guacamole-spice-protocol/src/guacd/daemon.c

639 lines
17 KiB
C
Raw Normal View History

2010-12-08 21:14:04 +00:00
2011-02-16 02:48:02 +00:00
/* ***** BEGIN LICENSE BLOCK *****
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
2010-12-08 21:14:04 +00:00
*
2011-02-16 02:48:02 +00:00
* The contents of this file are subject to the Mozilla Public License Version
* 1.1 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
2010-12-08 21:14:04 +00:00
*
2011-02-16 02:48:02 +00:00
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the
* License.
2010-12-08 21:14:04 +00:00
*
2011-02-16 02:48:02 +00:00
* The Original Code is guacd.
*
* The Initial Developer of the Original Code is
* Michael Jumper.
* Portions created by the Initial Developer are Copyright (C) 2010
* the Initial Developer. All Rights Reserved.
*
* Contributor(s):
2012-05-25 06:44:50 +00:00
* David PHAM-VAN <d.pham-van@ulteo.com> Ulteo SAS - http://www.ulteo.com
2012-10-03 16:22:35 +00:00
* Alex Bligh <alex@alex.org.uk>
2011-02-16 02:48:02 +00:00
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
2010-12-08 21:14:04 +00:00
#include <unistd.h>
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <signal.h>
2010-12-08 21:14:04 +00:00
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <ctype.h>
2010-12-08 21:14:04 +00:00
#include <sys/socket.h>
#include <netdb.h>
2010-12-08 21:14:04 +00:00
#include <netinet/in.h>
2010-12-08 21:14:04 +00:00
#include <errno.h>
#include <syslog.h>
#include <libgen.h>
2010-12-08 21:14:04 +00:00
2013-07-22 20:37:30 +00:00
#ifdef ENABLE_SSL
#include <openssl/ssl.h>
#endif
2011-02-11 07:47:46 +00:00
#include <guacamole/client.h>
#include <guacamole/error.h>
2012-09-07 03:45:21 +00:00
#include <guacamole/instruction.h>
#include <guacamole/plugin.h>
#include <guacamole/protocol.h>
2011-02-11 07:47:46 +00:00
2011-11-23 08:01:27 +00:00
#include "client.h"
2011-11-28 00:29:42 +00:00
#include "log.h"
#define GUACD_DEV_NULL "/dev/null"
#define GUACD_ROOT "/"
2013-07-22 20:37:30 +00:00
void guacd_handle_connection(guac_socket* socket) {
2010-12-08 21:14:04 +00:00
guac_client* client;
guac_client_plugin* plugin;
guac_instruction* select;
guac_instruction* size;
guac_instruction* audio;
guac_instruction* video;
guac_instruction* connect;
2012-08-29 18:32:19 +00:00
int init_result;
/* Get protocol from select instruction */
2012-09-07 03:45:21 +00:00
select = guac_instruction_expect(
socket, GUACD_USEC_TIMEOUT, "select");
if (select == NULL) {
2011-11-26 07:28:49 +00:00
/* Log error */
2011-11-28 00:07:04 +00:00
guacd_log_guac_error("Error reading \"select\"");
2011-11-26 07:28:49 +00:00
/* Free resources */
guac_socket_free(socket);
return;
}
2010-12-08 21:14:04 +00:00
/* Validate args to select */
if (select->argc != 1) {
2011-11-26 07:28:49 +00:00
/* Log error */
guacd_log_error("Bad number of arguments to \"select\" (%i)",
2011-11-26 07:28:49 +00:00
select->argc);
/* Free resources */
guac_socket_free(socket);
return;
}
2010-12-08 21:14:04 +00:00
guacd_log_info("Protocol \"%s\" selected", select->argv[0]);
2011-11-26 07:28:49 +00:00
/* Get plugin from protocol in select */
plugin = guac_client_plugin_open(select->argv[0]);
guac_instruction_free(select);
2010-12-08 21:14:04 +00:00
if (plugin == NULL) {
2011-11-26 07:28:49 +00:00
/* Log error */
2011-11-28 00:07:04 +00:00
guacd_log_guac_error("Error loading client plugin");
2011-11-26 07:28:49 +00:00
/* Free resources */
guac_socket_free(socket);
return;
2010-12-08 21:14:04 +00:00
}
/* Send args response */
2011-11-26 00:42:46 +00:00
if (guac_protocol_send_args(socket, plugin->args)
|| guac_socket_flush(socket)) {
2010-12-08 21:14:04 +00:00
2011-11-26 07:28:49 +00:00
/* Log error */
2011-11-28 00:07:04 +00:00
guacd_log_guac_error("Error sending \"args\"");
2011-11-26 07:28:49 +00:00
if (guac_client_plugin_close(plugin))
2011-11-28 00:07:04 +00:00
guacd_log_guac_error("Error closing client plugin");
guac_socket_free(socket);
return;
2010-12-08 21:14:04 +00:00
}
/* Get optimal screen size */
size = guac_instruction_expect(
socket, GUACD_USEC_TIMEOUT, "size");
if (size == NULL) {
/* Log error */
guacd_log_guac_error("Error reading \"size\"");
/* Free resources */
guac_socket_free(socket);
return;
}
/* Get supported audio formats */
audio = guac_instruction_expect(
socket, GUACD_USEC_TIMEOUT, "audio");
if (audio == NULL) {
/* Log error */
guacd_log_guac_error("Error reading \"audio\"");
/* Free resources */
guac_socket_free(socket);
return;
}
/* Get supported video formats */
video = guac_instruction_expect(
socket, GUACD_USEC_TIMEOUT, "video");
if (video == NULL) {
/* Log error */
guacd_log_guac_error("Error reading \"video\"");
/* Free resources */
guac_socket_free(socket);
return;
}
/* Get args from connect instruction */
2012-09-07 03:45:21 +00:00
connect = guac_instruction_expect(
socket, GUACD_USEC_TIMEOUT, "connect");
if (connect == NULL) {
2011-11-26 07:28:49 +00:00
/* Log error */
2011-11-28 00:07:04 +00:00
guacd_log_guac_error("Error reading \"connect\"");
2011-11-26 07:28:49 +00:00
if (guac_client_plugin_close(plugin))
2011-11-28 00:07:04 +00:00
guacd_log_guac_error("Error closing client plugin");
guac_socket_free(socket);
return;
}
2012-08-29 18:32:19 +00:00
/* Get client */
client = guac_client_alloc();
client->socket = socket;
client->log_info_handler = guacd_client_log_info;
client->log_error_handler = guacd_client_log_error;
/* Parse optimal screen dimensions from size instruction */
client->info.optimal_width = atoi(size->argv[0]);
client->info.optimal_height = atoi(size->argv[1]);
/* Store audio mimetypes */
client->info.audio_mimetypes = malloc(sizeof(char*) * (audio->argc+1));
memcpy(client->info.audio_mimetypes, audio->argv,
sizeof(char*) * audio->argc);
client->info.audio_mimetypes[audio->argc] = NULL;
/* Store video mimetypes */
client->info.video_mimetypes = malloc(sizeof(char*) * (video->argc+1));
memcpy(client->info.video_mimetypes, video->argv,
sizeof(char*) * video->argc);
client->info.video_mimetypes[video->argc] = NULL;
2012-08-29 18:32:19 +00:00
/* Init client */
2012-08-29 18:37:35 +00:00
init_result = guac_client_plugin_init_client(plugin,
client, connect->argc, connect->argv);
guac_instruction_free(connect);
2012-08-29 18:32:19 +00:00
/* If client could not be started, free everything and fail */
if (init_result) {
guac_client_free(client);
2011-11-28 00:07:04 +00:00
guacd_log_guac_error("Error instantiating client");
2011-11-26 07:28:49 +00:00
if (guac_client_plugin_close(plugin))
2011-11-28 00:07:04 +00:00
guacd_log_guac_error("Error closing client plugin");
guac_socket_free(socket);
return;
}
/* Start client threads */
guacd_log_info("Starting client");
if (guacd_client_start(client))
guacd_log_error("Client finished abnormally");
2011-11-27 06:26:39 +00:00
else
guacd_log_info("Client finished normally");
/* Free mimetype lists */
free(client->info.audio_mimetypes);
free(client->info.video_mimetypes);
2012-11-30 04:02:39 +00:00
/* Free remaining instructions */
guac_instruction_free(audio);
guac_instruction_free(video);
guac_instruction_free(size);
/* Clean up */
guac_client_free(client);
2011-11-26 07:28:49 +00:00
if (guac_client_plugin_close(plugin))
guacd_log_error("Error closing client plugin");
/* Close socket */
guac_socket_free(socket);
}
int redirect_fd(int fd, int flags) {
/* Attempt to open bit bucket */
int new_fd = open(GUACD_DEV_NULL, flags);
if (new_fd < 0)
return 1;
/* If descriptor is different, redirect old to new and close new */
if (new_fd != fd) {
dup2(new_fd, fd);
close(new_fd);
}
return 0;
}
int daemonize() {
pid_t pid;
/* Fork once to ensure we aren't the process group leader */
pid = fork();
if (pid < 0) {
guacd_log_error("Could not fork() parent: %s", strerror(errno));
return 1;
}
/* Exit if we are the parent */
2012-10-03 17:03:20 +00:00
if (pid > 0) {
guacd_log_info("Exiting and passing control to PID %i", pid);
_exit(0);
}
/* Start a new session (if not already group leader) */
setsid();
/* Fork again so the session group leader exits */
pid = fork();
if (pid < 0) {
guacd_log_error("Could not fork() group leader: %s", strerror(errno));
return 1;
}
/* Exit if we are the parent */
2012-10-03 17:03:20 +00:00
if (pid > 0) {
guacd_log_info("Exiting and passing control to PID %i", pid);
_exit(0);
}
/* Change to root directory */
if (chdir(GUACD_ROOT) < 0) {
guacd_log_error(
"Unable to change working directory to "
GUACD_ROOT);
return 1;
}
/* Reopen the 3 stdxxx to /dev/null */
if (redirect_fd(STDIN_FILENO, O_RDONLY)
|| redirect_fd(STDOUT_FILENO, O_WRONLY)
|| redirect_fd(STDERR_FILENO, O_WRONLY)) {
guacd_log_error(
"Unable to redirect standard file descriptors to "
GUACD_DEV_NULL);
return 1;
}
/* Success */
return 0;
2010-12-08 21:14:04 +00:00
}
2010-12-08 21:14:04 +00:00
int main(int argc, char* argv[]) {
/* Server */
int socket_fd;
struct addrinfo* addresses;
struct addrinfo* current_address;
char bound_address[1024];
char bound_port[64];
int opt_on = 1;
2010-12-08 21:14:04 +00:00
struct addrinfo hints = {
.ai_family = AF_UNSPEC,
.ai_socktype = SOCK_STREAM,
.ai_protocol = IPPROTO_TCP
};
2010-12-08 21:14:04 +00:00
/* Client */
struct sockaddr_in client_addr;
2011-04-21 22:54:29 +00:00
socklen_t client_addr_len;
2010-12-08 21:14:04 +00:00
int connected_socket_fd;
/* Arguments */
char* listen_address = NULL; /* Default address of INADDR_ANY */
char* listen_port = "4822"; /* Default port */
char* pidfile = NULL;
2010-12-08 21:14:04 +00:00
int opt;
int foreground = 0;
2010-12-08 21:14:04 +00:00
2013-07-22 20:37:30 +00:00
#ifdef ENABLE_SSL
/* SSL */
char* cert_file = NULL;
SSL_CTX* ssl_context = NULL;
#endif
/* General */
int retval;
2011-02-28 04:27:12 +00:00
2010-12-08 21:14:04 +00:00
/* Parse arguments */
2013-07-22 20:37:30 +00:00
while ((opt = getopt(argc, argv, "l:b:p:C:A:f")) != -1) {
2010-12-08 21:14:04 +00:00
if (opt == 'l') {
listen_port = strdup(optarg);
}
else if (opt == 'b') {
listen_address = strdup(optarg);
2010-12-08 21:14:04 +00:00
}
else if (opt == 'f') {
foreground = 1;
}
2011-02-28 04:27:12 +00:00
else if (opt == 'p') {
pidfile = strdup(optarg);
}
2013-07-22 20:37:30 +00:00
#ifdef ENABLE_SSL
else if (opt == 'C') {
cert_file = strdup(optarg);
}
else if (opt == 'A') {
fprintf(stderr, "The -a option is not yet implemented.\n");
exit(EXIT_FAILURE);
}
#else
else if (opt == 'C' || opt == 'A') {
fprintf(stderr,
"This %s does not have SSL/TLS support compiled in.\n"
"If you wish to enable support for the -%c option, please install libssl and "
"recompile %s.\n",
argv[0], opt, argv[0]);
exit(EXIT_FAILURE);
}
#endif
2010-12-08 21:14:04 +00:00
else {
fprintf(stderr, "USAGE: %s"
" [-l LISTENPORT]"
" [-b LISTENADDRESS]"
" [-p PIDFILE]"
2013-07-22 20:37:30 +00:00
#ifdef ENABLE_SSL
" [-c CERTIFICATE_FILE]"
" [-a CIPHER1:CIPHER2:...]"
#endif
2012-05-25 06:44:50 +00:00
" [-f]\n", argv[0]);
2010-12-08 21:14:04 +00:00
exit(EXIT_FAILURE);
}
}
/* Set up logging prefix */
strncpy(log_prefix, basename(argv[0]), sizeof(log_prefix));
/* Open log as early as we can */
openlog(NULL, LOG_PID, LOG_DAEMON);
2012-10-03 17:15:20 +00:00
/* Log start */
guacd_log_info("Guacamole proxy daemon (guacd) version " VERSION);
/* Get addresses for binding */
if ((retval = getaddrinfo(listen_address, listen_port,
&hints, &addresses))) {
guacd_log_error("Error parsing given address or port: %s",
gai_strerror(retval));
exit(EXIT_FAILURE);
}
2010-12-08 21:14:04 +00:00
/* Get socket */
socket_fd = socket(AF_INET, SOCK_STREAM, 0);
if (socket_fd < 0) {
guacd_log_error("Error opening socket: %s", strerror(errno));
2010-12-08 21:14:04 +00:00
exit(EXIT_FAILURE);
}
/* Allow socket reuse */
if (setsockopt(socket_fd, SOL_SOCKET, SO_REUSEADDR,
(void*) &opt_on, sizeof(opt_on))) {
guacd_log_info("Unable to set socket options for reuse: %s",
strerror(errno));
}
/* Attempt binding of each address until success */
current_address = addresses;
while (current_address != NULL) {
int retval;
/* Resolve hostname */
if ((retval = getnameinfo(current_address->ai_addr,
current_address->ai_addrlen,
bound_address, sizeof(bound_address),
bound_port, sizeof(bound_port),
NI_NUMERICHOST | NI_NUMERICSERV)))
guacd_log_error("Unable to resolve host: %s",
gai_strerror(retval));
/* Attempt to bind socket to address */
if (bind(socket_fd,
current_address->ai_addr,
current_address->ai_addrlen) == 0) {
2012-03-16 02:29:02 +00:00
guacd_log_info("Successfully bound socket to "
"host %s, port %s", bound_address, bound_port);
/* Done if successful bind */
break;
}
2012-03-16 02:29:02 +00:00
/* Otherwise log information regarding bind failure */
else
2012-03-16 02:29:02 +00:00
guacd_log_info("Unable to bind socket to "
"host %s, port %s: %s",
bound_address, bound_port, strerror(errno));
current_address = current_address->ai_next;
}
/* If unable to bind to anything, fail */
if (current_address == NULL) {
guacd_log_error("Unable to bind socket to any addresses.");
2010-12-08 21:14:04 +00:00
exit(EXIT_FAILURE);
}
2010-12-08 21:14:04 +00:00
2013-07-22 20:37:30 +00:00
#ifdef ENABLE_SSL
/* Init SSL if enabled */
if (cert_file != NULL) {
guacd_log_info("Using certificate file %s", cert_file);
guacd_log_info("Communication will be encrypted with SSL/TLS.");
SSL_library_init();
SSL_load_error_strings();
ssl_context = SSL_CTX_new(SSLv23_server_method());
}
#endif
/* Daemonize if requested */
if (!foreground) {
2012-05-25 06:44:50 +00:00
/* Attempt to daemonize process */
if (daemonize()) {
guacd_log_error("Could not become a daemon.");
exit(EXIT_FAILURE);
}
}
2011-02-28 04:27:12 +00:00
/* Write PID file if requested */
if (pidfile != NULL) {
2011-02-28 04:27:12 +00:00
/* Attempt to open pidfile and write PID */
FILE* pidf = fopen(pidfile, "w");
if (pidf) {
fprintf(pidf, "%d\n", getpid());
fclose(pidf);
}
/* Fail if could not write PID file*/
else {
guacd_log_error("Could not write PID file: %s", strerror(errno));
exit(EXIT_FAILURE);
2011-02-28 04:27:12 +00:00
}
}
2010-12-08 21:14:04 +00:00
/* Ignore SIGPIPE */
if (signal(SIGPIPE, SIG_IGN) == SIG_ERR) {
guacd_log_info("Could not set handler for SIGPIPE to ignore. "
"SIGPIPE may cause termination of the daemon.");
}
/* Ignore SIGCHLD (force automatic removal of children) */
if (signal(SIGCHLD, SIG_IGN) == SIG_ERR) {
guacd_log_info("Could not set handler for SIGCHLD to ignore. "
"Child processes may pile up in the process table.");
}
/* Log listening status */
guacd_log_info("Listening on host %s, port %s", bound_address, bound_port);
/* Free addresses */
freeaddrinfo(addresses);
2010-12-08 21:14:04 +00:00
/* Daemon loop */
for (;;) {
pid_t child_pid;
2010-12-08 21:14:04 +00:00
/* Listen for connections */
if (listen(socket_fd, 5) < 0) {
guacd_log_error("Could not listen on socket: %s", strerror(errno));
2010-12-08 21:14:04 +00:00
return 3;
}
/* Accept connection */
client_addr_len = sizeof(client_addr);
connected_socket_fd = accept(socket_fd,
(struct sockaddr*) &client_addr, &client_addr_len);
2010-12-08 21:14:04 +00:00
if (connected_socket_fd < 0) {
guacd_log_error("Could not accept client connection: %s",
strerror(errno));
2010-12-08 21:14:04 +00:00
return 3;
}
/*
* Once connection is accepted, send child into background.
*
2011-04-21 22:54:29 +00:00
* Note that we prefer fork() over threads for connection-handling
* processes as they give each connection its own memory area, and
* isolate the main daemon and other connections from errors in any
* particular client plugin.
*/
child_pid = fork();
/* If error, log */
if (child_pid == -1)
guacd_log_error("Error forking child process: %s", strerror(errno));
/* If child, start client, and exit when finished */
else if (child_pid == 0) {
2013-07-22 20:37:30 +00:00
guac_socket* socket;
#ifdef ENABLE_SSL
/* If SSL chosen, use it */
if (ssl_context != NULL)
guacd_log_info("STUB: SSL ENABLED - would have used SSL here.");
socket = guac_socket_open(connected_socket_fd);
#else
/* Open guac_socket */
socket = guac_socket_open(connected_socket_fd);
#endif
guacd_handle_connection(socket);
close(connected_socket_fd);
return 0;
2010-12-08 21:14:04 +00:00
}
2011-03-19 07:59:14 +00:00
/* If parent, close reference to child's descriptor */
2011-07-14 08:13:20 +00:00
else if (close(connected_socket_fd) < 0) {
guacd_log_error("Error closing daemon reference to "
"child descriptor: %s", strerror(errno));
}
2010-12-08 21:14:04 +00:00
}
/* Close socket */
2011-07-14 08:13:20 +00:00
if (close(socket_fd) < 0) {
guacd_log_error("Could not close socket: %s", strerror(errno));
2010-12-08 21:14:04 +00:00
return 3;
}
return 0;
}