1 /* ClientSocket.c - NeonServ v5.3
2 * Copyright (C) 2011-2012 Philipp Kreil (pk910)
4 * This program is free software: you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation, either version 3 of the License, or
7 * (at your option) any later version.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program. If not, see <http://www.gnu.org/licenses/>.
18 #include "ClientSocket.h"
19 #include "IRCParser.h"
22 #include "WHOHandler.h"
23 #include "HandleInfoHandler.h"
25 #include "ConfigParser.h"
29 struct ClientSocket *data;
34 static pthread_mutex_t synchronized;
38 static struct socket_list *sockets = NULL;
39 static char buffer[BUF_SIZ];
42 THREAD_MUTEX_INIT(synchronized);
44 sockets = malloc(sizeof(*sockets));
47 perror("malloc() failed");
54 struct ClientSocket* create_socket(char *host, int port, char *bindto, char *pass, char *nick, char *ident, char *realname) {
55 struct ClientSocket *client = malloc(sizeof(*client));
58 perror("malloc() failed");
61 client->host = strdup(host);
63 client->bind = (bindto ? strdup(bindto) : NULL);
64 client->pass = (pass == NULL ? NULL : strdup(pass));
65 client->nick = strdup(nick);
66 client->ident = strdup(ident);
67 client->realname = strdup(realname);
70 client->bufferpos = 0;
71 client->traffic_in = 0;
72 client->traffic_out = 0;
73 client->connection_time = 0;
77 client->whoqueue_first = NULL;
78 client->whoqueue_last = NULL;
79 client->handleinfo_first = NULL;
80 client->handleinfo_last = NULL;
81 SYNCHRONIZE(synchronized);
82 client->next = sockets->data;
83 sockets->data = client;
84 DESYNCHRONIZE(synchronized);
88 static int _connect_socket(struct ClientSocket *client);
90 int connect_socket(struct ClientSocket *client) {
91 SYNCHRONIZE(synchronized);
92 int ret = _connect_socket(client);
93 DESYNCHRONIZE(synchronized);
98 static int _connect_socket(struct ClientSocket *client) {
99 if((client->flags & SOCKET_FLAG_CONNECTED)) return 1;
102 struct addrinfo hints, *res;
103 struct sockaddr_in *ip4 = NULL;
104 struct sockaddr_in6 *ip6 = NULL;
105 memset (&hints, 0, sizeof (hints));
106 hints.ai_family = PF_UNSPEC;
107 hints.ai_socktype = SOCK_STREAM;
108 hints.ai_flags |= AI_CANONNAME;
109 if (getaddrinfo (client->host, NULL, &hints, &res)) {
113 switch (res->ai_family) {
115 ip4 = (struct sockaddr_in *) res->ai_addr;
118 ip6 = (struct sockaddr_in6 *) res->ai_addr;
125 sock = socket(AF_INET6, SOCK_STREAM, 0);
127 perror("socket() failed");
131 ip6->sin6_family = AF_INET6;
132 ip6->sin6_port = htons(client->port);
134 struct sockaddr_in6 *ip6vhost = NULL;
135 if (client->bind && !getaddrinfo(client->bind, NULL, &hints, &res)) {
137 switch (res->ai_family) {
139 ip6vhost = (struct sockaddr_in6 *) res->ai_addr;
146 ip6vhost->sin6_family = AF_INET6;
147 ip6vhost->sin6_port = htons(0);
148 bind(sock, (struct sockaddr*)ip6vhost, sizeof(*ip6vhost));
151 if (connect(sock, (struct sockaddr*)ip6, sizeof(*ip6)) == -1) {
152 perror("connect() failed");
157 sock = socket(AF_INET, SOCK_STREAM, 0);
159 perror("socket() failed");
163 ip4->sin_family = AF_INET;
164 ip4->sin_port = htons(client->port);
166 struct sockaddr_in *ip4vhost = NULL;
167 if (client->bind && !getaddrinfo(client->bind, NULL, &hints, &res)) {
169 switch (res->ai_family) {
171 ip4vhost = (struct sockaddr_in *) res->ai_addr;
178 ip4vhost->sin_family = AF_INET;
179 ip4vhost->sin_port = htons(0);
180 bind(sock, (struct sockaddr*)ip4vhost, sizeof(*ip4vhost));
183 if (connect(sock, (struct sockaddr*)ip4, sizeof(*ip4)) == -1) {
184 perror("connect() failed");
191 if(get_int_field("Sockets.NoDelay")) {
193 if(setsockopt(sock, IPPROTO_TCP, TCP_NODELAY, (char *) &flag, sizeof(int)) == -1) {
194 perror("setsockopt() failed");
200 client->flags |= SOCKET_FLAG_CONNECTED | SOCKET_FLAG_RECONNECT;
201 client->connection_time = time(0);
203 if(client->flags & SOCKET_FLAG_SSL) {
205 client->flags |= SOCKET_FLAG_HAVE_SSL;
207 client->flags &= ~SOCKET_FLAG_HAVE_SSL;
209 //send the IRC Headers
213 if(client->pass && strcmp(client->pass, "")) {
214 len = sprintf(sendBuf, "PASS :%s\n", client->pass);
215 write_socket(client, sendBuf, len);
217 len = sprintf(sendBuf, "USER %s 0 0 :%s\n", client->ident, client->realname);
218 write_socket(client, sendBuf, len);
219 len = sprintf(sendBuf, "NICK %s\n", client->nick);
220 write_socket(client, sendBuf, len);
225 static int connect_socket(struct ClientSocket *client) {
226 if((client->flags & SOCKET_FLAG_CONNECTED)) return 1;
227 struct hostent *host;
228 struct sockaddr_in addr;
230 addr.sin_addr.s_addr = inet_addr(client->host);
231 if (addr.sin_addr.s_addr == INADDR_NONE) {
232 host = gethostbyname(client->host);
236 memcpy(&(addr.sin_addr), host->h_addr_list[0], 4);
238 sock = socket(PF_INET, SOCK_STREAM, 0);
241 perror("socket() failed");
245 addr.sin_port = htons(client->port);
246 addr.sin_family = AF_INET;
248 if (connect(sock, (struct sockaddr*)&addr, sizeof(addr)) == -1)
250 perror("connect() failed");
255 client->flags |= SOCKET_FLAG_CONNECTED | SOCKET_FLAG_RECONNECT;
256 client->connection_time = time(0);
259 if(client->flags & SOCKET_FLAG_SSL) {
261 client->flags |= SOCKET_FLAG_HAVE_SSL;
263 client->flags &= ~SOCKET_FLAG_HAVE_SSL;
265 //send the IRC Headers
269 if(client->pass && strcmp(client->pass, "")) {
270 len = sprintf(sendBuf, "PASS :%s\n", client->pass);
271 write_socket(client, sendBuf, len);
273 len = sprintf(sendBuf, "USER %s 0 0 :%s\n", client->ident, client->realname);
274 write_socket(client, sendBuf, len);
275 len = sprintf(sendBuf, "NICK %s\n", client->nick);
276 write_socket(client, sendBuf, len);
282 int close_socket(struct ClientSocket *client) {
283 if(client == NULL) return 0;
284 if((client->flags & SOCKET_FLAG_CONNECTED)) {
285 char quitbuf[MAXLEN];
286 int quitlen = sprintf(quitbuf, "QUIT :[NeonServ %s.%d] disconnect requested.\n", NEONSERV_VERSION, patchlevel);
287 write_socket_force(client, quitbuf, quitlen);
289 client->flags &= ~(SOCKET_FLAG_READY | SOCKET_FLAG_RECONNECT);
290 client->flags |= SOCKET_FLAG_QUITTED | SOCKET_FLAG_DEAD;
294 int disconnect_socket(struct ClientSocket *client) {
295 if(client == NULL) return 0;
296 if((client->flags & SOCKET_FLAG_CONNECTED)) {
297 char quitbuf[MAXLEN];
298 int quitlen = sprintf(quitbuf, "QUIT :[NeonServ %s.%d] disconnect requested.\n", NEONSERV_VERSION, patchlevel);
299 write_socket_force(client, quitbuf, quitlen);
301 client->flags &= ~(SOCKET_FLAG_READY | SOCKET_FLAG_RECONNECT);
302 client->flags |= SOCKET_FLAG_QUITTED;
306 static void destroy_socket(struct ClientSocket *client, int free_socket) {
307 SYNCHRONIZE(synchronized);
308 if((client->flags & SOCKET_FLAG_CONNECTED)) {
310 bot_disconnect(client);
312 if(client->flags & SOCKET_FLAG_HAVE_SSL)
313 ssl_disconnect(client);
315 queue_destroy(client);
316 if(client->whoqueue_first)
317 clear_whoqueue(client);
318 if(client->handleinfo_first)
319 clear_handleinfoqueue(client);
320 client->flags &= ~(SOCKET_FLAG_CONNECTED | SOCKET_FLAG_READY | SOCKET_FLAG_HAVE_SSL);
322 struct ClientSocket *sock, *last_sock = NULL;
323 for (sock = sockets->data; sock; sock = sock->next) {
326 last_sock->next = sock->next;
328 sockets->data = sock->next;
340 } else if(client->flags & SOCKET_FLAG_FAST_JUMP) {
341 client->flags &= ~SOCKET_FLAG_FAST_JUMP;
342 connect_socket(client);
344 DESYNCHRONIZE(synchronized);
347 int write_socket_force(struct ClientSocket *client, char* msg, int len) {
348 SYNCHRONIZE(synchronized);
349 printf("[send %d] %s", len, msg);
350 if(!(client->flags & SOCKET_FLAG_HAVE_SSL) || ssl_write(client, msg, len) == -2) {
352 send(client->sock, msg, len, 0);
354 write(client->sock, msg, len);
357 client->traffic_out += len;
358 DESYNCHRONIZE(synchronized);
362 int write_socket(struct ClientSocket *client, char* msg, int len) {
363 if(!(client && (client->flags & SOCKET_FLAG_CONNECTED))) return 0;
364 if(client->flags & SOCKET_FLAG_USE_QUEUE)
365 return queue_add(client, msg, len);
367 return write_socket_force(client, msg, len);
370 void socket_loop(int timeout_seconds) {
371 if(sockets == NULL) return;
372 int is_synchronized = 1;
373 SYNCHRONIZE(synchronized);
375 struct timeval timeout;
376 struct ClientSocket *sock, *next;
377 int ret = 0, bytes, i;
380 for (sock = sockets->data; sock; sock = sock->next) {
381 if(!(sock->flags & SOCKET_FLAG_CONNECTED)) continue; //skip disconnected sockets
382 FD_SET(sock->sock, &fds);
386 timeout.tv_sec = timeout_seconds;
388 ret = select(ret + 1, &fds, NULL, NULL, &timeout);
390 DEDESYNCHRONIZE(synchronized);
393 for (sock = sockets->data; sock; sock = next) {
395 if((sock->flags & (SOCKET_FLAG_CONNECTED | SOCKET_FLAG_QUITTED)) == SOCKET_FLAG_CONNECTED && FD_ISSET(sock->sock, &fds)) {
396 if(sock->bufferpos != 0) {
397 if(!(sock->flags & SOCKET_FLAG_HAVE_SSL) || (bytes = ssl_read(sock, buffer, sizeof(buffer))) == -2) {
399 bytes = recv(sock->sock, buffer, sizeof(buffer), 0);
401 bytes = read(sock->sock, buffer, sizeof(buffer));
405 for(i = 0; i < bytes; i++) {
406 if(sock->bufferpos + i == BUF_SIZ*2) break; //buffer overflow
407 sock->buffer[sock->bufferpos + i] = buffer[i];
409 sock->bufferpos += i;
412 if(!(sock->flags & SOCKET_FLAG_HAVE_SSL) || (bytes = ssl_read(sock, sock->buffer, sizeof(sock->buffer))) == -2) {
414 bytes = recv(sock->sock, sock->buffer, sizeof(sock->buffer), 0);
416 bytes = read(sock->sock, sock->buffer, sizeof(sock->buffer));
420 sock->bufferpos = bytes;
424 sock->flags |= SOCKET_FLAG_QUITTED;
426 sock->traffic_in += bytes;
428 DESYNCHRONIZE(synchronized);
429 int used = parse_lines(sock, sock->buffer, sock->bufferpos);
430 if(used == sock->bufferpos + 1) {
431 //used all bytes so just reset the bufferpos
434 for(i = 0; i < sock->bufferpos - used; i++) {
435 sock->buffer[i] = sock->buffer[i+used];
437 sock->bufferpos -= used;
440 FD_ZERO(&fds); //zero out all other pending sockets here (we have other threads receiving from them)
443 } else if((sock->flags & (SOCKET_FLAG_CONNECTED | SOCKET_FLAG_RECONNECT)) == SOCKET_FLAG_RECONNECT) {
444 if(time(0) - sock->connection_time >= SOCKET_RECONNECT_TIME) {
445 connect_socket(sock);
448 if((sock->flags & SOCKET_FLAG_QUITTED)) {
449 sock->flags &= ~SOCKET_FLAG_QUITTED;
450 destroy_socket(sock, (sock->flags & SOCKET_FLAG_DEAD));
453 if(is_synchronized) {
454 DESYNCHRONIZE(synchronized);
459 putsock(struct ClientSocket *client, const char *text, ...)
462 char sendBuf[MAXLEN];
464 if (!(client && (client->flags & SOCKET_FLAG_CONNECTED))) return;
466 va_start(arg_list, text);
467 pos = vsnprintf(sendBuf, MAXLEN - 2, text, arg_list);
469 if (pos < 0 || pos > (MAXLEN - 2)) pos = MAXLEN - 2;
471 sendBuf[pos+1] = '\0';
472 write_socket(client, sendBuf, pos+1);
475 struct ClientSocket* getBots(int flags, struct ClientSocket* last_bot) {
476 struct ClientSocket *sock = (last_bot ? last_bot->next : sockets->data);
477 if(sock == NULL) return NULL;
478 for (; sock; sock = sock->next) {
479 if(!flags || (sock->flags & flags) == flags)
485 void free_sockets() {
487 struct ClientSocket *client, *next;
488 for (client = sockets->data; client; client = next) {
490 if((client->flags & SOCKET_FLAG_CONNECTED))
492 if(client->flags & SOCKET_FLAG_HAVE_SSL)
493 ssl_disconnect(client);
495 queue_destroy(client);