2 * Copyright (c) 2012, 2015, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
24 * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
25 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
26 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
27 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
29 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
31 * OF THE POSSIBILITY OF SUCH DAMAGE.
38 #include <event2/event.h>
43 #include <tid_internal.h>
44 #include <mon_internal.h>
48 #include <tr_config.h>
50 #include <tr_cfgwatch.h>
54 #define TALLOC_DEBUG_ENABLE 1
56 /***** command-line option handling / setup *****/
58 static void print_version_info(void)
60 printf("Moonshot Trust Router %s\n\n", PACKAGE_VERSION);
63 /* Strip trailing / from a path name.*/
64 static void remove_trailing_slash(char *s) {
73 /* argp global parameters */
74 const char *argp_program_bug_address=PACKAGE_BUGREPORT; /* bug reporting address */
77 static const char doc[]=PACKAGE_NAME " - Moonshot Trust Router " PACKAGE_VERSION;
78 static const char arg_doc[]=""; /* string describing arguments, if any */
80 /* define the options here. Fields are:
81 * { long-name, short-name, variable name, options, help description } */
82 static const struct argp_option cmdline_options[] = {
83 { "config-dir", 'c', "DIR", 0, "Specify configuration file location (default is current directory)"},
84 { "config-validate", 'C', NULL, 0, "Validate configuration files and exit"},
85 { "version", 1, NULL, 0, "Print version information and exit"},
89 /* structure for communicating with option parser */
91 int version_requested;
92 int validate_config_and_exit;
96 /* parser for individual options - fills in a struct cmdline_args */
97 static error_t parse_option(int key, char *arg, struct argp_state *state)
99 /* get a shorthand to the command line argument structure, part of state */
100 struct cmdline_args *arguments=state->input;
105 /* somehow we got called without an argument */
106 return ARGP_ERR_UNKNOWN;
108 arguments->config_dir=arg;
112 arguments->version_requested=1;
116 arguments->validate_config_and_exit=1;
120 return ARGP_ERR_UNKNOWN;
123 return 0; /* success */
126 /* assemble the argp parser */
127 static struct argp argp = {cmdline_options, parse_option, arg_doc, doc};
130 /***** talloc error handling *****/
131 /* called when talloc tries to abort */
132 static void tr_abort(const char *reason)
134 tr_crit("tr_abort: Critical error, talloc aborted. Reason: %s", reason);
138 #if TALLOC_DEBUG_ENABLE
139 static void tr_talloc_log(const char *msg)
141 tr_debug("talloc: %s", msg);
143 #endif /* TALLOC_DEBUG_ENABLE */
145 static void configure_signals(void)
149 sigemptyset(&signals);
150 sigaddset(&signals, SIGPIPE);
151 pthread_sigmask(SIG_BLOCK, &signals, NULL);
154 /* Monitoring handlers */
155 static MON_RC tr_handle_version(void *cookie, json_t **result_ptr)
157 *result_ptr = json_string(PACKAGE_VERSION);
158 return (*result_ptr == NULL) ? MON_NOMEM : MON_SUCCESS;
161 static MON_RC tr_handle_uptime(void *cookie, json_t **result_ptr)
163 time_t *start_time = cookie;
164 *result_ptr = json_integer(time(NULL) - (*start_time));
165 return (*result_ptr == NULL) ? MON_NOMEM : MON_SUCCESS;
168 static MON_RC tr_handle_show_rp_clients(void *cookie, json_t **response_ptr)
170 TR_CFG_MGR *cfg_mgr = talloc_get_type_abort(cookie, TR_CFG_MGR);
172 *response_ptr = tr_rp_clients_to_json(cfg_mgr->active->rp_clients);
173 return (*response_ptr == NULL) ? MON_NOMEM : MON_SUCCESS;
178 int main(int argc, char *argv[])
180 TALLOC_CTX *main_ctx=NULL;
182 TR_INSTANCE *tr = NULL;
183 struct cmdline_args opts;
184 struct event_base *ev_base;
185 struct tr_socket_event tids_ev = {0};
186 struct event *tids_sweep_ev;
187 struct tr_socket_event mon_ev = {0};
188 struct event *cfgwatch_ev;
190 time_t start_time = time(NULL); /* TODO move this? */
194 /* we're going to be multithreaded, so disable null context tracking */
195 talloc_set_abort_fn(tr_abort);
196 talloc_disable_null_tracking();
197 #if TALLOC_DEBUG_ENABLE
198 talloc_set_log_fn(tr_talloc_log);
199 #endif /* TALLOC_DEBUG_ENABLE */
200 main_ctx=talloc_new(NULL);
202 /* Use standalone logging */
205 /***** parse command-line arguments *****/
207 opts.version_requested=0;
208 opts.validate_config_and_exit=0;
211 /* parse the command line*/
212 argp_parse(&argp, argc, argv, 0, 0, &opts);
214 /* process options */
215 remove_trailing_slash(opts.config_dir);
218 /***** Print version info *****/
219 print_version_info();
220 if (opts.version_requested)
221 return 0; /* requested that we print version and exit */
223 /***** create a Trust Router instance *****/
224 if (NULL == (tr = tr_create(main_ctx))) {
225 tr_crit("Unable to create Trust Router instance, exiting.");
229 /***** initialize the trust path query server instance *****/
230 if (NULL == (tr->tids = tids_new(tr))) {
231 tr_crit("Error initializing Trust Path Query Server instance.");
235 /***** initialize the trust router protocol server instance *****/
236 if (NULL == (tr->trps = trps_new(tr))) {
237 tr_crit("Error initializing Trust Router Protocol Server instance.");
241 /***** initialize the monitoring interface instance *****/
242 if (NULL == (tr->mons = mons_new(tr))) {
243 tr_crit("Error initializing monitoring interface instance.");
246 /* Monitor our tids/trps instances */
247 tr->mons->tids = tr->tids;
248 tr->mons->trps = tr->trps;
250 /* Register monitoring handlers */
251 mons_register_handler(tr->mons, MON_CMD_SHOW, OPT_TYPE_SHOW_VERSION, tr_handle_version, NULL);
252 mons_register_handler(tr->mons, MON_CMD_SHOW, OPT_TYPE_SHOW_UPTIME, tr_handle_uptime, &start_time);
253 mons_register_handler(tr->mons, MON_CMD_SHOW, OPT_TYPE_SHOW_RP_CLIENTS, tr_handle_show_rp_clients, tr->cfg_mgr);
254 tr_tid_register_mons_handlers(tr->tids, tr->mons);
255 tr_trp_register_mons_handlers(tr->trps, tr->mons);
257 /***** process configuration *****/
258 tr->cfgwatch=tr_cfgwatch_create(tr);
259 if (tr->cfgwatch == NULL) {
260 tr_crit("Unable to create configuration watcher object, exiting.");
263 tr->cfgwatch->config_dir=opts.config_dir;
264 tr->cfgwatch->cfg_mgr=tr->cfg_mgr;
265 tr->cfgwatch->update_cb=tr_config_changed; /* handle configuration changes */
266 tr->cfgwatch->update_cookie=(void *)tr;
267 if (0 != tr_read_and_apply_config(tr->cfgwatch)) {
268 tr_crit("Error reading configuration, exiting.");
272 /***** Exit here if we are just validating our configuration *****/
273 if (opts.validate_config_and_exit) {
274 printf("Valid configuration found in %s.\n", opts.config_dir);
277 /***** Set up the event loop *****/
278 ev_base=tr_event_loop_init(); /* Set up the event loop */
280 tr_crit("Error initializing event loop.");
284 /* already set config_dir, fstat_list and n_files earlier */
285 if (0 != tr_cfgwatch_event_init(ev_base, tr->cfgwatch, &cfgwatch_ev)) {
286 tr_crit("Error initializing configuration file watcher.");
290 /* install monitoring interface events */
291 tr_debug("Initializing monitoring interface events.");
292 if (0 != tr_mons_event_init(ev_base, tr->mons, tr->cfg_mgr, &mon_ev)) {
293 tr_crit("Error initializing monitoring interface.");
297 /* install TID server events */
298 tr_debug("Initializing TID server events.");
299 if (0 != tr_tids_event_init(ev_base, tr->tids, tr->cfg_mgr, tr->trps, &tids_ev, &tids_sweep_ev)) {
300 tr_crit("Error initializing Trust Path Query Server instance.");
304 /* install TRP handler events */
305 tr_debug("Initializing Dynamic Trust Router Protocol events.");
306 if (TRP_SUCCESS != tr_trps_event_init(ev_base, tr)) {
307 tr_crit("Error initializing Trust Path Query Server instance.");
311 tr_debug("Starting event loop.");
312 tr_event_loop_run(ev_base); /* does not return until we are done */
314 tr_destroy(tr); /* thanks to talloc, should destroy everything */
316 talloc_free(main_ctx);