|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include "server_setup.h" |
|
|
#include <stdlib.h> |
|
|
#include <string.h> |
|
|
#include "util.h" |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include <signal.h> |
|
|
#ifdef HAVE_NETINET_IN_H |
|
|
#include <netinet/in.h> |
|
|
#endif |
|
|
#ifdef HAVE_NETINET_IN6_H |
|
|
#include <netinet/in6.h> |
|
|
#endif |
|
|
#ifdef HAVE_ARPA_INET_H |
|
|
#include <arpa/inet.h> |
|
|
#endif |
|
|
#ifdef HAVE_NETDB_H |
|
|
#include <netdb.h> |
|
|
#endif |
|
|
|
|
|
#include "curlx.h" |
|
|
#include "getpart.h" |
|
|
#include "inet_pton.h" |
|
|
#include "server_sockaddr.h" |
|
|
#include "warnless.h" |
|
|
|
|
|
|
|
|
#include "memdebug.h" |
|
|
|
|
|
#ifdef USE_WINSOCK |
|
|
#undef EINTR |
|
|
#define EINTR 4 |
|
|
#undef EAGAIN |
|
|
#define EAGAIN 11 |
|
|
#undef ENOMEM |
|
|
#define ENOMEM 12 |
|
|
#undef EINVAL |
|
|
#define EINVAL 22 |
|
|
#endif |
|
|
|
|
|
#define DEFAULT_PORT 1883 |
|
|
|
|
|
#ifndef DEFAULT_LOGFILE |
|
|
#define DEFAULT_LOGFILE "log/mqttd.log" |
|
|
#endif |
|
|
|
|
|
#ifndef DEFAULT_CONFIG |
|
|
#define DEFAULT_CONFIG "mqttd.config" |
|
|
#endif |
|
|
|
|
|
#define MQTT_MSG_CONNECT 0x10 |
|
|
#define MQTT_MSG_CONNACK 0x20 |
|
|
#define MQTT_MSG_PUBLISH 0x30 |
|
|
#define MQTT_MSG_PUBACK 0x40 |
|
|
#define MQTT_MSG_SUBSCRIBE 0x82 |
|
|
#define MQTT_MSG_SUBACK 0x90 |
|
|
#define MQTT_MSG_DISCONNECT 0xe0 |
|
|
|
|
|
#define MQTT_CONNACK_LEN 4 |
|
|
#define MQTT_SUBACK_LEN 5 |
|
|
#define MQTT_CLIENTID_LEN 12 |
|
|
|
|
|
struct configurable { |
|
|
unsigned char version; |
|
|
|
|
|
bool publish_before_suback; |
|
|
bool short_publish; |
|
|
bool excessive_remaining; |
|
|
unsigned char error_connack; |
|
|
int testnum; |
|
|
}; |
|
|
|
|
|
#define REQUEST_DUMP "server.input" |
|
|
#define CONFIG_VERSION 5 |
|
|
|
|
|
static struct configurable config; |
|
|
|
|
|
const char *serverlogfile = DEFAULT_LOGFILE; |
|
|
static const char *configfile = DEFAULT_CONFIG; |
|
|
static const char *logdir = "log"; |
|
|
static char loglockfile[256]; |
|
|
|
|
|
#ifdef USE_IPV6 |
|
|
static bool use_ipv6 = FALSE; |
|
|
#endif |
|
|
static const char *ipv_inuse = "IPv4"; |
|
|
static unsigned short port = DEFAULT_PORT; |
|
|
|
|
|
static void resetdefaults(void) |
|
|
{ |
|
|
logmsg("Reset to defaults"); |
|
|
config.version = CONFIG_VERSION; |
|
|
config.publish_before_suback = FALSE; |
|
|
config.short_publish = FALSE; |
|
|
config.excessive_remaining = FALSE; |
|
|
config.error_connack = 0; |
|
|
config.testnum = 0; |
|
|
} |
|
|
|
|
|
static unsigned char byteval(char *value) |
|
|
{ |
|
|
unsigned long num = strtoul(value, NULL, 10); |
|
|
return num & 0xff; |
|
|
} |
|
|
|
|
|
static void getconfig(void) |
|
|
{ |
|
|
FILE *fp = fopen(configfile, FOPEN_READTEXT); |
|
|
resetdefaults(); |
|
|
if(fp) { |
|
|
char buffer[512]; |
|
|
logmsg("parse config file"); |
|
|
while(fgets(buffer, sizeof(buffer), fp)) { |
|
|
char key[32]; |
|
|
char value[32]; |
|
|
if(2 == sscanf(buffer, "%31s %31s", key, value)) { |
|
|
if(!strcmp(key, "version")) { |
|
|
config.version = byteval(value); |
|
|
logmsg("version [%d] set", config.version); |
|
|
} |
|
|
else if(!strcmp(key, "PUBLISH-before-SUBACK")) { |
|
|
logmsg("PUBLISH-before-SUBACK set"); |
|
|
config.publish_before_suback = TRUE; |
|
|
} |
|
|
else if(!strcmp(key, "short-PUBLISH")) { |
|
|
logmsg("short-PUBLISH set"); |
|
|
config.short_publish = TRUE; |
|
|
} |
|
|
else if(!strcmp(key, "error-CONNACK")) { |
|
|
config.error_connack = byteval(value); |
|
|
logmsg("error-CONNACK = %d", config.error_connack); |
|
|
} |
|
|
else if(!strcmp(key, "Testnum")) { |
|
|
config.testnum = atoi(value); |
|
|
logmsg("testnum = %d", config.testnum); |
|
|
} |
|
|
else if(!strcmp(key, "excessive-remaining")) { |
|
|
logmsg("excessive-remaining set"); |
|
|
config.excessive_remaining = TRUE; |
|
|
} |
|
|
} |
|
|
} |
|
|
fclose(fp); |
|
|
} |
|
|
else { |
|
|
logmsg("No config file '%s' to read", configfile); |
|
|
} |
|
|
} |
|
|
|
|
|
static void loghex(unsigned char *buffer, ssize_t len) |
|
|
{ |
|
|
char data[12000]; |
|
|
ssize_t i; |
|
|
unsigned char *ptr = buffer; |
|
|
char *optr = data; |
|
|
ssize_t width = 0; |
|
|
int left = sizeof(data); |
|
|
|
|
|
for(i = 0; i < len && (left >= 0); i++) { |
|
|
msnprintf(optr, left, "%02x", ptr[i]); |
|
|
width += 2; |
|
|
optr += 2; |
|
|
left -= 2; |
|
|
} |
|
|
if(width) |
|
|
logmsg("'%s'", data); |
|
|
} |
|
|
|
|
|
typedef enum { |
|
|
FROM_CLIENT, |
|
|
FROM_SERVER |
|
|
} mqttdir; |
|
|
|
|
|
static void logprotocol(mqttdir dir, |
|
|
const char *prefix, size_t remlen, |
|
|
FILE *output, |
|
|
unsigned char *buffer, ssize_t len) |
|
|
{ |
|
|
char data[12000] = ""; |
|
|
ssize_t i; |
|
|
unsigned char *ptr = buffer; |
|
|
char *optr = data; |
|
|
int left = sizeof(data); |
|
|
|
|
|
for(i = 0; i < len && (left >= 0); i++) { |
|
|
msnprintf(optr, left, "%02x", ptr[i]); |
|
|
optr += 2; |
|
|
left -= 2; |
|
|
} |
|
|
fprintf(output, "%s %s %zx %s\n", |
|
|
dir == FROM_CLIENT ? "client" : "server", |
|
|
prefix, remlen, data); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
static int connack(FILE *dump, curl_socket_t fd) |
|
|
{ |
|
|
unsigned char packet[]={ |
|
|
MQTT_MSG_CONNACK, 0x02, |
|
|
0x00, 0x00 |
|
|
}; |
|
|
ssize_t rc; |
|
|
|
|
|
packet[3] = config.error_connack; |
|
|
|
|
|
rc = swrite(fd, (char *)packet, sizeof(packet)); |
|
|
if(rc > 0) { |
|
|
logmsg("WROTE %zd bytes [CONNACK]", rc); |
|
|
loghex(packet, rc); |
|
|
logprotocol(FROM_SERVER, "CONNACK", 2, dump, packet, sizeof(packet)); |
|
|
} |
|
|
if(rc == sizeof(packet)) { |
|
|
return 0; |
|
|
} |
|
|
return 1; |
|
|
} |
|
|
|
|
|
|
|
|
static int suback(FILE *dump, curl_socket_t fd, unsigned short packetid) |
|
|
{ |
|
|
unsigned char packet[]={ |
|
|
MQTT_MSG_SUBACK, 0x03, |
|
|
0, 0, |
|
|
0x00 |
|
|
}; |
|
|
ssize_t rc; |
|
|
packet[2] = (unsigned char)(packetid >> 8); |
|
|
packet[3] = (unsigned char)(packetid & 0xff); |
|
|
|
|
|
rc = swrite(fd, (char *)packet, sizeof(packet)); |
|
|
if(rc == sizeof(packet)) { |
|
|
logmsg("WROTE %zd bytes [SUBACK]", rc); |
|
|
loghex(packet, rc); |
|
|
logprotocol(FROM_SERVER, "SUBACK", 3, dump, packet, rc); |
|
|
return 0; |
|
|
} |
|
|
return 1; |
|
|
} |
|
|
|
|
|
#ifdef QOS |
|
|
|
|
|
static int puback(FILE *dump, curl_socket_t fd, unsigned short packetid) |
|
|
{ |
|
|
unsigned char packet[]={ |
|
|
MQTT_MSG_PUBACK, 0x00, |
|
|
0, 0 |
|
|
}; |
|
|
ssize_t rc; |
|
|
packet[2] = (unsigned char)(packetid >> 8); |
|
|
packet[3] = (unsigned char)(packetid & 0xff); |
|
|
|
|
|
rc = swrite(fd, (char *)packet, sizeof(packet)); |
|
|
if(rc == sizeof(packet)) { |
|
|
logmsg("WROTE %zd bytes [PUBACK]", rc); |
|
|
loghex(packet, rc); |
|
|
logprotocol(FROM_SERVER, dump, packet, rc); |
|
|
return 0; |
|
|
} |
|
|
logmsg("Failed sending [PUBACK]"); |
|
|
return 1; |
|
|
} |
|
|
#endif |
|
|
|
|
|
|
|
|
static int disconnect(FILE *dump, curl_socket_t fd) |
|
|
{ |
|
|
unsigned char packet[]={ |
|
|
MQTT_MSG_DISCONNECT, 0x00, |
|
|
}; |
|
|
ssize_t rc = swrite(fd, (char *)packet, sizeof(packet)); |
|
|
if(rc == sizeof(packet)) { |
|
|
logmsg("WROTE %zd bytes [DISCONNECT]", rc); |
|
|
loghex(packet, rc); |
|
|
logprotocol(FROM_SERVER, "DISCONNECT", 0, dump, packet, rc); |
|
|
return 0; |
|
|
} |
|
|
logmsg("Failed sending [DISCONNECT]"); |
|
|
return 1; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static size_t encode_length(size_t packetlen, |
|
|
unsigned char *remlength) |
|
|
{ |
|
|
size_t bytes = 0; |
|
|
unsigned char encode; |
|
|
|
|
|
do { |
|
|
encode = packetlen % 0x80; |
|
|
packetlen /= 0x80; |
|
|
if(packetlen) |
|
|
encode |= 0x80; |
|
|
|
|
|
remlength[bytes++] = encode; |
|
|
|
|
|
if(bytes > 3) { |
|
|
logmsg("too large packet!"); |
|
|
return 0; |
|
|
} |
|
|
} while(packetlen); |
|
|
|
|
|
return bytes; |
|
|
} |
|
|
|
|
|
|
|
|
static size_t decode_length(unsigned char *buf, |
|
|
size_t buflen, size_t *lenbytes) |
|
|
{ |
|
|
size_t len = 0; |
|
|
size_t mult = 1; |
|
|
size_t i; |
|
|
unsigned char encoded = 0x80; |
|
|
|
|
|
for(i = 0; (i < buflen) && (encoded & 0x80); i++) { |
|
|
encoded = buf[i]; |
|
|
len += (encoded & 0x7f) * mult; |
|
|
mult *= 0x80; |
|
|
} |
|
|
|
|
|
if(lenbytes) |
|
|
*lenbytes = i; |
|
|
|
|
|
return len; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
static int publish(FILE *dump, |
|
|
curl_socket_t fd, unsigned short packetid, |
|
|
char *topic, char *payload, size_t payloadlen) |
|
|
{ |
|
|
size_t topiclen = strlen(topic); |
|
|
unsigned char *packet; |
|
|
size_t payloadindex; |
|
|
size_t remaininglength = topiclen + 2 + payloadlen; |
|
|
size_t packetlen; |
|
|
size_t sendamount; |
|
|
ssize_t rc; |
|
|
unsigned char rembuffer[4]; |
|
|
size_t encodedlen; |
|
|
|
|
|
if(config.excessive_remaining) { |
|
|
|
|
|
rembuffer[0] = 0xff; |
|
|
rembuffer[1] = 0xff; |
|
|
rembuffer[2] = 0xff; |
|
|
rembuffer[3] = 0x80; |
|
|
encodedlen = 4; |
|
|
} |
|
|
else |
|
|
encodedlen = encode_length(remaininglength, rembuffer); |
|
|
|
|
|
|
|
|
packetlen = remaininglength + encodedlen + 1; |
|
|
packet = malloc(packetlen); |
|
|
if(!packet) |
|
|
return 1; |
|
|
|
|
|
packet[0] = MQTT_MSG_PUBLISH; |
|
|
memcpy(&packet[1], rembuffer, encodedlen); |
|
|
|
|
|
(void)packetid; |
|
|
|
|
|
|
|
|
packet[1 + encodedlen] = (unsigned char)(topiclen >> 8); |
|
|
packet[2 + encodedlen] = (unsigned char)(topiclen & 0xff); |
|
|
memcpy(&packet[3 + encodedlen], topic, topiclen); |
|
|
|
|
|
payloadindex = 3 + topiclen + encodedlen; |
|
|
memcpy(&packet[payloadindex], payload, payloadlen); |
|
|
|
|
|
sendamount = packetlen; |
|
|
if(config.short_publish) |
|
|
sendamount -= 2; |
|
|
|
|
|
rc = swrite(fd, (char *)packet, sendamount); |
|
|
if(rc > 0) { |
|
|
logmsg("WROTE %zd bytes [PUBLISH]", rc); |
|
|
loghex(packet, rc); |
|
|
logprotocol(FROM_SERVER, "PUBLISH", remaininglength, dump, packet, rc); |
|
|
} |
|
|
free(packet); |
|
|
if((size_t)rc == packetlen) |
|
|
return 0; |
|
|
return 1; |
|
|
} |
|
|
|
|
|
#define MAX_TOPIC_LENGTH 65535 |
|
|
#define MAX_CLIENT_ID_LENGTH 32 |
|
|
|
|
|
static char topic[MAX_TOPIC_LENGTH + 1]; |
|
|
|
|
|
static int fixedheader(curl_socket_t fd, |
|
|
unsigned char *bytep, |
|
|
size_t *remaining_lengthp, |
|
|
size_t *remaining_length_bytesp) |
|
|
{ |
|
|
|
|
|
unsigned char buffer[10]; |
|
|
|
|
|
|
|
|
ssize_t rc = sread(fd, (char *)buffer, 2); |
|
|
size_t i; |
|
|
if(rc < 2) { |
|
|
logmsg("READ %zd bytes [SHORT!]", rc); |
|
|
return 1; |
|
|
} |
|
|
logmsg("READ %zd bytes", rc); |
|
|
loghex(buffer, rc); |
|
|
*bytep = buffer[0]; |
|
|
|
|
|
|
|
|
i = 1; |
|
|
while(buffer[i] & 0x80) { |
|
|
i++; |
|
|
rc = sread(fd, (char *)&buffer[i], 1); |
|
|
if(rc != 1) { |
|
|
logmsg("Remaining Length broken"); |
|
|
return 1; |
|
|
} |
|
|
} |
|
|
*remaining_lengthp = decode_length(&buffer[1], i, remaining_length_bytesp); |
|
|
logmsg("Remaining Length: %zu [%zu bytes]", *remaining_lengthp, |
|
|
*remaining_length_bytesp); |
|
|
return 0; |
|
|
} |
|
|
|
|
|
static curl_socket_t mqttit(curl_socket_t fd) |
|
|
{ |
|
|
size_t buff_size = 10*1024; |
|
|
unsigned char *buffer = NULL; |
|
|
ssize_t rc; |
|
|
unsigned char byte; |
|
|
unsigned short packet_id; |
|
|
size_t payload_len; |
|
|
size_t client_id_length; |
|
|
size_t topic_len; |
|
|
size_t remaining_length = 0; |
|
|
size_t bytes = 0; |
|
|
char client_id[MAX_CLIENT_ID_LENGTH]; |
|
|
long testno; |
|
|
FILE *stream = NULL; |
|
|
FILE *dump; |
|
|
char dumpfile[256]; |
|
|
|
|
|
static const char protocol[7] = { |
|
|
0x00, 0x04, |
|
|
'M','Q','T','T', |
|
|
0x04 |
|
|
}; |
|
|
msnprintf(dumpfile, sizeof(dumpfile), "%s/%s", logdir, REQUEST_DUMP); |
|
|
dump = fopen(dumpfile, "ab"); |
|
|
if(!dump) |
|
|
goto end; |
|
|
|
|
|
getconfig(); |
|
|
|
|
|
testno = config.testnum; |
|
|
|
|
|
if(testno) |
|
|
logmsg("Found test number %ld", testno); |
|
|
|
|
|
buffer = malloc(buff_size); |
|
|
if(!buffer) { |
|
|
logmsg("Out of memory, unable to allocate buffer"); |
|
|
goto end; |
|
|
} |
|
|
|
|
|
do { |
|
|
unsigned char usr_flag = 0x80; |
|
|
unsigned char passwd_flag = 0x40; |
|
|
unsigned char conn_flags; |
|
|
const size_t client_id_offset = 12; |
|
|
size_t start_usr; |
|
|
size_t start_passwd; |
|
|
|
|
|
|
|
|
rc = fixedheader(fd, &byte, &remaining_length, &bytes); |
|
|
if(rc) |
|
|
break; |
|
|
|
|
|
if(remaining_length >= buff_size) { |
|
|
buff_size = remaining_length; |
|
|
buffer = realloc(buffer, buff_size); |
|
|
if(!buffer) { |
|
|
logmsg("Failed realloc of size %zu", buff_size); |
|
|
goto end; |
|
|
} |
|
|
} |
|
|
|
|
|
if(remaining_length) { |
|
|
|
|
|
rc = sread(fd, (char *)buffer, remaining_length); |
|
|
if(rc > 0) { |
|
|
logmsg("READ %zd bytes", rc); |
|
|
loghex(buffer, rc); |
|
|
} |
|
|
} |
|
|
|
|
|
if(byte == MQTT_MSG_CONNECT) { |
|
|
logprotocol(FROM_CLIENT, "CONNECT", remaining_length, |
|
|
dump, buffer, rc); |
|
|
|
|
|
if(memcmp(protocol, buffer, sizeof(protocol))) { |
|
|
logmsg("Protocol preamble mismatch"); |
|
|
goto end; |
|
|
} |
|
|
|
|
|
payload_len = (size_t)(buffer[10] << 8) | buffer[11]; |
|
|
|
|
|
client_id_length = payload_len; |
|
|
|
|
|
|
|
|
conn_flags = buffer[7]; |
|
|
|
|
|
start_usr = client_id_offset + payload_len; |
|
|
if(usr_flag == (unsigned char)(conn_flags & usr_flag)) { |
|
|
logmsg("User flag is present in CONN flag"); |
|
|
payload_len += (size_t)(buffer[start_usr] << 8) | |
|
|
buffer[start_usr + 1]; |
|
|
payload_len += 2; |
|
|
} |
|
|
|
|
|
start_passwd = client_id_offset + payload_len; |
|
|
if(passwd_flag == (char)(conn_flags & passwd_flag)) { |
|
|
logmsg("Password flag is present in CONN flags"); |
|
|
payload_len += (size_t)(buffer[start_passwd] << 8) | |
|
|
buffer[start_passwd + 1]; |
|
|
payload_len += 2; |
|
|
} |
|
|
|
|
|
|
|
|
if((ssize_t)payload_len != (rc - 12)) { |
|
|
logmsg("Payload length mismatch, expected %zx got %zx", |
|
|
rc - 12, payload_len); |
|
|
goto end; |
|
|
} |
|
|
|
|
|
else if((client_id_length + 1) > MAX_CLIENT_ID_LENGTH) { |
|
|
logmsg("Too large client id"); |
|
|
goto end; |
|
|
} |
|
|
memcpy(client_id, &buffer[12], client_id_length); |
|
|
client_id[client_id_length] = 0; |
|
|
|
|
|
logmsg("MQTT client connect accepted: %s", client_id); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if(connack(dump, fd)) { |
|
|
logmsg("failed sending CONNACK"); |
|
|
goto end; |
|
|
} |
|
|
} |
|
|
else if(byte == MQTT_MSG_SUBSCRIBE) { |
|
|
int error; |
|
|
char *data; |
|
|
size_t datalen; |
|
|
logprotocol(FROM_CLIENT, "SUBSCRIBE", remaining_length, |
|
|
dump, buffer, rc); |
|
|
logmsg("Incoming SUBSCRIBE"); |
|
|
|
|
|
if(rc < 6) { |
|
|
logmsg("Too small SUBSCRIBE"); |
|
|
goto end; |
|
|
} |
|
|
|
|
|
|
|
|
packet_id = (unsigned short)((buffer[0] << 8) | buffer[1]); |
|
|
|
|
|
|
|
|
topic_len = (size_t)(buffer[2] << 8) | buffer[3]; |
|
|
if(topic_len != (remaining_length - 5)) { |
|
|
logmsg("Wrong topic length, got %zu expected %zu", |
|
|
topic_len, remaining_length - 5); |
|
|
goto end; |
|
|
} |
|
|
memcpy(topic, &buffer[4], topic_len); |
|
|
topic[topic_len] = 0; |
|
|
|
|
|
|
|
|
|
|
|
logmsg("SUBSCRIBE to '%s' [%d]", topic, packet_id); |
|
|
stream = test2fopen(testno, logdir); |
|
|
error = getpart(&data, &datalen, "reply", "data", stream); |
|
|
if(!error) { |
|
|
if(!config.publish_before_suback) { |
|
|
if(suback(dump, fd, packet_id)) { |
|
|
logmsg("failed sending SUBACK"); |
|
|
free(data); |
|
|
goto end; |
|
|
} |
|
|
} |
|
|
if(publish(dump, fd, packet_id, topic, data, datalen)) { |
|
|
logmsg("PUBLISH failed"); |
|
|
free(data); |
|
|
goto end; |
|
|
} |
|
|
free(data); |
|
|
if(config.publish_before_suback) { |
|
|
if(suback(dump, fd, packet_id)) { |
|
|
logmsg("failed sending SUBACK"); |
|
|
goto end; |
|
|
} |
|
|
} |
|
|
} |
|
|
else { |
|
|
char *def = (char *)"this is random payload yes yes it is"; |
|
|
publish(dump, fd, packet_id, topic, def, strlen(def)); |
|
|
} |
|
|
disconnect(dump, fd); |
|
|
} |
|
|
else if((byte & 0xf0) == (MQTT_MSG_PUBLISH & 0xf0)) { |
|
|
size_t topiclen; |
|
|
|
|
|
logmsg("Incoming PUBLISH"); |
|
|
logprotocol(FROM_CLIENT, "PUBLISH", remaining_length, |
|
|
dump, buffer, rc); |
|
|
|
|
|
topiclen = (size_t)(buffer[1 + bytes] << 8) | buffer[2 + bytes]; |
|
|
logmsg("Got %zu bytes topic", topiclen); |
|
|
|
|
|
|
|
|
#ifdef QOS |
|
|
|
|
|
puback(dump, fd, 0); |
|
|
#endif |
|
|
|
|
|
|
|
|
rc = sread(fd, (char *)&buffer[0], 2); |
|
|
|
|
|
logmsg("READ %zd bytes [DISCONNECT]", rc); |
|
|
loghex(buffer, rc); |
|
|
logprotocol(FROM_CLIENT, "DISCONNECT", 0, dump, buffer, rc); |
|
|
goto end; |
|
|
} |
|
|
else { |
|
|
|
|
|
goto end; |
|
|
} |
|
|
} while(1); |
|
|
|
|
|
end: |
|
|
if(buffer) |
|
|
free(buffer); |
|
|
if(dump) |
|
|
fclose(dump); |
|
|
if(stream) |
|
|
fclose(stream); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static bool incoming(curl_socket_t listenfd) |
|
|
{ |
|
|
fd_set fds_read; |
|
|
fd_set fds_write; |
|
|
fd_set fds_err; |
|
|
int clients = 0; |
|
|
|
|
|
if(got_exit_signal) { |
|
|
logmsg("signalled to die, exiting..."); |
|
|
return FALSE; |
|
|
} |
|
|
|
|
|
#ifdef HAVE_GETPPID |
|
|
|
|
|
if(getppid() <= 1) { |
|
|
logmsg("process becomes orphan, exiting"); |
|
|
return FALSE; |
|
|
} |
|
|
#endif |
|
|
|
|
|
do { |
|
|
ssize_t rc; |
|
|
int error = 0; |
|
|
curl_socket_t sockfd = listenfd; |
|
|
int maxfd = (int)sockfd; |
|
|
|
|
|
FD_ZERO(&fds_read); |
|
|
FD_ZERO(&fds_write); |
|
|
FD_ZERO(&fds_err); |
|
|
|
|
|
|
|
|
FD_SET(sockfd, &fds_read); |
|
|
|
|
|
do { |
|
|
|
|
|
rc = select(maxfd + 1, &fds_read, &fds_write, &fds_err, NULL); |
|
|
if(got_exit_signal) { |
|
|
logmsg("signalled to die, exiting..."); |
|
|
return FALSE; |
|
|
} |
|
|
} while((rc == -1) && ((error = SOCKERRNO) == EINTR)); |
|
|
|
|
|
if(rc < 0) { |
|
|
logmsg("select() failed with error: (%d) %s", |
|
|
error, strerror(error)); |
|
|
return FALSE; |
|
|
} |
|
|
|
|
|
if(FD_ISSET(sockfd, &fds_read)) { |
|
|
curl_socket_t newfd = accept(sockfd, NULL, NULL); |
|
|
if(CURL_SOCKET_BAD == newfd) { |
|
|
error = SOCKERRNO; |
|
|
logmsg("accept(%" FMT_SOCKET_T ", NULL, NULL) " |
|
|
"failed with error: (%d) %s", sockfd, error, sstrerror(error)); |
|
|
} |
|
|
else { |
|
|
logmsg("====> Client connect, fd %" FMT_SOCKET_T ". " |
|
|
"Read config from %s", newfd, configfile); |
|
|
set_advisor_read_lock(loglockfile); |
|
|
(void)mqttit(newfd); |
|
|
clear_advisor_read_lock(loglockfile); |
|
|
|
|
|
logmsg("====> Client disconnect"); |
|
|
sclose(newfd); |
|
|
} |
|
|
} |
|
|
} while(clients); |
|
|
|
|
|
return TRUE; |
|
|
} |
|
|
|
|
|
static curl_socket_t sockdaemon(curl_socket_t sock, |
|
|
unsigned short *listenport) |
|
|
{ |
|
|
|
|
|
srvr_sockaddr_union_t listener; |
|
|
int flag; |
|
|
int rc; |
|
|
int totdelay = 0; |
|
|
int maxretr = 10; |
|
|
int delay = 20; |
|
|
int attempt = 0; |
|
|
int error = 0; |
|
|
|
|
|
do { |
|
|
attempt++; |
|
|
flag = 1; |
|
|
rc = setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, |
|
|
(void *)&flag, sizeof(flag)); |
|
|
if(rc) { |
|
|
error = SOCKERRNO; |
|
|
logmsg("setsockopt(SO_REUSEADDR) failed with error: (%d) %s", |
|
|
error, sstrerror(error)); |
|
|
if(maxretr) { |
|
|
rc = wait_ms(delay); |
|
|
if(rc) { |
|
|
|
|
|
logmsg("wait_ms() failed with error: %d", rc); |
|
|
sclose(sock); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
if(got_exit_signal) { |
|
|
logmsg("signalled to die, exiting..."); |
|
|
sclose(sock); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
totdelay += delay; |
|
|
delay *= 2; |
|
|
} |
|
|
} |
|
|
} while(rc && maxretr--); |
|
|
|
|
|
if(rc) { |
|
|
logmsg("setsockopt(SO_REUSEADDR) failed %d times in %d ms. Error: (%d) %s", |
|
|
attempt, totdelay, error, strerror(error)); |
|
|
logmsg("Continuing anyway..."); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#ifdef USE_IPV6 |
|
|
if(!use_ipv6) { |
|
|
#endif |
|
|
memset(&listener.sa4, 0, sizeof(listener.sa4)); |
|
|
listener.sa4.sin_family = AF_INET; |
|
|
listener.sa4.sin_addr.s_addr = INADDR_ANY; |
|
|
listener.sa4.sin_port = htons(*listenport); |
|
|
rc = bind(sock, &listener.sa, sizeof(listener.sa4)); |
|
|
#ifdef USE_IPV6 |
|
|
} |
|
|
else { |
|
|
memset(&listener.sa6, 0, sizeof(listener.sa6)); |
|
|
listener.sa6.sin6_family = AF_INET6; |
|
|
listener.sa6.sin6_addr = in6addr_any; |
|
|
listener.sa6.sin6_port = htons(*listenport); |
|
|
rc = bind(sock, &listener.sa, sizeof(listener.sa6)); |
|
|
} |
|
|
#endif |
|
|
if(rc) { |
|
|
error = SOCKERRNO; |
|
|
logmsg("Error binding socket on port %hu: (%d) %s", |
|
|
*listenport, error, sstrerror(error)); |
|
|
sclose(sock); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
if(!*listenport) { |
|
|
|
|
|
|
|
|
curl_socklen_t la_size; |
|
|
srvr_sockaddr_union_t localaddr; |
|
|
#ifdef USE_IPV6 |
|
|
if(!use_ipv6) |
|
|
#endif |
|
|
la_size = sizeof(localaddr.sa4); |
|
|
#ifdef USE_IPV6 |
|
|
else |
|
|
la_size = sizeof(localaddr.sa6); |
|
|
#endif |
|
|
memset(&localaddr.sa, 0, (size_t)la_size); |
|
|
if(getsockname(sock, &localaddr.sa, &la_size) < 0) { |
|
|
error = SOCKERRNO; |
|
|
logmsg("getsockname() failed with error: (%d) %s", |
|
|
error, sstrerror(error)); |
|
|
sclose(sock); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
switch(localaddr.sa.sa_family) { |
|
|
case AF_INET: |
|
|
*listenport = ntohs(localaddr.sa4.sin_port); |
|
|
break; |
|
|
#ifdef USE_IPV6 |
|
|
case AF_INET6: |
|
|
*listenport = ntohs(localaddr.sa6.sin6_port); |
|
|
break; |
|
|
#endif |
|
|
default: |
|
|
break; |
|
|
} |
|
|
if(!*listenport) { |
|
|
|
|
|
logmsg("Apparently getsockname() succeeded, with listener port zero."); |
|
|
logmsg("A valid reason for this failure is a binary built without"); |
|
|
logmsg("proper network library linkage. This might not be the only"); |
|
|
logmsg("reason, but double check it before anything else."); |
|
|
sclose(sock); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
rc = listen(sock, 5); |
|
|
if(0 != rc) { |
|
|
error = SOCKERRNO; |
|
|
logmsg("listen(%" FMT_SOCKET_T ", 5) failed with error: (%d) %s", |
|
|
sock, error, sstrerror(error)); |
|
|
sclose(sock); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
return sock; |
|
|
} |
|
|
|
|
|
|
|
|
int main(int argc, char *argv[]) |
|
|
{ |
|
|
curl_socket_t sock = CURL_SOCKET_BAD; |
|
|
curl_socket_t msgsock = CURL_SOCKET_BAD; |
|
|
int wrotepidfile = 0; |
|
|
int wroteportfile = 0; |
|
|
const char *pidname = ".mqttd.pid"; |
|
|
const char *portname = ".mqttd.port"; |
|
|
bool juggle_again; |
|
|
int error; |
|
|
int arg = 1; |
|
|
|
|
|
while(argc > arg) { |
|
|
if(!strcmp("--version", argv[arg])) { |
|
|
printf("mqttd IPv4%s\n", |
|
|
#ifdef USE_IPV6 |
|
|
"/IPv6" |
|
|
#else |
|
|
"" |
|
|
#endif |
|
|
); |
|
|
return 0; |
|
|
} |
|
|
else if(!strcmp("--pidfile", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) |
|
|
pidname = argv[arg++]; |
|
|
} |
|
|
else if(!strcmp("--portfile", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) |
|
|
portname = argv[arg++]; |
|
|
} |
|
|
else if(!strcmp("--config", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) |
|
|
configfile = argv[arg++]; |
|
|
} |
|
|
else if(!strcmp("--logfile", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) |
|
|
serverlogfile = argv[arg++]; |
|
|
} |
|
|
else if(!strcmp("--logdir", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) |
|
|
logdir = argv[arg++]; |
|
|
} |
|
|
else if(!strcmp("--ipv6", argv[arg])) { |
|
|
#ifdef USE_IPV6 |
|
|
ipv_inuse = "IPv6"; |
|
|
use_ipv6 = TRUE; |
|
|
#endif |
|
|
arg++; |
|
|
} |
|
|
else if(!strcmp("--ipv4", argv[arg])) { |
|
|
|
|
|
#ifdef USE_IPV6 |
|
|
ipv_inuse = "IPv4"; |
|
|
use_ipv6 = FALSE; |
|
|
#endif |
|
|
arg++; |
|
|
} |
|
|
else if(!strcmp("--port", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) { |
|
|
char *endptr; |
|
|
unsigned long ulnum = strtoul(argv[arg], &endptr, 10); |
|
|
if((endptr != argv[arg] + strlen(argv[arg])) || |
|
|
((ulnum != 0UL) && ((ulnum < 1025UL) || (ulnum > 65535UL)))) { |
|
|
fprintf(stderr, "mqttd: invalid --port argument (%s)\n", |
|
|
argv[arg]); |
|
|
return 0; |
|
|
} |
|
|
port = curlx_ultous(ulnum); |
|
|
arg++; |
|
|
} |
|
|
} |
|
|
else { |
|
|
puts("Usage: mqttd [option]\n" |
|
|
" --config [file]\n" |
|
|
" --version\n" |
|
|
" --logfile [file]\n" |
|
|
" --logdir [directory]\n" |
|
|
" --pidfile [file]\n" |
|
|
" --portfile [file]\n" |
|
|
" --ipv4\n" |
|
|
" --ipv6\n" |
|
|
" --port [port]\n"); |
|
|
return 0; |
|
|
} |
|
|
} |
|
|
|
|
|
msnprintf(loglockfile, sizeof(loglockfile), "%s/%s/mqtt-%s.lock", |
|
|
logdir, SERVERLOGS_LOCKDIR, ipv_inuse); |
|
|
|
|
|
#ifdef _WIN32 |
|
|
win32_init(); |
|
|
atexit(win32_cleanup); |
|
|
|
|
|
setmode(fileno(stdin), O_BINARY); |
|
|
setmode(fileno(stdout), O_BINARY); |
|
|
setmode(fileno(stderr), O_BINARY); |
|
|
#endif |
|
|
|
|
|
install_signal_handlers(FALSE); |
|
|
|
|
|
#ifdef USE_IPV6 |
|
|
if(!use_ipv6) |
|
|
#endif |
|
|
sock = socket(AF_INET, SOCK_STREAM, 0); |
|
|
#ifdef USE_IPV6 |
|
|
else |
|
|
sock = socket(AF_INET6, SOCK_STREAM, 0); |
|
|
#endif |
|
|
|
|
|
if(CURL_SOCKET_BAD == sock) { |
|
|
error = SOCKERRNO; |
|
|
logmsg("Error creating socket: (%d) %s", error, sstrerror(error)); |
|
|
goto mqttd_cleanup; |
|
|
} |
|
|
|
|
|
{ |
|
|
|
|
|
sock = sockdaemon(sock, &port); |
|
|
if(CURL_SOCKET_BAD == sock) { |
|
|
goto mqttd_cleanup; |
|
|
} |
|
|
msgsock = CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
logmsg("Running %s version", ipv_inuse); |
|
|
logmsg("Listening on port %hu", port); |
|
|
|
|
|
wrotepidfile = write_pidfile(pidname); |
|
|
if(!wrotepidfile) { |
|
|
goto mqttd_cleanup; |
|
|
} |
|
|
|
|
|
wroteportfile = write_portfile(portname, port); |
|
|
if(!wroteportfile) { |
|
|
goto mqttd_cleanup; |
|
|
} |
|
|
|
|
|
do { |
|
|
juggle_again = incoming(sock); |
|
|
} while(juggle_again); |
|
|
|
|
|
mqttd_cleanup: |
|
|
|
|
|
if((msgsock != sock) && (msgsock != CURL_SOCKET_BAD)) |
|
|
sclose(msgsock); |
|
|
|
|
|
if(sock != CURL_SOCKET_BAD) |
|
|
sclose(sock); |
|
|
|
|
|
if(wrotepidfile) |
|
|
unlink(pidname); |
|
|
if(wroteportfile) |
|
|
unlink(portname); |
|
|
|
|
|
restore_signal_handlers(FALSE); |
|
|
|
|
|
if(got_exit_signal) { |
|
|
logmsg("============> mqttd exits with signal (%d)", exit_signal); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
raise(exit_signal); |
|
|
} |
|
|
|
|
|
logmsg("============> mqttd quits"); |
|
|
return 0; |
|
|
} |
|
|
|