123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247 |
- // SPDX-License-Identifier: GPL-3.0-or-later
- #ifndef NETDATA_SOCKET_H
- #define NETDATA_SOCKET_H
- #include "../libnetdata.h"
- #ifndef MAX_LISTEN_FDS
- #define MAX_LISTEN_FDS 50
- #endif
- typedef enum web_client_acl {
- WEB_CLIENT_ACL_NONE = (0),
- WEB_CLIENT_ACL_NOCHECK = (0), // Don't check anything - this should work on all channels
- WEB_CLIENT_ACL_DASHBOARD = (1 << 0),
- WEB_CLIENT_ACL_REGISTRY = (1 << 1),
- WEB_CLIENT_ACL_BADGE = (1 << 2),
- WEB_CLIENT_ACL_MGMT = (1 << 3),
- WEB_CLIENT_ACL_STREAMING = (1 << 4),
- WEB_CLIENT_ACL_NETDATACONF = (1 << 5),
- WEB_CLIENT_ACL_SSL_OPTIONAL = (1 << 6),
- WEB_CLIENT_ACL_SSL_FORCE = (1 << 7),
- WEB_CLIENT_ACL_SSL_DEFAULT = (1 << 8),
- WEB_CLIENT_ACL_ACLK = (1 << 9),
- WEB_CLIENT_ACL_WEBRTC = (1 << 10),
- WEB_CLIENT_ACL_BEARER_OPTIONAL = (1 << 11), // allow unprotected access if bearer is not enabled in netdata
- WEB_CLIENT_ACL_BEARER_REQUIRED = (1 << 12), // allow access only if a valid bearer is used
- } WEB_CLIENT_ACL;
- #define WEB_CLIENT_ACL_DASHBOARD_ACLK_WEBRTC (WEB_CLIENT_ACL_DASHBOARD | WEB_CLIENT_ACL_ACLK | WEB_CLIENT_ACL_WEBRTC | WEB_CLIENT_ACL_BEARER_OPTIONAL)
- #define WEB_CLIENT_ACL_ACLK_WEBRTC_DASHBOARD_WITH_BEARER (WEB_CLIENT_ACL_DASHBOARD | WEB_CLIENT_ACL_ACLK | WEB_CLIENT_ACL_WEBRTC | WEB_CLIENT_ACL_BEARER_REQUIRED)
- #ifdef NETDATA_DEV_MODE
- #define ACL_DEV_OPEN_ACCESS WEB_CLIENT_ACL_DASHBOARD
- #else
- #define ACL_DEV_OPEN_ACCESS 0
- #endif
- #define WEB_CLIENT_ACL_ALL 0xFFFF
- #define web_client_can_access_dashboard(w) ((w)->acl & WEB_CLIENT_ACL_DASHBOARD)
- #define web_client_can_access_registry(w) ((w)->acl & WEB_CLIENT_ACL_REGISTRY)
- #define web_client_can_access_badges(w) ((w)->acl & WEB_CLIENT_ACL_BADGE)
- #define web_client_can_access_mgmt(w) ((w)->acl & WEB_CLIENT_ACL_MGMT)
- #define web_client_can_access_stream(w) ((w)->acl & WEB_CLIENT_ACL_STREAMING)
- #define web_client_can_access_netdataconf(w) ((w)->acl & WEB_CLIENT_ACL_NETDATACONF)
- #define web_client_is_using_ssl_optional(w) ((w)->port_acl & WEB_CLIENT_ACL_SSL_OPTIONAL)
- #define web_client_is_using_ssl_force(w) ((w)->port_acl & WEB_CLIENT_ACL_SSL_FORCE)
- #define web_client_is_using_ssl_default(w) ((w)->port_acl & WEB_CLIENT_ACL_SSL_DEFAULT)
- typedef struct listen_sockets {
- struct config *config; // the config file to use
- const char *config_section; // the netdata configuration section to read settings from
- const char *default_bind_to; // the default bind to configuration string
- uint16_t default_port; // the default port to use
- int backlog; // the default listen backlog to use
- size_t opened; // the number of sockets opened
- size_t failed; // the number of sockets attempted to open, but failed
- int fds[MAX_LISTEN_FDS]; // the open sockets
- char *fds_names[MAX_LISTEN_FDS]; // descriptions for the open sockets
- int fds_types[MAX_LISTEN_FDS]; // the socktype for the open sockets (SOCK_STREAM, SOCK_DGRAM)
- int fds_families[MAX_LISTEN_FDS]; // the family of the open sockets (AF_UNIX, AF_INET, AF_INET6)
- WEB_CLIENT_ACL fds_acl_flags[MAX_LISTEN_FDS]; // the acl to apply to the open sockets (dashboard, badges, streaming, netdata.conf, management)
- } LISTEN_SOCKETS;
- char *strdup_client_description(int family, const char *protocol, const char *ip, uint16_t port);
- int listen_sockets_setup(LISTEN_SOCKETS *sockets);
- void listen_sockets_close(LISTEN_SOCKETS *sockets);
- void foreach_entry_in_connection_string(const char *destination, bool (*callback)(char *entry, void *data), void *data);
- int connect_to_this_ip46(int protocol, int socktype, const char *host, uint32_t scope_id, const char *service, struct timeval *timeout);
- int connect_to_this(const char *definition, int default_port, struct timeval *timeout);
- int connect_to_one_of(const char *destination, int default_port, struct timeval *timeout, size_t *reconnects_counter, char *connected_to, size_t connected_to_size);
- int connect_to_one_of_urls(const char *destination, int default_port, struct timeval *timeout, size_t *reconnects_counter, char *connected_to, size_t connected_to_size);
- #ifdef ENABLE_HTTPS
- ssize_t recv_timeout(NETDATA_SSL *ssl,int sockfd, void *buf, size_t len, int flags, int timeout);
- ssize_t send_timeout(NETDATA_SSL *ssl,int sockfd, void *buf, size_t len, int flags, int timeout);
- #else
- ssize_t recv_timeout(int sockfd, void *buf, size_t len, int flags, int timeout);
- ssize_t send_timeout(int sockfd, void *buf, size_t len, int flags, int timeout);
- #endif
- bool fd_is_socket(int fd);
- bool sock_has_output_error(int fd);
- int sock_setnonblock(int fd);
- int sock_delnonblock(int fd);
- int sock_setreuse(int fd, int reuse);
- int sock_setreuse_port(int fd, int reuse);
- int sock_enlarge_in(int fd);
- int sock_enlarge_out(int fd);
- int connection_allowed(int fd, char *client_ip, char *client_host, size_t hostsize,
- SIMPLE_PATTERN *access_list, const char *patname, int allow_dns);
- int accept_socket(int fd, int flags, char *client_ip, size_t ipsize, char *client_port, size_t portsize,
- char *client_host, size_t hostsize, SIMPLE_PATTERN *access_list, int allow_dns);
- #ifndef HAVE_ACCEPT4
- int accept4(int sock, struct sockaddr *addr, socklen_t *addrlen, int flags);
- #ifndef SOCK_NONBLOCK
- #define SOCK_NONBLOCK 00004000
- #endif /* #ifndef SOCK_NONBLOCK */
- #ifndef SOCK_CLOEXEC
- #define SOCK_CLOEXEC 02000000
- #endif /* #ifndef SOCK_CLOEXEC */
- #endif /* #ifndef HAVE_ACCEPT4 */
- // ----------------------------------------------------------------------------
- // poll() based listener
- #define POLLINFO_FLAG_SERVER_SOCKET 0x00000001
- #define POLLINFO_FLAG_CLIENT_SOCKET 0x00000002
- #define POLLINFO_FLAG_DONT_CLOSE 0x00000004
- typedef struct poll POLLJOB;
- typedef struct pollinfo {
- POLLJOB *p; // the parent
- size_t slot; // the slot id
- int fd; // the file descriptor
- int socktype; // the client socket type
- WEB_CLIENT_ACL port_acl; // the access lists permitted on this web server port (it's -1 for client sockets)
- char *client_ip; // Max INET6_ADDRSTRLEN bytes
- char *client_port; // Max NI_MAXSERV bytes
- char *client_host; // Max NI_MAXHOST bytes
- time_t connected_t; // the time the socket connected
- time_t last_received_t; // the time the socket last received data
- time_t last_sent_t; // the time the socket last sent data
- size_t recv_count; // the number of times the socket was ready for inbound traffic
- size_t send_count; // the number of times the socket was ready for outbound traffic
- uint32_t flags; // internal flags
- // callbacks for this socket
- void (*del_callback)(struct pollinfo *pi);
- int (*rcv_callback)(struct pollinfo *pi, short int *events);
- int (*snd_callback)(struct pollinfo *pi, short int *events);
- // the user data
- void *data;
- // linking of free pollinfo structures
- // for quickly finding the next available
- // this is like a stack, it grows and shrinks
- // (with gaps - lower empty slots are preferred)
- struct pollinfo *next;
- } POLLINFO;
- struct poll {
- size_t slots;
- size_t used;
- size_t min;
- size_t max;
- size_t limit;
- time_t complete_request_timeout;
- time_t idle_timeout;
- time_t checks_every;
- time_t timer_milliseconds;
- void *timer_data;
- struct pollfd *fds;
- struct pollinfo *inf;
- struct pollinfo *first_free;
- SIMPLE_PATTERN *access_list;
- int allow_dns;
- void *(*add_callback)(POLLINFO *pi, short int *events, void *data);
- void (*del_callback)(POLLINFO *pi);
- int (*rcv_callback)(POLLINFO *pi, short int *events);
- int (*snd_callback)(POLLINFO *pi, short int *events);
- void (*tmr_callback)(void *timer_data);
- };
- #define pollinfo_from_slot(p, slot) (&((p)->inf[(slot)]))
- int poll_default_snd_callback(POLLINFO *pi, short int *events);
- int poll_default_rcv_callback(POLLINFO *pi, short int *events);
- void poll_default_del_callback(POLLINFO *pi);
- void *poll_default_add_callback(POLLINFO *pi, short int *events, void *data);
- POLLINFO *poll_add_fd(POLLJOB *p
- , int fd
- , int socktype
- , WEB_CLIENT_ACL port_acl
- , uint32_t flags
- , const char *client_ip
- , const char *client_port
- , const char *client_host
- , void *(*add_callback)(POLLINFO *pi, short int *events, void *data)
- , void (*del_callback)(POLLINFO *pi)
- , int (*rcv_callback)(POLLINFO *pi, short int *events)
- , int (*snd_callback)(POLLINFO *pi, short int *events)
- , void *data
- );
- void poll_close_fd(POLLINFO *pi);
- void poll_events(LISTEN_SOCKETS *sockets
- , void *(*add_callback)(POLLINFO *pi, short int *events, void *data)
- , void (*del_callback)(POLLINFO *pi)
- , int (*rcv_callback)(POLLINFO *pi, short int *events)
- , int (*snd_callback)(POLLINFO *pi, short int *events)
- , void (*tmr_callback)(void *timer_data)
- , bool (*check_to_stop_callback)(void)
- , SIMPLE_PATTERN *access_list
- , int allow_dns
- , void *data
- , time_t tcp_request_timeout_seconds
- , time_t tcp_idle_timeout_seconds
- , time_t timer_milliseconds
- , void *timer_data
- , size_t max_tcp_sockets
- );
- #ifndef INET6_ADDRSTRLEN
- #define INET6_ADDRSTRLEN 46
- #endif
- typedef struct socket_peers {
- struct {
- char ip[INET6_ADDRSTRLEN];
- int port;
- } local;
- struct {
- char ip[INET6_ADDRSTRLEN];
- int port;
- } peer;
- } SOCKET_PEERS;
- SOCKET_PEERS socket_peers(int sock_fd);
- #endif //NETDATA_SOCKET_H
|