12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253 |
- #define PT_PRIVATE
- #include "or.h"
- #include "config.h"
- #include "circuitbuild.h"
- #include "transports.h"
- #include "util.h"
- #include "router.h"
- #ifdef _WIN32
- static void set_managed_proxy_environment(LPVOID *envp,
- const managed_proxy_t *mp);
- #else
- static int set_managed_proxy_environment(char ***envp,
- const managed_proxy_t *mp);
- #endif
- static INLINE int proxy_configuration_finished(const managed_proxy_t *mp);
- static void managed_proxy_destroy(managed_proxy_t *mp,
- int also_terminate_process);
- static void handle_finished_proxy(managed_proxy_t *mp);
- static void configure_proxy(managed_proxy_t *mp);
- static void parse_method_error(const char *line, int is_server_method);
- #define parse_server_method_error(l) parse_method_error(l, 1)
- #define parse_client_method_error(l) parse_method_error(l, 0)
- static INLINE void free_execve_args(char **arg);
- #define PROTO_ENV_ERROR "ENV-ERROR"
- #define PROTO_NEG_SUCCESS "VERSION"
- #define PROTO_NEG_FAIL "VERSION-ERROR no-version"
- #define PROTO_CMETHOD "CMETHOD"
- #define PROTO_SMETHOD "SMETHOD"
- #define PROTO_CMETHOD_ERROR "CMETHOD-ERROR"
- #define PROTO_SMETHOD_ERROR "SMETHOD-ERROR"
- #define PROTO_CMETHODS_DONE "CMETHODS DONE"
- #define PROTO_SMETHODS_DONE "SMETHODS DONE"
- #define SMALLEST_MANAGED_LINE_SIZE 9
- #define ENVIRON_SIZE_CLIENT 5
- #define ENVIRON_SIZE_SERVER 8
- #define PROTO_VERSION_ONE 1
- static smartlist_t *managed_proxy_list = NULL;
- static int unconfigured_proxies_n = 0;
- int
- pt_proxies_configuration_pending(void)
- {
- return !! unconfigured_proxies_n;
- }
- static int
- managed_proxy_has_argv(const managed_proxy_t *mp, char **proxy_argv)
- {
- char **tmp1=proxy_argv;
- char **tmp2=mp->argv;
- tor_assert(tmp1);
- tor_assert(tmp2);
- while (*tmp1 && *tmp2) {
- if (strcmp(*tmp1++, *tmp2++))
- return 0;
- }
- if (!*tmp1 && !*tmp2)
- return 1;
- return 0;
- }
- static managed_proxy_t *
- get_managed_proxy_by_argv_and_type(char **proxy_argv, int is_server)
- {
- if (!managed_proxy_list)
- return NULL;
- SMARTLIST_FOREACH_BEGIN(managed_proxy_list, managed_proxy_t *, mp) {
- if (managed_proxy_has_argv(mp, proxy_argv) &&
- mp->is_server == is_server)
- return mp;
- } SMARTLIST_FOREACH_END(mp);
- return NULL;
- }
- static void
- add_transport_to_proxy(const char *transport, managed_proxy_t *mp)
- {
- tor_assert(mp->transports_to_launch);
- if (!smartlist_string_isin(mp->transports_to_launch, transport))
- smartlist_add(mp->transports_to_launch, tor_strdup(transport));
- }
- static int
- proxy_needs_restart(const managed_proxy_t *mp)
- {
-
- tor_assert(smartlist_len(mp->transports_to_launch) > 0);
- tor_assert(mp->conf_state == PT_PROTO_COMPLETED);
- if (smartlist_len(mp->transports_to_launch) != smartlist_len(mp->transports))
- goto needs_restart;
- SMARTLIST_FOREACH_BEGIN(mp->transports_to_launch, char *, t_t_l) {
- if (!smartlist_string_isin(mp->transports, t_t_l))
- goto needs_restart;
- } SMARTLIST_FOREACH_END(t_t_l);
- return 0;
- needs_restart:
- return 1;
- }
- static void
- proxy_prepare_for_restart(managed_proxy_t *mp)
- {
- transport_t *t_tmp = NULL;
- tor_assert(mp->conf_state == PT_PROTO_COMPLETED);
-
- tor_process_handle_destroy(mp->process_handle, 1);
- mp->process_handle = NULL;
-
- SMARTLIST_FOREACH_BEGIN(mp->transports, const char *, t_name) {
- t_tmp = transport_get_by_name(t_name);
- if (t_tmp)
- t_tmp->marked_for_removal = 1;
- } SMARTLIST_FOREACH_END(t_name);
- sweep_transport_list();
-
- SMARTLIST_FOREACH(mp->transports, char *, t_name, tor_free(t_name));
- smartlist_clear(mp->transports);
-
- mp->conf_state = PT_PROTO_INFANT;
- }
- static int
- launch_managed_proxy(managed_proxy_t *mp)
- {
- int retval;
- #ifdef _WIN32
- LPVOID envp=NULL;
- set_managed_proxy_environment(&envp, mp);
- tor_assert(envp);
-
- retval = tor_spawn_background(NULL, (const char **)mp->argv, envp,
- &mp->process_handle);
- tor_free(envp);
- #else
- char **envp=NULL;
-
- if (set_managed_proxy_environment(&envp, mp) < 0) {
- log_warn(LD_GENERAL, "Could not setup the environment of "
- "the managed proxy at '%s'.", mp->argv[0]);
- free_execve_args(envp);
- return -1;
- }
- retval = tor_spawn_background(mp->argv[0], (const char **)mp->argv,
- (const char **)envp, &mp->process_handle);
-
- free_execve_args(envp);
- #endif
- if (retval == PROCESS_STATUS_ERROR) {
- log_warn(LD_GENERAL, "Managed proxy at '%s' failed at launch.",
- mp->argv[0]);
- return -1;
- }
- log_info(LD_CONFIG, "Managed proxy at '%s' has spawned with PID '%d'.",
- mp->argv[0], tor_process_get_pid(mp->process_handle));
- mp->conf_state = PT_PROTO_LAUNCHED;
- return 0;
- }
- void
- pt_configure_remaining_proxies(void)
- {
- log_debug(LD_CONFIG, "Configuring remaining managed proxies (%d)!",
- unconfigured_proxies_n);
- SMARTLIST_FOREACH_BEGIN(managed_proxy_list, managed_proxy_t *, mp) {
- tor_assert(mp->conf_state != PT_PROTO_BROKEN ||
- mp->conf_state != PT_PROTO_FAILED_LAUNCH);
- if (mp->got_hup) {
- mp->got_hup = 0;
-
- if (proxy_needs_restart(mp)) {
- log_info(LD_GENERAL, "Preparing managed proxy for restart.");
- proxy_prepare_for_restart(mp);
- continue;
- } else {
- log_info(LD_GENERAL, "Nothing changed for managed proxy after HUP: "
- "not restarting.");
- unconfigured_proxies_n--;
- tor_assert(unconfigured_proxies_n >= 0);
- }
- continue;
- }
-
- if (!proxy_configuration_finished(mp))
- configure_proxy(mp);
- } SMARTLIST_FOREACH_END(mp);
- }
- #ifdef _WIN32
- static void
- configure_proxy(managed_proxy_t *mp)
- {
- int pos;
- char stdout_buf[200];
- smartlist_t *lines = NULL;
-
- if (mp->conf_state == PT_PROTO_INFANT) {
- if (launch_managed_proxy(mp) < 0) {
- mp->conf_state = PT_PROTO_FAILED_LAUNCH;
- handle_finished_proxy(mp);
- }
- return;
- }
- tor_assert(mp->conf_state != PT_PROTO_INFANT);
- tor_assert(mp->process_handle);
- pos = tor_read_all_handle(tor_process_get_stdout_pipe(mp->process_handle),
- stdout_buf, sizeof(stdout_buf) - 1, NULL);
- if (pos < 0) {
- log_notice(LD_GENERAL, "Failed to read data from managed proxy");
- mp->conf_state = PT_PROTO_BROKEN;
- goto done;
- }
- if (pos == 0)
- return;
-
-
- stdout_buf[pos] = '\0';
-
- lines = smartlist_new();
- tor_split_lines(lines, stdout_buf, pos);
-
- SMARTLIST_FOREACH_BEGIN(lines, const char *, line) {
- handle_proxy_line(line, mp);
- if (proxy_configuration_finished(mp))
- goto done;
- } SMARTLIST_FOREACH_END(line);
- done:
-
- if (proxy_configuration_finished(mp))
- handle_finished_proxy(mp);
- if (lines)
- smartlist_free(lines);
- }
- #else
- static void
- configure_proxy(managed_proxy_t *mp)
- {
- enum stream_status r;
- char stdout_buf[200];
-
- if (mp->conf_state == PT_PROTO_INFANT) {
- if (launch_managed_proxy(mp) < 0) {
- mp->conf_state = PT_PROTO_FAILED_LAUNCH;
- handle_finished_proxy(mp);
- }
- return;
- }
- tor_assert(mp->conf_state != PT_PROTO_INFANT);
- tor_assert(mp->process_handle);
- while (1) {
- r = get_string_from_pipe(tor_process_get_stdout_pipe(mp->process_handle),
- stdout_buf, sizeof(stdout_buf) - 1);
- if (r == IO_STREAM_OKAY) {
- handle_proxy_line((const char *)stdout_buf, mp);
- } else if (r == IO_STREAM_EAGAIN) {
- return;
- } else if (r == IO_STREAM_CLOSED || r == IO_STREAM_TERM) {
- log_notice(LD_GENERAL, "Managed proxy stream closed. "
- "Most probably application stopped running");
- mp->conf_state = PT_PROTO_BROKEN;
- } else {
- log_notice(LD_GENERAL, "Unknown stream status while configuring proxy.");
- }
-
- if (proxy_configuration_finished(mp)) {
- handle_finished_proxy(mp);
- return;
- }
- }
- }
- #endif
- static void
- register_server_proxy(managed_proxy_t *mp)
- {
-
- smartlist_t *sm_tmp = smartlist_new();
- tor_assert(mp->conf_state != PT_PROTO_COMPLETED);
- SMARTLIST_FOREACH_BEGIN(mp->transports, transport_t *, t) {
- save_transport_to_state(t->name, &t->addr, t->port);
-
- log_warn(LD_GENERAL, "Registered server transport '%s' at '%s:%d'",
- t->name, fmt_addr(&t->addr), (int)t->port);
- smartlist_add(sm_tmp, tor_strdup(t->name));
- } SMARTLIST_FOREACH_END(t);
-
- SMARTLIST_FOREACH(mp->transports, transport_t *, t, transport_free(t));
- smartlist_free(mp->transports);
- mp->transports = sm_tmp;
- }
- static void
- register_client_proxy(managed_proxy_t *mp)
- {
- int r;
-
- smartlist_t *sm_tmp = smartlist_new();
- tor_assert(mp->conf_state != PT_PROTO_COMPLETED);
- SMARTLIST_FOREACH_BEGIN(mp->transports, transport_t *, t) {
- r = transport_add(t);
- switch (r) {
- case -1:
- log_notice(LD_GENERAL, "Could not add transport %s. Skipping.", t->name);
- transport_free(t);
- break;
- case 0:
- log_info(LD_GENERAL, "Succesfully registered transport %s", t->name);
- smartlist_add(sm_tmp, tor_strdup(t->name));
- break;
- case 1:
- log_info(LD_GENERAL, "Succesfully registered transport %s", t->name);
- smartlist_add(sm_tmp, tor_strdup(t->name));
- transport_free(t);
- break;
- }
- } SMARTLIST_FOREACH_END(t);
- smartlist_free(mp->transports);
- mp->transports = sm_tmp;
- }
- static INLINE void
- register_proxy(managed_proxy_t *mp)
- {
- if (mp->is_server)
- register_server_proxy(mp);
- else
- register_client_proxy(mp);
- }
- static void
- managed_proxy_destroy(managed_proxy_t *mp,
- int also_terminate_process)
- {
- if (mp->conf_state != PT_PROTO_COMPLETED)
- SMARTLIST_FOREACH(mp->transports, transport_t *, t, transport_free(t));
- else
- SMARTLIST_FOREACH(mp->transports, char *, t_name, tor_free(t_name));
-
- smartlist_free(mp->transports);
-
- SMARTLIST_FOREACH(mp->transports_to_launch, char *, t, tor_free(t));
- smartlist_free(mp->transports_to_launch);
-
- smartlist_remove(managed_proxy_list, mp);
-
- free_execve_args(mp->argv);
- tor_process_handle_destroy(mp->process_handle, also_terminate_process);
- mp->process_handle = NULL;
- tor_free(mp);
- }
- static void
- handle_finished_proxy(managed_proxy_t *mp)
- {
- switch (mp->conf_state) {
- case PT_PROTO_BROKEN:
- managed_proxy_destroy(mp, 1);
- break;
- case PT_PROTO_FAILED_LAUNCH:
- managed_proxy_destroy(mp, 0);
- break;
- case PT_PROTO_CONFIGURED:
- register_proxy(mp);
- mp->conf_state = PT_PROTO_COMPLETED;
- break;
- case PT_PROTO_INFANT:
- case PT_PROTO_LAUNCHED:
- case PT_PROTO_ACCEPTING_METHODS:
- case PT_PROTO_COMPLETED:
- default:
- log_warn(LD_CONFIG, "Unexpected managed proxy state in "
- "handle_finished_proxy().");
- tor_assert(0);
- }
- unconfigured_proxies_n--;
- tor_assert(unconfigured_proxies_n >= 0);
- }
- static INLINE int
- proxy_configuration_finished(const managed_proxy_t *mp)
- {
- return (mp->conf_state == PT_PROTO_CONFIGURED ||
- mp->conf_state == PT_PROTO_BROKEN ||
- mp->conf_state == PT_PROTO_FAILED_LAUNCH);
- }
- static void
- handle_methods_done(const managed_proxy_t *mp)
- {
- tor_assert(mp->transports);
- if (smartlist_len(mp->transports) == 0)
- log_notice(LD_GENERAL, "Proxy was spawned successfully, "
- "but it didn't laucn any pluggable transport listeners!");
- log_info(LD_CONFIG, "%s managed proxy configuration completed!",
- mp->is_server ? "Server" : "Client");
- }
- void
- handle_proxy_line(const char *line, managed_proxy_t *mp)
- {
- log_debug(LD_GENERAL, "Got a line from managed proxy: %s", line);
- if (strlen(line) < SMALLEST_MANAGED_LINE_SIZE) {
- log_warn(LD_GENERAL, "Managed proxy configuration line is too small. "
- "Discarding");
- goto err;
- }
- if (!strcmpstart(line, PROTO_ENV_ERROR)) {
- if (mp->conf_state != PT_PROTO_LAUNCHED)
- goto err;
- parse_env_error(line);
- goto err;
- } else if (!strcmpstart(line, PROTO_NEG_FAIL)) {
- if (mp->conf_state != PT_PROTO_LAUNCHED)
- goto err;
- log_warn(LD_CONFIG, "Managed proxy could not pick a "
- "configuration protocol version.");
- goto err;
- } else if (!strcmpstart(line, PROTO_NEG_SUCCESS)) {
- if (mp->conf_state != PT_PROTO_LAUNCHED)
- goto err;
- if (parse_version(line,mp) < 0)
- goto err;
- tor_assert(mp->conf_protocol != 0);
- mp->conf_state = PT_PROTO_ACCEPTING_METHODS;
- return;
- } else if (!strcmpstart(line, PROTO_CMETHODS_DONE)) {
- if (mp->conf_state != PT_PROTO_ACCEPTING_METHODS)
- goto err;
- handle_methods_done(mp);
- mp->conf_state = PT_PROTO_CONFIGURED;
- return;
- } else if (!strcmpstart(line, PROTO_SMETHODS_DONE)) {
- if (mp->conf_state != PT_PROTO_ACCEPTING_METHODS)
- goto err;
- handle_methods_done(mp);
- mp->conf_state = PT_PROTO_CONFIGURED;
- return;
- } else if (!strcmpstart(line, PROTO_CMETHOD_ERROR)) {
- if (mp->conf_state != PT_PROTO_ACCEPTING_METHODS)
- goto err;
- parse_client_method_error(line);
- goto err;
- } else if (!strcmpstart(line, PROTO_SMETHOD_ERROR)) {
- if (mp->conf_state != PT_PROTO_ACCEPTING_METHODS)
- goto err;
- parse_server_method_error(line);
- goto err;
- } else if (!strcmpstart(line, PROTO_CMETHOD)) {
- if (mp->conf_state != PT_PROTO_ACCEPTING_METHODS)
- goto err;
- if (parse_cmethod_line(line, mp) < 0)
- goto err;
- return;
- } else if (!strcmpstart(line, PROTO_SMETHOD)) {
- if (mp->conf_state != PT_PROTO_ACCEPTING_METHODS)
- goto err;
- if (parse_smethod_line(line, mp) < 0)
- goto err;
- return;
- } else if (!strcmpstart(line, SPAWN_ERROR_MESSAGE)) {
- log_warn(LD_GENERAL, "Could not launch managed proxy executable!");
- mp->conf_state = PT_PROTO_FAILED_LAUNCH;
- return;
- }
- log_warn(LD_CONFIG, "Unknown line received by managed proxy. (%s)", line);
- err:
- mp->conf_state = PT_PROTO_BROKEN;
- log_warn(LD_CONFIG, "Managed proxy at '%s' failed the configuration protocol"
- " and will be destroyed.", mp->argv ? mp->argv[0] : "");
- }
- void
- parse_env_error(const char *line)
- {
-
- if (strlen(line) < (strlen(PROTO_ENV_ERROR) + 2))
- log_notice(LD_CONFIG, "Managed proxy sent us an %s without an error "
- "message.", PROTO_ENV_ERROR);
- log_warn(LD_CONFIG, "Managed proxy couldn't understand the "
- "pluggable transport environment variables. (%s)",
- line+strlen(PROTO_ENV_ERROR)+1);
- }
- int
- parse_version(const char *line, managed_proxy_t *mp)
- {
- if (strlen(line) < (strlen(PROTO_NEG_SUCCESS) + 2)) {
- log_warn(LD_CONFIG, "Managed proxy sent us malformed %s line.",
- PROTO_NEG_SUCCESS);
- return -1;
- }
- if (strcmp("1", line+strlen(PROTO_NEG_SUCCESS)+1)) {
- log_warn(LD_CONFIG, "Managed proxy tried to negotiate on version '%s'. "
- "We only support version '1'", line+strlen(PROTO_NEG_SUCCESS)+1);
- return -1;
- }
- mp->conf_protocol = PROTO_VERSION_ONE;
- return 0;
- }
- static void
- parse_method_error(const char *line, int is_server)
- {
- const char* error = is_server ?
- PROTO_SMETHOD_ERROR : PROTO_CMETHOD_ERROR;
-
- if (strlen(line) < (strlen(error) + 2))
- log_warn(LD_CONFIG, "Managed proxy sent us an %s without an error "
- "message.", error);
- log_warn(LD_CONFIG, "%s managed proxy encountered a method error. (%s)",
- is_server ? "Server" : "Client",
- line+strlen(error)+1);
- }
- int
- parse_smethod_line(const char *line, managed_proxy_t *mp)
- {
- int r;
- smartlist_t *items = NULL;
- char *method_name=NULL;
- char *addrport=NULL;
- tor_addr_t addr;
- uint16_t port = 0;
- transport_t *transport=NULL;
- items = smartlist_new();
- smartlist_split_string(items, line, NULL,
- SPLIT_SKIP_SPACE|SPLIT_IGNORE_BLANK, -1);
- if (smartlist_len(items) < 3) {
- log_warn(LD_CONFIG, "Server managed proxy sent us a SMETHOD line "
- "with too few arguments.");
- goto err;
- }
- tor_assert(!strcmp(smartlist_get(items,0),PROTO_SMETHOD));
- method_name = smartlist_get(items,1);
- if (!string_is_C_identifier(method_name)) {
- log_warn(LD_CONFIG, "Transport name is not a C identifier (%s).",
- method_name);
- goto err;
- }
- addrport = smartlist_get(items, 2);
- if (tor_addr_port_lookup(addrport, &addr, &port)<0) {
- log_warn(LD_CONFIG, "Error parsing transport "
- "address '%s'", addrport);
- goto err;
- }
- if (!port) {
- log_warn(LD_CONFIG,
- "Transport address '%s' has no port.", addrport);
- goto err;
- }
- transport = transport_new(&addr, port, method_name, PROXY_NONE);
- if (!transport)
- goto err;
- smartlist_add(mp->transports, transport);
-
- log_info(LD_CONFIG, "Server transport %s at %s:%d.",
- method_name, fmt_addr(&addr), (int)port);
- r=0;
- goto done;
- err:
- r = -1;
- done:
- SMARTLIST_FOREACH(items, char*, s, tor_free(s));
- smartlist_free(items);
- return r;
- }
- int
- parse_cmethod_line(const char *line, managed_proxy_t *mp)
- {
- int r;
- smartlist_t *items = NULL;
- char *method_name=NULL;
- char *socks_ver_str=NULL;
- int socks_ver=PROXY_NONE;
- char *addrport=NULL;
- tor_addr_t addr;
- uint16_t port = 0;
- transport_t *transport=NULL;
- items = smartlist_new();
- smartlist_split_string(items, line, NULL,
- SPLIT_SKIP_SPACE|SPLIT_IGNORE_BLANK, -1);
- if (smartlist_len(items) < 4) {
- log_warn(LD_CONFIG, "Client managed proxy sent us a CMETHOD line "
- "with too few arguments.");
- goto err;
- }
- tor_assert(!strcmp(smartlist_get(items,0),PROTO_CMETHOD));
- method_name = smartlist_get(items,1);
- if (!string_is_C_identifier(method_name)) {
- log_warn(LD_CONFIG, "Transport name is not a C identifier (%s).",
- method_name);
- goto err;
- }
- socks_ver_str = smartlist_get(items,2);
- if (!strcmp(socks_ver_str,"socks4")) {
- socks_ver = PROXY_SOCKS4;
- } else if (!strcmp(socks_ver_str,"socks5")) {
- socks_ver = PROXY_SOCKS5;
- } else {
- log_warn(LD_CONFIG, "Client managed proxy sent us a proxy protocol "
- "we don't recognize. (%s)", socks_ver_str);
- goto err;
- }
- addrport = smartlist_get(items, 3);
- if (tor_addr_port_lookup(addrport, &addr, &port)<0) {
- log_warn(LD_CONFIG, "Error parsing transport "
- "address '%s'", addrport);
- goto err;
- }
- if (!port) {
- log_warn(LD_CONFIG,
- "Transport address '%s' has no port.", addrport);
- goto err;
- }
- transport = transport_new(&addr, port, method_name, socks_ver);
- if (!transport)
- goto err;
- smartlist_add(mp->transports, transport);
- log_info(LD_CONFIG, "Transport %s at %s:%d with SOCKS %d. "
- "Attached to managed proxy.",
- method_name, fmt_addr(&addr), (int)port, socks_ver);
- r=0;
- goto done;
- err:
- r = -1;
- done:
- SMARTLIST_FOREACH(items, char*, s, tor_free(s));
- smartlist_free(items);
- return r;
- }
- static char *
- get_bindaddr_for_server_proxy(const managed_proxy_t *mp)
- {
- char *bindaddr_result = NULL;
- char *bindaddr_tmp = NULL;
- smartlist_t *string_tmp = smartlist_new();
- tor_assert(mp->is_server);
- SMARTLIST_FOREACH_BEGIN(mp->transports_to_launch, char *, t) {
- bindaddr_tmp = get_stored_bindaddr_for_server_transport(t);
- smartlist_add_asprintf(string_tmp, "%s-%s", t, bindaddr_tmp);
- tor_free(bindaddr_tmp);
- } SMARTLIST_FOREACH_END(t);
- bindaddr_result = smartlist_join_strings(string_tmp, ",", 0, NULL);
- SMARTLIST_FOREACH(string_tmp, char *, t, tor_free(t));
- smartlist_free(string_tmp);
- return bindaddr_result;
- }
- #ifdef _WIN32
- static void
- set_managed_proxy_environment(LPVOID *envp, const managed_proxy_t *mp)
- {
- const or_options_t *options = get_options();
- char *tmp=NULL;
- char *state_tmp=NULL;
- char *state_env=NULL;
- char *transports_to_launch=NULL;
- char *transports_env=NULL;
- char *bindaddr_tmp=NULL;
- char *bindaddr_env=NULL;
- char *orport_env=NULL;
- char version_env[31];
- char extended_env[43];
- int env_size = 0;
-
- smartlist_t *envs = smartlist_new();
-
- char **environ_tmp = environ;
- while (*environ_tmp)
- smartlist_add(envs, *environ_tmp++);
-
- state_tmp = get_datadir_fname("pt_state/");
- tor_asprintf(&state_env, "TOR_PT_STATE_LOCATION=%s", state_tmp);
- strcpy(version_env, "TOR_PT_MANAGED_TRANSPORT_VER=1");
- transports_to_launch =
- smartlist_join_strings(mp->transports_to_launch, ",", 0, NULL);
- tor_asprintf(&transports_env,
- mp->is_server ?
- "TOR_PT_SERVER_TRANSPORTS=%s" : "TOR_PT_CLIENT_TRANSPORTS=%s",
- transports_to_launch);
- smartlist_add(envs, state_env);
- smartlist_add(envs, version_env);
- smartlist_add(envs, transports_env);
- if (mp->is_server) {
- tor_asprintf(&orport_env, "TOR_PT_ORPORT=127.0.0.1:%s",
- options->ORPort->value);
- bindaddr_tmp = get_bindaddr_for_server_proxy(mp);
- tor_asprintf(&bindaddr_env, "TOR_PT_SERVER_BINDADDR=%s", bindaddr_tmp);
- strcpy(extended_env, "TOR_PT_EXTENDED_SERVER_PORT=127.0.0.1:4200");
- smartlist_add(envs, orport_env);
- smartlist_add(envs, extended_env);
- smartlist_add(envs, bindaddr_env);
- }
-
- smartlist_sort_strings(envs);
-
-
- SMARTLIST_FOREACH(envs, const char *, s,
- env_size += strlen(s) + 1);
- env_size += 1;
- *envp = tor_malloc(env_size);
- tmp = *envp;
-
- SMARTLIST_FOREACH_BEGIN(envs, const char *, s) {
- memcpy(tmp, s, strlen(s));
- tmp += strlen(s);
- memset(tmp, '\0', 1);
- tmp += 1;
- } SMARTLIST_FOREACH_END(s);
- memset(tmp, '\0', 1);
-
- tor_free(state_tmp);
- tor_free(state_env);
- tor_free(transports_to_launch);
- tor_free(transports_env);
- tor_free(bindaddr_tmp);
- tor_free(bindaddr_env);
- tor_free(orport_env);
- smartlist_free(envs);
- }
- #else
- static int
- set_managed_proxy_environment(char ***envp, const managed_proxy_t *mp)
- {
- const or_options_t *options = get_options();
- char **tmp=NULL;
- char *state_loc=NULL;
- char *transports_to_launch=NULL;
- char *bindaddr=NULL;
- char *home_env=NULL;
- char *path_env=NULL;
- int r = -1;
- int n_envs = mp->is_server ? ENVIRON_SIZE_SERVER : ENVIRON_SIZE_CLIENT;
-
- *envp = tor_malloc(sizeof(char*)*(n_envs+1));
- tmp = *envp;
- state_loc = get_datadir_fname("pt_state/");
- transports_to_launch =
- smartlist_join_strings(mp->transports_to_launch, ",", 0, NULL);
- home_env = getenv("HOME");
- path_env = getenv("PATH");
- if (!home_env || !path_env)
- goto done;
- tor_asprintf(tmp++, "HOME=%s", home_env);
- tor_asprintf(tmp++, "PATH=%s", path_env);
- tor_asprintf(tmp++, "TOR_PT_STATE_LOCATION=%s", state_loc);
- tor_asprintf(tmp++, "TOR_PT_MANAGED_TRANSPORT_VER=1");
- if (mp->is_server) {
- bindaddr = get_bindaddr_for_server_proxy(mp);
-
- tor_asprintf(tmp++, "TOR_PT_ORPORT=127.0.0.1:%d",
- router_get_advertised_or_port(options));
- tor_asprintf(tmp++, "TOR_PT_SERVER_BINDADDR=%s", bindaddr);
- tor_asprintf(tmp++, "TOR_PT_SERVER_TRANSPORTS=%s", transports_to_launch);
-
- tor_asprintf(tmp++, "TOR_PT_EXTENDED_SERVER_PORT=127.0.0.1:4200");
- } else {
- tor_asprintf(tmp++, "TOR_PT_CLIENT_TRANSPORTS=%s", transports_to_launch);
- }
- *tmp = NULL;
- r = 0;
- done:
- tor_free(state_loc);
- tor_free(transports_to_launch);
- tor_free(bindaddr);
- return r;
- }
- #endif
- static managed_proxy_t *
- managed_proxy_create(const smartlist_t *transport_list,
- char **proxy_argv, int is_server)
- {
- managed_proxy_t *mp = tor_malloc_zero(sizeof(managed_proxy_t));
- mp->conf_state = PT_PROTO_INFANT;
- mp->is_server = is_server;
- mp->argv = proxy_argv;
- mp->transports = smartlist_new();
- mp->transports_to_launch = smartlist_new();
- SMARTLIST_FOREACH(transport_list, const char *, transport,
- add_transport_to_proxy(transport, mp));
-
- if (!managed_proxy_list)
- managed_proxy_list = smartlist_new();
- smartlist_add(managed_proxy_list, mp);
- unconfigured_proxies_n++;
- return mp;
- }
- void
- pt_kickstart_proxy(const smartlist_t *transport_list,
- char **proxy_argv, int is_server)
- {
- managed_proxy_t *mp=NULL;
- transport_t *old_transport = NULL;
- mp = get_managed_proxy_by_argv_and_type(proxy_argv, is_server);
- if (!mp) {
- managed_proxy_create(transport_list, proxy_argv, is_server);
- } else {
- if (mp->got_hup) {
-
- if (mp->marked_for_removal) {
- mp->marked_for_removal = 0;
- unconfigured_proxies_n++;
- }
- SMARTLIST_FOREACH_BEGIN(transport_list, const char *, transport) {
- old_transport = transport_get_by_name(transport);
- if (old_transport)
- old_transport->marked_for_removal = 0;
- } SMARTLIST_FOREACH_END(transport);
- }
- SMARTLIST_FOREACH(transport_list, const char *, transport,
- add_transport_to_proxy(transport, mp));
- free_execve_args(proxy_argv);
- }
- }
- static INLINE void
- free_execve_args(char **arg)
- {
- char **tmp = arg;
- while (*tmp)
- _tor_free(*tmp++);
- tor_free(arg);
- }
- void
- pt_prepare_proxy_list_for_config_read(void)
- {
- if (!managed_proxy_list)
- return;
- SMARTLIST_FOREACH_BEGIN(managed_proxy_list, managed_proxy_t *, mp) {
-
- if (mp->conf_state != PT_PROTO_COMPLETED) {
- managed_proxy_destroy(mp, 1);
- unconfigured_proxies_n--;
- continue;
- }
- tor_assert(mp->conf_state == PT_PROTO_COMPLETED);
- mp->marked_for_removal = 1;
- mp->got_hup = 1;
- SMARTLIST_FOREACH(mp->transports_to_launch, char *, t, tor_free(t));
- smartlist_clear(mp->transports_to_launch);
- } SMARTLIST_FOREACH_END(mp);
- tor_assert(unconfigured_proxies_n == 0);
- }
- void
- sweep_proxy_list(void)
- {
- if (!managed_proxy_list)
- return;
- SMARTLIST_FOREACH_BEGIN(managed_proxy_list, managed_proxy_t *, mp) {
- if (mp->marked_for_removal) {
- SMARTLIST_DEL_CURRENT(managed_proxy_list, mp);
- managed_proxy_destroy(mp, 1);
- }
- } SMARTLIST_FOREACH_END(mp);
- }
- void
- pt_free_all(void)
- {
- if (managed_proxy_list) {
-
- SMARTLIST_FOREACH(managed_proxy_list, managed_proxy_t *, mp,
- managed_proxy_destroy(mp, 1));
- smartlist_free(managed_proxy_list);
- managed_proxy_list=NULL;
- }
- }
|