summaryrefslogtreecommitdiffstats
path: root/src/libutil/addr.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 21:30:40 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 21:30:40 +0000
commit133a45c109da5310add55824db21af5239951f93 (patch)
treeba6ac4c0a950a0dda56451944315d66409923918 /src/libutil/addr.c
parentInitial commit. (diff)
downloadrspamd-133a45c109da5310add55824db21af5239951f93.tar.xz
rspamd-133a45c109da5310add55824db21af5239951f93.zip
Adding upstream version 3.8.1.upstream/3.8.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/libutil/addr.c')
-rw-r--r--src/libutil/addr.c2049
1 files changed, 2049 insertions, 0 deletions
diff --git a/src/libutil/addr.c b/src/libutil/addr.c
new file mode 100644
index 0000000..e011c99
--- /dev/null
+++ b/src/libutil/addr.c
@@ -0,0 +1,2049 @@
+/*
+ * Copyright 2023 Vsevolod Stakhov
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+#include "config.h"
+#include "addr.h"
+#include "util.h"
+#include "logger.h"
+#include "cryptobox.h"
+#include "unix-std.h"
+/* pwd and grp */
+#ifdef HAVE_PWD_H
+#include <pwd.h>
+#endif
+
+#ifdef HAVE_GRP_H
+#include <grp.h>
+#endif
+
+static void *local_addrs;
+
+enum {
+ RSPAMD_IPV6_UNDEFINED = 0,
+ RSPAMD_IPV6_SUPPORTED,
+ RSPAMD_IPV6_UNSUPPORTED
+} ipv6_status = RSPAMD_IPV6_UNDEFINED;
+
+/**
+ * Union that is used for storing sockaddrs
+ */
+union sa_union {
+ struct sockaddr sa;
+ struct sockaddr_in s4;
+ struct sockaddr_in6 s6;
+ struct sockaddr_un su;
+ struct sockaddr_storage ss;
+};
+
+union sa_inet {
+ struct sockaddr sa;
+ struct sockaddr_in s4;
+ struct sockaddr_in6 s6;
+};
+
+struct rspamd_addr_unix {
+ struct sockaddr_un addr;
+ gint mode;
+ uid_t owner;
+ gid_t group;
+};
+
+struct rspamd_addr_inet {
+ union sa_inet addr;
+};
+
+struct rspamd_inet_addr_s {
+ union {
+ struct rspamd_addr_inet in;
+ struct rspamd_addr_unix *un;
+ } u;
+ gint af;
+ socklen_t slen;
+};
+
+static void
+rspamd_ip_validate_af(rspamd_inet_addr_t *addr)
+{
+ if (addr->af != AF_UNIX) {
+ if (addr->u.in.addr.sa.sa_family != addr->af) {
+ addr->u.in.addr.sa.sa_family = addr->af;
+ }
+ }
+ else {
+ addr->u.un->addr.sun_family = AF_UNIX;
+ }
+
+ if (addr->af == AF_INET) {
+ addr->slen = sizeof(struct sockaddr_in);
+ }
+ else if (addr->af == AF_INET6) {
+ addr->slen = sizeof(struct sockaddr_in6);
+ }
+ else if (addr->af == AF_UNIX) {
+#ifdef SUN_LEN
+ addr->slen = SUN_LEN(&addr->u.un->addr);
+#else
+ addr->slen = sizeof(addr->u.un->addr);
+#endif
+#if defined(FREEBSD) || defined(__APPLE__)
+ addr->u.un->addr.sun_len = addr->slen;
+#endif
+ }
+}
+
+#define RSPAMD_MAYBE_ALLOC_POOL(pool, sz) \
+ (pool != NULL) ? rspamd_mempool_alloc((pool), (sz)) : g_malloc(sz)
+#define RSPAMD_MAYBE_ALLOC0_POOL(pool, sz) \
+ (pool != NULL) ? rspamd_mempool_alloc0((pool), (sz)) : g_malloc0(sz)
+
+static rspamd_inet_addr_t *
+rspamd_inet_addr_create(gint af, rspamd_mempool_t *pool)
+{
+ rspamd_inet_addr_t *addr;
+
+ addr = RSPAMD_MAYBE_ALLOC0_POOL(pool, sizeof(*addr));
+
+ addr->af = af;
+
+ if (af == AF_UNIX) {
+ addr->u.un = RSPAMD_MAYBE_ALLOC0_POOL(pool, sizeof(*addr->u.un));
+ addr->slen = sizeof(addr->u.un->addr);
+ }
+ else {
+ rspamd_ip_validate_af(addr);
+ }
+
+ return addr;
+}
+
+void rspamd_inet_address_free(rspamd_inet_addr_t *addr)
+{
+ if (addr) {
+ if (addr->af == AF_UNIX) {
+ if (addr->u.un) {
+ g_free(addr->u.un);
+ }
+ }
+ g_free(addr);
+ }
+}
+
+static void
+rspamd_ip_check_ipv6(void)
+{
+ if (ipv6_status == RSPAMD_IPV6_UNDEFINED) {
+ gint s;
+
+ s = socket(AF_INET6, SOCK_STREAM, 0);
+
+ if (s == -1) {
+ ipv6_status = RSPAMD_IPV6_UNSUPPORTED;
+ }
+ else {
+ /*
+ * Try to check /proc if we are on Linux (the common case)
+ */
+ struct stat st;
+
+ close(s);
+
+ if (stat("/proc/net/dev", &st) != -1) {
+ if (stat("/proc/net/if_inet6", &st) != -1) {
+ ipv6_status = RSPAMD_IPV6_SUPPORTED;
+ }
+ else {
+ ipv6_status = RSPAMD_IPV6_UNSUPPORTED;
+ }
+ }
+ else {
+ /* Not a Linux, so we assume it supports ipv6 somehow... */
+ ipv6_status = RSPAMD_IPV6_SUPPORTED;
+ }
+ }
+ }
+}
+
+gboolean
+rspamd_ip_is_valid(const rspamd_inet_addr_t *addr)
+{
+ const struct in_addr ip4_any = {INADDR_ANY}, ip4_none = {INADDR_NONE};
+ const struct in6_addr ip6_any = IN6ADDR_ANY_INIT;
+ gboolean ret = FALSE;
+
+ if (G_LIKELY(addr->af == AF_INET)) {
+ if (memcmp(&addr->u.in.addr.s4.sin_addr, &ip4_any,
+ sizeof(struct in_addr)) != 0 &&
+ memcmp(&addr->u.in.addr.s4.sin_addr, &ip4_none,
+ sizeof(struct in_addr)) != 0) {
+ ret = TRUE;
+ }
+ }
+ else if (G_UNLIKELY(addr->af == AF_INET6)) {
+ if (memcmp(&addr->u.in.addr.s6.sin6_addr, &ip6_any,
+ sizeof(struct in6_addr)) != 0) {
+ ret = TRUE;
+ }
+ }
+
+ return ret;
+}
+
+gint rspamd_accept_from_socket(gint sock, rspamd_inet_addr_t **target,
+ rspamd_accept_throttling_handler hdl,
+ void *hdl_data)
+{
+ gint nfd, serrno;
+ union sa_union su;
+ socklen_t len = sizeof(su);
+ rspamd_inet_addr_t *addr = NULL;
+
+ if ((nfd = accept(sock, &su.sa, &len)) == -1) {
+ if (target) {
+ *target = NULL;
+ }
+
+ if (errno == EAGAIN || errno == EINTR || errno == EWOULDBLOCK) {
+ return 0;
+ }
+ else if (errno == EMFILE || errno == ENFILE) {
+ /* Temporary disable accept event */
+ if (hdl) {
+ hdl(sock, hdl_data);
+ }
+
+ return 0;
+ }
+
+ return -1;
+ }
+
+ if (su.sa.sa_family == AF_INET6) {
+ /* Deal with bloody v4 mapped to v6 addresses */
+
+ static const guint8 mask[] = {
+ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0};
+ const guint8 *p;
+
+ if (memcmp((const guint8 *) &su.s6.sin6_addr, mask, sizeof(mask)) == 0) {
+ p = (const guint8 *) &su.s6.sin6_addr;
+
+ if ((p[10] == 0xff && p[11] == 0xff)) {
+ addr = rspamd_inet_addr_create(AF_INET, NULL);
+ memcpy(&addr->u.in.addr.s4.sin_addr, &p[12],
+ sizeof(struct in_addr));
+ addr->u.in.addr.s4.sin_port = su.s6.sin6_port;
+ }
+ else {
+ /* Something strange but not mapped v4 address */
+ addr = rspamd_inet_addr_create(AF_INET6, NULL);
+ memcpy(&addr->u.in.addr.s6, &su.s6,
+ sizeof(struct sockaddr_in6));
+ }
+ }
+ else {
+ addr = rspamd_inet_addr_create(AF_INET6, NULL);
+ memcpy(&addr->u.in.addr.s6, &su.s6,
+ sizeof(struct sockaddr_in6));
+ }
+ }
+ else {
+ addr = rspamd_inet_addr_create(su.sa.sa_family, NULL);
+ addr->slen = len;
+
+ if (addr->af == AF_UNIX) {
+ len = sizeof(su);
+
+ if (getsockname(sock, &su.sa, &len) != -1) {
+ memcpy(&addr->u.un->addr, &su.su, MIN(len, sizeof(struct sockaddr_un)));
+ }
+ else {
+ /* Just copy socket address */
+ memcpy(&addr->u.un->addr, &su.sa, sizeof(struct sockaddr));
+ }
+ }
+ else {
+ memcpy(&addr->u.in.addr, &su, MIN(len, sizeof(addr->u.in.addr)));
+ }
+ }
+
+ if (rspamd_socket_nonblocking(nfd) < 0) {
+ goto out;
+ }
+
+ /* Set close on exec */
+ if (fcntl(nfd, F_SETFD, FD_CLOEXEC) == -1) {
+ msg_warn("fcntl failed: %d, '%s'", errno, strerror(errno));
+ goto out;
+ }
+
+ if (target) {
+ *target = addr;
+ }
+ else {
+ /* Avoid leak */
+ rspamd_inet_address_free(addr);
+ }
+
+ return (nfd);
+
+out:
+ serrno = errno;
+ close(nfd);
+ errno = serrno;
+ rspamd_inet_address_free(addr);
+
+ return (-1);
+}
+
+static gboolean
+rspamd_parse_unix_path(rspamd_inet_addr_t **target,
+ const char *src, gsize len,
+ rspamd_mempool_t *pool,
+ enum rspamd_inet_address_parse_flags how)
+{
+ gchar **tokens, **cur_tok, *p, *pwbuf;
+ glong pwlen;
+ struct passwd pw, *ppw;
+ struct group gr, *pgr;
+ rspamd_inet_addr_t *addr;
+ bool has_group = false;
+
+ addr = rspamd_inet_addr_create(AF_UNIX, pool);
+
+ addr->u.un->mode = 00644;
+ addr->u.un->owner = (uid_t) -1;
+ addr->u.un->group = (gid_t) -1;
+
+ if (!(how & RSPAMD_INET_ADDRESS_PARSE_REMOTE)) {
+ tokens = rspamd_string_len_split(src, len, " ,", -1, pool);
+
+ if (tokens[0] == NULL) {
+
+ if (!pool) {
+ rspamd_inet_address_free(addr);
+ g_strfreev(tokens);
+ }
+
+ return FALSE;
+ }
+
+ rspamd_strlcpy(addr->u.un->addr.sun_path, tokens[0],
+ sizeof(addr->u.un->addr.sun_path));
+#if defined(FREEBSD) || defined(__APPLE__)
+ addr->u.un->addr.sun_len = SUN_LEN(&addr->u.un->addr);
+#endif
+ }
+ else {
+ rspamd_strlcpy(addr->u.un->addr.sun_path, src,
+ MIN(len + 1, sizeof(addr->u.un->addr.sun_path)));
+#if defined(FREEBSD) || defined(__APPLE__)
+ addr->u.un->addr.sun_len = SUN_LEN(&addr->u.un->addr);
+#endif
+
+ if (target) {
+ rspamd_ip_validate_af(addr);
+ *target = addr;
+ }
+ else {
+ if (!pool) {
+ rspamd_inet_address_free(addr);
+ }
+ }
+
+ return TRUE;
+ }
+
+ /* Skip for remote */
+ cur_tok = &tokens[1];
+#ifdef _SC_GETPW_R_SIZE_MAX
+ pwlen = sysconf(_SC_GETPW_R_SIZE_MAX);
+ if (pwlen <= 0) {
+ pwlen = 8192;
+ }
+#else
+ pwlen = 8192;
+#endif
+
+ pwbuf = g_malloc0(pwlen);
+
+ while (*cur_tok) {
+ if (g_ascii_strncasecmp(*cur_tok, "mode=", sizeof("mode=") - 1) == 0) {
+ p = strchr(*cur_tok, '=');
+ /* XXX: add error check */
+ addr->u.un->mode = strtoul(p + 1, NULL, 0);
+
+ if (addr->u.un->mode == 0) {
+ msg_err("bad mode: %s", p + 1);
+ errno = EINVAL;
+ goto err;
+ }
+ }
+ else if (g_ascii_strncasecmp(*cur_tok, "owner=",
+ sizeof("owner=") - 1) == 0) {
+ p = strchr(*cur_tok, '=');
+
+ if (getpwnam_r(p + 1, &pw, pwbuf, pwlen, &ppw) != 0 || ppw == NULL) {
+ msg_err("bad user: %s", p + 1);
+ if (ppw == NULL) {
+ errno = ENOENT;
+ }
+ goto err;
+ }
+ addr->u.un->owner = pw.pw_uid;
+
+ if (!has_group) {
+ addr->u.un->group = pw.pw_gid;
+ }
+ }
+ else if (g_ascii_strncasecmp(*cur_tok, "group=",
+ sizeof("group=") - 1) == 0) {
+ p = strchr(*cur_tok, '=');
+
+ if (getgrnam_r(p + 1, &gr, pwbuf, pwlen, &pgr) != 0 || pgr == NULL) {
+ msg_err("bad group: %s", p + 1);
+ if (pgr == NULL) {
+ errno = ENOENT;
+ }
+ goto err;
+ }
+
+ has_group = true;
+ addr->u.un->group = gr.gr_gid;
+ }
+ cur_tok++;
+ }
+
+ g_free(pwbuf);
+
+ if (!pool) {
+ g_strfreev(tokens);
+ }
+
+ if (target) {
+ rspamd_ip_validate_af(addr);
+ *target = addr;
+ }
+ else {
+ if (!pool) {
+ rspamd_inet_address_free(addr);
+ }
+ }
+
+ return TRUE;
+
+err:
+
+ g_free(pwbuf);
+
+ if (!pool) {
+ g_strfreev(tokens);
+ rspamd_inet_address_free(addr);
+ }
+
+ return FALSE;
+}
+
+gboolean
+rspamd_parse_inet_address_ip4(const guchar *text, gsize len, gpointer target)
+{
+ const guchar *p;
+ guchar c;
+ guint32 addr = 0, *addrptr = target;
+ guint octet = 0, n = 0;
+
+ g_assert(text != NULL);
+ g_assert(target != NULL);
+
+ if (len == 0) {
+ len = strlen(text);
+ }
+
+ for (p = text; p < text + len; p++) {
+ c = *p;
+
+ if (c >= '0' && c <= '9') {
+ octet = octet * 10 + (c - '0');
+
+ if (octet > 255) {
+ return FALSE;
+ }
+
+ continue;
+ }
+
+ if (c == '.') {
+ addr = (addr << 8) + octet;
+ octet = 0;
+ n++;
+ continue;
+ }
+
+ return FALSE;
+ }
+
+ if (n == 3) {
+ addr = (addr << 8) + octet;
+ *addrptr = ntohl(addr);
+
+ return TRUE;
+ }
+
+ return FALSE;
+}
+
+gboolean
+rspamd_parse_inet_address_ip6(const guchar *text, gsize len, gpointer target)
+{
+ guchar t, *zero = NULL, *s, *d, *addr = target;
+ const guchar *p, *digit = NULL, *percent;
+ gsize len4 = 0;
+ guint n = 8, nibbles = 0, word = 0;
+
+ g_assert(text != NULL);
+ g_assert(target != NULL);
+
+ p = text;
+ if (len == 0) {
+ len = strlen(text);
+ }
+
+ /* Check IPv6 scope */
+ if ((percent = memchr(p, '%', len)) != NULL && percent > p) {
+ len = percent - p; /* Ignore scope */
+ }
+
+ if (len > sizeof("IPv6:") - 1 &&
+ g_ascii_strncasecmp(p, "IPv6:", sizeof("IPv6:") - 1) == 0) {
+ /* Special case, SMTP conformant IPv6 address */
+ p += sizeof("IPv6:") - 1;
+ len -= sizeof("IPv6:") - 1;
+ }
+
+ if (*p == '[' && len > 1 && p[len - 1] == ']') {
+ /* Strip [] as well */
+ p++;
+ len -= 2;
+ }
+
+ /* Ignore leading colon */
+ if (len > 0 && *p == ':') {
+ p++;
+ len--;
+ }
+
+ for (/* void */; len; len--) {
+ t = *p++;
+
+ if (t == ':') {
+ if (nibbles) {
+ digit = p;
+ len4 = len;
+ *addr++ = (u_char) (word >> 8);
+ *addr++ = (u_char) (word & 0xff);
+
+ if (--n) {
+ nibbles = 0;
+ word = 0;
+ continue;
+ }
+ }
+ else {
+ if (zero == NULL) {
+ digit = p;
+ len4 = len;
+ zero = addr;
+ continue;
+ }
+ }
+
+ return FALSE;
+ }
+
+ if (t == '.' && nibbles) {
+ if (n < 2 || digit == NULL) {
+ return FALSE;
+ }
+
+ /* IPv4 encoded in IPv6 */
+ if (!rspamd_parse_inet_address_ip4(digit, len4 - 1, &word)) {
+ return FALSE;
+ }
+
+ word = ntohl(word);
+ *addr++ = (guchar) ((word >> 24) & 0xff);
+ *addr++ = (guchar) ((word >> 16) & 0xff);
+ n--;
+ break;
+ }
+
+ if (++nibbles > 4) {
+ /* Too many digits */
+ return FALSE;
+ }
+
+ /* Restore from hex */
+ if (t >= '0' && t <= '9') {
+ word = word * 16 + (t - '0');
+ continue;
+ }
+
+ t |= 0x20;
+
+ if (t >= 'a' && t <= 'f') {
+ word = word * 16 + (t - 'a') + 10;
+ continue;
+ }
+
+ return FALSE;
+ }
+
+ if (nibbles == 0 && zero == NULL) {
+ return FALSE;
+ }
+
+ *addr++ = (guchar) (word >> 8);
+ *addr++ = (guchar) (word & 0xff);
+
+ if (--n) {
+ if (zero) {
+ n *= 2;
+ s = addr - 1;
+ d = s + n;
+ while (s >= zero) {
+ *d-- = *s--;
+ }
+ memset(zero, 0, n);
+
+ return TRUE;
+ }
+ }
+ else {
+ if (zero == NULL) {
+ return TRUE;
+ }
+ }
+
+ return FALSE;
+}
+
+/* Checks for ipv6 mapped address */
+static rspamd_inet_addr_t *
+rspamd_inet_address_v6_maybe_map(const struct sockaddr_in6 *sin6,
+ rspamd_mempool_t *pool)
+{
+ rspamd_inet_addr_t *addr = NULL;
+ /* 10 zero bytes or 80 bits */
+ static const guint8 mask[] = {
+ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0};
+ const guint8 *p;
+
+ if (memcmp((const guint8 *) &sin6->sin6_addr, mask, sizeof(mask)) == 0) {
+ p = (const guint8 *) &sin6->sin6_addr;
+
+ if ((p[10] == 0xff && p[11] == 0xff)) {
+ addr = rspamd_inet_addr_create(AF_INET, pool);
+ memcpy(&addr->u.in.addr.s4.sin_addr, &p[12],
+ sizeof(struct in_addr));
+ }
+ else {
+ /* Something strange but not mapped v4 address */
+ addr = rspamd_inet_addr_create(AF_INET6, pool);
+ memcpy(&addr->u.in.addr.s6.sin6_addr, &sin6->sin6_addr,
+ sizeof(struct in6_addr));
+ }
+ }
+ else {
+ addr = rspamd_inet_addr_create(AF_INET6, pool);
+ memcpy(&addr->u.in.addr.s6.sin6_addr, &sin6->sin6_addr,
+ sizeof(struct in6_addr));
+ }
+
+ return addr;
+}
+
+static void
+rspamd_inet_address_v6_maybe_map_static(const struct sockaddr_in6 *sin6,
+ rspamd_inet_addr_t *addr)
+{
+ /* 10 zero bytes or 80 bits */
+ static const guint8 mask[] = {
+ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0};
+ const guint8 *p;
+
+ if (memcmp((const guint8 *) &sin6->sin6_addr, mask, sizeof(mask)) == 0) {
+ p = (const guint8 *) &sin6->sin6_addr;
+
+ if ((p[10] == 0xff && p[11] == 0xff)) {
+ memcpy(&addr->u.in.addr.s4.sin_addr, &p[12],
+ sizeof(struct in_addr));
+ addr->af = AF_INET;
+ addr->slen = sizeof(addr->u.in.addr.s4);
+ }
+ else {
+ /* Something strange but not mapped v4 address */
+ memcpy(&addr->u.in.addr.s6.sin6_addr, &sin6->sin6_addr,
+ sizeof(struct in6_addr));
+ addr->af = AF_INET6;
+ addr->slen = sizeof(addr->u.in.addr.s6);
+ }
+ }
+ else {
+ memcpy(&addr->u.in.addr.s6.sin6_addr, &sin6->sin6_addr,
+ sizeof(struct in6_addr));
+ addr->af = AF_INET6;
+ addr->slen = sizeof(addr->u.in.addr.s6);
+ }
+}
+
+static gboolean
+rspamd_parse_inet_address_common(rspamd_inet_addr_t **target,
+ const char *src,
+ gsize srclen,
+ rspamd_mempool_t *pool,
+ enum rspamd_inet_address_parse_flags how)
+{
+ gboolean ret = FALSE;
+ rspamd_inet_addr_t *addr = NULL;
+ union sa_inet su;
+ const char *end = NULL;
+ char ipbuf[INET6_ADDRSTRLEN + 1];
+ guint iplen;
+ gulong portnum;
+
+ if (srclen == 0) {
+ return FALSE;
+ }
+
+ g_assert(src != NULL);
+ g_assert(target != NULL);
+
+ rspamd_ip_check_ipv6();
+
+ if (!(how & RSPAMD_INET_ADDRESS_PARSE_NO_UNIX) &&
+ (src[0] == '/' || src[0] == '.')) {
+ return rspamd_parse_unix_path(target, src, srclen, pool, how);
+ }
+
+ if (src[0] == '[') {
+ const gchar *ip_start;
+ /* Ipv6 address in format [::1]:port or just [::1] */
+ end = memchr(src + 1, ']', srclen - 1);
+
+ if (end == NULL) {
+ return FALSE;
+ }
+
+ iplen = end - src - 1;
+
+ if (iplen == 0 || iplen >= sizeof(ipbuf)) {
+ return FALSE;
+ }
+
+ ip_start = src + 1;
+ rspamd_strlcpy(ipbuf, ip_start, iplen + 1);
+
+ if (rspamd_parse_inet_address_ip6(ipbuf, iplen,
+ &su.s6.sin6_addr)) {
+ addr = rspamd_inet_address_v6_maybe_map(&su.s6, pool);
+ ret = TRUE;
+ }
+
+ if (!(how & RSPAMD_INET_ADDRESS_PARSE_NO_PORT) && ret && end[1] == ':') {
+ /* Port part */
+ rspamd_strtoul(end + 1, srclen - iplen - 3, &portnum);
+ rspamd_inet_address_set_port(addr, portnum);
+ }
+ }
+ else {
+
+ if (!(how & RSPAMD_INET_ADDRESS_PARSE_NO_PORT) &&
+ (end = memchr(src, ':', srclen)) != NULL) {
+ /* This is either port number and ipv4 addr or ipv6 addr */
+ /* Search for another semicolon */
+ if (memchr(end + 1, ':', srclen - (end - src + 1)) &&
+ rspamd_parse_inet_address_ip6(src, srclen,
+ &su.s6.sin6_addr)) {
+ addr = rspamd_inet_address_v6_maybe_map(&su.s6, pool);
+ ret = TRUE;
+ }
+ else {
+ /* Not ipv6, so try ip:port */
+ iplen = end - src;
+
+ if (iplen >= sizeof(ipbuf) || iplen <= 1) {
+ return FALSE;
+ }
+ else {
+ rspamd_strlcpy(ipbuf, src, iplen + 1);
+ }
+
+ if (rspamd_parse_inet_address_ip4(ipbuf, iplen,
+ &su.s4.sin_addr)) {
+ addr = rspamd_inet_addr_create(AF_INET, pool);
+ memcpy(&addr->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
+ sizeof(struct in_addr));
+ rspamd_strtoul(end + 1, srclen - iplen - 1, &portnum);
+ rspamd_inet_address_set_port(addr, portnum);
+ ret = TRUE;
+ }
+ }
+ }
+ else {
+ if (rspamd_parse_inet_address_ip4(src, srclen, &su.s4.sin_addr)) {
+ addr = rspamd_inet_addr_create(AF_INET, pool);
+ memcpy(&addr->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
+ sizeof(struct in_addr));
+ ret = TRUE;
+ }
+ else if (rspamd_parse_inet_address_ip6(src, srclen, &su.s6.sin6_addr)) {
+ addr = rspamd_inet_address_v6_maybe_map(&su.s6, pool);
+ ret = TRUE;
+ }
+ }
+ }
+
+ if (ret && target) {
+ *target = addr;
+ }
+
+ return ret;
+}
+
+gboolean
+rspamd_parse_inet_address(rspamd_inet_addr_t **target,
+ const char *src,
+ gsize srclen,
+ enum rspamd_inet_address_parse_flags how)
+{
+ return rspamd_parse_inet_address_common(target, src, srclen, NULL, how);
+}
+
+rspamd_inet_addr_t *
+rspamd_parse_inet_address_pool(const char *src,
+ gsize srclen,
+ rspamd_mempool_t *pool,
+ enum rspamd_inet_address_parse_flags how)
+{
+ rspamd_inet_addr_t *ret = NULL;
+
+ if (!rspamd_parse_inet_address_common(&ret, src, srclen, pool, how)) {
+ return NULL;
+ }
+
+ return ret;
+}
+
+gboolean
+rspamd_parse_inet_address_ip(const char *src, gsize srclen,
+ rspamd_inet_addr_t *target)
+{
+ const char *end;
+ char ipbuf[INET6_ADDRSTRLEN + 1];
+ guint iplen;
+ gulong portnum;
+ gboolean ret = FALSE;
+ union sa_inet su;
+
+ g_assert(target != NULL);
+ g_assert(src != NULL);
+
+ if (src[0] == '[') {
+ /* Ipv6 address in format [::1]:port or just [::1] */
+ end = memchr(src + 1, ']', srclen - 1);
+
+ if (end == NULL) {
+ return FALSE;
+ }
+
+ iplen = end - src - 1;
+
+ if (iplen == 0 || iplen >= sizeof(ipbuf)) {
+ return FALSE;
+ }
+
+ rspamd_strlcpy(ipbuf, src + 1, iplen + 1);
+
+ if (rspamd_parse_inet_address_ip6(ipbuf, iplen,
+ &su.s6.sin6_addr)) {
+ rspamd_inet_address_v6_maybe_map_static(&su.s6, target);
+ ret = TRUE;
+ }
+
+ if (ret && end[1] == ':') {
+ /* Port part */
+ rspamd_strtoul(end + 1, srclen - iplen - 3, &portnum);
+ rspamd_inet_address_set_port(target, portnum);
+ }
+ }
+ else {
+
+ if ((end = memchr(src, ':', srclen)) != NULL) {
+ /* This is either port number and ipv4 addr or ipv6 addr */
+ /* Search for another semicolon */
+ if (memchr(end + 1, ':', srclen - (end - src + 1)) &&
+ rspamd_parse_inet_address_ip6(src, srclen, &su.s6.sin6_addr)) {
+ rspamd_inet_address_v6_maybe_map_static(&su.s6, target);
+ ret = TRUE;
+ }
+ else {
+ /* Not ipv6, so try ip:port */
+ iplen = end - src;
+
+ if (iplen >= sizeof(ipbuf) || iplen <= 1) {
+ return FALSE;
+ }
+ else {
+ rspamd_strlcpy(ipbuf, src, iplen + 1);
+ }
+
+ if (rspamd_parse_inet_address_ip4(ipbuf, iplen,
+ &su.s4.sin_addr)) {
+ memcpy(&target->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
+ sizeof(struct in_addr));
+ target->af = AF_INET;
+ target->slen = sizeof(target->u.in.addr.s4);
+ rspamd_strtoul(end + 1, srclen - iplen - 1, &portnum);
+ rspamd_inet_address_set_port(target, portnum);
+ ret = TRUE;
+ }
+ }
+ }
+ else {
+ if (rspamd_parse_inet_address_ip4(src, srclen, &su.s4.sin_addr)) {
+ memcpy(&target->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
+ sizeof(struct in_addr));
+ target->af = AF_INET;
+ target->slen = sizeof(target->u.in.addr.s4);
+ ret = TRUE;
+ }
+ else if (rspamd_parse_inet_address_ip6(src, srclen,
+ &su.s6.sin6_addr)) {
+ rspamd_inet_address_v6_maybe_map_static(&su.s6, target);
+ ret = TRUE;
+ }
+ }
+ }
+
+ return ret;
+}
+
+/*
+ * This is used to allow rspamd_inet_address_to_string to be used several times
+ * at the same function invocation, like printf("%s -> %s", f(ip1), f(ip2));
+ * Yes, it is bad but it helps to utilise this function without temporary buffers
+ * for up to 5 simultaneous invocations.
+ */
+#define NADDR_BUFS 5
+
+const char *
+rspamd_inet_address_to_string(const rspamd_inet_addr_t *addr)
+{
+ static char addr_str[NADDR_BUFS][INET6_ADDRSTRLEN + 1];
+ static guint cur_addr = 0;
+ char *addr_buf;
+
+ if (addr == NULL) {
+ return "<empty inet address>";
+ }
+
+ addr_buf = addr_str[cur_addr++ % NADDR_BUFS];
+
+ switch (addr->af) {
+ case AF_INET:
+ return inet_ntop(addr->af, &addr->u.in.addr.s4.sin_addr, addr_buf,
+ INET6_ADDRSTRLEN + 1);
+ case AF_INET6:
+ return inet_ntop(addr->af, &addr->u.in.addr.s6.sin6_addr, addr_buf,
+ INET6_ADDRSTRLEN + 1);
+ case AF_UNIX:
+ return addr->u.un->addr.sun_path;
+ }
+
+ return "undefined";
+}
+
+#define PRETTY_IP_BUFSIZE 128
+
+const char *
+rspamd_inet_address_to_string_pretty(const rspamd_inet_addr_t *addr)
+{
+ static char addr_str[NADDR_BUFS][PRETTY_IP_BUFSIZE];
+ static guint cur_addr = 0;
+ char *addr_buf;
+
+ if (addr == NULL) {
+ return "<empty inet address>";
+ }
+
+ addr_buf = addr_str[cur_addr++ % NADDR_BUFS];
+
+ switch (addr->af) {
+ case AF_INET:
+ rspamd_snprintf(addr_buf, PRETTY_IP_BUFSIZE, "%s:%d",
+ rspamd_inet_address_to_string(addr),
+ rspamd_inet_address_get_port(addr));
+ break;
+ case AF_INET6:
+ rspamd_snprintf(addr_buf, PRETTY_IP_BUFSIZE, "[%s]:%d",
+ rspamd_inet_address_to_string(addr),
+ rspamd_inet_address_get_port(addr));
+ break;
+ case AF_UNIX:
+ rspamd_snprintf(addr_buf, PRETTY_IP_BUFSIZE, "unix:%s",
+ rspamd_inet_address_to_string(addr));
+ break;
+ }
+
+ return addr_buf;
+}
+
+uint16_t
+rspamd_inet_address_get_port(const rspamd_inet_addr_t *addr)
+{
+ switch (addr->af) {
+ case AF_INET:
+ return ntohs(addr->u.in.addr.s4.sin_port);
+ case AF_INET6:
+ return ntohs(addr->u.in.addr.s6.sin6_port);
+ }
+
+ return 0;
+}
+
+void rspamd_inet_address_set_port(rspamd_inet_addr_t *addr, uint16_t port)
+{
+ switch (addr->af) {
+ case AF_INET:
+ addr->u.in.addr.s4.sin_port = htons(port);
+ break;
+ case AF_INET6:
+ addr->u.in.addr.s6.sin6_port = htons(port);
+ break;
+ }
+}
+
+int rspamd_inet_address_connect(const rspamd_inet_addr_t *addr, gint type,
+ gboolean async)
+{
+ int fd, r;
+ const struct sockaddr *sa;
+
+ if (addr == NULL) {
+ return -1;
+ }
+
+ fd = rspamd_socket_create(addr->af, type, 0, async);
+ if (fd == -1) {
+ return -1;
+ }
+
+ if (addr->af == AF_UNIX) {
+ sa = (const struct sockaddr *) &addr->u.un->addr;
+
+ if (type == (int) SOCK_DGRAM) {
+ struct sockaddr ca;
+
+ memset(&ca, 0, sizeof(ca));
+ ca.sa_family = AF_UNIX;
+
+ r = bind(fd, &ca, sizeof(sa_family_t));
+ if (r == -1) {
+ msg_info("unix socket client autobind failed: %s, '%s'",
+ addr->u.un->addr.sun_path, strerror(errno));
+ }
+ }
+ }
+ else {
+ sa = &addr->u.in.addr.sa;
+ }
+
+ r = connect(fd, sa, addr->slen);
+
+ if (r == -1) {
+ if (!async || errno != EINPROGRESS) {
+ close(fd);
+ msg_info("connect %s failed: %d, '%s'",
+ rspamd_inet_address_to_string_pretty(addr),
+ errno, strerror(errno));
+ return -1;
+ }
+ }
+
+ return fd;
+}
+
+int rspamd_inet_address_listen(const rspamd_inet_addr_t *addr, gint type,
+ enum rspamd_inet_address_listen_opts opts,
+ gint listen_queue)
+{
+ gint fd, r;
+ gint on = 1, serrno;
+ const struct sockaddr *sa;
+ const char *path;
+
+ if (addr == NULL) {
+ return -1;
+ }
+
+ fd = rspamd_socket_create(addr->af, type, 0,
+ (opts & RSPAMD_INET_ADDRESS_LISTEN_ASYNC));
+ if (fd == -1) {
+ return -1;
+ }
+
+ if (addr->af == AF_UNIX && access(addr->u.un->addr.sun_path, W_OK) != -1) {
+ /* Unlink old socket */
+ (void) unlink(addr->u.un->addr.sun_path);
+ }
+
+ if (addr->af == AF_UNIX) {
+ sa = (const struct sockaddr *) &addr->u.un->addr;
+ }
+ else {
+ sa = &addr->u.in.addr.sa;
+ }
+
+#if defined(SO_REUSEADDR)
+ if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (const void *) &on, sizeof(gint)) == -1) {
+ msg_err("cannot set SO_REUSEADDR on %s (fd=%d): %s",
+ rspamd_inet_address_to_string_pretty(addr),
+ fd, strerror(errno));
+ goto err;
+ }
+#endif
+
+#if defined(SO_REUSEPORT) && defined(LINUX)
+ if (opts & RSPAMD_INET_ADDRESS_LISTEN_REUSEPORT) {
+ on = 1;
+
+ if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, (const void *) &on, sizeof(gint)) == -1) {
+ msg_err("cannot set SO_REUSEPORT on %s (fd=%d): %s",
+ rspamd_inet_address_to_string_pretty(addr),
+ fd, strerror(errno));
+ goto err;
+ }
+ }
+#endif
+
+#ifdef HAVE_IPV6_V6ONLY
+ if (addr->af == AF_INET6) {
+ /* We need to set this flag to avoid errors */
+ on = 1;
+#ifdef SOL_IPV6
+ (void) setsockopt(fd, SOL_IPV6, IPV6_V6ONLY, (const void *) &on, sizeof(gint));
+#elif defined(IPPROTO_IPV6)
+ (void) setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (const void *) &on, sizeof(gint));
+#endif
+ }
+#endif
+
+ r = bind(fd, sa, addr->slen);
+ if (r == -1) {
+ if (!(opts & RSPAMD_INET_ADDRESS_LISTEN_ASYNC) || errno != EINPROGRESS) {
+ msg_warn("bind %s failed: %d, '%s'",
+ rspamd_inet_address_to_string_pretty(addr),
+ errno,
+ strerror(errno));
+
+ goto err;
+ }
+ }
+
+ if (addr->af == AF_UNIX) {
+ path = addr->u.un->addr.sun_path;
+ /* Try to set mode and owner */
+
+ if (addr->u.un->owner != (uid_t) -1 || addr->u.un->group != (gid_t) -1) {
+ if (chown(path, addr->u.un->owner, addr->u.un->group) == -1) {
+ msg_info("cannot change owner for %s to %d:%d: %s",
+ path, addr->u.un->owner, addr->u.un->group,
+ strerror(errno));
+ }
+ }
+
+ if (chmod(path, addr->u.un->mode) == -1) {
+ msg_info("cannot change mode for %s to %od %s",
+ path, addr->u.un->mode, strerror(errno));
+ }
+ }
+
+ if (type != (int) SOCK_DGRAM) {
+
+ if (!(opts & RSPAMD_INET_ADDRESS_LISTEN_NOLISTEN)) {
+ r = listen(fd, listen_queue);
+
+ if (r == -1) {
+ msg_warn("listen %s failed: %d, '%s'",
+ rspamd_inet_address_to_string_pretty(addr),
+ errno, strerror(errno));
+
+ goto err;
+ }
+ }
+ }
+
+ return fd;
+
+err:
+ /* Error path */
+ serrno = errno;
+
+ if (fd != -1) {
+ close(fd);
+ }
+
+ errno = serrno;
+
+ return -1;
+}
+
+gssize
+rspamd_inet_address_recvfrom(gint fd, void *buf, gsize len, gint fl,
+ rspamd_inet_addr_t **target)
+{
+ gssize ret;
+ union sa_union su;
+ socklen_t slen = sizeof(su);
+ rspamd_inet_addr_t *addr = NULL;
+
+ if ((ret = recvfrom(fd, buf, len, fl, &su.sa, &slen)) == -1) {
+ if (target) {
+ *target = NULL;
+ }
+
+ return -1;
+ }
+
+ if (target) {
+ addr = rspamd_inet_addr_create(su.sa.sa_family, NULL);
+ addr->slen = slen;
+
+ if (addr->af == AF_UNIX) {
+ addr->u.un = g_malloc(sizeof(*addr->u.un));
+ memcpy(&addr->u.un->addr, &su.su, sizeof(struct sockaddr_un));
+ }
+ else {
+ memcpy(&addr->u.in.addr, &su.sa, MIN(slen, sizeof(addr->u.in.addr)));
+ }
+
+ *target = addr;
+ }
+
+ return (ret);
+}
+
+gssize
+rspamd_inet_address_sendto(gint fd, const void *buf, gsize len, gint fl,
+ const rspamd_inet_addr_t *addr)
+{
+ gssize r;
+ const struct sockaddr *sa;
+
+ if (addr == NULL) {
+#ifdef EADDRNOTAVAIL
+ errno = EADDRNOTAVAIL;
+#endif
+ return -1;
+ }
+
+ if (addr->af == AF_UNIX) {
+ sa = (struct sockaddr *) &addr->u.un->addr;
+ }
+ else {
+ sa = &addr->u.in.addr.sa;
+ }
+
+ r = sendto(fd, buf, len, fl, sa, addr->slen);
+
+ return r;
+}
+
+static gboolean
+rspamd_check_port_priority(const char *line, guint default_port,
+ guint *priority, gchar *out,
+ gsize outlen, rspamd_mempool_t *pool)
+{
+ guint real_port = default_port, real_priority = 0;
+ gchar *err_str, *err_str_prio;
+
+ if (line && line[0] == ':') {
+ errno = 0;
+ real_port = strtoul(line + 1, &err_str, 10);
+
+ if (err_str && *err_str == ':') {
+ /* We have priority */
+ real_priority = strtoul(err_str + 1, &err_str_prio, 10);
+
+ if (err_str_prio && *err_str_prio != '\0') {
+ msg_err_pool_check(
+ "cannot parse priority: %s, at symbol %c, error: %s",
+ line,
+ *err_str_prio,
+ strerror(errno));
+
+ return FALSE;
+ }
+ }
+ else if (err_str && *err_str != '\0') {
+ msg_err_pool_check(
+ "cannot parse port: %s, at symbol %c, error: %s",
+ line,
+ *err_str,
+ strerror(errno));
+
+ return FALSE;
+ }
+ }
+
+ if (priority) {
+ *priority = real_priority;
+ }
+
+ rspamd_snprintf(out, outlen, "%ud", real_port);
+
+ return TRUE;
+}
+
+static enum rspamd_parse_host_port_result
+rspamd_resolve_addrs(const char *begin, size_t len, GPtrArray **addrs,
+ const gchar *portbuf, gint flags,
+ rspamd_mempool_t *pool)
+{
+ struct addrinfo hints, *res, *cur;
+ rspamd_inet_addr_t *cur_addr = NULL;
+ gint r, addr_cnt;
+ gchar *addr_cpy = NULL;
+ enum rspamd_parse_host_port_result ret = RSPAMD_PARSE_ADDR_FAIL;
+
+ rspamd_ip_check_ipv6();
+
+ if (rspamd_parse_inet_address(&cur_addr,
+ begin, len, RSPAMD_INET_ADDRESS_PARSE_DEFAULT) &&
+ cur_addr != NULL) {
+ if (*addrs == NULL) {
+ *addrs = g_ptr_array_new_full(1,
+ (GDestroyNotify) rspamd_inet_address_free);
+
+ if (pool != NULL) {
+ rspamd_mempool_add_destructor(pool,
+ rspamd_ptr_array_free_hard, *addrs);
+ }
+ }
+
+ rspamd_inet_address_set_port(cur_addr, strtoul(portbuf, NULL, 10));
+ g_ptr_array_add(*addrs, cur_addr);
+ ret = RSPAMD_PARSE_ADDR_NUMERIC;
+ }
+ else {
+ memset(&hints, 0, sizeof(hints));
+ hints.ai_socktype = SOCK_STREAM; /* Type of the socket */
+ hints.ai_flags = AI_NUMERICSERV | flags;
+
+ if (len > 0) {
+ if (pool) {
+ addr_cpy = rspamd_mempool_alloc(pool, len + 1);
+ }
+ else {
+ addr_cpy = g_malloc(len + 1);
+ }
+
+ rspamd_strlcpy(addr_cpy, begin, len + 1);
+ }
+ /* Otherwise it will be NULL */
+
+ if (ipv6_status == RSPAMD_IPV6_SUPPORTED) {
+ hints.ai_family = AF_UNSPEC;
+ }
+ else {
+ hints.ai_family = AF_INET;
+ }
+
+ if ((r = getaddrinfo(addr_cpy, portbuf, &hints, &res)) == 0) {
+ /* Now copy up to max_addrs of addresses */
+ addr_cnt = 0;
+ cur = res;
+ while (cur) {
+ cur = cur->ai_next;
+ addr_cnt++;
+ }
+
+ if (*addrs == NULL) {
+ *addrs = g_ptr_array_new_full(addr_cnt,
+ (GDestroyNotify) rspamd_inet_address_free);
+
+ if (pool != NULL) {
+ rspamd_mempool_add_destructor(pool,
+ rspamd_ptr_array_free_hard, *addrs);
+ }
+ }
+
+ cur = res;
+ while (cur) {
+ cur_addr = rspamd_inet_address_from_sa(cur->ai_addr,
+ cur->ai_addrlen);
+
+ if (cur_addr != NULL) {
+ g_ptr_array_add(*addrs, cur_addr);
+ }
+ cur = cur->ai_next;
+ }
+
+ freeaddrinfo(res);
+ ret = RSPAMD_PARSE_ADDR_RESOLVED;
+ }
+ else if (addr_cpy) {
+ msg_err_pool_check("address resolution for %s failed: %s",
+ addr_cpy,
+ gai_strerror(r));
+
+ if (pool == NULL) {
+ g_free(addr_cpy);
+ }
+
+ return RSPAMD_PARSE_ADDR_FAIL;
+ }
+ else {
+ /* Should never ever happen */
+ g_assert(0);
+ }
+ }
+
+ if (pool == NULL) {
+ g_free(addr_cpy);
+ }
+
+ return ret;
+}
+
+enum rspamd_parse_host_port_result
+rspamd_parse_host_port_priority(const gchar *str,
+ GPtrArray **addrs,
+ guint *priority,
+ gchar **name_ptr,
+ guint default_port,
+ gboolean allow_listen,
+ rspamd_mempool_t *pool)
+{
+ gchar portbuf[8];
+ const gchar *p, *name = NULL;
+ gsize namelen;
+ rspamd_inet_addr_t *cur_addr = NULL;
+ enum rspamd_parse_host_port_result ret = RSPAMD_PARSE_ADDR_FAIL;
+ union sa_union su;
+
+ /*
+ * In this function, we can have several possibilities:
+ * 1) Unix socket: check for '.' or '/' at the begin of string
+ * 2) \[ipv6\]: check for '[' at the beginning
+ * 3) '*': means listening on any address
+ * 4) ip|host[:port[:priority]]
+ */
+
+ if (allow_listen && str[0] == '*') {
+ bool v4_any = true, v6_any = true;
+
+ p = &str[1];
+
+ if (g_ascii_strncasecmp(p, "v4", 2) == 0) {
+ p += 2;
+ name = "*v4";
+ v6_any = false;
+ }
+ else if (g_ascii_strncasecmp(p, "v6", 2) == 0) {
+ p += 2;
+ name = "*v6";
+ v4_any = false;
+ }
+ else {
+ name = "*";
+ }
+
+ if (!rspamd_check_port_priority(p, default_port, priority,
+ portbuf, sizeof(portbuf), pool)) {
+ return ret;
+ }
+
+ if (*addrs == NULL) {
+ *addrs = g_ptr_array_new_full(1,
+ pool == NULL ? NULL : (GDestroyNotify) rspamd_inet_address_free);
+
+ if (pool != NULL) {
+ rspamd_mempool_add_destructor(pool,
+ rspamd_ptr_array_free_hard, *addrs);
+ }
+ }
+
+ if (v4_any) {
+ cur_addr = rspamd_inet_addr_create(AF_INET, NULL);
+ rspamd_parse_inet_address_ip4("0.0.0.0",
+ sizeof("0.0.0.0") - 1, &su.s4.sin_addr);
+ memcpy(&cur_addr->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
+ sizeof(struct in_addr));
+ rspamd_inet_address_set_port(cur_addr,
+ strtoul(portbuf, NULL, 10));
+ g_ptr_array_add(*addrs, cur_addr);
+ }
+ if (v6_any) {
+ cur_addr = rspamd_inet_addr_create(AF_INET6, NULL);
+ rspamd_parse_inet_address_ip6("::",
+ sizeof("::") - 1, &su.s6.sin6_addr);
+ memcpy(&cur_addr->u.in.addr.s6.sin6_addr, &su.s6.sin6_addr,
+ sizeof(struct in6_addr));
+ rspamd_inet_address_set_port(cur_addr,
+ strtoul(portbuf, NULL, 10));
+ g_ptr_array_add(*addrs, cur_addr);
+ }
+
+ namelen = strlen(name);
+ ret = RSPAMD_PARSE_ADDR_NUMERIC; /* No resolution here */
+ }
+ else if (str[0] == '[') {
+ /* This is braced IPv6 address */
+ p = strchr(str, ']');
+
+ if (p == NULL) {
+ msg_err_pool_check("cannot parse address definition %s: %s",
+ str,
+ strerror(EINVAL));
+
+ return ret;
+ }
+
+ name = str + 1;
+ namelen = p - str - 1;
+
+ if (!rspamd_check_port_priority(p + 1, default_port, priority, portbuf,
+ sizeof(portbuf), pool)) {
+ return ret;
+ }
+
+ ret = rspamd_resolve_addrs(name, namelen, addrs, portbuf, 0, pool);
+ }
+ else if (str[0] == '/' || str[0] == '.') {
+ /* Special case of unix socket, as getaddrinfo cannot deal with them */
+ if (*addrs == NULL) {
+ *addrs = g_ptr_array_new_full(1,
+ (GDestroyNotify) rspamd_inet_address_free);
+
+ if (pool != NULL) {
+ rspamd_mempool_add_destructor(pool,
+ rspamd_ptr_array_free_hard, *addrs);
+ }
+ }
+
+ if (!rspamd_parse_inet_address(&cur_addr,
+ str, strlen(str), RSPAMD_INET_ADDRESS_PARSE_DEFAULT)) {
+ msg_err_pool_check("cannot parse unix socket definition %s: %s",
+ str,
+ strerror(errno));
+
+ return ret;
+ }
+
+ g_ptr_array_add(*addrs, cur_addr);
+ name = str;
+ namelen = strlen(str);
+ ret = RSPAMD_PARSE_ADDR_NUMERIC; /* No resolution here: unix socket */
+ }
+ else {
+ p = strchr(str, ':');
+
+ if (p == NULL) {
+ /* Just address or IP */
+ name = str;
+ namelen = strlen(str);
+ rspamd_check_port_priority("", default_port, priority, portbuf,
+ sizeof(portbuf), pool);
+
+ ret = rspamd_resolve_addrs(name, namelen, addrs,
+ portbuf, 0, pool);
+ }
+ else {
+ const gchar *second_semicolon = strchr(p + 1, ':');
+
+ name = str;
+
+ if (second_semicolon) {
+ /* name + port part excluding priority */
+ namelen = second_semicolon - str;
+ }
+ else {
+ /* Full ip/name + port */
+ namelen = strlen(str);
+ }
+
+ if (!rspamd_check_port_priority(p, default_port, priority, portbuf,
+ sizeof(portbuf), pool)) {
+ return ret;
+ }
+
+ ret = rspamd_resolve_addrs(str, p - str, addrs,
+ portbuf, 0, pool);
+ }
+ }
+
+ if (name_ptr != NULL) {
+ if (pool) {
+ *name_ptr = rspamd_mempool_alloc(pool, namelen + 1);
+ }
+ else {
+ *name_ptr = g_malloc(namelen + 1);
+ }
+
+ rspamd_strlcpy(*name_ptr, name, namelen + 1);
+ }
+
+ return ret;
+}
+
+guchar *
+rspamd_inet_address_get_hash_key(const rspamd_inet_addr_t *addr, guint *klen)
+{
+ guchar *res = NULL;
+ static struct in_addr local = {INADDR_LOOPBACK};
+
+ g_assert(addr != NULL);
+ g_assert(klen != NULL);
+
+ if (addr->af == AF_INET) {
+ *klen = sizeof(struct in_addr);
+ res = (guchar *) &addr->u.in.addr.s4.sin_addr;
+ }
+ else if (addr->af == AF_INET6) {
+ *klen = sizeof(struct in6_addr);
+ res = (guchar *) &addr->u.in.addr.s6.sin6_addr;
+ }
+ else if (addr->af == AF_UNIX) {
+ *klen = sizeof(struct in_addr);
+ res = (guchar *) &local;
+ }
+ else {
+ *klen = 0;
+ res = NULL;
+ }
+
+ return res;
+}
+
+
+rspamd_inet_addr_t *
+rspamd_inet_address_new(int af, const void *init)
+{
+ rspamd_inet_addr_t *addr;
+
+ addr = rspamd_inet_addr_create(af, NULL);
+
+ if (init != NULL) {
+ if (af == AF_UNIX) {
+ /* Init is a path */
+ rspamd_strlcpy(addr->u.un->addr.sun_path, init,
+ sizeof(addr->u.un->addr.sun_path));
+#if defined(FREEBSD) || defined(__APPLE__)
+ addr->u.un->addr.sun_len = SUN_LEN(&addr->u.un->addr);
+#endif
+ }
+ else if (af == AF_INET) {
+ memcpy(&addr->u.in.addr.s4.sin_addr, init, sizeof(struct in_addr));
+ }
+ else if (af == AF_INET6) {
+ memcpy(&addr->u.in.addr.s6.sin6_addr, init, sizeof(struct in6_addr));
+ }
+ }
+
+ return addr;
+}
+
+rspamd_inet_addr_t *
+rspamd_inet_address_from_sa(const struct sockaddr *sa, socklen_t slen)
+{
+ rspamd_inet_addr_t *addr;
+
+ g_assert(sa != NULL);
+ /* Address of an AF_UNIX socket can be tiny */
+ g_assert(slen >= sizeof(sa_family_t) + 1);
+
+ addr = rspamd_inet_addr_create(sa->sa_family, NULL);
+
+ if (sa->sa_family == AF_UNIX) {
+ /* Init is a path */
+ const struct sockaddr_un *un = (const struct sockaddr_un *) sa;
+
+ g_assert(slen >= SUN_LEN(un));
+ g_assert(slen <= sizeof(addr->u.un->addr));
+
+ /* sun_path can legally contain intermittent NULL bytes */
+ memcpy(&addr->u.un->addr, un, slen);
+
+ /* length of AF_UNIX addresses is variable */
+ addr->slen = slen;
+ }
+ else if (sa->sa_family == AF_INET) {
+ g_assert(slen >= sizeof(struct sockaddr_in));
+ memcpy(&addr->u.in.addr.s4, sa, sizeof(struct sockaddr_in));
+ }
+ else if (sa->sa_family == AF_INET6) {
+ g_assert(slen >= sizeof(struct sockaddr_in6));
+ memcpy(&addr->u.in.addr.s6, sa, sizeof(struct sockaddr_in6));
+ }
+ else {
+ /* XXX: currently we cannot deal with other AF */
+ g_assert(0);
+ }
+
+ return addr;
+}
+
+rspamd_inet_addr_t *
+rspamd_inet_address_from_rnds(const struct rdns_reply_entry *rep)
+{
+ rspamd_inet_addr_t *addr = NULL;
+
+ g_assert(rep != NULL);
+
+ if (rep->type == RDNS_REQUEST_A) {
+ addr = rspamd_inet_addr_create(AF_INET, NULL);
+ memcpy(&addr->u.in.addr.s4.sin_addr, &rep->content.a.addr,
+ sizeof(struct in_addr));
+ }
+ else if (rep->type == RDNS_REQUEST_AAAA) {
+ addr = rspamd_inet_addr_create(AF_INET6, NULL);
+ memcpy(&addr->u.in.addr.s6.sin6_addr, &rep->content.aaa.addr,
+ sizeof(struct in6_addr));
+ }
+
+ return addr;
+}
+
+void rspamd_inet_address_apply_mask(rspamd_inet_addr_t *addr, guint mask)
+{
+ guint32 umsk, *p;
+
+ if (mask > 0 && addr != NULL) {
+ if (addr->af == AF_INET && mask <= 32) {
+ umsk = htonl(G_MAXUINT32 << (32 - mask));
+ addr->u.in.addr.s4.sin_addr.s_addr &= umsk;
+ }
+ else if (addr->af == AF_INET6 && mask <= 128) {
+ p = (uint32_t *) &addr->u.in.addr.s6.sin6_addr;
+ mask = 128 - mask;
+ p += 3;
+
+ for (;;) {
+ if (mask >= 32) {
+ mask -= 32;
+ *p = 0;
+ }
+ else {
+ umsk = htonl(G_MAXUINT32 << mask);
+ *p &= umsk;
+ break;
+ }
+
+ p--;
+ }
+ }
+ }
+}
+
+static gint
+rspamd_inet_address_af_order(const rspamd_inet_addr_t *addr)
+{
+ int ret;
+
+ switch (addr->af) {
+ case AF_UNIX:
+ ret = 2;
+ break;
+ case AF_INET:
+ ret = 1;
+ break;
+ default:
+ ret = 0;
+ break;
+ }
+
+ return ret;
+}
+
+gint rspamd_inet_address_compare(const rspamd_inet_addr_t *a1,
+ const rspamd_inet_addr_t *a2, gboolean compare_ports)
+{
+ g_assert(a1 != NULL);
+ g_assert(a2 != NULL);
+
+ if (a1->af != a2->af) {
+ return (rspamd_inet_address_af_order(a2) -
+ rspamd_inet_address_af_order(a1));
+ }
+ else {
+ switch (a1->af) {
+ case AF_INET:
+ if (!compare_ports) {
+ return memcmp(&a1->u.in.addr.s4.sin_addr,
+ &a2->u.in.addr.s4.sin_addr, sizeof(struct in_addr));
+ }
+ else {
+ if (a1->u.in.addr.s4.sin_port == a2->u.in.addr.s4.sin_port) {
+ return memcmp(&a1->u.in.addr.s4.sin_addr,
+ &a2->u.in.addr.s4.sin_addr, sizeof(struct in_addr));
+ }
+ else {
+ return a1->u.in.addr.s4.sin_port - a2->u.in.addr.s4.sin_port;
+ }
+ }
+ case AF_INET6:
+ if (!compare_ports) {
+ return memcmp(&a1->u.in.addr.s6.sin6_addr,
+ &a2->u.in.addr.s6.sin6_addr, sizeof(struct in6_addr));
+ }
+ else {
+ if (a1->u.in.addr.s6.sin6_port == a2->u.in.addr.s6.sin6_port) {
+ return memcmp(&a1->u.in.addr.s6.sin6_addr,
+ &a2->u.in.addr.s6.sin6_addr, sizeof(struct in6_addr));
+ }
+ else {
+ return a1->u.in.addr.s6.sin6_port - a2->u.in.addr.s6.sin6_port;
+ }
+ }
+ case AF_UNIX:
+ return strncmp(a1->u.un->addr.sun_path,
+ a2->u.un->addr.sun_path, sizeof(a1->u.un->addr.sun_path));
+ default:
+ return memcmp(&a1->u.in, &a2->u.in, sizeof(a1->u.in));
+ }
+ }
+
+ return 0;
+}
+
+gint rspamd_inet_address_compare_ptr(gconstpointer a1,
+ gconstpointer a2)
+{
+ const rspamd_inet_addr_t **i1 = (const rspamd_inet_addr_t **) a1,
+ **i2 = (const rspamd_inet_addr_t **) a2;
+
+ return rspamd_inet_address_compare(*i1, *i2, FALSE);
+}
+
+rspamd_inet_addr_t *
+rspamd_inet_address_copy(const rspamd_inet_addr_t *addr, rspamd_mempool_t *pool)
+{
+ rspamd_inet_addr_t *n;
+
+ if (addr == NULL) {
+ return NULL;
+ }
+
+ n = rspamd_inet_addr_create(addr->af, pool);
+
+ if (n->af == AF_UNIX) {
+ memcpy(n->u.un, addr->u.un, sizeof(*addr->u.un));
+ }
+ else {
+ memcpy(&n->u.in, &addr->u.in, sizeof(addr->u.in));
+ }
+
+ return n;
+}
+
+gint rspamd_inet_address_get_af(const rspamd_inet_addr_t *addr)
+{
+ g_assert(addr != NULL);
+
+ return addr->af;
+}
+
+struct sockaddr *
+rspamd_inet_address_get_sa(const rspamd_inet_addr_t *addr,
+ socklen_t *sz)
+{
+ g_assert(addr != NULL);
+
+ if (addr->af == AF_UNIX) {
+ *sz = addr->slen;
+ return (struct sockaddr *) &addr->u.un->addr;
+ }
+ else {
+ *sz = addr->slen;
+ return (struct sockaddr *) &addr->u.in.addr.sa;
+ }
+}
+
+
+guint rspamd_inet_address_hash(gconstpointer a)
+{
+ const rspamd_inet_addr_t *addr = a;
+ struct {
+ gchar buf[sizeof(struct in6_addr)]; /* 16 bytes */
+ int af;
+ } layout;
+
+ gint32 k;
+
+ if (addr->af == AF_UNIX && addr->u.un) {
+ rspamd_cryptobox_fast_hash_state_t st;
+
+ rspamd_cryptobox_fast_hash_init(&st, rspamd_hash_seed());
+ rspamd_cryptobox_fast_hash_update(&st, &addr->af, sizeof(addr->af));
+ rspamd_cryptobox_fast_hash_update(&st, addr->u.un, sizeof(*addr->u.un));
+
+ return rspamd_cryptobox_fast_hash_final(&st);
+ }
+ else {
+ memset(&layout, 0, sizeof(layout));
+ layout.af = addr->af;
+
+ /* We ignore port part here */
+ if (addr->af == AF_INET) {
+ memcpy(layout.buf, &addr->u.in.addr.s4.sin_addr,
+ sizeof(addr->u.in.addr.s4.sin_addr));
+ }
+ else {
+ memcpy(layout.buf, &addr->u.in.addr.s6.sin6_addr,
+ sizeof(addr->u.in.addr.s6.sin6_addr));
+ }
+
+ k = rspamd_cryptobox_fast_hash(&layout, sizeof(layout),
+ rspamd_hash_seed());
+ }
+
+ return k;
+}
+
+guint rspamd_inet_address_port_hash(gconstpointer a)
+{
+ const rspamd_inet_addr_t *addr = a;
+ struct {
+ gchar buf[sizeof(struct in6_addr)]; /* 16 bytes */
+ int port;
+ int af;
+ } layout;
+
+ gint32 k;
+
+ if (addr->af == AF_UNIX && addr->u.un) {
+ rspamd_cryptobox_fast_hash_state_t st;
+
+ rspamd_cryptobox_fast_hash_init(&st, rspamd_hash_seed());
+ rspamd_cryptobox_fast_hash_update(&st, &addr->af, sizeof(addr->af));
+ rspamd_cryptobox_fast_hash_update(&st, addr->u.un, sizeof(*addr->u.un));
+
+ return rspamd_cryptobox_fast_hash_final(&st);
+ }
+ else {
+ memset(&layout, 0, sizeof(layout));
+ layout.af = addr->af;
+
+ /* We consider port part here */
+ if (addr->af == AF_INET) {
+ memcpy(layout.buf, &addr->u.in.addr.s4.sin_addr,
+ sizeof(addr->u.in.addr.s4.sin_addr));
+ layout.port = addr->u.in.addr.s4.sin_port;
+ }
+ else {
+ memcpy(layout.buf, &addr->u.in.addr.s6.sin6_addr,
+ sizeof(addr->u.in.addr.s6.sin6_addr));
+ layout.port = addr->u.in.addr.s6.sin6_port;
+ }
+
+ k = rspamd_cryptobox_fast_hash(&layout, sizeof(layout),
+ rspamd_hash_seed());
+ }
+
+ return k;
+}
+
+gboolean
+rspamd_inet_address_equal(gconstpointer a, gconstpointer b)
+{
+ const rspamd_inet_addr_t *a1 = a, *a2 = b;
+
+ return rspamd_inet_address_compare(a1, a2, FALSE) == 0;
+}
+
+gboolean
+rspamd_inet_address_port_equal(gconstpointer a, gconstpointer b)
+{
+ const rspamd_inet_addr_t *a1 = a, *a2 = b;
+
+ return rspamd_inet_address_compare(a1, a2, TRUE) == 0;
+}
+
+#ifndef IN6_IS_ADDR_LOOPBACK
+#define IN6_IS_ADDR_LOOPBACK(a) \
+ ((*(const __uint32_t *) (const void *) (&(a)->s6_addr[0]) == 0) && \
+ (*(const __uint32_t *) (const void *) (&(a)->s6_addr[4]) == 0) && \
+ (*(const __uint32_t *) (const void *) (&(a)->s6_addr[8]) == 0) && \
+ (*(const __uint32_t *) (const void *) (&(a)->s6_addr[12]) == ntohl(1)))
+#endif
+#ifndef IN6_IS_ADDR_LINKLOCAL
+#define IN6_IS_ADDR_LINKLOCAL(a) \
+ (((a)->s6_addr[0] == 0xfe) && (((a)->s6_addr[1] & 0xc0) == 0x80))
+#endif
+#ifndef IN6_IS_ADDR_SITELOCAL
+#define IN6_IS_ADDR_SITELOCAL(a) \
+ (((a)->s6_addr[0] == 0xfe) && (((a)->s6_addr[1] & 0xc0) == 0xc0))
+#endif
+
+gboolean
+rspamd_inet_address_is_local(const rspamd_inet_addr_t *addr)
+{
+ if (addr == NULL) {
+ return FALSE;
+ }
+
+ if (addr->af == AF_UNIX) {
+ /* Always true for unix sockets */
+ return TRUE;
+ }
+ else {
+ if (addr->af == AF_INET) {
+ if ((ntohl(addr->u.in.addr.s4.sin_addr.s_addr) & 0xff000000) == 0x7f000000) {
+ return TRUE;
+ }
+ }
+ else if (addr->af == AF_INET6) {
+ if (IN6_IS_ADDR_LOOPBACK(&addr->u.in.addr.s6.sin6_addr) ||
+ IN6_IS_ADDR_LINKLOCAL(&addr->u.in.addr.s6.sin6_addr) ||
+ IN6_IS_ADDR_SITELOCAL(&addr->u.in.addr.s6.sin6_addr)) {
+ return TRUE;
+ }
+ }
+ }
+
+ return FALSE;
+}
+
+void **
+rspamd_inet_library_init(void)
+{
+ return &local_addrs;
+}
+
+void *
+rspamd_inet_library_get_lib_ctx(void)
+{
+ return local_addrs;
+}
+
+void rspamd_inet_library_destroy(void)
+{
+ /* Ugly: local_addrs will actually be freed by config object */
+}
+
+gsize rspamd_inet_address_storage_size(void)
+{
+ return sizeof(rspamd_inet_addr_t);
+}