]> git.ipfire.org Git - thirdparty/squid.git/blame - src/wccp2.cc
Cleanup: fix most 'unused parameter' warnings
[thirdparty/squid.git] / src / wccp2.cc
CommitLineData
0b0cfcf2 1/*
bbc27441 2 * Copyright (C) 1996-2014 The Squid Software Foundation and contributors
0b0cfcf2 3 *
bbc27441
AJ
4 * Squid software is distributed under GPLv2+ license and includes
5 * contributions from numerous individuals and organizations.
6 * Please see the COPYING and CONTRIBUTORS files for details.
0b0cfcf2 7 */
bf8fe701 8
bbc27441
AJ
9/* DEBUG: section 80 WCCP Support */
10
582c2af2 11#include "squid.h"
c898ced1
AJ
12
13#if USE_WCCPv2
14
8a01b99e 15#include "cache_cf.h"
0b0cfcf2 16#include "comm.h"
f9b72e0c 17#include "comm/Connection.h"
d841c88d 18#include "comm/Loops.h"
2eceb328 19#include "ConfigParser.h"
a553a5a3 20#include "event.h"
96d89ea0 21#include "ip/Address.h"
582c2af2 22#include "md5.h"
0b0cfcf2 23#include "Parsing.h"
a553a5a3 24#include "Store.h"
bef81ea5 25#include "SwapDir.h"
0b0cfcf2 26
5fefeec1 27#if HAVE_NETDB_H
0b0cfcf2 28#include <netdb.h>
5fefeec1 29#endif
0b0cfcf2 30
31#define WCCP_PORT 2048
0b0cfcf2 32#define WCCP_RESPONSE_SIZE 12448
0b0cfcf2 33#define WCCP_BUCKETS 256
34
0b0cfcf2 35static int theWccp2Connection = -1;
36static int wccp2_connected = 0;
37
38static PF wccp2HandleUdp;
39static EVH wccp2HereIam;
40static EVH wccp2AssignBuckets;
41
42/* KDW WCCP V2 */
c1f55201 43
f53969cc
SM
44#define WCCP2_HASH_ASSIGNMENT 0x00
45#define WCCP2_MASK_ASSIGNMENT 0x01
0b0cfcf2 46
f53969cc
SM
47#define WCCP2_NONE_SECURITY_LEN 0
48#define WCCP2_MD5_SECURITY_LEN SQUID_MD5_DIGEST_LENGTH // 16
0b0cfcf2 49
c898ced1 50/* Useful defines */
f53969cc
SM
51#define WCCP2_NUMPORTS 8
52#define WCCP2_PASSWORD_LEN 8
0b0cfcf2 53
c898ced1
AJ
54/* WCCPv2 Pakcet format structures */
55/* Defined in draft-wilson-wccp-v2-12-oct-2001.txt */
0b0cfcf2 56
c898ced1
AJ
57/** \interface WCCPv2_Protocol
58 * Generic header struct
59 */
60struct wccp2_item_header_t {
61 uint16_t type;
62 uint16_t length;
63};
0b0cfcf2 64
c898ced1 65/* item type values */
f53969cc
SM
66#define WCCP2_SECURITY_INFO 0
67#define WCCP2_SERVICE_INFO 1
68#define WCCP2_ROUTER_ID_INFO 2
69#define WCCP2_WC_ID_INFO 3
70#define WCCP2_RTR_VIEW_INFO 4
71#define WCCP2_WC_VIEW_INFO 5
72#define WCCP2_REDIRECT_ASSIGNMENT 6
73#define WCCP2_QUERY_INFO 7
74#define WCCP2_CAPABILITY_INFO 8
75#define WCCP2_ALT_ASSIGNMENT 13
76#define WCCP2_ASSIGN_MAP 14
77#define WCCP2_COMMAND_EXTENSION 15
b7d249f9 78
c898ced1
AJ
79/** \interface WCCPv2_Protocol
80 * Sect 5.5 WCCP Message Header
81 */
82struct wccp2_message_header_t {
0b0cfcf2 83 uint32_t type;
84 uint16_t version;
c898ced1
AJ
85#define WCCP2_VERSION 0x200
86
0b0cfcf2 87 uint16_t length;
88};
c898ced1 89static struct wccp2_message_header_t wccp2_here_i_am_header;
0b0cfcf2 90
c898ced1
AJ
91/* message types */
92#define WCCP2_HERE_I_AM 10
93#define WCCP2_I_SEE_YOU 11
94#define WCCP2_REDIRECT_ASSIGN 12
95#define WCCP2_REMOVAL_QUERY 13
0b0cfcf2 96
c898ced1
AJ
97/** \interface WCCPv2_Protocol
98 * Sect 5.6.1 Security Info Component
99 *
100 * Basic security Header. Matches "no security" case exactly.
101 */
26ac0430 102struct wccp2_security_none_t {
0b0cfcf2 103 uint16_t security_type;
104 uint16_t security_length;
105 uint32_t security_option;
106};
107
c898ced1 108/* security options */
f53969cc
SM
109#define WCCP2_NO_SECURITY 0
110#define WCCP2_MD5_SECURITY 1
c898ced1 111
c898ced1
AJ
112/** \interface WCCPv2_Protocol
113 * Sect 5.6.1 Security Info Component
114 *
115 * Extended security section. Matches "MD5 security" type exactly.
116 * Including the security header.
117 */
26ac0430 118struct wccp2_security_md5_t {
0b0cfcf2 119 uint16_t security_type;
120 uint16_t security_length;
121 uint32_t security_option;
122 uint8_t security_implementation[WCCP2_MD5_SECURITY_LEN];
123};
124
125/* Service info struct */
126
c898ced1
AJ
127/** \interface WCCPv2_Protocol
128 * Sect 5.6.2 Service Info Component
129 */
26ac0430 130struct wccp2_service_info_t {
0b0cfcf2 131 uint16_t service_type;
132 uint16_t service_length;
133 uint8_t service;
134 uint8_t service_id;
135 uint8_t service_priority;
136 uint8_t service_protocol;
137 uint32_t service_flags;
138 uint16_t port0;
139 uint16_t port1;
140 uint16_t port2;
141 uint16_t port3;
142 uint16_t port4;
143 uint16_t port5;
144 uint16_t port6;
145 uint16_t port7;
146};
c898ced1 147/* services */
f53969cc
SM
148#define WCCP2_SERVICE_STANDARD 0
149#define WCCP2_SERVICE_DYNAMIC 1
0b0cfcf2 150
c898ced1 151/* service IDs */
f53969cc 152#define WCCP2_SERVICE_ID_HTTP 0x00
c898ced1
AJ
153
154/* service flags */
f53969cc
SM
155#define WCCP2_SERVICE_SRC_IP_HASH 0x1
156#define WCCP2_SERVICE_DST_IP_HASH 0x2
157#define WCCP2_SERVICE_SRC_PORT_HASH 0x4
158#define WCCP2_SERVICE_DST_PORT_HASH 0x8
159#define WCCP2_SERVICE_PORTS_DEFINED 0x10
160#define WCCP2_SERVICE_PORTS_SOURCE 0x20
161#define WCCP2_SERVICE_SRC_IP_ALT_HASH 0x100
162#define WCCP2_SERVICE_DST_IP_ALT_HASH 0x200
163#define WCCP2_SERVICE_SRC_PORT_ALT_HASH 0x400
164#define WCCP2_SERVICE_DST_PORT_ALT_HASH 0x800
c898ced1 165
c898ced1
AJ
166/* TODO the following structures need to be re-defined for correct full operation.
167 wccp2_cache_identity_element needs to be merged as a sub-struct of
168 wccp2_identity_info_t (identity_type); which frees up the identifty info
169 structures so mask_assigment_data_element can become variable length
170 and cope with multiple fail-over caches hanging off one router.
171 */
172
173/** \interface WCCPv2_Protocol
174 * Sect 5.7.2 Web-Cache Identity Element
175 */
26ac0430 176struct wccp2_cache_identity_info_t {
cc192b50 177 struct in_addr addr;
0b0cfcf2 178 uint16_t hash_revision;
85442144 179 uint16_t bits;
c898ced1
AJ
180//#define WCCP2_HASH_ASSIGNMENT_DATA 0x0
181
af6a12ee 182 /* 5.7.2 Hash Assignment Data Element */
c898ced1 183 char buckets[32]; /* Draft indicates 8x 32-bit buckets but it's just a mask so doesn't matter how we define. */
0b0cfcf2 184 uint16_t weight;
185 uint16_t status;
186};
187
c898ced1
AJ
188/** \interface WCCPv2_Protocol
189 * Sect 5.6.4 Web-Cache Identity Info Component
190 */
26ac0430 191struct wccp2_identity_info_t {
0b0cfcf2 192 uint16_t cache_identity_type;
193 uint16_t cache_identity_length;
194
195 struct wccp2_cache_identity_info_t cache_identity;
196};
197
198static struct wccp2_identity_info_t wccp2_identity_info;
199
c898ced1
AJ
200/** \interface WCCPv2_Protocol
201 * Sect 5.7.7 Mask Element
202 */
203struct wccp2_mask_element_t {
b7d249f9 204 uint32_t source_ip_mask;
205 uint32_t dest_ip_mask;
206 uint16_t source_port_mask;
207 uint16_t dest_port_mask;
c898ced1 208 uint32_t number_values;
b7d249f9 209};
210
c898ced1
AJ
211/** \interface WCCPv2_Protocol
212 * Sect 5.7.2 Web-Cache Identity Element
213 */
214struct wccp2_cache_mask_identity_info_t {
215 struct in_addr addr;
216 uint16_t hash_revision;
217 uint16_t bits;
85442144 218#define WCCP2_MASK_ASSIGNMENT_DATA (0x2)
c898ced1 219
af6a12ee
AJ
220 /* Sect 5.7.2 Mask Assignment Data Element
221 *
222 * NP: draft specifies a variable-length set of keys here.
223 * the following fields only matche the special case Squid sends outbound (single-cache).
224 */
225 uint32_t mask_element_count;
c898ced1 226
af6a12ee
AJ
227 /* Sect 5.7.6 Mask/Value Set Element */
228 /* special case: single mask element. no values. */
c898ced1
AJ
229 struct wccp2_mask_element_t mask;
230
af6a12ee 231 /* Sect 5.7.2 Mask Assignment Data Element */
c898ced1
AJ
232 uint16_t weight;
233 uint16_t status;
234};
235
236/** \interface WCCPv2_Protocol
237 * Sect 5.6.4 Web-Cache Identity Info Component
238 */
26ac0430 239struct wccp2_mask_identity_info_t {
b7d249f9 240 uint16_t cache_identity_type;
241 uint16_t cache_identity_length;
242
243 struct wccp2_cache_mask_identity_info_t cache_identity;
244};
245
246static struct wccp2_mask_identity_info_t wccp2_mask_identity_info;
247
c898ced1
AJ
248/** \interface WCCPv2_Protocol
249 * Sect 5.6.5 Router View Info Component
250 * Sect 5.6.6 Web Cache View Info Component
251 *
252 * first three fields. (shared by both view components)
253 */
26ac0430 254struct wccp2_cache_view_header_t {
0b0cfcf2 255 uint16_t cache_view_type;
256 uint16_t cache_view_length;
257 uint32_t cache_view_version;
258};
259
260static struct wccp2_cache_view_header_t wccp2_cache_view_header;
261
e041b6d2 262/// \interface WCCPv2_Protocol
c898ced1 263/* NP: special-case 5.6.5 or 5.6.6 * View Info when no routers or caches are advertised? */
26ac0430 264struct wccp2_cache_view_info_t {
0b0cfcf2 265 uint32_t num_routers;
266 uint32_t num_caches;
267};
268
269static struct wccp2_cache_view_info_t wccp2_cache_view_info;
270
c898ced1
AJ
271/** \interface WCCPv2_Protocol
272 * Sect 5.7.1 Router ID Element
273 */
26ac0430 274struct wccp2_router_id_element_t {
cc192b50 275 struct in_addr router_address;
0b0cfcf2 276 uint32_t received_id;
277};
278
279static struct wccp2_router_id_element_t wccp2_router_id_element;
280
bd8d3feb 281/** \interface WCCPv2_Protocol
c898ced1
AJ
282 * Sect 5.6.9 Capabilities Info Component
283 */
26ac0430 284struct wccp2_capability_info_header_t {
0b0cfcf2 285 uint16_t capability_info_type;
286 uint16_t capability_info_length;
c898ced1 287 /* dynamic length capabilities list */
0b0cfcf2 288};
289
290static struct wccp2_capability_info_header_t wccp2_capability_info_header;
291
c898ced1
AJ
292/** \interface WCCPv2_Protocol
293 * 5.7.5 Capability Element
294 */
26ac0430 295struct wccp2_capability_element_t {
0b0cfcf2 296 uint16_t capability_type;
297 uint16_t capability_length;
298 uint32_t capability_value;
299};
0b0cfcf2 300static struct wccp2_capability_element_t wccp2_capability_element;
301
c898ced1 302/* capability types */
f53969cc
SM
303#define WCCP2_CAPABILITY_FORWARDING_METHOD 0x01
304#define WCCP2_CAPABILITY_ASSIGNMENT_METHOD 0x02
305#define WCCP2_CAPABILITY_RETURN_METHOD 0x03
43f3d687
AJ
306// 0x04 ?? - advertised by a 4507 (ios v15.1) Cisco switch
307// 0x05 ?? - advertised by a 4507 (ios v15.1) Cisco switch
b7d249f9 308
c898ced1 309/* capability values */
f53969cc
SM
310#define WCCP2_METHOD_GRE 0x00000001
311#define WCCP2_METHOD_L2 0x00000002
af6a12ee 312/* when type=WCCP2_CAPABILITY_FORWARDING_METHOD */
f53969cc
SM
313#define WCCP2_FORWARDING_METHOD_GRE WCCP2_METHOD_GRE
314#define WCCP2_FORWARDING_METHOD_L2 WCCP2_METHOD_L2
af6a12ee 315/* when type=WCCP2_CAPABILITY_ASSIGNMENT_METHOD */
f53969cc
SM
316#define WCCP2_ASSIGNMENT_METHOD_HASH 0x00000001
317#define WCCP2_ASSIGNMENT_METHOD_MASK 0x00000002
af6a12ee 318/* when type=WCCP2_CAPABILITY_RETURN_METHOD */
f53969cc
SM
319#define WCCP2_PACKET_RETURN_METHOD_GRE WCCP2_METHOD_GRE
320#define WCCP2_PACKET_RETURN_METHOD_L2 WCCP2_METHOD_L2
b7d249f9 321
c898ced1
AJ
322/** \interface WCCPv2_Protocol
323 * 5.7.8 Value Element
324 */
26ac0430 325struct wccp2_value_element_t {
b7d249f9 326 uint32_t source_ip_value;
327 uint32_t dest_ip_value;
328 uint16_t source_port_value;
329 uint16_t dest_port_value;
330
cc192b50 331 struct in_addr cache_ip;
b7d249f9 332};
0b0cfcf2 333
334/* RECEIVED PACKET STRUCTURE */
335
c898ced1
AJ
336/** \interface WCCPv2_Protocol
337 * 5.2 'I See You' Message
338 */
26ac0430 339struct wccp2_i_see_you_t {
0b0cfcf2 340 uint32_t type;
341 uint16_t version;
342 uint16_t length;
343 char data[WCCP_RESPONSE_SIZE];
344};
345
346static struct wccp2_i_see_you_t wccp2_i_see_you;
347
c898ced1
AJ
348/** \interface WCCPv2_Protocol
349 * 5.7.4 Router Assignment Element
350 */
26ac0430 351struct wccp2_router_assign_element_t {
cc192b50 352 struct in_addr router_address;
0b0cfcf2 353 uint32_t received_id;
354 uint32_t change_number;
355};
356
0b0cfcf2 357/* Router identity struct */
358
c898ced1
AJ
359/** \interface WCCPv2_Protocol
360 * 5.6.3 Router Identity Info Component (partial)
361 */
26ac0430 362struct router_identity_info_t {
0b0cfcf2 363
364 struct wccp2_item_header_t header;
365
366 struct wccp2_router_id_element_t router_id_element;
367
2adffc6f 368 struct in_addr router_address;
0b0cfcf2 369 uint32_t number_caches;
c898ced1 370 /* dynamic list of cache IP addresses */
0b0cfcf2 371};
372
b7d249f9 373/* The received packet for a mask assignment is unusual */
374
c898ced1
AJ
375/** \interface WCCPv2_Protocol
376 * Sect 5.7.7 Mask Element ???
377 * see code below. apparently the supposed IP address at position num1 can be equal to 3.
378 */
26ac0430 379struct cache_mask_info_t {
cc192b50 380 struct in_addr addr;
b7d249f9 381 uint32_t num1;
382 uint32_t num2;
383 uint32_t num3;
384};
385
c898ced1
AJ
386/** \interface WCCPv2_Protocol
387 * 5.7.3 Assignment Key Element
388 */
26ac0430 389struct assignment_key_t {
cc192b50 390 struct in_addr master_ip;
0b0cfcf2 391 uint32_t master_number;
392};
393
c898ced1
AJ
394/** \interface WCCPv2_Protocol
395 * 5.6.5 Router View Info Component (first three fields)
396 */
26ac0430 397struct router_view_t {
0b0cfcf2 398 struct wccp2_item_header_t header;
399 uint32_t change_number;
0b0cfcf2 400 struct assignment_key_t assignment_key;
c898ced1 401 /* dynamic lists of routers and caches elided */
0b0cfcf2 402};
403
0b0cfcf2 404/* Lists used to keep track of caches, routers and services */
405
e041b6d2 406/// \interface WCCPv2_Protocol
26ac0430 407struct wccp2_cache_list_t {
0b0cfcf2 408
cc192b50 409 struct in_addr cache_ip;
0b0cfcf2 410
f16fbc82 411 int weight;
412
0b0cfcf2 413 struct wccp2_cache_list_t *next;
414};
415
e041b6d2 416/// \interface WCCPv2_Protocol
26ac0430 417struct wccp2_router_list_t {
0b0cfcf2 418
419 struct wccp2_router_id_element_t *info;
420
cc192b50 421 struct in_addr local_ip;
0b0cfcf2 422
cc192b50 423 struct in_addr router_sendto_address;
0b0cfcf2 424 uint32_t member_change;
425 uint32_t num_caches;
426
427 struct wccp2_cache_list_t cache_list_head;
428
429 struct wccp2_router_list_t *next;
430};
431
432static int wccp2_numrouters;
433
e041b6d2 434/// \interface WCCPv2_Protocol
26ac0430 435struct wccp2_service_list_t {
0b0cfcf2 436
437 struct wccp2_service_info_t info;
438 uint32_t num_routers;
439
440 struct wccp2_router_list_t router_list_head;
441 int lowest_ip;
442 uint32_t change_num;
443
b7d249f9 444 char *wccp2_identity_info_ptr;
0b0cfcf2 445
446 struct wccp2_security_md5_t *security_info;
447
448 struct wccp2_service_info_t *service_info;
449 char wccp_packet[WCCP_RESPONSE_SIZE];
450 size_t wccp_packet_size;
451
452 struct wccp2_service_list_t *next;
f53969cc 453 char wccp_password[WCCP2_PASSWORD_LEN + 1]; /* hold the trailing C-string NUL */
0b0cfcf2 454 uint32_t wccp2_security_type;
455};
456
457static struct wccp2_service_list_t *wccp2_service_list_head = NULL;
458
26ac0430 459int empty_portlist[WCCP2_NUMPORTS] = {0, 0, 0, 0, 0, 0, 0, 0};
0b0cfcf2 460
c898ced1
AJ
461/* END WCCP V2 PROTOCL TYPES DEFINITION */
462
0b0cfcf2 463void wccp2_add_service_list(int service, int service_id, int service_priority,
464 int service_proto, int service_flags, int ports[], int security_type, char *password);
264096e2 465static void wccp2SortCacheList(struct wccp2_cache_list_t *head);
0b0cfcf2 466
467/*
468 * The functions used during startup:
469 * wccp2Init
470 * wccp2ConnectionOpen
471 * wccp2ConnectionClose
472 */
473
474static void
475wccp2InitServices(void)
476{
bf8fe701 477 debugs(80, 5, "wccp2InitServices: called");
0b0cfcf2 478}
479
480static void
0b0cfcf2 481wccp2_update_service(struct wccp2_service_list_t *srv, int service,
482 int service_id, int service_priority, int service_proto, int service_flags,
483 int ports[])
484{
485 /* XXX check what needs to be wrapped in htons()! */
486 srv->info.service = service;
487 srv->info.service_id = service_id;
488 srv->info.service_priority = service_priority;
489 srv->info.service_protocol = service_proto;
490 srv->info.service_flags = htonl(service_flags);
491 srv->info.port0 = htons(ports[0]);
492 srv->info.port1 = htons(ports[1]);
493 srv->info.port2 = htons(ports[2]);
494 srv->info.port3 = htons(ports[3]);
495 srv->info.port4 = htons(ports[4]);
496 srv->info.port5 = htons(ports[5]);
497 srv->info.port6 = htons(ports[6]);
498 srv->info.port7 = htons(ports[7]);
499}
500
501void
502wccp2_add_service_list(int service, int service_id, int service_priority,
503 int service_proto, int service_flags, int ports[], int security_type,
504 char *password)
505{
506
507 struct wccp2_service_list_t *wccp2_service_list_ptr;
508
509 wccp2_service_list_ptr = (wccp2_service_list_t *) xcalloc(1, sizeof(struct wccp2_service_list_t));
510
bf8fe701 511 debugs(80, 5, "wccp2_add_service_list: added service id " << service_id);
0b0cfcf2 512
513 /* XXX check what needs to be wrapped in htons()! */
514 wccp2_service_list_ptr->info.service_type = htons(WCCP2_SERVICE_INFO);
515
516 wccp2_service_list_ptr->info.service_length = htons(sizeof(struct wccp2_service_info_t) - 4);
517 wccp2_service_list_ptr->change_num = 0;
518 wccp2_update_service(wccp2_service_list_ptr, service, service_id,
519 service_priority, service_proto, service_flags, ports);
520 wccp2_service_list_ptr->wccp2_security_type = security_type;
a302ad3c 521 memset(wccp2_service_list_ptr->wccp_password, 0, WCCP2_PASSWORD_LEN + 1);
0b0cfcf2 522 strncpy(wccp2_service_list_ptr->wccp_password, password, WCCP2_PASSWORD_LEN);
523 /* add to linked list - XXX this should use the Squid dlink* routines! */
524 wccp2_service_list_ptr->next = wccp2_service_list_head;
525 wccp2_service_list_head = wccp2_service_list_ptr;
526}
527
528static struct wccp2_service_list_t *
e1381638 529wccp2_get_service_by_id(int service, int service_id) {
0b0cfcf2 530
531 struct wccp2_service_list_t *p;
532
533 p = wccp2_service_list_head;
534
26ac0430 535 while (p != NULL) {
0b0cfcf2 536 if (p->info.service == service && p->info.service_id == service_id) {
537 return p;
538 }
539
540 p = p->next;
541 }
542
543 return NULL;
544}
545
546/*
547 * Update the md5 security header, if possible
548 *
549 * Returns: 1 if we set it, 0 if not (eg, no security section, or non-md5)
550 */
551static char
552wccp2_update_md5_security(char *password, char *ptr, char *packet, int len)
553{
09cd7204 554 uint8_t md5Digest[SQUID_MD5_DIGEST_LENGTH];
0b0cfcf2 555 char pwd[WCCP2_PASSWORD_LEN];
c3031d67 556 SquidMD5_CTX M;
0b0cfcf2 557
558 struct wccp2_security_md5_t *ws;
559
bf8fe701 560 debugs(80, 5, "wccp2_update_md5_security: called");
0b0cfcf2 561
562 /* The password field, for the MD5 hash, needs to be 8 bytes and NUL padded. */
a302ad3c 563 memset(pwd, 0, sizeof(pwd));
0b0cfcf2 564 strncpy(pwd, password, sizeof(pwd));
85494816 565 pwd[sizeof(pwd) - 1] = '\0';
0b0cfcf2 566
567 ws = (struct wccp2_security_md5_t *) ptr;
568 assert(ntohs(ws->security_type) == WCCP2_SECURITY_INFO);
569 /* Its the security part */
570
571 if (ntohl(ws->security_option) != WCCP2_MD5_SECURITY) {
bf8fe701 572 debugs(80, 5, "wccp2_update_md5_security: this service ain't md5'ing, abort");
0b0cfcf2 573 return 0;
574 }
575
576 /* And now its the MD5 section! */
577 /* According to the draft, the MD5 security hash is the combination of
578 * the 8-octet password (padded w/ NUL bytes) and the entire WCCP packet,
579 * including the WCCP message header. The WCCP security implementation
580 * area should be zero'ed before calculating the MD5 hash.
581 */
09cd7204 582 /* XXX eventually we should be able to kill md5Digest and blit it directly in */
a302ad3c 583 memset(ws->security_implementation, 0, sizeof(ws->security_implementation));
0b0cfcf2 584
c3031d67 585 SquidMD5Init(&M);
0b0cfcf2 586
0a84e4fb 587 SquidMD5Update(&M, pwd, sizeof(pwd));
0b0cfcf2 588
c3031d67 589 SquidMD5Update(&M, packet, len);
0b0cfcf2 590
09cd7204 591 SquidMD5Final(md5Digest, &M);
0b0cfcf2 592
09cd7204 593 memcpy(ws->security_implementation, md5Digest, sizeof(md5Digest));
0b0cfcf2 594
595 /* Finished! */
596 return 1;
597}
598
0b0cfcf2 599/*
600 * Check the given WCCP2 packet against the given password.
601 */
602static char
603
604wccp2_check_security(struct wccp2_service_list_t *srv, char *security, char *packet, int len)
605{
606
607 struct wccp2_security_md5_t *ws = (struct wccp2_security_md5_t *) security;
09cd7204 608 uint8_t md5Digest[SQUID_MD5_DIGEST_LENGTH], md5_challenge[SQUID_MD5_DIGEST_LENGTH];
0b0cfcf2 609 char pwd[WCCP2_PASSWORD_LEN];
c3031d67 610 SquidMD5_CTX M;
0b0cfcf2 611
612 /* Make sure the security type matches what we expect */
613
26ac0430 614 if (ntohl(ws->security_option) != srv->wccp2_security_type) {
e0236918 615 debugs(80, DBG_IMPORTANT, "wccp2_check_security: received packet has the wrong security option");
0b0cfcf2 616 return 0;
617 }
618
26ac0430 619 if (srv->wccp2_security_type == WCCP2_NO_SECURITY) {
0b0cfcf2 620 return 1;
621 }
622
26ac0430 623 if (srv->wccp2_security_type != WCCP2_MD5_SECURITY) {
e0236918 624 debugs(80, DBG_IMPORTANT, "wccp2_check_security: invalid security option");
0b0cfcf2 625 return 0;
626 }
627
628 /* If execution makes it here then we have an MD5 security */
629
630 /* The password field, for the MD5 hash, needs to be 8 bytes and NUL padded. */
a302ad3c 631 memset(pwd, 0, sizeof(pwd));
0b0cfcf2 632 strncpy(pwd, srv->wccp_password, sizeof(pwd));
85494816 633 pwd[sizeof(pwd) - 1] = '\0';
0b0cfcf2 634
635 /* Take a copy of the challenge: we need to NUL it before comparing */
09cd7204 636 memcpy(md5_challenge, ws->security_implementation, sizeof(md5_challenge));
0b0cfcf2 637
a302ad3c 638 memset(ws->security_implementation, 0, sizeof(ws->security_implementation));
0b0cfcf2 639
c3031d67 640 SquidMD5Init(&M);
0b0cfcf2 641
0a84e4fb 642 SquidMD5Update(&M, pwd, sizeof(pwd));
0b0cfcf2 643
c3031d67 644 SquidMD5Update(&M, packet, len);
0b0cfcf2 645
09cd7204 646 SquidMD5Final(md5Digest, &M);
0b0cfcf2 647
09cd7204 648 return (memcmp(md5Digest, md5_challenge, SQUID_MD5_DIGEST_LENGTH) == 0);
0b0cfcf2 649}
650
0b0cfcf2 651void
652wccp2Init(void)
653{
b7ac5457 654 Ip::Address_list *s;
0b0cfcf2 655 char *ptr;
b7d249f9 656 uint32_t service_flags;
0b0cfcf2 657
658 struct wccp2_service_list_t *service_list_ptr;
659
660 struct wccp2_router_list_t *router_list_ptr;
661
bf8fe701 662 debugs(80, 5, "wccp2Init: Called");
0b0cfcf2 663
664 if (wccp2_connected == 1)
665 return;
666
667 wccp2_numrouters = 0;
668
669 /* Calculate the number of routers configured in the config file */
670 for (s = Config.Wccp2.router; s; s = s->next) {
4dd643d5 671 if (!s->s.isAnyAddr()) {
0b0cfcf2 672 /* Increment the counter */
14942edd 673 ++wccp2_numrouters;
0b0cfcf2 674 }
675 }
676
677 if (wccp2_numrouters == 0) {
678 return;
679 }
680
883dcc9c
AJ
681 struct wccp2_security_md5_t wccp2_security_md5;
682 memset(&wccp2_security_md5, 0, sizeof(wccp2_security_md5));
683
0b0cfcf2 684 /* Initialise the list of services */
685 wccp2InitServices();
686
687 service_list_ptr = wccp2_service_list_head;
688
689 while (service_list_ptr != NULL) {
690 /* Set up our list pointers */
691 router_list_ptr = &service_list_ptr->router_list_head;
692
693 /* start the wccp header */
694 wccp2_here_i_am_header.type = htonl(WCCP2_HERE_I_AM);
695 wccp2_here_i_am_header.version = htons(WCCP2_VERSION);
696 wccp2_here_i_am_header.length = 0;
697 ptr = service_list_ptr->wccp_packet + sizeof(wccp2_here_i_am_header);
698
699 /* add the security section */
700 /* XXX this is ugly */
701
702 if (service_list_ptr->wccp2_security_type == WCCP2_MD5_SECURITY) {
703 wccp2_security_md5.security_option = htonl(WCCP2_MD5_SECURITY);
704
705 wccp2_security_md5.security_length = htons(sizeof(struct wccp2_security_md5_t) - 4);
706 } else if (service_list_ptr->wccp2_security_type == WCCP2_NO_SECURITY) {
707 wccp2_security_md5.security_option = htonl(WCCP2_NO_SECURITY);
708 /* XXX I hate magic length numbers! */
709 wccp2_security_md5.security_length = htons(4);
710 } else {
711 fatalf("Bad WCCP2 security type\n");
712 }
713
714 wccp2_here_i_am_header.length += ntohs(wccp2_security_md5.security_length) + 4;
715 assert(wccp2_here_i_am_header.length <= WCCP_RESPONSE_SIZE);
716 wccp2_security_md5.security_type = htons(WCCP2_SECURITY_INFO);
717
718 service_list_ptr->security_info = (struct wccp2_security_md5_t *) ptr;
719
720 if (service_list_ptr->wccp2_security_type == WCCP2_MD5_SECURITY) {
41d00cd3 721 memcpy(ptr, &wccp2_security_md5, sizeof(struct wccp2_security_md5_t));
0b0cfcf2 722 ptr += sizeof(struct wccp2_security_md5_t);
723 } else {
724 /* assume NONE, and XXX I hate magic length numbers */
41d00cd3 725 memcpy(ptr, &wccp2_security_md5, 8);
0b0cfcf2 726 ptr += 8;
727 }
728
729 /* Add the service info section */
730
731 wccp2_here_i_am_header.length += sizeof(struct wccp2_service_info_t);
732
733 assert(wccp2_here_i_am_header.length <= WCCP_RESPONSE_SIZE);
734
41d00cd3 735 memcpy(ptr, &service_list_ptr->info, sizeof(struct wccp2_service_info_t));
0b0cfcf2 736
737 service_list_ptr->service_info = (struct wccp2_service_info_t *) ptr;
738
739 ptr += sizeof(struct wccp2_service_info_t);
740
741 /* Add the cache identity section */
742
b7d249f9 743 switch (Config.Wccp2.assignment_method) {
0b0cfcf2 744
b7d249f9 745 case WCCP2_ASSIGNMENT_METHOD_HASH:
0b0cfcf2 746
b7d249f9 747 wccp2_here_i_am_header.length += sizeof(struct wccp2_identity_info_t);
748 assert(wccp2_here_i_am_header.length <= WCCP_RESPONSE_SIZE);
749 wccp2_identity_info.cache_identity_type = htons(WCCP2_WC_ID_INFO);
750 wccp2_identity_info.cache_identity_length = htons(sizeof(wccp2_identity_info.cache_identity));
cc192b50 751 memset(&wccp2_identity_info.cache_identity.addr, '\0', sizeof(struct in_addr));
b7d249f9 752 memset(&wccp2_identity_info.cache_identity.hash_revision, '\0', sizeof(wccp2_identity_info.cache_identity.hash_revision));
753 memset(&wccp2_identity_info.cache_identity.bits, '\0', sizeof(wccp2_identity_info.cache_identity.bits));
754 memset(&wccp2_identity_info.cache_identity.buckets, '\0', sizeof(wccp2_identity_info.cache_identity.buckets));
755 wccp2_identity_info.cache_identity.weight = htons(Config.Wccp2.weight);
756 memset(&wccp2_identity_info.cache_identity.status, '\0', sizeof(wccp2_identity_info.cache_identity.status));
0b0cfcf2 757
41d00cd3 758 memcpy(ptr, &wccp2_identity_info, sizeof(struct wccp2_identity_info_t));
b7d249f9 759 service_list_ptr->wccp2_identity_info_ptr = ptr;
0b0cfcf2 760
b7d249f9 761 ptr += sizeof(struct wccp2_identity_info_t);
762 break;
0b0cfcf2 763
b7d249f9 764 case WCCP2_ASSIGNMENT_METHOD_MASK:
765
766 wccp2_here_i_am_header.length += sizeof(struct wccp2_mask_identity_info_t);
767 assert(wccp2_here_i_am_header.length <= WCCP_RESPONSE_SIZE);
768 wccp2_mask_identity_info.cache_identity_type = htons(WCCP2_WC_ID_INFO);
769 wccp2_mask_identity_info.cache_identity_length = htons(sizeof(wccp2_mask_identity_info.cache_identity));
cc192b50 770 memset(&wccp2_mask_identity_info.cache_identity.addr, '\0', sizeof(struct in_addr));
85442144 771 wccp2_mask_identity_info.cache_identity.bits = htons(WCCP2_MASK_ASSIGNMENT_DATA);
c898ced1 772 wccp2_mask_identity_info.cache_identity.mask_element_count = htonl(1);
b7d249f9 773 service_flags = ntohl(service_list_ptr->service_info->service_flags);
774
c898ced1
AJ
775 memset(&wccp2_mask_identity_info.cache_identity.mask, 0, sizeof(struct wccp2_mask_element_t));
776
b7d249f9 777 if ((service_flags & WCCP2_SERVICE_SRC_IP_HASH) || (service_flags & WCCP2_SERVICE_SRC_IP_ALT_HASH)) {
c898ced1 778 wccp2_mask_identity_info.cache_identity.mask.source_ip_mask = htonl(0x00001741);
b7d249f9 779 } else if ((service_list_ptr->info.service == WCCP2_SERVICE_STANDARD) || (service_flags & WCCP2_SERVICE_DST_IP_HASH) || (service_flags & WCCP2_SERVICE_DST_IP_ALT_HASH)) {
c898ced1 780 wccp2_mask_identity_info.cache_identity.mask.dest_ip_mask = htonl(0x00001741);
b7d249f9 781 } else if ((service_flags & WCCP2_SERVICE_SRC_PORT_HASH) || (service_flags & WCCP2_SERVICE_SRC_PORT_ALT_HASH)) {
c898ced1 782 wccp2_mask_identity_info.cache_identity.mask.source_port_mask = htons(0x1741);
b7d249f9 783 } else if ((service_flags & WCCP2_SERVICE_DST_PORT_HASH) || (service_flags & WCCP2_SERVICE_DST_PORT_ALT_HASH)) {
c898ced1 784 wccp2_mask_identity_info.cache_identity.mask.dest_port_mask = htons(0x1741);
b7d249f9 785 } else {
786 fatalf("Unknown service hash method\n");
787 }
0b0cfcf2 788
c898ced1
AJ
789 wccp2_mask_identity_info.cache_identity.weight = 0;
790 wccp2_mask_identity_info.cache_identity.status = 0;
0b0cfcf2 791
41d00cd3 792 memcpy(ptr, &wccp2_mask_identity_info, sizeof(struct wccp2_mask_identity_info_t));
b7d249f9 793 service_list_ptr->wccp2_identity_info_ptr = ptr;
0b0cfcf2 794
b7d249f9 795 ptr += sizeof(struct wccp2_mask_identity_info_t);
796 break;
0b0cfcf2 797
b7d249f9 798 default:
799 fatalf("Unknown Wccp2 assignment method\n");
800 }
0b0cfcf2 801
802 /* Add the cache view section */
803 wccp2_here_i_am_header.length += sizeof(wccp2_cache_view_header);
804
805 assert(wccp2_here_i_am_header.length <= WCCP_RESPONSE_SIZE);
806
807 wccp2_cache_view_header.cache_view_type = htons(WCCP2_WC_VIEW_INFO);
808
809 wccp2_cache_view_header.cache_view_length = htons(sizeof(wccp2_cache_view_header) - 4 +
810 sizeof(wccp2_cache_view_info) + (wccp2_numrouters * sizeof(wccp2_router_id_element)));
811
812 wccp2_cache_view_header.cache_view_version = htonl(1);
813
41d00cd3 814 memcpy(ptr, &wccp2_cache_view_header, sizeof(wccp2_cache_view_header));
0b0cfcf2 815
816 ptr += sizeof(wccp2_cache_view_header);
817
818 /* Add the number of routers to the packet */
819 wccp2_here_i_am_header.length += sizeof(service_list_ptr->num_routers);
820
821 assert(wccp2_here_i_am_header.length <= WCCP_RESPONSE_SIZE);
822
823 service_list_ptr->num_routers = htonl(wccp2_numrouters);
824
41d00cd3 825 memcpy(ptr, &service_list_ptr->num_routers, sizeof(service_list_ptr->num_routers));
0b0cfcf2 826
827 ptr += sizeof(service_list_ptr->num_routers);
828
829 /* Add each router. Keep this functionality here to make sure the received_id can be updated in the packet */
830 for (s = Config.Wccp2.router; s; s = s->next) {
4dd643d5 831 if (!s->s.isAnyAddr()) {
0b0cfcf2 832
833 wccp2_here_i_am_header.length += sizeof(struct wccp2_router_id_element_t);
834 assert(wccp2_here_i_am_header.length <= WCCP_RESPONSE_SIZE);
835
836 /* Add a pointer to the router list for this router */
837
838 router_list_ptr->info = (struct wccp2_router_id_element_t *) ptr;
4dd643d5 839 s->s.getInAddr(router_list_ptr->info->router_address);
0b0cfcf2 840 router_list_ptr->info->received_id = htonl(0);
4dd643d5 841 s->s.getInAddr(router_list_ptr->router_sendto_address);
0b0cfcf2 842 router_list_ptr->member_change = htonl(0);
843
844 /* Build the next struct */
845
846 router_list_ptr->next = (wccp2_router_list_t*) xcalloc(1, sizeof(struct wccp2_router_list_t));
847
848 /* update the pointer */
849 router_list_ptr = router_list_ptr->next;
850 router_list_ptr->next = NULL;
851
852 /* no need to copy memory - we've just set the values directly in the packet above */
853
854 ptr += sizeof(struct wccp2_router_id_element_t);
855 }
856 }
857
858 /* Add the number of caches (0) */
859 wccp2_here_i_am_header.length += sizeof(wccp2_cache_view_info.num_caches);
860
861 assert(wccp2_here_i_am_header.length <= WCCP_RESPONSE_SIZE);
862
863 wccp2_cache_view_info.num_caches = htonl(0);
864
41d00cd3 865 memcpy(ptr, &wccp2_cache_view_info.num_caches, sizeof(wccp2_cache_view_info.num_caches));
0b0cfcf2 866
867 ptr += sizeof(wccp2_cache_view_info.num_caches);
868
869 /* Add the extra capability header */
870 wccp2_here_i_am_header.length += sizeof(wccp2_capability_info_header);
871
872 assert(wccp2_here_i_am_header.length <= WCCP_RESPONSE_SIZE);
873
874 wccp2_capability_info_header.capability_info_type = htons(WCCP2_CAPABILITY_INFO);
875
c1f55201 876 wccp2_capability_info_header.capability_info_length = htons(3 * sizeof(wccp2_capability_element));
0b0cfcf2 877
41d00cd3 878 memcpy(ptr, &wccp2_capability_info_header, sizeof(wccp2_capability_info_header));
0b0cfcf2 879
880 ptr += sizeof(wccp2_capability_info_header);
881
882 /* Add the forwarding method */
883 wccp2_here_i_am_header.length += sizeof(wccp2_capability_element);
884
885 assert(wccp2_here_i_am_header.length <= WCCP_RESPONSE_SIZE);
886
887 wccp2_capability_element.capability_type = htons(WCCP2_CAPABILITY_FORWARDING_METHOD);
888
889 wccp2_capability_element.capability_length = htons(sizeof(wccp2_capability_element.capability_value));
890
891 wccp2_capability_element.capability_value = htonl(Config.Wccp2.forwarding_method);
892
41d00cd3 893 memcpy(ptr, &wccp2_capability_element, sizeof(wccp2_capability_element));
0b0cfcf2 894
895 ptr += sizeof(wccp2_capability_element);
896
c1f55201 897 /* Add the assignment method */
898 wccp2_here_i_am_header.length += sizeof(wccp2_capability_element);
899
900 assert(wccp2_here_i_am_header.length <= WCCP_RESPONSE_SIZE);
901
902 wccp2_capability_element.capability_type = htons(WCCP2_CAPABILITY_ASSIGNMENT_METHOD);
903
904 wccp2_capability_element.capability_length = htons(sizeof(wccp2_capability_element.capability_value));
905
b7d249f9 906 wccp2_capability_element.capability_value = htonl(Config.Wccp2.assignment_method);
c1f55201 907
41d00cd3 908 memcpy(ptr, &wccp2_capability_element, sizeof(wccp2_capability_element));
c1f55201 909
910 ptr += sizeof(wccp2_capability_element);
911
0b0cfcf2 912 /* Add the return method */
913 wccp2_here_i_am_header.length += sizeof(wccp2_capability_element);
914
915 assert(wccp2_here_i_am_header.length <= WCCP_RESPONSE_SIZE);
916
917 wccp2_capability_element.capability_type = htons(WCCP2_CAPABILITY_RETURN_METHOD);
918
919 wccp2_capability_element.capability_length = htons(sizeof(wccp2_capability_element.capability_value));
920
921 wccp2_capability_element.capability_value = htonl(Config.Wccp2.return_method);
922
41d00cd3 923 memcpy(ptr, &wccp2_capability_element, sizeof(wccp2_capability_element));
0b0cfcf2 924
925 ptr += sizeof(wccp2_capability_element);
926
927 /* Finally, fix the total length to network order, and copy to the appropriate memory blob */
928 wccp2_here_i_am_header.length = htons(wccp2_here_i_am_header.length);
929
930 memcpy(&service_list_ptr->wccp_packet, &wccp2_here_i_am_header, sizeof(wccp2_here_i_am_header));
931
932 service_list_ptr->wccp_packet_size = ntohs(wccp2_here_i_am_header.length) + sizeof(wccp2_here_i_am_header);
933
934 /* Add the event if everything initialised correctly */
51676485 935 debugs(80,3,"wccp2Init: scheduled 'HERE_I_AM' message to " << wccp2_numrouters << "routers.");
0b0cfcf2 936 if (wccp2_numrouters) {
937 if (!eventFind(wccp2HereIam, NULL)) {
938 eventAdd("wccp2HereIam", wccp2HereIam, NULL, 1, 1);
af6a12ee 939 } else
51676485 940 debugs(80,3,"wccp2Init: skip duplicate 'HERE_I_AM'.");
0b0cfcf2 941 }
942
943 service_list_ptr = service_list_ptr->next;
944 }
945}
946
947void
948wccp2ConnectionOpen(void)
949{
c1f55201 950 struct sockaddr_in router, local, null;
0b0cfcf2 951 socklen_t local_len, router_len;
952
953 struct wccp2_service_list_t *service_list_ptr;
954
955 struct wccp2_router_list_t *router_list_ptr;
956
bf8fe701 957 debugs(80, 5, "wccp2ConnectionOpen: Called");
0b0cfcf2 958
959 if (wccp2_numrouters == 0 || !wccp2_service_list_head) {
30c48b1a 960 debugs(80, 2, "WCCPv2 Disabled. No IPv4 Router(s) configured.");
0b0cfcf2 961 return;
962 }
963
4dd643d5 964 if ( !Config.Wccp2.address.setIPv4() ) {
30c48b1a 965 debugs(80, DBG_CRITICAL, "WCCPv2 Disabled. Local address " << Config.Wccp2.address << " is not an IPv4 address.");
cc192b50 966 return;
967 }
968
4dd643d5 969 Config.Wccp2.address.port(WCCP_PORT);
31be869c 970 theWccp2Connection = comm_open_listener(SOCK_DGRAM,
04f7fd38
AJ
971 0,
972 Config.Wccp2.address,
973 COMM_NONBLOCKING,
974 "WCCPv2 Socket");
0b0cfcf2 975
976 if (theWccp2Connection < 0)
977 fatal("Cannot open WCCP Port");
978
85d25b95 979#if defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DONT)
980 {
981 int i = IP_PMTUDISC_DONT;
182106f3
AJ
982 if (setsockopt(theWccp2Connection, SOL_IP, IP_MTU_DISCOVER, &i, sizeof i) < 0)
983 debugs(80, 2, "WARNING: Path MTU discovery could not be disabled on FD " << theWccp2Connection << ": " << xstrerror());
85d25b95 984 }
985
986#endif
d841c88d 987 Comm::SetSelect(theWccp2Connection, COMM_SELECT_READ, wccp2HandleUdp, NULL, 0);
0b0cfcf2 988
e0236918
FC
989 debugs(80, DBG_IMPORTANT, "Accepting WCCPv2 messages on port " << WCCP_PORT << ", FD " << theWccp2Connection << ".");
990 debugs(80, DBG_IMPORTANT, "Initialising all WCCPv2 lists");
0b0cfcf2 991
992 /* Initialise all routers on all services */
c1f55201 993 memset(&null, 0, sizeof(null));
994
995 null.sin_family = AF_UNSPEC;
996
0b0cfcf2 997 service_list_ptr = wccp2_service_list_head;
998
999 while (service_list_ptr != NULL) {
1000 for (router_list_ptr = &service_list_ptr->router_list_head; router_list_ptr->next != NULL; router_list_ptr = router_list_ptr->next) {
1001 router_len = sizeof(router);
1002 memset(&router, '\0', router_len);
1003 router.sin_family = AF_INET;
cc192b50 1004 router.sin_port = htons(WCCP_PORT);
0b0cfcf2 1005 router.sin_addr = router_list_ptr->router_sendto_address;
1006
1007 if (connect(theWccp2Connection, (struct sockaddr *) &router, router_len))
1008 fatal("Unable to connect WCCP out socket");
1009
1010 local_len = sizeof(local);
1011
1012 memset(&local, '\0', local_len);
1013
1014 if (getsockname(theWccp2Connection, (struct sockaddr *) &local, &local_len))
1015 fatal("Unable to getsockname on WCCP out socket");
1016
1017 router_list_ptr->local_ip = local.sin_addr;
1018
c1f55201 1019 /* Disconnect the sending socket. Note: FreeBSD returns error
1020 * but disconnects anyway so we have to just assume it worked
1021 */
182106f3
AJ
1022 if (wccp2_numrouters > 1) {
1023 (void)connect(theWccp2Connection, (struct sockaddr *) &null, router_len);
1024 }
0b0cfcf2 1025 }
1026
1027 service_list_ptr = service_list_ptr->next;
1028 }
1029
0b0cfcf2 1030 wccp2_connected = 1;
1031}
1032
1033void
1034wccp2ConnectionClose(void)
1035{
1036
1037 struct wccp2_service_list_t *service_list_ptr;
1038
1039 struct wccp2_service_list_t *service_list_ptr_next;
1040
1041 struct wccp2_router_list_t *router_list_ptr;
1042
1043 struct wccp2_router_list_t *router_list_next;
1044
1045 struct wccp2_cache_list_t *cache_list_ptr;
1046
1047 struct wccp2_cache_list_t *cache_list_ptr_next;
1048
1049 if (wccp2_connected == 0) {
1050 return;
1051 }
1052
a527a95c
AJ
1053 /* TODO A shutting-down cache should generate a removal query, informing the router
1054 * (and therefore the caches in the group) that this cache is going
1055 * away and no new traffic should be forwarded to it.
1056 */
1057
0b0cfcf2 1058 if (theWccp2Connection > -1) {
e0236918 1059 debugs(80, DBG_IMPORTANT, "FD " << theWccp2Connection << " Closing WCCPv2 socket");
0b0cfcf2 1060 comm_close(theWccp2Connection);
1061 theWccp2Connection = -1;
1062 }
1063
a527a95c 1064 /* free all stored router state */
0b0cfcf2 1065 service_list_ptr = wccp2_service_list_head;
1066
1067 while (service_list_ptr != NULL) {
1068 for (router_list_ptr = &service_list_ptr->router_list_head; router_list_ptr != NULL; router_list_ptr = router_list_next) {
1069 for (cache_list_ptr = &router_list_ptr->cache_list_head; cache_list_ptr; cache_list_ptr = cache_list_ptr_next) {
1070 cache_list_ptr_next = cache_list_ptr->next;
1071
1072 if (cache_list_ptr != &router_list_ptr->cache_list_head) {
1073 xfree(cache_list_ptr);
1074 } else {
1075
1076 memset(cache_list_ptr, '\0', sizeof(struct wccp2_cache_list_t));
1077 }
1078 }
1079
1080 router_list_next = router_list_ptr->next;
1081
1082 if (router_list_ptr != &service_list_ptr->router_list_head) {
1083 xfree(router_list_ptr);
1084 } else {
1085
1086 memset(router_list_ptr, '\0', sizeof(struct wccp2_router_list_t));
1087 }
1088 }
1089
1090 service_list_ptr_next = service_list_ptr->next;
1091 xfree(service_list_ptr);
1092 service_list_ptr = service_list_ptr_next;
1093 }
1094
1095 wccp2_service_list_head = NULL;
1096 eventDelete(wccp2HereIam, NULL);
1097 eventDelete(wccp2AssignBuckets, NULL);
1098 eventDelete(wccp2HereIam, NULL);
1099 wccp2_connected = 0;
1100}
1101
1102/*
1103 * Functions for handling the requests.
1104 */
1105
1106/*
1107 * Accept the UDP packet
1108 */
1109static void
ced8def3 1110wccp2HandleUdp(int sock, void *)
0b0cfcf2 1111{
0b0cfcf2 1112 struct wccp2_service_list_t *service_list_ptr;
1113
1114 struct wccp2_router_list_t *router_list_ptr;
1115
1116 struct wccp2_cache_list_t *cache_list_ptr;
1117
1118 struct wccp2_cache_list_t *cache_list_ptr_next;
1119
1120 /* These structs form the parts of the packet */
1121
1122 struct wccp2_item_header_t *header = NULL;
1123
1124 struct wccp2_security_none_t *security_info = NULL;
1125
1126 struct wccp2_service_info_t *service_info = NULL;
1127
1128 struct router_identity_info_t *router_identity_info = NULL;
1129
1130 struct router_view_t *router_view_header = NULL;
1131
b7d249f9 1132 struct wccp2_cache_mask_identity_info_t *cache_mask_identity = NULL;
1133
1134 struct cache_mask_info_t *cache_mask_info = NULL;
1135
0b0cfcf2 1136 struct wccp2_cache_identity_info_t *cache_identity = NULL;
1137
1138 struct wccp2_capability_info_header_t *router_capability_header = NULL;
1139
1140 struct wccp2_capability_element_t *router_capability_element;
1141
1142 struct sockaddr_in from;
1143
2adffc6f 1144 struct in_addr cache_address;
0b0cfcf2 1145 int len, found;
1146 short int data_length, offset;
1147 uint32_t tmp;
1148 char *ptr;
1149 int num_caches;
0b0cfcf2 1150
bf8fe701 1151 debugs(80, 6, "wccp2HandleUdp: Called.");
0b0cfcf2 1152
d841c88d 1153 Comm::SetSelect(sock, COMM_SELECT_READ, wccp2HandleUdp, NULL, 0);
0b0cfcf2 1154
26ac0430 1155 /* FIXME INET6 : drop conversion boundary */
b7ac5457 1156 Ip::Address from_tmp;
cbd5aee3 1157 from_tmp.setIPv4();
0b0cfcf2 1158
1159 len = comm_udp_recvfrom(sock,
1160 &wccp2_i_see_you,
1161 WCCP_RESPONSE_SIZE,
1162 0,
cc192b50 1163 from_tmp);
0b0cfcf2 1164
1165 if (len < 0)
1166 return;
1167
1168 if (ntohs(wccp2_i_see_you.version) != WCCP2_VERSION)
1169 return;
1170
1171 if (ntohl(wccp2_i_see_you.type) != WCCP2_I_SEE_YOU)
1172 return;
1173
cbd5aee3
AJ
1174 /* FIXME INET6 : drop conversion boundary */
1175 from_tmp.getSockAddr(from);
1176
bf8fe701 1177 debugs(80, 3, "Incoming WCCPv2 I_SEE_YOU length " << ntohs(wccp2_i_see_you.length) << ".");
0b0cfcf2 1178
1179 /* Record the total data length */
1180 data_length = ntohs(wccp2_i_see_you.length);
1181
1182 offset = 0;
1183
1184 if (data_length > len) {
e0236918 1185 debugs(80, DBG_IMPORTANT, "ERROR: Malformed WCCPv2 packet claiming it's bigger than received data");
0b0cfcf2 1186 return;
1187 }
1188
1189 /* Go through the data structure */
1190 while (data_length > offset) {
1191
af6a12ee 1192 char *data = wccp2_i_see_you.data;
c6ba4504
HN
1193
1194 header = (struct wccp2_item_header_t *) &data[offset];
0b0cfcf2 1195
1196 switch (ntohs(header->type)) {
1197
1198 case WCCP2_SECURITY_INFO:
1199
1200 if (security_info != NULL) {
e0236918 1201 debugs(80, DBG_IMPORTANT, "Duplicate security definition");
0b0cfcf2 1202 return;
1203 }
1204
1205 security_info = (struct wccp2_security_none_t *) &wccp2_i_see_you.data[offset];
1206 break;
1207
1208 case WCCP2_SERVICE_INFO:
1209
1210 if (service_info != NULL) {
e0236918 1211 debugs(80, DBG_IMPORTANT, "Duplicate service_info definition");
0b0cfcf2 1212 return;
1213 }
1214
1215 service_info = (struct wccp2_service_info_t *) &wccp2_i_see_you.data[offset];
1216 break;
1217
1218 case WCCP2_ROUTER_ID_INFO:
1219
1220 if (router_identity_info != NULL) {
e0236918 1221 debugs(80, DBG_IMPORTANT, "Duplicate router_identity_info definition");
0b0cfcf2 1222 return;
1223 }
1224
1225 router_identity_info = (struct router_identity_info_t *) &wccp2_i_see_you.data[offset];
1226 break;
1227
1228 case WCCP2_RTR_VIEW_INFO:
1229
1230 if (router_view_header != NULL) {
e0236918 1231 debugs(80, DBG_IMPORTANT, "Duplicate router_view definition");
0b0cfcf2 1232 return;
1233 }
1234
1235 router_view_header = (struct router_view_t *) &wccp2_i_see_you.data[offset];
1236 break;
1237
1238 case WCCP2_CAPABILITY_INFO:
1239
1240 if (router_capability_header != NULL) {
e0236918 1241 debugs(80, DBG_IMPORTANT, "Duplicate router_capability definition");
0b0cfcf2 1242 return;
1243 }
1244
1245 router_capability_header = (struct wccp2_capability_info_header_t *) &wccp2_i_see_you.data[offset];
c1f55201 1246 break;
0b0cfcf2 1247
f53969cc 1248 /* Nothing to do for the types below */
b7d249f9 1249
1250 case WCCP2_ASSIGN_MAP:
40228366 1251 case WCCP2_REDIRECT_ASSIGNMENT:
b7d249f9 1252 break;
1253
0b0cfcf2 1254 default:
e0236918 1255 debugs(80, DBG_IMPORTANT, "Unknown record type in WCCPv2 Packet (" << ntohs(header->type) << ").");
0b0cfcf2 1256 }
1257
1258 offset += sizeof(struct wccp2_item_header_t);
1259 offset += ntohs(header->length);
1260
1261 if (offset > data_length) {
e0236918 1262 debugs(80, DBG_IMPORTANT, "Error: WCCPv2 packet tried to tell us there is data beyond the end of the packet");
0b0cfcf2 1263 return;
1264 }
1265 }
1266
1267 if ((security_info == NULL) || (service_info == NULL) || (router_identity_info == NULL) || (router_view_header == NULL)) {
e0236918 1268 debugs(80, DBG_IMPORTANT, "Incomplete WCCPv2 Packet");
0b0cfcf2 1269 return;
1270 }
1271
bf8fe701 1272 debugs(80, 5, "Complete packet received");
0b0cfcf2 1273
1274 /* Check that the service in the packet is configured on this router */
1275 service_list_ptr = wccp2_service_list_head;
1276
1277 while (service_list_ptr != NULL) {
1278 if (service_info->service_id == service_list_ptr->service_info->service_id) {
1279 break;
1280 }
1281
1282 service_list_ptr = service_list_ptr->next;
1283 }
1284
1285 if (service_list_ptr == NULL) {
e0236918 1286 debugs(80, DBG_IMPORTANT, "WCCPv2 Unknown service received from router (" << service_info->service_id << ")");
0b0cfcf2 1287 return;
1288 }
1289
1290 if (ntohl(security_info->security_option) != ntohl(service_list_ptr->security_info->security_option)) {
e0236918 1291 debugs(80, DBG_IMPORTANT, "Invalid security option in WCCPv2 Packet (" << ntohl(security_info->security_option) << " vs " << ntohl(service_list_ptr->security_info->security_option) << ").");
0b0cfcf2 1292 return;
1293 }
1294
1295 if (!wccp2_check_security(service_list_ptr, (char *) security_info, (char *) &wccp2_i_see_you, len)) {
e0236918 1296 debugs(80, DBG_IMPORTANT, "Received WCCPv2 Packet failed authentication");
0b0cfcf2 1297 return;
1298 }
1299
1300 /* Check that the router address is configured on this router */
1301 for (router_list_ptr = &service_list_ptr->router_list_head; router_list_ptr->next != NULL; router_list_ptr = router_list_ptr->next) {
1302 if (router_list_ptr->router_sendto_address.s_addr == from.sin_addr.s_addr)
1303 break;
1304 }
1305
1306 if (router_list_ptr->next == NULL) {
e0236918 1307 debugs(80, DBG_IMPORTANT, "WCCPv2 Packet received from unknown router");
0b0cfcf2 1308 return;
1309 }
1310
1311 /* Set the router id */
1312 router_list_ptr->info->router_address = router_identity_info->router_id_element.router_address;
1313
1314 /* Increment the received id in the packet */
1315 if (ntohl(router_list_ptr->info->received_id) != ntohl(router_identity_info->router_id_element.received_id)) {
6013702c 1316 debugs(80, 3, "Incoming WCCP2_I_SEE_YOU Received ID old=" << ntohl(router_list_ptr->info->received_id) << " new=" << ntohl(router_identity_info->router_id_element.received_id) << ".");
0b0cfcf2 1317 router_list_ptr->info->received_id = router_identity_info->router_id_element.received_id;
1318 }
1319
1320 /* TODO: check return/forwarding methods */
1321 if (router_capability_header == NULL) {
c1f55201 1322 if ((Config.Wccp2.return_method != WCCP2_PACKET_RETURN_METHOD_GRE) || (Config.Wccp2.forwarding_method != WCCP2_FORWARDING_METHOD_GRE)) {
e0236918 1323 debugs(80, DBG_IMPORTANT, "wccp2HandleUdp: fatal error - A WCCP router does not support the forwarding method specified, only GRE supported");
0b0cfcf2 1324 wccp2ConnectionClose();
1325 return;
1326 }
1327 } else {
0b0cfcf2 1328
c1f55201 1329 char *end = ((char *) router_capability_header) + sizeof(*router_capability_header) + ntohs(router_capability_header->capability_info_length) - sizeof(struct wccp2_capability_info_header_t);
1330
1331 router_capability_element = (struct wccp2_capability_element_t *) (((char *) router_capability_header) + sizeof(*router_capability_header));
0b0cfcf2 1332
c1f55201 1333 while ((char *) router_capability_element <= end) {
0b0cfcf2 1334
1335 switch (ntohs(router_capability_element->capability_type)) {
1336
1337 case WCCP2_CAPABILITY_FORWARDING_METHOD:
1338
c1f55201 1339 if (!(ntohl(router_capability_element->capability_value) & Config.Wccp2.forwarding_method)) {
e0236918 1340 debugs(80, DBG_IMPORTANT, "wccp2HandleUdp: fatal error - A WCCP router has specified a different forwarding method " << ntohl(router_capability_element->capability_value) << ", expected " << Config.Wccp2.forwarding_method);
0b0cfcf2 1341 wccp2ConnectionClose();
1342 return;
1343 }
1344
1345 break;
1346
1347 case WCCP2_CAPABILITY_ASSIGNMENT_METHOD:
c1f55201 1348
b7d249f9 1349 if (!(ntohl(router_capability_element->capability_value) & Config.Wccp2.assignment_method)) {
e0236918 1350 debugs(80, DBG_IMPORTANT, "wccp2HandleUdp: fatal error - A WCCP router has specified a different assignment method " << ntohl(router_capability_element->capability_value) << ", expected "<< Config.Wccp2.assignment_method);
c1f55201 1351 wccp2ConnectionClose();
1352 return;
1353 }
1354
0b0cfcf2 1355 break;
1356
1357 case WCCP2_CAPABILITY_RETURN_METHOD:
1358
c1f55201 1359 if (!(ntohl(router_capability_element->capability_value) & Config.Wccp2.return_method)) {
e0236918 1360 debugs(80, DBG_IMPORTANT, "wccp2HandleUdp: fatal error - A WCCP router has specified a different return method " << ntohl(router_capability_element->capability_value) << ", expected " << Config.Wccp2.return_method);
0b0cfcf2 1361 wccp2ConnectionClose();
1362 return;
1363 }
1364
1365 break;
1366
43f3d687
AJ
1367 case 4:
1368 case 5:
1369 break; // ignore silently for now
1370
0b0cfcf2 1371 default:
e0236918 1372 debugs(80, DBG_IMPORTANT, "Unknown capability type in WCCPv2 Packet (" << ntohs(router_capability_element->capability_type) << ").");
0b0cfcf2 1373 }
c1f55201 1374
c898ced1 1375 router_capability_element = (struct wccp2_capability_element_t *) (((char *) router_capability_element) + sizeof(struct wccp2_item_header_t) + ntohs(router_capability_element->capability_length));
0b0cfcf2 1376 }
1377 }
1378
bf8fe701 1379 debugs(80, 5, "Cleaning out cache list");
0b0cfcf2 1380 /* clean out the old cache list */
1381
1382 for (cache_list_ptr = &router_list_ptr->cache_list_head; cache_list_ptr; cache_list_ptr = cache_list_ptr_next) {
1383 cache_list_ptr_next = cache_list_ptr->next;
1384
1385 if (cache_list_ptr != &router_list_ptr->cache_list_head) {
1386 xfree(cache_list_ptr);
1387 }
1388 }
1389
1390 router_list_ptr->num_caches = htonl(0);
1391 num_caches = 0;
1392
1393 /* Check to see if we're the master cache and update the cache list */
1394 found = 0;
1395 service_list_ptr->lowest_ip = 1;
1396 cache_list_ptr = &router_list_ptr->cache_list_head;
1397
1398 /* to find the list of caches, we start at the end of the router view header */
1399
1400 ptr = (char *) (router_view_header) + sizeof(struct router_view_t);
1401
1402 /* Then we read the number of routers */
1403 memcpy(&tmp, ptr, sizeof(tmp));
1404
1405 /* skip the number plus all the ip's */
1406
2adffc6f 1407 ptr += sizeof(tmp) + (ntohl(tmp) * sizeof(struct in_addr));
0b0cfcf2 1408
1409 /* Then read the number of caches */
1410 memcpy(&tmp, ptr, sizeof(tmp));
1411 ptr += sizeof(tmp);
1412
1413 if (ntohl(tmp) != 0) {
1414 /* search through the list of received-from ip addresses */
1415
14942edd 1416 for (num_caches = 0; num_caches < (int) ntohl(tmp); ++num_caches) {
0b0cfcf2 1417 /* Get a copy of the ip */
af6a12ee 1418 memset(&cache_address, 0, sizeof(cache_address)); // Make GCC happy
0b0cfcf2 1419
b7d249f9 1420 switch (Config.Wccp2.assignment_method) {
1421
1422 case WCCP2_ASSIGNMENT_METHOD_HASH:
1423
1424 cache_identity = (struct wccp2_cache_identity_info_t *) ptr;
1425
1426 ptr += sizeof(struct wccp2_cache_identity_info_t);
1427
2adffc6f 1428 memcpy(&cache_address, &cache_identity->addr, sizeof(struct in_addr));
b7d249f9 1429
1430 cache_list_ptr->weight = ntohs(cache_identity->weight);
1431 break;
1432
1433 case WCCP2_ASSIGNMENT_METHOD_MASK:
1434
1435 cache_mask_info = (struct cache_mask_info_t *) ptr;
1436
1437 /* The mask assignment has an undocumented variable length entry here */
1438
1439 if (ntohl(cache_mask_info->num1) == 3) {
1440
1441 cache_mask_identity = (struct wccp2_cache_mask_identity_info_t *) ptr;
1442
1443 ptr += sizeof(struct wccp2_cache_mask_identity_info_t);
0b0cfcf2 1444
2adffc6f 1445 memcpy(&cache_address, &cache_mask_identity->addr, sizeof(struct in_addr));
b7d249f9 1446 } else {
1447
1448 ptr += sizeof(struct cache_mask_info_t);
1449
2adffc6f 1450 memcpy(&cache_address, &cache_mask_info->addr, sizeof(struct in_addr));
b7d249f9 1451 }
0b0cfcf2 1452
b7d249f9 1453 cache_list_ptr->weight = 0;
1454 break;
1455
1456 default:
1457 fatalf("Unknown Wccp2 assignment method\n");
1458 }
0b0cfcf2 1459
1460 /* Update the cache list */
1461 cache_list_ptr->cache_ip = cache_address;
b7d249f9 1462
0b0cfcf2 1463 cache_list_ptr->next = (wccp2_cache_list_t*) xcalloc(1, sizeof(struct wccp2_cache_list_t));
b7d249f9 1464
0b0cfcf2 1465 cache_list_ptr = cache_list_ptr->next;
b7d249f9 1466
0b0cfcf2 1467 cache_list_ptr->next = NULL;
1468
bf8fe701 1469 debugs (80, 5, "checking cache list: (" << std::hex << cache_address.s_addr << ":" << router_list_ptr->local_ip.s_addr << ")");
b7d249f9 1470
0b0cfcf2 1471 /* Check to see if it's the master, or us */
1472
1473 if (cache_address.s_addr == router_list_ptr->local_ip.s_addr) {
1474 found = 1;
1475 }
1476
1477 if (cache_address.s_addr < router_list_ptr->local_ip.s_addr) {
1478 service_list_ptr->lowest_ip = 0;
1479 }
1480 }
1481 } else {
bf8fe701 1482 debugs(80, 5, "Adding ourselves as the only cache");
0b0cfcf2 1483
1484 /* Update the cache list */
1485 cache_list_ptr->cache_ip = router_list_ptr->local_ip;
1486
1487 cache_list_ptr->next = (wccp2_cache_list_t*) xcalloc(1, sizeof(struct wccp2_cache_list_t));
1488 cache_list_ptr = cache_list_ptr->next;
1489 cache_list_ptr->next = NULL;
1490
b7d249f9 1491 service_list_ptr->lowest_ip = 1;
0b0cfcf2 1492 found = 1;
1493 num_caches = 1;
1494 }
1495
264096e2 1496 wccp2SortCacheList(&router_list_ptr->cache_list_head);
1497
0b0cfcf2 1498 router_list_ptr->num_caches = htonl(num_caches);
1499
1500 if ((found == 1) && (service_list_ptr->lowest_ip == 1)) {
1501 if (ntohl(router_view_header->change_number) != router_list_ptr->member_change) {
bf8fe701 1502 debugs(80, 4, "Change detected - queueing up new assignment");
0b0cfcf2 1503 router_list_ptr->member_change = ntohl(router_view_header->change_number);
c1f55201 1504 eventDelete(wccp2AssignBuckets, NULL);
1505 eventAdd("wccp2AssignBuckets", wccp2AssignBuckets, NULL, 15.0, 1);
b7d249f9 1506 } else {
4a7a3d56 1507 debugs(80, 5, "Change not detected (" << ntohl(router_view_header->change_number) << " = " << router_list_ptr->member_change << ")");
0b0cfcf2 1508 }
1509 } else {
b7d249f9 1510 eventDelete(wccp2AssignBuckets, NULL);
bf8fe701 1511 debugs(80, 5, "I am not the lowest ip cache - not assigning buckets");
0b0cfcf2 1512 }
1513}
1514
1515static void
ced8def3 1516wccp2HereIam(void *)
0b0cfcf2 1517{
0b0cfcf2 1518 struct wccp2_service_list_t *service_list_ptr;
1519
1520 struct wccp2_router_list_t *router_list_ptr;
1521
b7d249f9 1522 struct wccp2_identity_info_t *wccp2_identity_info_ptr;
1523
1524 struct wccp2_mask_identity_info_t *wccp2_mask_identity_info_ptr;
1525
b7ac5457 1526 Ip::Address router;
0b0cfcf2 1527
bf8fe701 1528 debugs(80, 6, "wccp2HereIam: Called");
0b0cfcf2 1529
1530 if (wccp2_connected == 0) {
e0236918 1531 debugs(80, DBG_IMPORTANT, "wccp2HereIam: wccp2 socket closed. Shutting down WCCP2");
0b0cfcf2 1532 return;
1533 }
1534
bef81ea5 1535 /* Wait if store dirs are rebuilding */
1536 if (StoreController::store_dirs_rebuilding && Config.Wccp2.rebuildwait) {
f67332d3 1537 eventAdd("wccp2HereIam", wccp2HereIam, NULL, 1.0, 1);
1538 return;
1539 }
1540
4dd643d5 1541 router.port(WCCP_PORT);
0b0cfcf2 1542
1543 /* for each router on each service send a packet */
1544 service_list_ptr = wccp2_service_list_head;
1545
1546 while (service_list_ptr != NULL) {
bf8fe701 1547 debugs(80, 5, "wccp2HereIam: sending to service id " << service_list_ptr->info.service_id);
0b0cfcf2 1548
1549 for (router_list_ptr = &service_list_ptr->router_list_head; router_list_ptr->next != NULL; router_list_ptr = router_list_ptr->next) {
cc192b50 1550 router = router_list_ptr->router_sendto_address;
0b0cfcf2 1551
1552 /* Set the cache id (ip) */
b7d249f9 1553
1554 switch (Config.Wccp2.assignment_method) {
1555
1556 case WCCP2_ASSIGNMENT_METHOD_HASH:
1557
1558 wccp2_identity_info_ptr = (struct wccp2_identity_info_t *) service_list_ptr->wccp2_identity_info_ptr;
1559 wccp2_identity_info_ptr->cache_identity.addr = router_list_ptr->local_ip;
1560 break;
1561
1562 case WCCP2_ASSIGNMENT_METHOD_MASK:
1563
1564 wccp2_mask_identity_info_ptr = (struct wccp2_mask_identity_info_t *) service_list_ptr->wccp2_identity_info_ptr;
1565 wccp2_mask_identity_info_ptr->cache_identity.addr = router_list_ptr->local_ip;
1566 break;
1567
1568 default:
1569 fatalf("Unknown Wccp2 assignment method\n");
1570 }
1571
0b0cfcf2 1572 /* Security update, if needed */
1573
1574 if (service_list_ptr->wccp2_security_type == WCCP2_MD5_SECURITY) {
1575 wccp2_update_md5_security(service_list_ptr->wccp_password, (char *) service_list_ptr->security_info, service_list_ptr->wccp_packet, service_list_ptr->wccp_packet_size);
1576 }
1577
4a7a3d56 1578 debugs(80, 3, "Sending HereIam packet size " << service_list_ptr->wccp_packet_size);
0b0cfcf2 1579 /* Send the packet */
0b0cfcf2 1580
c1f55201 1581 if (wccp2_numrouters > 1) {
1582 comm_udp_sendto(theWccp2Connection,
cc192b50 1583 router,
c1f55201 1584 &service_list_ptr->wccp_packet,
1585 service_list_ptr->wccp_packet_size);
1586 } else {
182106f3 1587 errno = 0;
3af9db3f 1588 if (send(theWccp2Connection, &service_list_ptr->wccp_packet, service_list_ptr->wccp_packet_size, 0) < static_cast<int>(service_list_ptr->wccp_packet_size))
182106f3 1589 debugs(80, 2, "ERROR: failed to send WCCPv2 HERE_I_AM packet to " << router << " : " << xstrerror());
c1f55201 1590 }
0b0cfcf2 1591 }
1592
1593 service_list_ptr = service_list_ptr->next;
1594 }
1595
f67332d3 1596 eventAdd("wccp2HereIam", wccp2HereIam, NULL, 10.0, 1);
0b0cfcf2 1597}
1598
1599static void
ced8def3 1600wccp2AssignBuckets(void *)
0b0cfcf2 1601{
0b0cfcf2 1602 struct wccp2_service_list_t *service_list_ptr;
1603
1604 struct wccp2_router_list_t *router_list_ptr;
1605
1606 struct wccp2_cache_list_t *cache_list_ptr;
1607 char wccp_packet[WCCP_RESPONSE_SIZE];
b7d249f9 1608 short int offset, saved_offset, assignment_offset, alt_assignment_offset;
0b0cfcf2 1609
1610 struct sockaddr_in router;
1611 int router_len;
1612 int bucket_counter;
b7d249f9 1613 uint32_t service_flags;
f45dd259 1614 unsigned short port = WCCP_PORT;
0b0cfcf2 1615
1616 /* Packet segments */
1617
c898ced1 1618 struct wccp2_message_header_t *main_header;
0b0cfcf2 1619
1620 struct wccp2_security_md5_t *security = NULL;
1621 /* service from service struct */
1622
1623 struct wccp2_item_header_t *assignment_header;
1624
b7d249f9 1625 struct wccp2_item_header_t *alt_assignment_type_header = NULL;
1626
0b0cfcf2 1627 struct assignment_key_t *assignment_key;
1628 /* number of routers */
1629
1630 struct wccp2_router_assign_element_t *router_assign;
1631 /* number of caches */
1632
2adffc6f 1633 struct in_addr *cache_address;
b7d249f9 1634 /* Alternative assignement mask/values */
1635 int num_maskval;
1636
1637 struct wccp2_mask_element_t *mask_element;
1638
1639 struct wccp2_value_element_t *value_element;
1640 int valuecounter, value;
0b0cfcf2 1641 char *buckets;
1642
b7d249f9 1643 assignment_offset = alt_assignment_offset = 0;
1644
0b0cfcf2 1645 router_len = sizeof(router);
1646 memset(&router, '\0', router_len);
1647 router.sin_family = AF_INET;
1648 router.sin_port = htons(port);
1649
1650 /* Start main header - fill in length later */
1651 offset = 0;
1652
c898ced1 1653 main_header = (struct wccp2_message_header_t *) &wccp_packet[offset];
0b0cfcf2 1654 main_header->type = htonl(WCCP2_REDIRECT_ASSIGN);
1655 main_header->version = htons(WCCP2_VERSION);
1656
bf8fe701 1657 debugs(80, 2, "Running wccp2AssignBuckets");
0b0cfcf2 1658 service_list_ptr = wccp2_service_list_head;
1659
1660 while (service_list_ptr != NULL) {
1661 /* If we're not the lowest, we don't need to worry */
1662
1663 if (service_list_ptr->lowest_ip == 0) {
1664 /* XXX eww */
1665 service_list_ptr = service_list_ptr->next;
1666 continue;
1667 }
1668
1669 /* reset the offset */
1670
c898ced1 1671 offset = sizeof(struct wccp2_message_header_t);
0b0cfcf2 1672
1673 /* build packet header from hereIam packet */
1674 /* Security info */
1675 /* XXX this should be made more generic! */
1676 /* XXX and I hate magic numbers! */
1677 switch (service_list_ptr->wccp2_security_type) {
1678
1679 case WCCP2_NO_SECURITY:
1680
1681 security = (struct wccp2_security_md5_t *) &wccp_packet[offset];
1682 memcpy(security, service_list_ptr->security_info, 8);
1683 offset += 8;
1684 break;
1685
1686 case WCCP2_MD5_SECURITY:
1687
1688 security = (struct wccp2_security_md5_t *) &wccp_packet[offset];
1689
1690 memcpy(security, service_list_ptr->security_info, sizeof(struct wccp2_security_md5_t));
1691
1692 offset += sizeof(struct wccp2_security_md5_t);
1693 break;
1694
1695 default:
1696 fatalf("Unknown Wccp2 security type\n");
1697 }
1698
1699 /* Service info */
1700
1701 memcpy(&wccp_packet[offset], service_list_ptr->service_info, sizeof(struct wccp2_service_info_t));
1702
1703 offset += sizeof(struct wccp2_service_info_t);
1704
1705 /* assignment header - fill in length later */
1706
1707 assignment_header = (struct wccp2_item_header_t *) &wccp_packet[offset];
1708
b7d249f9 1709 switch (Config.Wccp2.assignment_method) {
0b0cfcf2 1710
b7d249f9 1711 case WCCP2_ASSIGNMENT_METHOD_HASH:
1712 assignment_header->type = htons(WCCP2_REDIRECT_ASSIGNMENT);
1713
1714 offset += sizeof(struct wccp2_item_header_t);
1715 assignment_offset = offset;
1716 break;
1717
1718 case WCCP2_ASSIGNMENT_METHOD_MASK:
1719 assignment_header->type = htons(WCCP2_ALT_ASSIGNMENT);
1720
1721 offset += sizeof(struct wccp2_item_header_t);
1722 assignment_offset = offset;
1723
1724 /* The alternative assignment has an extra header, fill in length later */
1725
1726 alt_assignment_type_header = (struct wccp2_item_header_t *) &wccp_packet[offset];
1727 alt_assignment_type_header->type = htons(WCCP2_MASK_ASSIGNMENT);
1728
1729 offset += sizeof(struct wccp2_item_header_t);
1730 alt_assignment_offset = offset;
1731
1732 break;
1733
1734 default:
1735 fatalf("Unknown Wccp2 assignment method\n");
1736 }
0b0cfcf2 1737
1738 /* Assignment key - fill in master ip later */
1739
1740 assignment_key = (struct assignment_key_t *) &wccp_packet[offset];
1741
1742 assignment_key->master_number = htonl(++service_list_ptr->change_num);
1743
1744 offset += sizeof(struct assignment_key_t);
1745
1746 /* Number of routers */
41d00cd3 1747 memcpy(&wccp_packet[offset], &service_list_ptr->num_routers, sizeof(service_list_ptr->num_routers));
0b0cfcf2 1748
1749 offset += sizeof(service_list_ptr->num_routers);
1750
1751 for (router_list_ptr = &service_list_ptr->router_list_head; router_list_ptr->next != NULL; router_list_ptr = router_list_ptr->next) {
1752
1753 /* Add routers */
1754
1755 router_assign = (struct wccp2_router_assign_element_t *) &wccp_packet[offset];
1756 router_assign->router_address = router_list_ptr->info->router_address;
1757 router_assign->received_id = router_list_ptr->info->received_id;
1758 router_assign->change_number = htonl(router_list_ptr->member_change);
1759
1760 offset += sizeof(struct wccp2_router_assign_element_t);
1761 }
1762
1763 saved_offset = offset;
1764
1765 for (router_list_ptr = &service_list_ptr->router_list_head; router_list_ptr->next != NULL; router_list_ptr = router_list_ptr->next) {
b7d249f9 1766 unsigned long *weight = (unsigned long *)xcalloc(sizeof(*weight), ntohl(router_list_ptr->num_caches));
1767 unsigned long total_weight = 0;
1768 int num_caches = ntohl(router_list_ptr->num_caches);
f16fbc82 1769
0b0cfcf2 1770 offset = saved_offset;
1771
b7d249f9 1772 switch (Config.Wccp2.assignment_method) {
1773
1774 case WCCP2_ASSIGNMENT_METHOD_HASH:
1775 /* Number of caches */
41d00cd3 1776 memcpy(&wccp_packet[offset], &router_list_ptr->num_caches, sizeof(router_list_ptr->num_caches));
b7d249f9 1777 offset += sizeof(router_list_ptr->num_caches);
1778
1779 if (num_caches) {
1780 int cache;
1781
14942edd 1782 for (cache = 0, cache_list_ptr = &router_list_ptr->cache_list_head; cache_list_ptr->next; cache_list_ptr = cache_list_ptr->next, ++cache) {
b7d249f9 1783 /* add caches */
0b0cfcf2 1784
2adffc6f 1785 cache_address = (struct in_addr *) &wccp_packet[offset];
0b0cfcf2 1786
41d00cd3 1787 memcpy(cache_address, &cache_list_ptr->cache_ip, sizeof(struct in_addr));
b7d249f9 1788 total_weight += cache_list_ptr->weight << 12;
1789 weight[cache] = cache_list_ptr->weight << 12;
0b0cfcf2 1790
2adffc6f 1791 offset += sizeof(struct in_addr);
b7d249f9 1792 }
0b0cfcf2 1793 }
0b0cfcf2 1794
b7d249f9 1795 /* Add buckets */
1796 buckets = (char *) &wccp_packet[offset];
1797
1798 memset(buckets, '\0', WCCP_BUCKETS);
1799
1800 if (num_caches != 0) {
1801 if (total_weight == 0) {
14942edd 1802 for (bucket_counter = 0; bucket_counter < WCCP_BUCKETS; ++bucket_counter) {
b7d249f9 1803 buckets[bucket_counter] = (char) (bucket_counter % num_caches);
1804 }
1805 } else {
1806 unsigned long *assigned = (unsigned long *)xcalloc(sizeof(*assigned), num_caches);
1807 unsigned long done = 0;
1808 int cache = -1;
1809 unsigned long per_bucket = total_weight / WCCP_BUCKETS;
1810
14942edd 1811 for (bucket_counter = 0; bucket_counter < WCCP_BUCKETS; ++bucket_counter) {
b7d249f9 1812 int n;
1813 unsigned long step;
1814
5e263176 1815 for (n = num_caches; n; --n) {
14942edd 1816 ++cache;
b7d249f9 1817
1818 if (cache >= num_caches)
1819 cache = 0;
1820
1821 if (!weight[cache]) {
14942edd 1822 ++n;
b7d249f9 1823 continue;
1824 }
1825
1826 if (assigned[cache] <= done)
1827 break;
1828 }
1829
1830 buckets[bucket_counter] = (char) cache;
1831 step = per_bucket * total_weight / weight[cache];
1832 assigned[cache] += step;
1833 done += per_bucket;
1834 }
1835
1836 safe_free(assigned);
1837 }
1838 }
0b0cfcf2 1839
b7d249f9 1840 offset += (WCCP_BUCKETS * sizeof(char));
1841 safe_free(weight);
1842 break;
0b0cfcf2 1843
b7d249f9 1844 case WCCP2_ASSIGNMENT_METHOD_MASK:
1845 num_maskval = htonl(1);
41d00cd3 1846 memcpy(&wccp_packet[offset], &num_maskval, sizeof(int));
b7d249f9 1847 offset += sizeof(int);
1848
1849 mask_element = (struct wccp2_mask_element_t *) &wccp_packet[offset];
1850 service_flags = ntohl(service_list_ptr->service_info->service_flags);
1851
1852 if ((service_flags & WCCP2_SERVICE_SRC_IP_HASH) || (service_flags & WCCP2_SERVICE_SRC_IP_ALT_HASH)) {
1853 mask_element->source_ip_mask = htonl(0x00001741);
1854 mask_element->dest_ip_mask = 0;
1855 mask_element->source_port_mask = 0;
1856 mask_element->dest_port_mask = 0;
1857 } else if ((service_list_ptr->info.service == WCCP2_SERVICE_STANDARD) || (service_flags & WCCP2_SERVICE_DST_IP_HASH) || (service_flags & WCCP2_SERVICE_DST_IP_ALT_HASH)) {
1858 mask_element->source_ip_mask = 0;
1859 mask_element->dest_ip_mask = htonl(0x00001741);
1860 mask_element->source_port_mask = 0;
1861 mask_element->dest_port_mask = 0;
1862 } else if ((service_flags & WCCP2_SERVICE_SRC_PORT_HASH) || (service_flags & WCCP2_SERVICE_SRC_PORT_ALT_HASH)) {
1863 mask_element->source_ip_mask = 0;
1864 mask_element->dest_ip_mask = 0;
1865 mask_element->source_port_mask = htons(0x1741);
1866 mask_element->dest_port_mask = 0;
1867 } else if ((service_flags & WCCP2_SERVICE_DST_PORT_HASH) || (service_flags & WCCP2_SERVICE_DST_PORT_ALT_HASH)) {
1868 mask_element->source_ip_mask = 0;
1869 mask_element->dest_ip_mask = 0;
1870 mask_element->source_port_mask = 0;
1871 mask_element->dest_port_mask = htons(0x1741);
1872 } else {
1873 fatalf("Unknown service hash method\n");
1874 }
1875
1876 mask_element->number_values = htonl(64);
1877
1878 offset += sizeof(struct wccp2_mask_element_t);
1879
1880 cache_list_ptr = &router_list_ptr->cache_list_head;
1881 value = 0;
1882
14942edd 1883 for (valuecounter = 0; valuecounter < 64; ++valuecounter) {
b7d249f9 1884
1885 value_element = (struct wccp2_value_element_t *) &wccp_packet[offset];
1886
25e26086 1887 /* Update the value according the the "correct" formula */
1888
14942edd 1889 for (; (value & 0x1741) != value; ++value) {
25e26086 1890 assert(value <= 0x1741);
1891 }
1892
b7d249f9 1893 if ((service_flags & WCCP2_SERVICE_SRC_IP_HASH) || (service_flags & WCCP2_SERVICE_SRC_IP_ALT_HASH)) {
1894 value_element->source_ip_value = htonl(value);
1895 value_element->dest_ip_value = 0;
1896 value_element->source_port_value = 0;
1897 value_element->dest_port_value = 0;
1898 } else if ((service_list_ptr->info.service == WCCP2_SERVICE_STANDARD) || (service_flags & WCCP2_SERVICE_DST_IP_HASH) || (service_flags & WCCP2_SERVICE_DST_IP_ALT_HASH)) {
1899 value_element->source_ip_value = 0;
1900 value_element->dest_ip_value = htonl(value);
1901 value_element->source_port_value = 0;
1902 value_element->dest_port_value = 0;
1903 } else if ((service_flags & WCCP2_SERVICE_SRC_PORT_HASH) || (service_flags & WCCP2_SERVICE_SRC_PORT_ALT_HASH)) {
1904 value_element->source_ip_value = 0;
1905 value_element->dest_ip_value = 0;
1906 value_element->source_port_value = htons(value);
1907 value_element->dest_port_value = 0;
1908 } else if ((service_flags & WCCP2_SERVICE_DST_PORT_HASH) || (service_flags & WCCP2_SERVICE_DST_PORT_ALT_HASH)) {
1909 value_element->source_ip_value = 0;
1910 value_element->dest_ip_value = 0;
1911 value_element->source_port_value = 0;
1912 value_element->dest_port_value = htons(value);
1913 } else {
1914 fatalf("Unknown service hash method\n");
1915 }
1916
1917 value_element->cache_ip = cache_list_ptr->cache_ip;
1918
1919 offset += sizeof(struct wccp2_value_element_t);
14942edd 1920 ++value;
b7d249f9 1921
1922 /* Assign the next value to the next cache */
25e26086 1923
b7d249f9 1924 if ((cache_list_ptr->next) && (cache_list_ptr->next->next))
1925 cache_list_ptr = cache_list_ptr->next;
1926 else
1927 cache_list_ptr = &router_list_ptr->cache_list_head;
1928 }
0b0cfcf2 1929
b7d249f9 1930 /* Fill in length */
1931 alt_assignment_type_header->length = htons(offset - alt_assignment_offset);
1932
1933 break;
1934
1935 default:
1936 fatalf("Unknown Wccp2 assignment method\n");
1937 }
1938
1939 /* Fill in length */
0b0cfcf2 1940
b7d249f9 1941 assignment_header->length = htons(offset - assignment_offset);
0b0cfcf2 1942
1943 /* Fill in assignment key */
1944 assignment_key->master_ip = router_list_ptr->local_ip;
1945
1946 /* finish length */
1947
c898ced1 1948 main_header->length = htons(offset - sizeof(struct wccp2_message_header_t));
0b0cfcf2 1949
1950 /* set the destination address */
1951 router.sin_addr = router_list_ptr->router_sendto_address;
1952
1953 /* Security update, if needed */
1954
1955 if (service_list_ptr->wccp2_security_type == WCCP2_MD5_SECURITY) {
1956 wccp2_update_md5_security(service_list_ptr->wccp_password, (char *) security, wccp_packet, offset);
1957 }
1958
1959 if (ntohl(router_list_ptr->num_caches)) {
1960 /* send packet */
c1f55201 1961
182106f3
AJ
1962 /* FIXME INET6 : drop temp conversion */
1963 Ip::Address tmp_rtr(router);
1964
c1f55201 1965 if (wccp2_numrouters > 1) {
1966 comm_udp_sendto(theWccp2Connection,
cc192b50 1967 tmp_rtr,
c1f55201 1968 &wccp_packet,
1969 offset);
1970 } else {
182106f3 1971 errno = 0;
3af9db3f 1972 if (send(theWccp2Connection, &wccp_packet, offset, 0) < static_cast<int>(offset))
182106f3 1973 debugs(80, 2, "ERROR: failed to send WCCPv2 HERE_I_AM packet to " << tmp_rtr << " : " << xstrerror());
c1f55201 1974 }
0b0cfcf2 1975 }
182106f3 1976 safe_free(weight);
0b0cfcf2 1977 }
1978
1979 service_list_ptr = service_list_ptr->next;
1980 }
1981}
1982
0b0cfcf2 1983/*
1984 * Configuration option parsing code
1985 */
1986
e313ab0a
AJ
1987/**
1988 * Parse wccp2_return_method and wccp2_forwarding_method options
72e2b394 1989 * they can be '1' aka 'gre' or '2' aka 'l2'
e313ab0a
AJ
1990 * repesenting the integer numeric of the same.
1991 */
1992void
1993parse_wccp2_method(int *method)
1994{
1995 char *t;
1996
1997 /* Snarf the method */
2eceb328 1998 if ((t = ConfigParser::NextToken()) == NULL) {
21ec1b94 1999 debugs(80, DBG_CRITICAL, "wccp2_*_method: missing setting.");
e313ab0a
AJ
2000 self_destruct();
2001 }
2002
2003 /* update configuration if its valid */
451c4786 2004 if (strcmp(t, "gre") == 0 || strcmp(t, "1") == 0) {
21ec1b94 2005 *method = WCCP2_METHOD_GRE;
451c4786 2006 } else if (strcmp(t, "l2") == 0 || strcmp(t, "2") == 0) {
21ec1b94 2007 *method = WCCP2_METHOD_L2;
e313ab0a 2008 } else {
21ec1b94 2009 debugs(80, DBG_CRITICAL, "wccp2_*_method: unknown setting, got " << t );
e313ab0a
AJ
2010 self_destruct();
2011 }
2012}
2013
2014void
2015dump_wccp2_method(StoreEntry * e, const char *label, int v)
2016{
26ac0430 2017 switch (v) {
451c4786
AJ
2018 case WCCP2_METHOD_GRE:
2019 storeAppendPrintf(e, "%s gre\n", label);
e313ab0a 2020 break;
451c4786
AJ
2021 case WCCP2_METHOD_L2:
2022 storeAppendPrintf(e, "%s l2\n", label);
e313ab0a
AJ
2023 break;
2024 default:
21ec1b94 2025 debugs(80, DBG_CRITICAL, "FATAL: WCCPv2 configured method (" << v << ") is not valid.");
e313ab0a
AJ
2026 self_destruct();
2027 }
2028}
2029
2030void
ced8def3 2031free_wccp2_method(int *)
e313ab0a
AJ
2032{ }
2033
451c4786
AJ
2034/**
2035 * Parse wccp2_assignment_method option
2036 * they can be '1' aka 'hash' or '2' aka 'mask'
2037 * repesenting the integer numeric of the same.
2038 */
2039void
72e2b394 2040parse_wccp2_amethod(int *method)
451c4786
AJ
2041{
2042 char *t;
2043
2044 /* Snarf the method */
2eceb328 2045 if ((t = ConfigParser::NextToken()) == NULL) {
451c4786
AJ
2046 debugs(80, DBG_CRITICAL, "wccp2_assignment_method: missing setting.");
2047 self_destruct();
2048 }
2049
2050 /* update configuration if its valid */
2051 if (strcmp(t, "hash") == 0 || strcmp(t, "1") == 0) {
2052 *method = WCCP2_ASSIGNMENT_METHOD_HASH;
2053 } else if (strcmp(t, "mask") == 0 || strcmp(t, "2") == 0) {
2054 *method = WCCP2_ASSIGNMENT_METHOD_MASK;
2055 } else {
2056 debugs(80, DBG_CRITICAL, "wccp2_assignment_method: unknown setting, got " << t );
2057 self_destruct();
2058 }
2059}
2060
2061void
2062dump_wccp2_amethod(StoreEntry * e, const char *label, int v)
2063{
26ac0430 2064 switch (v) {
451c4786
AJ
2065 case WCCP2_ASSIGNMENT_METHOD_HASH:
2066 storeAppendPrintf(e, "%s hash\n", label);
2067 break;
2068 case WCCP2_ASSIGNMENT_METHOD_MASK:
2069 storeAppendPrintf(e, "%s mask\n", label);
2070 break;
2071 default:
2072 debugs(80, DBG_CRITICAL, "FATAL: WCCPv2 configured " << label << " (" << v << ") is not valid.");
2073 self_destruct();
2074 }
2075}
2076
2077void
ced8def3
AJ
2078free_wccp2_amethod(int *)
2079{}
451c4786 2080
0b0cfcf2 2081/*
2082 * Format:
2083 *
2084 * wccp2_service {standard|dynamic} {id} (password=password)
2085 */
2086void
ced8def3 2087parse_wccp2_service(void *)
0b0cfcf2 2088{
2089 char *t;
2090 int service = 0;
2091 int service_id = 0;
2092 int security_type = WCCP2_NO_SECURITY;
2093 char wccp_password[WCCP2_PASSWORD_LEN + 1];
2094
2095 if (wccp2_connected == 1) {
e0236918 2096 debugs(80, DBG_IMPORTANT, "WCCPv2: Somehow reparsing the configuration without having shut down WCCP! Try reloading squid again.");
0b0cfcf2 2097 return;
2098 }
2099
2100 /* Snarf the type */
2eceb328 2101 if ((t = ConfigParser::NextToken()) == NULL) {
fa84c01d 2102 debugs(80, DBG_CRITICAL, "wccp2ParseServiceInfo: missing service info type (standard|dynamic)");
0b0cfcf2 2103 self_destruct();
2104 }
2105
2106 if (strcmp(t, "standard") == 0) {
2107 service = WCCP2_SERVICE_STANDARD;
2108 } else if (strcmp(t, "dynamic") == 0) {
2109 service = WCCP2_SERVICE_DYNAMIC;
2110 } else {
fa84c01d 2111 debugs(80, DBG_CRITICAL, "wccp2ParseServiceInfo: bad service info type (expected standard|dynamic, got " << t << ")");
0b0cfcf2 2112 self_destruct();
2113 }
2114
2115 /* Snarf the ID */
2116 service_id = GetInteger();
2117
2118 if (service_id < 0 || service_id > 255) {
30c48b1a 2119 debugs(80, DBG_CRITICAL, "ERROR: invalid WCCP service id " << service_id << " (must be between 0 .. 255)");
0b0cfcf2 2120 self_destruct();
2121 }
2122
2123 memset(wccp_password, 0, sizeof(wccp_password));
2124 /* Handle password, if any */
2125
2eceb328 2126 if ((t = ConfigParser::NextToken()) != NULL) {
0b0cfcf2 2127 if (strncmp(t, "password=", 9) == 0) {
2128 security_type = WCCP2_MD5_SECURITY;
2129 strncpy(wccp_password, t + 9, WCCP2_PASSWORD_LEN);
2130 }
2131 }
2132
2133 /* Create a placeholder service record */
2134 wccp2_add_service_list(service, service_id, 0, 0, 0, empty_portlist, security_type, wccp_password);
2135}
2136
2137void
ced8def3 2138dump_wccp2_service(StoreEntry * e, const char *label, void *)
0b0cfcf2 2139{
0b0cfcf2 2140 struct wccp2_service_list_t *srv;
2141 srv = wccp2_service_list_head;
2142
2143 while (srv != NULL) {
bf8fe701 2144 debugs(80, 3, "dump_wccp2_service: id " << srv->info.service_id << ", type " << srv->info.service);
0b0cfcf2 2145 storeAppendPrintf(e, "%s %s %d", label,
2146 (srv->info.service == WCCP2_SERVICE_DYNAMIC) ? "dynamic" : "standard",
2147 srv->info.service_id);
2148
2149 if (srv->wccp2_security_type == WCCP2_MD5_SECURITY) {
2150 storeAppendPrintf(e, " %s", srv->wccp_password);
2151 }
2152
c208fd0e 2153 storeAppendPrintf(e, "\n");
2154
0b0cfcf2 2155 srv = srv->next;
2156 }
2157}
2158
2159void
ced8def3 2160free_wccp2_service(void *)
0b0cfcf2 2161{}
2162
2163int
ced8def3 2164check_null_wccp2_service(void *)
0b0cfcf2 2165{
2166 return !wccp2_service_list_head;
2167}
2168
2169/*
2170 * Format:
2171 *
2172 * wccp2_service_info {id} stuff..
2173 *
2174 * Where stuff is:
2175 *
2176 * + flags=flag,flag,flag..
2177 * + proto=protocol (tcp|udp)
2178 * + ports=port,port,port (up to a max of 8)
2179 * + priority=priority (0->255)
2180 *
2181 * The flags here are:
2182 * src_ip_hash, dst_ip_hash, source_port_hash, dst_port_hash, ports_defined,
2183 * ports_source, src_ip_alt_hash, dst_ip_alt_hash, src_port_alt_hash, dst_port_alt_hash
2184 */
2185static int
2186parse_wccp2_service_flags(char *flags)
2187{
5a429fae 2188 if (!flags)
0b0cfcf2 2189 return 0;
0b0cfcf2 2190
5a429fae
AJ
2191 char *flag = flags;
2192 int retflag = 0;
0b0cfcf2 2193
5a429fae 2194 while (size_t len = strcspn(flag, ",")) {
0b0cfcf2 2195
5a429fae 2196 if (strncmp(flag, "src_ip_hash", len) == 0) {
0b0cfcf2 2197 retflag |= WCCP2_SERVICE_SRC_IP_HASH;
5a429fae 2198 } else if (strncmp(flag, "dst_ip_hash", len) == 0) {
0b0cfcf2 2199 retflag |= WCCP2_SERVICE_DST_IP_HASH;
5a429fae 2200 } else if (strncmp(flag, "source_port_hash", len) == 0) {
b7d249f9 2201 retflag |= WCCP2_SERVICE_SRC_PORT_HASH;
5a429fae 2202 } else if (strncmp(flag, "dst_port_hash", len) == 0) {
0b0cfcf2 2203 retflag |= WCCP2_SERVICE_DST_PORT_HASH;
5a429fae 2204 } else if (strncmp(flag, "ports_source", len) == 0) {
0b0cfcf2 2205 retflag |= WCCP2_SERVICE_PORTS_SOURCE;
5a429fae 2206 } else if (strncmp(flag, "src_ip_alt_hash", len) == 0) {
0b0cfcf2 2207 retflag |= WCCP2_SERVICE_SRC_IP_ALT_HASH;
5a429fae 2208 } else if (strncmp(flag, "dst_ip_alt_hash", len) == 0) {
0b0cfcf2 2209 retflag |= WCCP2_SERVICE_DST_IP_ALT_HASH;
5a429fae 2210 } else if (strncmp(flag, "src_port_alt_hash", len) == 0) {
0b0cfcf2 2211 retflag |= WCCP2_SERVICE_SRC_PORT_ALT_HASH;
5a429fae 2212 } else if (strncmp(flag, "dst_port_alt_hash", len) == 0) {
0b0cfcf2 2213 retflag |= WCCP2_SERVICE_DST_PORT_ALT_HASH;
2214 } else {
5a429fae 2215 flag[len] = '\0';
0b0cfcf2 2216 fatalf("Unknown wccp2 service flag: %s\n", flag);
2217 }
2218
5a429fae
AJ
2219 if (flag[len] == '\0')
2220 break;
2221
2222 flag += len+1;
0b0cfcf2 2223 }
2224
0b0cfcf2 2225 return retflag;
2226}
2227
2228static void
2229parse_wccp2_service_ports(char *options, int portlist[])
2230{
0b0cfcf2 2231 if (!options) {
2232 return;
2233 }
2234
5a429fae
AJ
2235 int i = 0;
2236 char *tmp = options;
af3adcba 2237
5a429fae
AJ
2238 while (size_t len = strcspn(tmp, ",")) {
2239 if (i >= WCCP2_NUMPORTS) {
2240 fatalf("parse_wccp2_service_ports: too many ports (maximum: 8) in list '%s'\n", options);
2241 }
2242 int p = xatoi(tmp);
0b0cfcf2 2243
2244 if (p < 1 || p > 65535) {
5a429fae 2245 fatalf("parse_wccp2_service_ports: port value '%s' isn't valid (1..65535)\n", tmp);
0b0cfcf2 2246 }
2247
2248 portlist[i] = p;
14942edd 2249 ++i;
5a429fae
AJ
2250 if (tmp[len] == '\0')
2251 return;
2252 tmp += len+1;
af3adcba 2253 }
0b0cfcf2 2254}
2255
2256void
ced8def3 2257parse_wccp2_service_info(void *)
0b0cfcf2 2258{
2259 char *t, *end;
2260 int service_id = 0;
2261 int flags = 0;
2262 int portlist[WCCP2_NUMPORTS];
f53969cc 2263 int protocol = -1; /* IPPROTO_TCP | IPPROTO_UDP */
0b0cfcf2 2264
2265 struct wccp2_service_list_t *srv;
2266 int priority = -1;
2267
2268 if (wccp2_connected == 1) {
e0236918 2269 debugs(80, DBG_IMPORTANT, "WCCPv2: Somehow reparsing the configuration without having shut down WCCP! Try reloading squid again.");
0b0cfcf2 2270 return;
2271 }
2272
bf8fe701 2273 debugs(80, 5, "parse_wccp2_service_info: called");
a302ad3c 2274 memset(portlist, 0, sizeof(portlist));
0b0cfcf2 2275 /* First argument: id */
2276 service_id = GetInteger();
2277
2278 if (service_id < 0 || service_id > 255) {
30c48b1a 2279 debugs(80, DBG_CRITICAL, "ERROR: invalid WCCP service id " << service_id << " (must be between 0 .. 255)");
0b0cfcf2 2280 self_destruct();
2281 }
2282
2283 /* Next: find the (hopefully!) existing service */
2284 srv = wccp2_get_service_by_id(WCCP2_SERVICE_DYNAMIC, service_id);
2285
2286 if (srv == NULL) {
2287 fatalf("parse_wccp2_service_info: unknown dynamic service id %d: you need to define it using wccp2_service (and make sure you wish to configure it as a dynamic service.)\n", service_id);
2288 }
2289
2290 /* Next: loop until we don't have any more tokens */
2eceb328 2291 while ((t = ConfigParser::NextToken()) != NULL) {
0b0cfcf2 2292 if (strncmp(t, "flags=", 6) == 0) {
2293 /* XXX eww, string pointer math */
2294 flags = parse_wccp2_service_flags(t + 6);
2295 } else if (strncmp(t, "ports=", 6) == 0) {
2296 parse_wccp2_service_ports(t + 6, portlist);
2297 flags |= WCCP2_SERVICE_PORTS_DEFINED;
2298 } else if (strncmp(t, "protocol=tcp", 12) == 0) {
2299 protocol = IPPROTO_TCP;
2300 } else if (strncmp(t, "protocol=udp", 12) == 0) {
2301 protocol = IPPROTO_UDP;
2302 } else if (strncmp(t, "protocol=", 9) == 0) {
2303 fatalf("parse_wccp2_service_info: id %d: unknown protocol (%s) - must be tcp or udp!\n", service_id, t);
2304 } else if (strncmp(t, "priority=", 9) == 0) {
2305 priority = strtol(t + 9, &end, 0);
2306
2307 if (priority < 0 || priority > 255) {
2308 fatalf("parse_wccp2_service_info: id %d: %s out of range (0..255)!\n", service_id, t);
2309 }
2310 } else {
2311 fatalf("parse_wccp2_service_info: id %d: unknown option '%s'\n", service_id, t);
2312 }
2313 }
2314
2315 /* Check everything is set */
2316 if (priority == -1) {
2317 fatalf("parse_wccp2_service_info: service %d: no priority defined (valid: 0..255)!\n", service_id);
2318 }
2319
2320 if (protocol == -1) {
2321 fatalf("parse_wccp2_service_info: service %d: no protocol defined (valid: tcp or udp)!\n", service_id);
2322 }
2323
2324 if (!(flags & WCCP2_SERVICE_PORTS_DEFINED)) {
2325 fatalf("parse_wccp2_service_info: service %d: no ports defined!\n", service_id);
2326 }
2327
2328 /* rightio! now we can update */
2329 wccp2_update_service(srv, WCCP2_SERVICE_DYNAMIC, service_id, priority,
2330 protocol, flags, portlist);
2331
2332 /* Done! */
2333}
2334
2335void
ced8def3 2336dump_wccp2_service_info(StoreEntry * e, const char *label, void *)
0b0cfcf2 2337{
2338 char comma;
2339
2340 struct wccp2_service_list_t *srv;
2341 int flags;
2342 srv = wccp2_service_list_head;
2343
2344 while (srv != NULL) {
bf8fe701 2345 debugs(80, 3, "dump_wccp2_service_info: id " << srv->info.service_id << " (type " << srv->info.service << ")");
0b0cfcf2 2346
2347 /* We don't need to spit out information for standard services */
2348
2349 if (srv->info.service == WCCP2_SERVICE_STANDARD) {
bf8fe701 2350 debugs(80, 3, "dump_wccp2_service_info: id " << srv->info.service_id << ": standard service, not dumping info");
2351
0b0cfcf2 2352 /* XXX eww */
2353 srv = srv->next;
2354 continue;
2355 }
2356
2357 storeAppendPrintf(e, "%s %d", label, srv->info.service_id);
2358
2359 /* priority */
2360 storeAppendPrintf(e, " priority=%d", srv->info.service_priority);
2361
2362 /* flags */
2363 flags = ntohl(srv->info.service_flags);
2364
2365 if (flags != 0) {
2366 comma = 0;
2367 storeAppendPrintf(e, " flags=");
2368
2369 if (flags & WCCP2_SERVICE_SRC_IP_HASH) {
2370 storeAppendPrintf(e, "%ssrc_ip_hash", comma ? "," : "");
2371 comma = 1;
2372 }
2373
2374 if (flags & WCCP2_SERVICE_DST_IP_HASH) {
2375 storeAppendPrintf(e, "%sdst_ip_hash", comma ? "," : "");
2376 comma = 1;
2377 }
2378
b7d249f9 2379 if (flags & WCCP2_SERVICE_SRC_PORT_HASH) {
0b0cfcf2 2380 storeAppendPrintf(e, "%ssource_port_hash", comma ? "," : "");
2381 comma = 1;
2382 }
2383
2384 if (flags & WCCP2_SERVICE_DST_PORT_HASH) {
2385 storeAppendPrintf(e, "%sdst_port_hash", comma ? "," : "");
2386 comma = 1;
2387 }
2388
2389 if (flags & WCCP2_SERVICE_PORTS_DEFINED) {
2390 storeAppendPrintf(e, "%sports_defined", comma ? "," : "");
2391 comma = 1;
2392 }
2393
2394 if (flags & WCCP2_SERVICE_PORTS_SOURCE) {
2395 storeAppendPrintf(e, "%sports_source", comma ? "," : "");
2396 comma = 1;
2397 }
2398
2399 if (flags & WCCP2_SERVICE_SRC_IP_ALT_HASH) {
2400 storeAppendPrintf(e, "%ssrc_ip_alt_hash", comma ? "," : "");
2401 comma = 1;
2402 }
2403
2404 if (flags & WCCP2_SERVICE_DST_IP_ALT_HASH) {
2405 storeAppendPrintf(e, "%ssrc_ip_alt_hash", comma ? "," : "");
2406 comma = 1;
2407 }
2408
2409 if (flags & WCCP2_SERVICE_SRC_PORT_ALT_HASH) {
2410 storeAppendPrintf(e, "%ssrc_port_alt_hash", comma ? "," : "");
2411 comma = 1;
2412 }
2413
2414 if (flags & WCCP2_SERVICE_DST_PORT_ALT_HASH) {
2415 storeAppendPrintf(e, "%sdst_port_alt_hash", comma ? "," : "");
2416 comma = 1;
2417 }
2418 }
2419
2420 /* ports */
2421 comma = 0;
2422
2423 if (srv->info.port0 != 0) {
2424 storeAppendPrintf(e, "%s%d", comma ? "," : " ports=", ntohs(srv->info.port0));
2425 comma = 1;
2426 }
2427
2428 if (srv->info.port1 != 0) {
2429 storeAppendPrintf(e, "%s%d", comma ? "," : "ports=", ntohs(srv->info.port1));
2430 comma = 1;
2431 }
2432
2433 if (srv->info.port2 != 0) {
2434 storeAppendPrintf(e, "%s%d", comma ? "," : "ports=", ntohs(srv->info.port2));
2435 comma = 1;
2436 }
2437
2438 if (srv->info.port3 != 0) {
2439 storeAppendPrintf(e, "%s%d", comma ? "," : "ports=", ntohs(srv->info.port3));
2440 comma = 1;
2441 }
2442
2443 if (srv->info.port4 != 0) {
2444 storeAppendPrintf(e, "%s%d", comma ? "," : "ports=", ntohs(srv->info.port4));
2445 comma = 1;
2446 }
2447
2448 if (srv->info.port5 != 0) {
2449 storeAppendPrintf(e, "%s%d", comma ? "," : "ports=", ntohs(srv->info.port5));
2450 comma = 1;
2451 }
2452
2453 if (srv->info.port6 != 0) {
2454 storeAppendPrintf(e, "%s%d", comma ? "," : "ports=", ntohs(srv->info.port6));
2455 comma = 1;
2456 }
2457
2458 if (srv->info.port7 != 0) {
2459 storeAppendPrintf(e, "%s%d", comma ? "," : "ports=", ntohs(srv->info.port7));
2460 comma = 1;
2461 }
2462
2463 /* protocol */
2464 storeAppendPrintf(e, " protocol=%s", (srv->info.service_protocol == IPPROTO_TCP) ? "tcp" : "udp");
2465
2466 storeAppendPrintf(e, "\n");
2467
2468 srv = srv->next;
2469 }
2470}
2471
264096e2 2472/* Sort the cache list by doing a "selection sort" by IP address */
2473static void
2474wccp2SortCacheList(struct wccp2_cache_list_t *head)
2475{
2476 struct wccp2_cache_list_t tmp;
2477 struct wccp2_cache_list_t *this_item;
2478 struct wccp2_cache_list_t *find_item;
2479 struct wccp2_cache_list_t *next_lowest;
2480
2481 /* Go through each position in the list one at a time */
2482 for (this_item = head; this_item->next; this_item = this_item->next) {
26ac0430
AJ
2483 /* Find the item with the lowest IP */
2484 next_lowest = this_item;
2485
2486 for (find_item = this_item; find_item->next; find_item = find_item->next) {
2487 if (find_item->cache_ip.s_addr < next_lowest->cache_ip.s_addr) {
2488 next_lowest = find_item;
2489 }
2490 }
2491 /* Swap if we need to */
2492 if (next_lowest != this_item) {
2493 /* First make a copy of the current item */
2494 memcpy(&tmp, this_item, sizeof(struct wccp2_cache_list_t));
2495
2496 /* Next update the pointers to maintain the linked list */
2497 tmp.next = next_lowest->next;
2498 next_lowest->next = this_item->next;
2499
2500 /* Finally copy the updated items to their correct location */
2501 memcpy(this_item, next_lowest, sizeof(struct wccp2_cache_list_t));
2502 memcpy(next_lowest, &tmp, sizeof(struct wccp2_cache_list_t));
2503 }
264096e2 2504 }
2505}
2506
0b0cfcf2 2507void
ced8def3 2508free_wccp2_service_info(void *)
0b0cfcf2 2509{}
2510
2511#endif /* USE_WCCPv2 */
f53969cc 2512