#include <stdio.h>
#include <stdlib.h>
#include <strings.h>
#include <unistd.h>
#include <stropts.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/stropts.h>
#include <sys/sockio.h>
#include <errno.h>
#include <sys/list.h>
#include <auth_attr.h>
#include <auth_list.h>
#include <secdb.h>
#include <libilb.h>
#include "libilb_impl.h"
#include "ilbd.h"
static boolean_t ilbd_debugging = B_FALSE;
static int ksock = -1;
void
ilbd_enable_debug(void)
{
ilbd_debugging = B_TRUE;
}
boolean_t
is_debugging_on(void)
{
return (ilbd_debugging);
}
void
ilbd_log(int pri, const char *fmt, ...)
{
va_list ap;
va_start(ap, fmt);
if (ilbd_debugging == B_TRUE) {
(void) vfprintf(stderr, fmt, ap);
(void) fprintf(stderr, "\n");
} else {
vsyslog(pri, fmt, ap);
}
va_end(ap);
}
void
logperror(const char *str)
{
if (ilbd_debugging == B_TRUE)
(void) fprintf(stderr, "%s: %s\n", str, strerror(errno));
else
syslog(LOG_ERR, "%s: %m", str);
}
ilb_status_t
ilbd_check_client_config_auth(const struct passwd *pwd)
{
if (chkauthattr(NET_ILB_CONFIG_AUTH, pwd->pw_name) == 0) {
logdebug("user %s is not authorized for"
" configuration operation", pwd->pw_name);
return (ILB_STATUS_CFGAUTH);
}
return (ILB_STATUS_OK);
}
ilb_status_t
ilbd_check_client_enable_auth(const struct passwd *pwd)
{
if (chkauthattr(NET_ILB_ENABLE_AUTH, pwd->pw_name) == 0) {
logdebug("user %s is not authorized for"
" enable/disable operation", pwd->pw_name);
return (ILB_STATUS_CFGAUTH);
}
return (ILB_STATUS_OK);
}
ilb_status_t
ilb_map_errno2ilbstat(int err)
{
ilb_status_t rc = ILB_STATUS_INTERNAL;
switch (err) {
case 0:
rc = ILB_STATUS_OK;
break;
case EINVAL:
rc = ILB_STATUS_EINVAL;
break;
case ENOENT:
rc = ILB_STATUS_ENOENT;
break;
case ENOMEM:
rc = ILB_STATUS_ENOMEM;
break;
case EINPROGRESS:
rc = ILB_STATUS_INPROGRESS;
break;
case EEXIST:
rc = ILB_STATUS_EEXIST;
break;
}
return (rc);
}
static int
i_get_kcmd_sz(void *cmdp)
{
int sz;
switch (((ilb_rule_cmd_t *)cmdp)->cmd) {
case ILB_DESTROY_RULE:
case ILB_ENABLE_RULE:
case ILB_DISABLE_RULE:
sz = sizeof (ilb_name_cmd_t);
break;
case ILB_CREATE_RULE:
case ILB_LIST_RULE:
sz = sizeof (ilb_rule_cmd_t);
break;
case ILB_NUM_RULES:
sz = sizeof (ilb_num_rules_cmd_t);
break;
case ILB_NUM_SERVERS:
sz = sizeof (ilb_num_servers_cmd_t);
break;
case ILB_ADD_SERVERS: {
ilb_servers_info_cmd_t *kcmd = (ilb_servers_info_cmd_t *)cmdp;
sz = sizeof (*kcmd) + ((kcmd->num_servers - 1) *
sizeof (kcmd->servers));
break;
}
case ILB_RULE_NAMES: {
ilb_rule_names_cmd_t *kcmd = (ilb_rule_names_cmd_t *)cmdp;
sz = sizeof (*kcmd) +
((kcmd->num_names - 1) * sizeof (kcmd->buf));
break;
}
case ILB_DEL_SERVERS:
case ILB_ENABLE_SERVERS:
case ILB_DISABLE_SERVERS: {
ilb_servers_cmd_t *kcmd = (ilb_servers_cmd_t *)cmdp;
sz = sizeof (*kcmd) +
((kcmd->num_servers - 1) * sizeof (kcmd->servers));
break;
}
default: sz = -1;
break;
}
return (sz);
}
ilb_status_t
do_ioctl(void *cmdp, ssize_t sz)
{
struct strioctl ioc;
int i_rc;
if (ksock == -1) {
ksock = socket(AF_INET, SOCK_DGRAM, 0);
if (ksock == -1) {
logperror("do_ioctl: AF_INET socket call"
" failed");
return (ILB_STATUS_INTERNAL);
}
}
(void) memset(&ioc, 0, sizeof (ioc));
ioc.ic_cmd = SIOCILB;
ioc.ic_timout = 0;
ioc.ic_dp = cmdp;
if (sz == 0) {
sz = i_get_kcmd_sz(cmdp);
if (sz == -1) {
logdebug("do_ioctl: unknown command");
return (ILB_STATUS_INVAL_CMD);
}
}
ioc.ic_len = sz;
i_rc = ioctl(ksock, I_STR, (caddr_t)&ioc);
if (i_rc == -1) {
logdebug("do_ioctl: SIOCILB ioctl (%d) failed: %s",
*(ilb_cmd_t *)cmdp, strerror(errno));
return (ilb_map_errno2ilbstat(errno));
}
return (ILB_STATUS_OK);
}
void
ilbd_reply_ok(uint32_t *rbuf, size_t *rbufsz)
{
ilb_comm_t *ic = (ilb_comm_t *)rbuf;
ic->ic_cmd = ILBD_CMD_OK;
ic->ic_flags = ILB_COMM_END;
*rbufsz = sizeof (ilb_comm_t);
}
void
ilbd_reply_err(uint32_t *rbuf, size_t *rbufsz, ilb_status_t status)
{
ilb_comm_t *ic = (ilb_comm_t *)rbuf;
ic->ic_cmd = ILBD_CMD_ERROR;
ic->ic_flags = ILB_COMM_END;
*(ilb_status_t *)&ic->ic_data = status;
*rbufsz = sizeof (ilb_comm_t) + sizeof (ilb_status_t);
}