]> git.netwichtig.de Git - user/henk/code/inspircd.git/blob - src/listensocket.cpp
Fall back to copying bind IP if getsockname() fails, as it apparently can on Windows
[user/henk/code/inspircd.git] / src / listensocket.cpp
1 /*       +------------------------------------+
2  *       | Inspire Internet Relay Chat Daemon |
3  *       +------------------------------------+
4  *
5  *  InspIRCd: (C) 2002-2010 InspIRCd Development Team
6  * See: http://wiki.inspircd.org/Credits
7  *
8  * This program is free but copyrighted software; see
9  *            the file COPYING for details.
10  *
11  * ---------------------------------------------------
12  */
13
14 /* $Core */
15
16 #include "inspircd.h"
17 #include "socket.h"
18 #include "socketengine.h"
19
20 ListenSocket::ListenSocket(ConfigTag* tag, const irc::sockets::sockaddrs& bind_to)
21         : bind_tag(tag)
22 {
23         irc::sockets::satoap(bind_to, bind_addr, bind_port);
24         bind_desc = irc::sockets::satouser(bind_to);
25
26         fd = socket(bind_to.sa.sa_family, SOCK_STREAM, 0);
27
28         if (this->fd == -1)
29                 return;
30
31         ServerInstance->SE->SetReuse(fd);
32         int rv = ServerInstance->SE->Bind(this->fd, bind_to);
33         if (rv >= 0)
34                 rv = ServerInstance->SE->Listen(this->fd, ServerInstance->Config->MaxConn);
35
36         if (rv < 0)
37         {
38                 int errstore = errno;
39                 ServerInstance->SE->Shutdown(this, 2);
40                 ServerInstance->SE->Close(this);
41                 this->fd = -1;
42                 errno = errstore;
43         }
44         else
45         {
46                 ServerInstance->SE->NonBlocking(this->fd);
47                 ServerInstance->SE->AddFd(this, FD_WANT_POLL_READ | FD_WANT_NO_WRITE);
48         }
49 }
50
51 ListenSocket::~ListenSocket()
52 {
53         if (this->GetFd() > -1)
54         {
55                 ServerInstance->SE->DelFd(this);
56                 ServerInstance->Logs->Log("SOCKET", DEBUG,"Shut down listener on fd %d", this->fd);
57                 if (ServerInstance->SE->Shutdown(this, 2) || ServerInstance->SE->Close(this))
58                         ServerInstance->Logs->Log("SOCKET", DEBUG,"Failed to cancel listener: %s", strerror(errno));
59                 this->fd = -1;
60         }
61 }
62
63 /* Just seperated into another func for tidiness really.. */
64 void ListenSocket::AcceptInternal()
65 {
66         irc::sockets::sockaddrs client;
67         irc::sockets::sockaddrs server;
68
69         socklen_t length = sizeof(client);
70         int incomingSockfd = ServerInstance->SE->Accept(this, &client.sa, &length);
71
72         ServerInstance->Logs->Log("SOCKET",DEBUG,"HandleEvent for Listensoket %s nfd=%d", bind_desc.c_str(), incomingSockfd);
73         if (incomingSockfd < 0)
74         {
75                 ServerInstance->stats->statsRefused++;
76                 return;
77         }
78
79         socklen_t sz = sizeof(server);
80         if (getsockname(incomingSockfd, &server.sa, &sz))
81         {
82                 ServerInstance->Logs->Log("SOCKET", DEBUG, "Can't get peername: %s", strerror(errno));
83                 irc::sockets::aptosa(bind_addr, bind_port, server);
84         }
85
86         /*
87          * XXX -
88          * this is done as a safety check to keep the file descriptors within range of fd_ref_table.
89          * its a pretty big but for the moment valid assumption:
90          * file descriptors are handed out starting at 0, and are recycled as theyre freed.
91          * therefore if there is ever an fd over 65535, 65536 clients must be connected to the
92          * irc server at once (or the irc server otherwise initiating this many connections, files etc)
93          * which for the time being is a physical impossibility (even the largest networks dont have more
94          * than about 10,000 users on ONE server!)
95          */
96         if (incomingSockfd >= ServerInstance->SE->GetMaxFds())
97         {
98                 ServerInstance->Logs->Log("SOCKET", DEBUG, "Server is full");
99                 ServerInstance->SE->Shutdown(incomingSockfd, 2);
100                 ServerInstance->SE->Close(incomingSockfd);
101                 ServerInstance->stats->statsRefused++;
102                 return;
103         }
104
105         if (client.sa.sa_family == AF_INET6)
106         {
107                 /*
108                  * This case is the be all and end all patch to catch and nuke 4in6
109                  * instead of special-casing shit all over the place and wreaking merry
110                  * havoc with crap, instead, we just recreate sockaddr and strip ::ffff: prefix
111                  * if it's a 4in6 IP.
112                  *
113                  * This is, of course, much improved over the older way of handling this
114                  * (pretend it doesn't exist + hack around it -- yes, both were done!)
115                  *
116                  * Big, big thanks to danieldg for his work on this.
117                  * -- w00t
118                  */
119                 static const unsigned char prefix4in6[12] = { 0,0,0,0, 0,0,0,0, 0,0,0xFF,0xFF };
120                 if (!memcmp(prefix4in6, &client.in6.sin6_addr, 12))
121                 {
122                         // recreate as a sockaddr_in using the IPv4 IP
123                         uint16_t sport = client.in6.sin6_port;
124                         uint32_t addr = *reinterpret_cast<uint32_t*>(client.in6.sin6_addr.s6_addr + 12);
125                         client.in4.sin_family = AF_INET;
126                         client.in4.sin_port = sport;
127                         client.in4.sin_addr.s_addr = addr;
128
129                         sport = server.in6.sin6_port;
130                         addr = *reinterpret_cast<uint32_t*>(server.in6.sin6_addr.s6_addr + 12);
131                         server.in4.sin_family = AF_INET;
132                         server.in4.sin_port = sport;
133                         server.in4.sin_addr.s_addr = addr;
134                 }
135         }
136
137         ServerInstance->SE->NonBlocking(incomingSockfd);
138
139         ModResult res;
140         FIRST_MOD_RESULT(OnAcceptConnection, res, (incomingSockfd, this, &client, &server));
141         if (res == MOD_RES_PASSTHRU)
142         {
143                 std::string type = bind_tag->getString("type", "clients");
144                 if (type == "clients")
145                 {
146                         ServerInstance->Users->AddUser(incomingSockfd, this, &client, &server);
147                         res = MOD_RES_ALLOW;
148                 }
149         }
150         if (res == MOD_RES_ALLOW)
151         {
152                 ServerInstance->stats->statsAccept++;
153         }
154         else
155         {
156                 ServerInstance->stats->statsRefused++;
157                 ServerInstance->Logs->Log("SOCKET",DEFAULT,"Refusing connection on %s - %s",
158                         bind_desc.c_str(), res == MOD_RES_DENY ? "Connection refused by module" : "Module for this port not found");
159                 ServerInstance->SE->Close(incomingSockfd);
160         }
161 }
162
163 void ListenSocket::HandleEvent(EventType e, int err)
164 {
165         switch (e)
166         {
167                 case EVENT_ERROR:
168                         ServerInstance->Logs->Log("SOCKET",DEFAULT,"ListenSocket::HandleEvent() received a socket engine error event! well shit! '%s'", strerror(err));
169                         break;
170                 case EVENT_WRITE:
171                         ServerInstance->Logs->Log("SOCKET",DEBUG,"*** BUG *** ListenSocket::HandleEvent() got a WRITE event!!!");
172                         break;
173                 case EVENT_READ:
174                         this->AcceptInternal();
175                         break;
176         }
177 }