]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/socket-proxy/socket-proxyd.c
hwdb: Add support for HP ZBook Studio G5 keyboard (#17525)
[thirdparty/systemd.git] / src / socket-proxy / socket-proxyd.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
912b54ad 2
912b54ad 3#include <errno.h>
3f6fd1ba 4#include <fcntl.h>
912b54ad 5#include <getopt.h>
3f6fd1ba 6#include <netdb.h>
912b54ad
DS
7#include <stdio.h>
8#include <stdlib.h>
912b54ad
DS
9#include <sys/un.h>
10#include <unistd.h>
11
912b54ad
DS
12#include "sd-daemon.h"
13#include "sd-event.h"
fb69d709 14#include "sd-resolve.h"
3f6fd1ba 15
b5efdb8a 16#include "alloc-util.h"
f60a028a 17#include "errno-util.h"
3ffd4af2 18#include "fd-util.h"
96c374d0 19#include "log.h"
a160567e 20#include "main-func.h"
37ec0fdd 21#include "parse-util.h"
3f6fd1ba 22#include "path-util.h"
294bf0c3 23#include "pretty-print.h"
f2935c77 24#include "resolve-private.h"
3f6fd1ba 25#include "set.h"
912b54ad 26#include "socket-util.h"
07630cea 27#include "string-util.h"
912b54ad 28#include "util.h"
8569a776
LP
29
30#define BUFFER_SIZE (256 * 1024)
912b54ad 31
f60a028a 32static unsigned arg_connections_max = 256;
fb69d709 33static const char *arg_remote_host = NULL;
9e12d5bf 34static usec_t arg_exit_idle_time = USEC_INFINITY;
fb69d709 35
8569a776 36typedef struct Context {
fb69d709
LP
37 sd_event *event;
38 sd_resolve *resolve;
9e12d5bf 39 sd_event_source *idle_time;
fb69d709 40
8569a776
LP
41 Set *listen;
42 Set *connections;
43} Context;
912b54ad 44
8569a776 45typedef struct Connection {
e633ea1c
LP
46 Context *context;
47
8569a776
LP
48 int server_fd, client_fd;
49 int server_to_client_buffer[2]; /* a pipe */
50 int client_to_server_buffer[2]; /* a pipe */
912b54ad 51
8569a776
LP
52 size_t server_to_client_buffer_full, client_to_server_buffer_full;
53 size_t server_to_client_buffer_size, client_to_server_buffer_size;
54
55 sd_event_source *server_event_source, *client_event_source;
912b54ad 56
fb69d709
LP
57 sd_resolve_query *resolve_query;
58} Connection;
912b54ad 59
8569a776
LP
60static void connection_free(Connection *c) {
61 assert(c);
32d3c809 62
e633ea1c
LP
63 if (c->context)
64 set_remove(c->context->connections, c);
65
8569a776
LP
66 sd_event_source_unref(c->server_event_source);
67 sd_event_source_unref(c->client_event_source);
32d3c809 68
03e334a1
LP
69 safe_close(c->server_fd);
70 safe_close(c->client_fd);
32d3c809 71
3d94f76c
LP
72 safe_close_pair(c->server_to_client_buffer);
73 safe_close_pair(c->client_to_server_buffer);
32d3c809 74
fb69d709
LP
75 sd_resolve_query_unref(c->resolve_query);
76
8569a776
LP
77 free(c);
78}
32d3c809 79
9e12d5bf
EA
80static int idle_time_cb(sd_event_source *s, uint64_t usec, void *userdata) {
81 Context *c = userdata;
82 int r;
83
84 if (!set_isempty(c->connections)) {
85 log_warning("Idle timer fired even though there are connections, ignoring");
86 return 0;
87 }
88
89 r = sd_event_exit(c->event, 0);
90 if (r < 0) {
91 log_warning_errno(r, "Error while stopping event loop, ignoring: %m");
92 return 0;
93 }
94 return 0;
95}
96
97static int connection_release(Connection *c) {
9e12d5bf 98 Context *context = c->context;
39cf0351 99 int r;
9e12d5bf
EA
100
101 connection_free(c);
102
103 if (arg_exit_idle_time < USEC_INFINITY && set_isempty(context->connections)) {
9e12d5bf 104 if (context->idle_time) {
39cf0351 105 r = sd_event_source_set_time_relative(context->idle_time, arg_exit_idle_time);
9e12d5bf
EA
106 if (r < 0)
107 return log_error_errno(r, "Error while setting idle time: %m");
108
109 r = sd_event_source_set_enabled(context->idle_time, SD_EVENT_ONESHOT);
110 if (r < 0)
111 return log_error_errno(r, "Error while enabling idle time: %m");
112 } else {
39cf0351
LP
113 r = sd_event_add_time_relative(
114 context->event, &context->idle_time, CLOCK_MONOTONIC,
115 arg_exit_idle_time, 0, idle_time_cb, context);
9e12d5bf
EA
116 if (r < 0)
117 return log_error_errno(r, "Failed to create idle timer: %m");
118 }
119 }
120
121 return 0;
122}
123
a160567e 124static void context_clear(Context *context) {
8569a776
LP
125 assert(context);
126
224b0e7a
ZJS
127 set_free_with_destructor(context->listen, sd_event_source_unref);
128 set_free_with_destructor(context->connections, connection_free);
32d3c809 129
fb69d709
LP
130 sd_event_unref(context->event);
131 sd_resolve_unref(context->resolve);
9e12d5bf 132 sd_event_source_unref(context->idle_time);
8569a776 133}
912b54ad 134
3042bbeb 135static int connection_create_pipes(Connection *c, int buffer[static 2], size_t *sz) {
8569a776 136 int r;
912b54ad 137
8569a776
LP
138 assert(c);
139 assert(buffer);
140 assert(sz);
912b54ad 141
8569a776
LP
142 if (buffer[0] >= 0)
143 return 0;
912b54ad 144
8569a776 145 r = pipe2(buffer, O_CLOEXEC|O_NONBLOCK);
4a62c710
MS
146 if (r < 0)
147 return log_error_errno(errno, "Failed to allocate pipe buffer: %m");
912b54ad 148
25dbe4f5 149 (void) fcntl(buffer[0], F_SETPIPE_SZ, BUFFER_SIZE);
8569a776
LP
150
151 r = fcntl(buffer[0], F_GETPIPE_SZ);
4a62c710
MS
152 if (r < 0)
153 return log_error_errno(errno, "Failed to get pipe buffer size: %m");
912b54ad 154
8569a776
LP
155 assert(r > 0);
156 *sz = r;
157
912b54ad
DS
158 return 0;
159}
160
8569a776
LP
161static int connection_shovel(
162 Connection *c,
163 int *from, int buffer[2], int *to,
164 size_t *full, size_t *sz,
165 sd_event_source **from_source, sd_event_source **to_source) {
166
167 bool shoveled;
168
169 assert(c);
170 assert(from);
171 assert(buffer);
172 assert(buffer[0] >= 0);
173 assert(buffer[1] >= 0);
174 assert(to);
175 assert(full);
176 assert(sz);
177 assert(from_source);
178 assert(to_source);
179
180 do {
181 ssize_t z;
182
183 shoveled = false;
184
185 if (*full < *sz && *from >= 0 && *to >= 0) {
186 z = splice(*from, NULL, buffer[1], NULL, *sz - *full, SPLICE_F_MOVE|SPLICE_F_NONBLOCK);
187 if (z > 0) {
188 *full += z;
189 shoveled = true;
f60a028a 190 } else if (z == 0 || ERRNO_IS_DISCONNECT(errno)) {
8569a776 191 *from_source = sd_event_source_unref(*from_source);
03e334a1 192 *from = safe_close(*from);
ec2ce0c5 193 } else if (!IN_SET(errno, EAGAIN, EINTR))
4a62c710 194 return log_error_errno(errno, "Failed to splice: %m");
912b54ad
DS
195 }
196
8569a776
LP
197 if (*full > 0 && *to >= 0) {
198 z = splice(buffer[0], NULL, *to, NULL, *full, SPLICE_F_MOVE|SPLICE_F_NONBLOCK);
199 if (z > 0) {
200 *full -= z;
201 shoveled = true;
f60a028a 202 } else if (z == 0 || ERRNO_IS_DISCONNECT(errno)) {
8569a776 203 *to_source = sd_event_source_unref(*to_source);
03e334a1 204 *to = safe_close(*to);
ec2ce0c5 205 } else if (!IN_SET(errno, EAGAIN, EINTR))
4a62c710 206 return log_error_errno(errno, "Failed to splice: %m");
8569a776
LP
207 }
208 } while (shoveled);
912b54ad 209
8569a776 210 return 0;
912b54ad
DS
211}
212
fb69d709 213static int connection_enable_event_sources(Connection *c);
8569a776
LP
214
215static int traffic_cb(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
216 Connection *c = userdata;
912b54ad
DS
217 int r;
218
8569a776
LP
219 assert(s);
220 assert(fd >= 0);
221 assert(c);
912b54ad 222
8569a776
LP
223 r = connection_shovel(c,
224 &c->server_fd, c->server_to_client_buffer, &c->client_fd,
225 &c->server_to_client_buffer_full, &c->server_to_client_buffer_size,
226 &c->server_event_source, &c->client_event_source);
227 if (r < 0)
228 goto quit;
912b54ad 229
8569a776
LP
230 r = connection_shovel(c,
231 &c->client_fd, c->client_to_server_buffer, &c->server_fd,
232 &c->client_to_server_buffer_full, &c->client_to_server_buffer_size,
233 &c->client_event_source, &c->server_event_source);
234 if (r < 0)
235 goto quit;
912b54ad 236
8569a776
LP
237 /* EOF on both sides? */
238 if (c->server_fd == -1 && c->client_fd == -1)
239 goto quit;
912b54ad 240
8569a776
LP
241 /* Server closed, and all data written to client? */
242 if (c->server_fd == -1 && c->server_to_client_buffer_full <= 0)
243 goto quit;
912b54ad 244
8569a776
LP
245 /* Client closed, and all data written to server? */
246 if (c->client_fd == -1 && c->client_to_server_buffer_full <= 0)
247 goto quit;
912b54ad 248
fb69d709 249 r = connection_enable_event_sources(c);
8569a776
LP
250 if (r < 0)
251 goto quit;
912b54ad 252
8569a776 253 return 1;
912b54ad 254
8569a776 255quit:
9e12d5bf 256 connection_release(c);
8569a776 257 return 0; /* ignore errors, continue serving */
912b54ad
DS
258}
259
fb69d709 260static int connection_enable_event_sources(Connection *c) {
8569a776
LP
261 uint32_t a = 0, b = 0;
262 int r;
912b54ad 263
8569a776 264 assert(c);
912b54ad 265
8569a776
LP
266 if (c->server_to_client_buffer_full > 0)
267 b |= EPOLLOUT;
268 if (c->server_to_client_buffer_full < c->server_to_client_buffer_size)
269 a |= EPOLLIN;
912b54ad 270
8569a776
LP
271 if (c->client_to_server_buffer_full > 0)
272 a |= EPOLLOUT;
273 if (c->client_to_server_buffer_full < c->client_to_server_buffer_size)
274 b |= EPOLLIN;
912b54ad 275
8569a776
LP
276 if (c->server_event_source)
277 r = sd_event_source_set_io_events(c->server_event_source, a);
278 else if (c->server_fd >= 0)
fb69d709 279 r = sd_event_add_io(c->context->event, &c->server_event_source, c->server_fd, a, traffic_cb, c);
8569a776
LP
280 else
281 r = 0;
282
f647962d
MS
283 if (r < 0)
284 return log_error_errno(r, "Failed to set up server event source: %m");
912b54ad 285
8569a776
LP
286 if (c->client_event_source)
287 r = sd_event_source_set_io_events(c->client_event_source, b);
288 else if (c->client_fd >= 0)
fb69d709 289 r = sd_event_add_io(c->context->event, &c->client_event_source, c->client_fd, b, traffic_cb, c);
8569a776
LP
290 else
291 r = 0;
912b54ad 292
f647962d
MS
293 if (r < 0)
294 return log_error_errno(r, "Failed to set up client event source: %m");
912b54ad 295
8569a776 296 return 0;
912b54ad
DS
297}
298
fb69d709
LP
299static int connection_complete(Connection *c) {
300 int r;
301
302 assert(c);
303
304 r = connection_create_pipes(c, c->server_to_client_buffer, &c->server_to_client_buffer_size);
305 if (r < 0)
306 goto fail;
307
308 r = connection_create_pipes(c, c->client_to_server_buffer, &c->client_to_server_buffer_size);
309 if (r < 0)
310 goto fail;
311
312 r = connection_enable_event_sources(c);
313 if (r < 0)
314 goto fail;
315
316 return 0;
317
318fail:
9e12d5bf 319 connection_release(c);
fb69d709
LP
320 return 0; /* ignore errors, continue serving */
321}
322
8569a776
LP
323static int connect_cb(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
324 Connection *c = userdata;
325 socklen_t solen;
326 int error, r;
327
328 assert(s);
329 assert(fd >= 0);
330 assert(c);
331
332 solen = sizeof(error);
333 r = getsockopt(fd, SOL_SOCKET, SO_ERROR, &error, &solen);
334 if (r < 0) {
56f64d95 335 log_error_errno(errno, "Failed to issue SO_ERROR: %m");
40976028
DS
336 goto fail;
337 }
912b54ad 338
8569a776 339 if (error != 0) {
279d3c9c 340 log_error_errno(error, "Failed to connect to remote host: %m");
912b54ad
DS
341 goto fail;
342 }
343
8569a776
LP
344 c->client_event_source = sd_event_source_unref(c->client_event_source);
345
fb69d709 346 return connection_complete(c);
912b54ad 347
fb69d709 348fail:
9e12d5bf 349 connection_release(c);
fb69d709
LP
350 return 0; /* ignore errors, continue serving */
351}
912b54ad 352
fb69d709
LP
353static int connection_start(Connection *c, struct sockaddr *sa, socklen_t salen) {
354 int r;
355
356 assert(c);
357 assert(sa);
358 assert(salen);
359
360 c->client_fd = socket(sa->sa_family, SOCK_STREAM|SOCK_NONBLOCK|SOCK_CLOEXEC, 0);
361 if (c->client_fd < 0) {
56f64d95 362 log_error_errno(errno, "Failed to get remote socket: %m");
8569a776 363 goto fail;
fb69d709
LP
364 }
365
366 r = connect(c->client_fd, sa, salen);
367 if (r < 0) {
368 if (errno == EINPROGRESS) {
369 r = sd_event_add_io(c->context->event, &c->client_event_source, c->client_fd, EPOLLOUT, connect_cb, c);
370 if (r < 0) {
da927ba9 371 log_error_errno(r, "Failed to add connection socket: %m");
fb69d709
LP
372 goto fail;
373 }
374
375 r = sd_event_source_set_enabled(c->client_event_source, SD_EVENT_ONESHOT);
376 if (r < 0) {
da927ba9 377 log_error_errno(r, "Failed to enable oneshot event source: %m");
fb69d709
LP
378 goto fail;
379 }
380 } else {
56f64d95 381 log_error_errno(errno, "Failed to connect to remote host: %m");
fb69d709
LP
382 goto fail;
383 }
384 } else {
385 r = connection_complete(c);
386 if (r < 0)
387 goto fail;
388 }
912b54ad 389
8569a776 390 return 0;
912b54ad 391
8569a776 392fail:
9e12d5bf 393 connection_release(c);
8569a776
LP
394 return 0; /* ignore errors, continue serving */
395}
396
f2935c77 397static int resolve_handler(sd_resolve_query *q, int ret, const struct addrinfo *ai, Connection *c) {
fb69d709
LP
398 assert(q);
399 assert(c);
400
401 if (ret != 0) {
402 log_error("Failed to resolve host: %s", gai_strerror(ret));
403 goto fail;
404 }
405
406 c->resolve_query = sd_resolve_query_unref(c->resolve_query);
407
408 return connection_start(c, ai->ai_addr, ai->ai_addrlen);
409
410fail:
9e12d5bf 411 connection_release(c);
fb69d709
LP
412 return 0; /* ignore errors, continue serving */
413}
414
415static int resolve_remote(Connection *c) {
416
417 static const struct addrinfo hints = {
418 .ai_family = AF_UNSPEC,
419 .ai_socktype = SOCK_STREAM,
fb69d709
LP
420 };
421
fb69d709 422 const char *node, *service;
fb69d709
LP
423 int r;
424
15a3e96f 425 if (IN_SET(arg_remote_host[0], '/', '@')) {
f36a9d59
ZJS
426 union sockaddr_union sa;
427 int sa_len;
15a3e96f 428
f36a9d59
ZJS
429 r = sockaddr_un_set_path(&sa.un, arg_remote_host);
430 if (r < 0) {
431 log_error_errno(r, "Specified address doesn't fit in an AF_UNIX address, refusing: %m");
15a3e96f
LP
432 goto fail;
433 }
f36a9d59 434 sa_len = r;
fb69d709 435
f36a9d59 436 return connection_start(c, &sa.sa, sa_len);
fb69d709
LP
437 }
438
439 service = strrchr(arg_remote_host, ':');
440 if (service) {
441 node = strndupa(arg_remote_host, service - arg_remote_host);
313cefa1 442 service++;
fb69d709
LP
443 } else {
444 node = arg_remote_host;
445 service = "80";
446 }
447
448 log_debug("Looking up address info for %s:%s", node, service);
f2935c77 449 r = resolve_getaddrinfo(c->context->resolve, &c->resolve_query, node, service, &hints, resolve_handler, NULL, c);
fb69d709 450 if (r < 0) {
da927ba9 451 log_error_errno(r, "Failed to resolve remote host: %m");
fb69d709
LP
452 goto fail;
453 }
454
455 return 0;
456
457fail:
9e12d5bf 458 connection_release(c);
fb69d709
LP
459 return 0; /* ignore errors, continue serving */
460}
461
462static int add_connection_socket(Context *context, int fd) {
8569a776
LP
463 Connection *c;
464 int r;
465
466 assert(context);
8569a776
LP
467 assert(fd >= 0);
468
dc3b8afb 469 if (set_size(context->connections) > arg_connections_max) {
8569a776 470 log_warning("Hit connection limit, refusing connection.");
03e334a1 471 safe_close(fd);
8569a776 472 return 0;
912b54ad
DS
473 }
474
9e12d5bf
EA
475 if (context->idle_time) {
476 r = sd_event_source_set_enabled(context->idle_time, SD_EVENT_OFF);
477 if (r < 0)
478 log_warning_errno(r, "Unable to disable idle timer, continuing: %m");
479 }
480
80ce54ad 481 c = new(Connection, 1);
fb69d709
LP
482 if (!c) {
483 log_oom();
484 return 0;
485 }
8569a776 486
80ce54ad
ZJS
487 *c = (Connection) {
488 .context = context,
489 .server_fd = fd,
490 .client_fd = -1,
491 .server_to_client_buffer = {-1, -1},
492 .client_to_server_buffer = {-1, -1},
493 };
8569a776 494
de7fef4b 495 r = set_ensure_put(&context->connections, NULL, c);
e633ea1c
LP
496 if (r < 0) {
497 free(c);
fb69d709
LP
498 log_oom();
499 return 0;
8569a776 500 }
912b54ad 501
fb69d709 502 return resolve_remote(c);
40976028
DS
503}
504
505static int accept_cb(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
7b77ed8c 506 _cleanup_free_ char *peer = NULL;
8569a776
LP
507 Context *context = userdata;
508 int nfd = -1, r;
40976028 509
8569a776
LP
510 assert(s);
511 assert(fd >= 0);
40976028 512 assert(revents & EPOLLIN);
8569a776
LP
513 assert(context);
514
515 nfd = accept4(fd, NULL, NULL, SOCK_NONBLOCK|SOCK_CLOEXEC);
7b77ed8c 516 if (nfd < 0) {
4ff9bc2e 517 if (!ERRNO_IS_ACCEPT_AGAIN(errno))
56f64d95 518 log_warning_errno(errno, "Failed to accept() socket: %m");
7b77ed8c 519 } else {
7ebd758c 520 (void) getpeername_pretty(nfd, true, &peer);
8569a776 521 log_debug("New connection from %s", strna(peer));
40976028 522
fb69d709 523 r = add_connection_socket(context, nfd);
f4bd42aa 524 if (r < 0) {
76c59537
LP
525 log_warning_errno(r, "Failed to accept connection, ignoring: %m");
526 safe_close(nfd);
f4bd42aa 527 }
7b77ed8c 528 }
8569a776 529
40976028 530 r = sd_event_source_set_enabled(s, SD_EVENT_ONESHOT);
ccaa30c1
LP
531 if (r < 0)
532 return log_error_errno(r, "Error while re-enabling listener with ONESHOT: %m");
40976028 533
96c374d0 534 return 1;
912b54ad
DS
535}
536
fb69d709 537static int add_listen_socket(Context *context, int fd) {
8569a776
LP
538 sd_event_source *source;
539 int r;
540
541 assert(context);
8569a776 542 assert(fd >= 0);
912b54ad 543
8569a776 544 r = sd_is_socket(fd, 0, SOCK_STREAM, 1);
f647962d
MS
545 if (r < 0)
546 return log_error_errno(r, "Failed to determine socket type: %m");
baaa35ad
ZJS
547 if (r == 0)
548 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
549 "Passed in socket is not a stream socket.");
912b54ad 550
8569a776 551 r = fd_nonblock(fd, true);
f647962d
MS
552 if (r < 0)
553 return log_error_errno(r, "Failed to mark file descriptor non-blocking: %m");
912b54ad 554
fb69d709 555 r = sd_event_add_io(context->event, &source, fd, EPOLLIN, accept_cb, context);
f647962d
MS
556 if (r < 0)
557 return log_error_errno(r, "Failed to add event source: %m");
912b54ad 558
de7fef4b 559 r = set_ensure_put(&context->listen, NULL, source);
96c374d0 560 if (r < 0) {
8569a776 561 sd_event_source_unref(source);
ccaa30c1 562 return log_error_errno(r, "Failed to add source to set: %m");
40976028 563 }
ccaa30c1
LP
564
565 r = sd_event_source_set_exit_on_failure(source, true);
566 if (r < 0)
567 return log_error_errno(r, "Failed to enable exit-on-failure logic: %m");
40976028
DS
568
569 /* Set the watcher to oneshot in case other processes are also
570 * watching to accept(). */
8569a776 571 r = sd_event_source_set_enabled(source, SD_EVENT_ONESHOT);
f647962d
MS
572 if (r < 0)
573 return log_error_errno(r, "Failed to enable oneshot mode: %m");
912b54ad 574
8569a776 575 return 0;
912b54ad
DS
576}
577
37ec0fdd
LP
578static int help(void) {
579 _cleanup_free_ char *link = NULL;
9e12d5bf 580 _cleanup_free_ char *time_link = NULL;
37ec0fdd
LP
581 int r;
582
583 r = terminal_urlify_man("systemd-socket-proxyd", "8", &link);
9e12d5bf
EA
584 if (r < 0)
585 return log_oom();
586 r = terminal_urlify_man("systemd.time", "7", &time_link);
37ec0fdd
LP
587 if (r < 0)
588 return log_oom();
589
601185b4
ZJS
590 printf("%1$s [HOST:PORT]\n"
591 "%1$s [SOCKET]\n\n"
8569a776 592 "Bidirectionally proxy local sockets to another (possibly remote) socket.\n\n"
23d0fff7 593 " -c --connections-max= Set the maximum number of connections to be accepted\n"
9e12d5bf
EA
594 " --exit-idle-time= Exit when without a connection for this duration. See\n"
595 " the %3$s for time span format\n"
8cf030b3 596 " -h --help Show this help\n"
37ec0fdd
LP
597 " --version Show package version\n"
598 "\nSee the %2$s for details.\n"
599 , program_invocation_short_name
600 , link
9e12d5bf 601 , time_link
37ec0fdd
LP
602 );
603
604 return 0;
912b54ad
DS
605}
606
8569a776 607static int parse_argv(int argc, char *argv[]) {
912b54ad
DS
608
609 enum {
8cf030b3 610 ARG_VERSION = 0x100,
9e12d5bf 611 ARG_EXIT_IDLE,
8cf030b3 612 ARG_IGNORE_ENV
912b54ad
DS
613 };
614
615 static const struct option options[] = {
dc3b8afb 616 { "connections-max", required_argument, NULL, 'c' },
9e12d5bf 617 { "exit-idle-time", required_argument, NULL, ARG_EXIT_IDLE },
dc3b8afb
DK
618 { "help", no_argument, NULL, 'h' },
619 { "version", no_argument, NULL, ARG_VERSION },
eb9da376 620 {}
912b54ad
DS
621 };
622
dc3b8afb 623 int c, r;
912b54ad
DS
624
625 assert(argc >= 0);
626 assert(argv);
627
dc3b8afb 628 while ((c = getopt_long(argc, argv, "c:h", options, NULL)) >= 0)
912b54ad
DS
629
630 switch (c) {
631
632 case 'h':
37ec0fdd
LP
633 return help();
634
635 case ARG_VERSION:
636 return version();
912b54ad 637
dc3b8afb
DK
638 case 'c':
639 r = safe_atou(optarg, &arg_connections_max);
640 if (r < 0) {
641 log_error("Failed to parse --connections-max= argument: %s", optarg);
642 return r;
643 }
644
baaa35ad
ZJS
645 if (arg_connections_max < 1)
646 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
647 "Connection limit is too low.");
dc3b8afb
DK
648
649 break;
650
9e12d5bf
EA
651 case ARG_EXIT_IDLE:
652 r = parse_sec(optarg, &arg_exit_idle_time);
653 if (r < 0)
654 return log_error_errno(r, "Failed to parse --exit-idle-time= argument: %s", optarg);
655 break;
656
eb9da376 657 case '?':
912b54ad 658 return -EINVAL;
eb9da376
LP
659
660 default:
661 assert_not_reached("Unhandled option");
912b54ad 662 }
912b54ad 663
baaa35ad
ZJS
664 if (optind >= argc)
665 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
666 "Not enough parameters.");
912b54ad 667
baaa35ad
ZJS
668 if (argc != optind+1)
669 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
670 "Too many parameters.");
912b54ad 671
8569a776 672 arg_remote_host = argv[optind];
912b54ad
DS
673 return 1;
674}
675
a160567e
YW
676static int run(int argc, char *argv[]) {
677 _cleanup_(context_clear) Context context = {};
8569a776 678 int r, n, fd;
912b54ad
DS
679
680 log_parse_environment();
681 log_open();
682
8569a776 683 r = parse_argv(argc, argv);
912b54ad 684 if (r <= 0)
a160567e 685 return r;
912b54ad 686
fb69d709 687 r = sd_event_default(&context.event);
a160567e
YW
688 if (r < 0)
689 return log_error_errno(r, "Failed to allocate event loop: %m");
912b54ad 690
fb69d709 691 r = sd_resolve_default(&context.resolve);
a160567e
YW
692 if (r < 0)
693 return log_error_errno(r, "Failed to allocate resolver: %m");
fb69d709
LP
694
695 r = sd_resolve_attach_event(context.resolve, context.event, 0);
a160567e
YW
696 if (r < 0)
697 return log_error_errno(r, "Failed to attach resolver: %m");
fb69d709
LP
698
699 sd_event_set_watchdog(context.event, true);
cde93897 700
a160567e
YW
701 r = sd_listen_fds(1);
702 if (r < 0)
703 return log_error_errno(r, "Failed to receive sockets from parent.");
704 if (r == 0)
705 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Didn't get any sockets passed in.");
706
707 n = r;
8cf030b3
LP
708
709 for (fd = SD_LISTEN_FDS_START; fd < SD_LISTEN_FDS_START + n; fd++) {
fb69d709 710 r = add_listen_socket(&context, fd);
8569a776 711 if (r < 0)
a160567e 712 return r;
912b54ad
DS
713 }
714
fb69d709 715 r = sd_event_loop(context.event);
a160567e
YW
716 if (r < 0)
717 return log_error_errno(r, "Failed to run event loop: %m");
8569a776 718
a160567e 719 return 0;
912b54ad 720}
a160567e
YW
721
722DEFINE_MAIN_FUNCTION(run);