER,
788           offsetof(listen_detail_t, retry_interval), NULL, Stringify(30)},
789
790         { NULL, -1, 0, NULL, NULL }             /* end the list */
791 };
792
793
794 /*
795  *      Parse a detail section.
796  */
797 int detail_parse(CONF_SECTION *cs, rad_listen_t *this)
798 {
799         int             rcode;
800         listen_detail_t *data;
801         RADCLIENT       *client;
802         char buffer[2048];
803
804         if (!this->data) {
805                 this->data = rad_malloc(sizeof(*data));
806                 memset(this->data, 0, sizeof(*data));
807         }
808
809         data = this->data;
810
811         rcode = cf_section_parse(cs, data, detail_config);
812         if (rcode < 0) {
813                 cf_log_err(cf_sectiontoitem(cs), "Failed parsing listen section");
814                 return -1;
815         }
816
817         if (!data->filename) {
818                 cf_log_err(cf_sectiontoitem(cs), "No detail file specified in listen section");
819                 return -1;
820         }
821
822         if ((data->load_factor < 1) || (data->load_factor > 100)) {
823                 cf_log_err(cf_sectiontoitem(cs), "Load factor must be between 1 and 100");
824                 return -1;
825         }
826
827         if ((data->poll_interval < 1) || (data->poll_interval > 20)) {
828                 cf_log_err(cf_sectiontoitem(cs), "poll_interval must be between 1 and 20");
829                 return -1;
830         }
831
832         /*
833          *      If the filename is a glob, use "detail.work" as the
834          *      work file name.
835          */
836         if ((strchr(data->filename, '*') != NULL) ||
837             (strchr(data->filename, '[') != NULL)) {
838                 char *p;
839
840 #ifndef HAVE_GLOB_H
841                 radlog(L_INFO, "WARNING: Detail file \"%s\" appears to use file globbing, but it is not supported on this system.", data->filename);
842 #endif
843                 strlcpy(buffer, data->filename, sizeof(buffer));
844                 p = strrchr(buffer, FR_DIR_SEP);
845                 if (p) {
846                         p[1] = '\0';
847                 } else {
848                         buffer[0] = '\0';
849                 }
850                 strlcat(buffer, "detail.work",
851                         sizeof(buffer) - strlen(buffer));
852                         
853         } else {
854                 snprintf(buffer, sizeof(buffer), "%s.work", data->filename);
855         }
856
857         free(data->filename_work);
858         data->filename_work = strdup(buffer); /* FIXME: leaked */
859
860         data->vps = NULL;
861         data->fp = NULL;
862         data->state = STATE_UNOPENED;
863         data->delay_time = data->poll_interval * USEC;
864         data->signal = 1;
865
866         /*
867          *      Initialize the fake client.
868          */
869         client = &data->detail_client;
870         memset(client, 0, sizeof(*client));
871         client->ipaddr.af = AF_INET;
872         client->ipaddr.ipaddr.ip4addr.s_addr = INADDR_NONE;
873         client->prefix = 0;
874         client->longname = client->shortname = data->filename;
875         client->secret = client->shortname;
876         client->nastype = strdup("none");
877
878         return 0;
879 }
880 #endif