]> git.ipfire.org Git - thirdparty/pdns.git/blob - pdns/misc.cc
Merge pull request #7984 from qvr/slave-renotify-metadata
[thirdparty/pdns.git] / pdns / misc.cc
1 /*
2 * This file is part of PowerDNS or dnsdist.
3 * Copyright -- PowerDNS.COM B.V. and its contributors
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of version 2 of the GNU General Public License as
7 * published by the Free Software Foundation.
8 *
9 * In addition, for the avoidance of any doubt, permission is granted to
10 * link this program with OpenSSL and to (re)distribute the binaries
11 * produced as the result of such linking.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
21 */
22 #ifdef HAVE_CONFIG_H
23 #include "config.h"
24 #endif
25 #include <sys/param.h>
26 #include <sys/socket.h>
27 #include <fcntl.h>
28 #include <netdb.h>
29 #include <sys/time.h>
30 #include <time.h>
31 #include <sys/resource.h>
32 #include <netinet/in.h>
33 #include <sys/un.h>
34 #include <unistd.h>
35 #include <fstream>
36 #include "misc.hh"
37 #include <vector>
38 #include <sstream>
39 #include <errno.h>
40 #include <cstring>
41 #include <iostream>
42 #include <sys/types.h>
43 #include <dirent.h>
44 #include <algorithm>
45 #include <boost/optional.hpp>
46 #include <poll.h>
47 #include <iomanip>
48 #include <netinet/tcp.h>
49 #include <string.h>
50 #include <stdlib.h>
51 #include <stdio.h>
52 #include "pdnsexception.hh"
53 #include <sys/types.h>
54 #include <boost/algorithm/string.hpp>
55 #include "iputils.hh"
56 #include "dnsparser.hh"
57 #include <sys/types.h>
58 #include <pwd.h>
59 #include <grp.h>
60 #ifdef __FreeBSD__
61 # include <pthread_np.h>
62 #endif
63 #ifdef __NetBSD__
64 # include <pthread.h>
65 # include <sched.h>
66 #endif
67
68 bool g_singleThreaded;
69
70 size_t writen2(int fd, const void *buf, size_t count)
71 {
72 const char *ptr = (char*)buf;
73 const char *eptr = ptr + count;
74
75 ssize_t res;
76 while(ptr != eptr) {
77 res = ::write(fd, ptr, eptr - ptr);
78 if(res < 0) {
79 if (errno == EAGAIN)
80 throw std::runtime_error("used writen2 on non-blocking socket, got EAGAIN");
81 else
82 unixDie("failed in writen2");
83 }
84 else if (res == 0)
85 throw std::runtime_error("could not write all bytes, got eof in writen2");
86
87 ptr += (size_t) res;
88 }
89
90 return count;
91 }
92
93 size_t readn2(int fd, void* buffer, size_t len)
94 {
95 size_t pos=0;
96 ssize_t res;
97 for(;;) {
98 res = read(fd, (char*)buffer + pos, len - pos);
99 if(res == 0)
100 throw runtime_error("EOF while reading message");
101 if(res < 0) {
102 if (errno == EAGAIN)
103 throw std::runtime_error("used readn2 on non-blocking socket, got EAGAIN");
104 else
105 unixDie("failed in readn2");
106 }
107
108 pos+=(size_t)res;
109 if(pos == len)
110 break;
111 }
112 return len;
113 }
114
115 size_t readn2WithTimeout(int fd, void* buffer, size_t len, int idleTimeout, int totalTimeout)
116 {
117 size_t pos = 0;
118 time_t start = 0;
119 int remainingTime = totalTimeout;
120 if (totalTimeout) {
121 start = time(NULL);
122 }
123
124 do {
125 ssize_t got = read(fd, (char *)buffer + pos, len - pos);
126 if (got > 0) {
127 pos += (size_t) got;
128 }
129 else if (got == 0) {
130 throw runtime_error("EOF while reading message");
131 }
132 else {
133 if (errno == EAGAIN) {
134 int res = waitForData(fd, (totalTimeout == 0 || idleTimeout <= remainingTime) ? idleTimeout : remainingTime);
135 if (res > 0) {
136 /* there is data available */
137 }
138 else if (res == 0) {
139 throw runtime_error("Timeout while waiting for data to read");
140 } else {
141 throw runtime_error("Error while waiting for data to read");
142 }
143 }
144 else {
145 unixDie("failed in readn2WithTimeout");
146 }
147 }
148
149 if (totalTimeout) {
150 time_t now = time(NULL);
151 int elapsed = now - start;
152 if (elapsed >= remainingTime) {
153 throw runtime_error("Timeout while reading data");
154 }
155 start = now;
156 remainingTime -= elapsed;
157 }
158 }
159 while (pos < len);
160
161 return len;
162 }
163
164 size_t writen2WithTimeout(int fd, const void * buffer, size_t len, int timeout)
165 {
166 size_t pos = 0;
167 do {
168 ssize_t written = write(fd, (char *)buffer + pos, len - pos);
169
170 if (written > 0) {
171 pos += (size_t) written;
172 }
173 else if (written == 0)
174 throw runtime_error("EOF while writing message");
175 else {
176 if (errno == EAGAIN) {
177 int res = waitForRWData(fd, false, timeout, 0);
178 if (res > 0) {
179 /* there is room available */
180 }
181 else if (res == 0) {
182 throw runtime_error("Timeout while waiting to write data");
183 } else {
184 throw runtime_error("Error while waiting for room to write data");
185 }
186 }
187 else {
188 unixDie("failed in write2WithTimeout");
189 }
190 }
191 }
192 while (pos < len);
193
194 return len;
195 }
196
197 string nowTime()
198 {
199 time_t now = time(nullptr);
200 struct tm* tm = localtime(&now);
201 char buffer[30];
202 // YYYY-mm-dd HH:MM:SS TZOFF
203 strftime(buffer, sizeof(buffer), "%F %T %z", tm);
204 buffer[sizeof(buffer)-1] = '\0';
205 return string(buffer);
206 }
207
208 uint16_t getShort(const unsigned char *p)
209 {
210 return p[0] * 256 + p[1];
211 }
212
213
214 uint16_t getShort(const char *p)
215 {
216 return getShort((const unsigned char *)p);
217 }
218
219 uint32_t getLong(const unsigned char* p)
220 {
221 return (p[0]<<24) + (p[1]<<16) + (p[2]<<8) + p[3];
222 }
223
224 uint32_t getLong(const char* p)
225 {
226 return getLong((unsigned char *)p);
227 }
228
229 static bool ciEqual(const string& a, const string& b)
230 {
231 if(a.size()!=b.size())
232 return false;
233
234 string::size_type pos=0, epos=a.size();
235 for(;pos < epos; ++pos)
236 if(dns_tolower(a[pos])!=dns_tolower(b[pos]))
237 return false;
238 return true;
239 }
240
241 /** does domain end on suffix? Is smart about "wwwds9a.nl" "ds9a.nl" not matching */
242 static bool endsOn(const string &domain, const string &suffix)
243 {
244 if( suffix.empty() || ciEqual(domain, suffix) )
245 return true;
246
247 if(domain.size()<=suffix.size())
248 return false;
249
250 string::size_type dpos=domain.size()-suffix.size()-1, spos=0;
251
252 if(domain[dpos++]!='.')
253 return false;
254
255 for(; dpos < domain.size(); ++dpos, ++spos)
256 if(dns_tolower(domain[dpos]) != dns_tolower(suffix[spos]))
257 return false;
258
259 return true;
260 }
261
262 /** strips a domain suffix from a domain, returns true if it stripped */
263 bool stripDomainSuffix(string *qname, const string &domain)
264 {
265 if(!endsOn(*qname, domain))
266 return false;
267
268 if(toLower(*qname)==toLower(domain))
269 *qname="@";
270 else {
271 if((*qname)[qname->size()-domain.size()-1]!='.')
272 return false;
273
274 qname->resize(qname->size()-domain.size()-1);
275 }
276 return true;
277 }
278
279 static void parseService4(const string &descr, ServiceTuple &st)
280 {
281 vector<string>parts;
282 stringtok(parts,descr,":");
283 if(parts.empty())
284 throw PDNSException("Unable to parse '"+descr+"' as a service");
285 st.host=parts[0];
286 if(parts.size()>1)
287 st.port=pdns_stou(parts[1]);
288 }
289
290 static void parseService6(const string &descr, ServiceTuple &st)
291 {
292 string::size_type pos=descr.find(']');
293 if(pos == string::npos)
294 throw PDNSException("Unable to parse '"+descr+"' as an IPv6 service");
295
296 st.host=descr.substr(1, pos-1);
297 if(pos + 2 < descr.length())
298 st.port=pdns_stou(descr.substr(pos+2));
299 }
300
301
302 void parseService(const string &descr, ServiceTuple &st)
303 {
304 if(descr.empty())
305 throw PDNSException("Unable to parse '"+descr+"' as a service");
306
307 vector<string> parts;
308 stringtok(parts, descr, ":");
309
310 if(descr[0]=='[') {
311 parseService6(descr, st);
312 }
313 else if(descr[0]==':' || parts.size() > 2 || descr.find("::") != string::npos) {
314 st.host=descr;
315 }
316 else {
317 parseService4(descr, st);
318 }
319 }
320
321 // returns -1 in case if error, 0 if no data is available, 1 if there is. In the first two cases, errno is set
322 int waitForData(int fd, int seconds, int useconds)
323 {
324 return waitForRWData(fd, true, seconds, useconds);
325 }
326
327 int waitForRWData(int fd, bool waitForRead, int seconds, int useconds, bool* error, bool* disconnected)
328 {
329 int ret;
330
331 struct pollfd pfd;
332 memset(&pfd, 0, sizeof(pfd));
333 pfd.fd = fd;
334
335 if(waitForRead)
336 pfd.events=POLLIN;
337 else
338 pfd.events=POLLOUT;
339
340 ret = poll(&pfd, 1, seconds * 1000 + useconds/1000);
341 if (ret > 0) {
342 if (error && (pfd.revents & POLLERR)) {
343 *error = true;
344 }
345 if (disconnected && (pfd.revents & POLLHUP)) {
346 *disconnected = true;
347 }
348 }
349
350 return ret;
351 }
352
353 // returns -1 in case of error, 0 if no data is available, 1 if there is. In the first two cases, errno is set
354 int waitForMultiData(const set<int>& fds, const int seconds, const int useconds, int* fdOut) {
355 set<int> realFDs;
356 for (const auto& fd : fds) {
357 if (fd >= 0 && realFDs.count(fd) == 0) {
358 realFDs.insert(fd);
359 }
360 }
361
362 std::vector<struct pollfd> pfds(realFDs.size());
363 memset(pfds.data(), 0, realFDs.size()*sizeof(struct pollfd));
364 int ctr = 0;
365 for (const auto& fd : realFDs) {
366 pfds[ctr].fd = fd;
367 pfds[ctr].events = POLLIN;
368 ctr++;
369 }
370
371 int ret;
372 if(seconds >= 0)
373 ret = poll(pfds.data(), realFDs.size(), seconds * 1000 + useconds/1000);
374 else
375 ret = poll(pfds.data(), realFDs.size(), -1);
376 if(ret <= 0)
377 return ret;
378
379 set<int> pollinFDs;
380 for (const auto& pfd : pfds) {
381 if (pfd.revents & POLLIN) {
382 pollinFDs.insert(pfd.fd);
383 }
384 }
385 set<int>::const_iterator it(pollinFDs.begin());
386 advance(it, random() % pollinFDs.size());
387 *fdOut = *it;
388 return 1;
389 }
390
391 // returns -1 in case of error, 0 if no data is available, 1 if there is. In the first two cases, errno is set
392 int waitFor2Data(int fd1, int fd2, int seconds, int useconds, int*fd)
393 {
394 int ret;
395
396 struct pollfd pfds[2];
397 memset(&pfds[0], 0, 2*sizeof(struct pollfd));
398 pfds[0].fd = fd1;
399 pfds[1].fd = fd2;
400
401 pfds[0].events= pfds[1].events = POLLIN;
402
403 int nsocks = 1 + (fd2 >= 0); // fd2 can optionally be -1
404
405 if(seconds >= 0)
406 ret = poll(pfds, nsocks, seconds * 1000 + useconds/1000);
407 else
408 ret = poll(pfds, nsocks, -1);
409 if(!ret || ret < 0)
410 return ret;
411
412 if((pfds[0].revents & POLLIN) && !(pfds[1].revents & POLLIN))
413 *fd = pfds[0].fd;
414 else if((pfds[1].revents & POLLIN) && !(pfds[0].revents & POLLIN))
415 *fd = pfds[1].fd;
416 else if(ret == 2) {
417 *fd = pfds[random()%2].fd;
418 }
419 else
420 *fd = -1; // should never happen
421
422 return 1;
423 }
424
425
426 string humanDuration(time_t passed)
427 {
428 ostringstream ret;
429 if(passed<60)
430 ret<<passed<<" seconds";
431 else if(passed<3600)
432 ret<<std::setprecision(2)<<passed/60.0<<" minutes";
433 else if(passed<86400)
434 ret<<std::setprecision(3)<<passed/3600.0<<" hours";
435 else if(passed<(86400*30.41))
436 ret<<std::setprecision(3)<<passed/86400.0<<" days";
437 else
438 ret<<std::setprecision(3)<<passed/(86400*30.41)<<" months";
439
440 return ret.str();
441 }
442
443 DTime::DTime()
444 {
445 // set(); // saves lots of gettimeofday calls
446 d_set.tv_sec=d_set.tv_usec=0;
447 }
448
449 DTime::DTime(const DTime &dt) : d_set(dt.d_set)
450 {
451 }
452
453 time_t DTime::time()
454 {
455 return d_set.tv_sec;
456 }
457
458 const string unquotify(const string &item)
459 {
460 if(item.size()<2)
461 return item;
462
463 string::size_type bpos=0, epos=item.size();
464
465 if(item[0]=='"')
466 bpos=1;
467
468 if(item[epos-1]=='"')
469 epos-=1;
470
471 return item.substr(bpos,epos-bpos);
472 }
473
474 void stripLine(string &line)
475 {
476 string::size_type pos=line.find_first_of("\r\n");
477 if(pos!=string::npos) {
478 line.resize(pos);
479 }
480 }
481
482 string urlEncode(const string &text)
483 {
484 string ret;
485 for(string::const_iterator i=text.begin();i!=text.end();++i)
486 if(*i==' ')ret.append("%20");
487 else ret.append(1,*i);
488 return ret;
489 }
490
491 string getHostname()
492 {
493 #ifndef MAXHOSTNAMELEN
494 #define MAXHOSTNAMELEN 255
495 #endif
496
497 char tmp[MAXHOSTNAMELEN];
498 if(gethostname(tmp, MAXHOSTNAMELEN))
499 return "UNKNOWN";
500
501 return string(tmp);
502 }
503
504 string itoa(int i)
505 {
506 ostringstream o;
507 o<<i;
508 return o.str();
509 }
510
511 string uitoa(unsigned int i) // MSVC 6 doesn't grok overloading (un)signed
512 {
513 ostringstream o;
514 o<<i;
515 return o.str();
516 }
517
518 string bitFlip(const string &str)
519 {
520 string::size_type pos=0, epos=str.size();
521 string ret;
522 ret.reserve(epos);
523 for(;pos < epos; ++pos)
524 ret.append(1, ~str[pos]);
525 return ret;
526 }
527
528 string stringerror()
529 {
530 return strerror(errno);
531 }
532
533 string netstringerror()
534 {
535 return stringerror();
536 }
537
538 void cleanSlashes(string &str)
539 {
540 string::const_iterator i;
541 string out;
542 for(i=str.begin();i!=str.end();++i) {
543 if(*i=='/' && i!=str.begin() && *(i-1)=='/')
544 continue;
545 out.append(1,*i);
546 }
547 str=out;
548 }
549
550
551 bool IpToU32(const string &str, uint32_t *ip)
552 {
553 if(str.empty()) {
554 *ip=0;
555 return true;
556 }
557
558 struct in_addr inp;
559 if(inet_aton(str.c_str(), &inp)) {
560 *ip=inp.s_addr;
561 return true;
562 }
563 return false;
564 }
565
566 string U32ToIP(uint32_t val)
567 {
568 char tmp[17];
569 snprintf(tmp, sizeof(tmp), "%u.%u.%u.%u",
570 (val >> 24)&0xff,
571 (val >> 16)&0xff,
572 (val >> 8)&0xff,
573 (val )&0xff);
574 return string(tmp);
575 }
576
577
578 string makeHexDump(const string& str)
579 {
580 char tmp[5];
581 string ret;
582 ret.reserve((int)(str.size()*2.2));
583
584 for(string::size_type n=0;n<str.size();++n) {
585 snprintf(tmp, sizeof(tmp), "%02x ", (unsigned char)str[n]);
586 ret+=tmp;
587 }
588 return ret;
589 }
590
591 // shuffle, maintaining some semblance of order
592 void shuffle(vector<DNSZoneRecord>& rrs)
593 {
594 vector<DNSZoneRecord>::iterator first, second;
595 for(first=rrs.begin();first!=rrs.end();++first)
596 if(first->dr.d_place==DNSResourceRecord::ANSWER && first->dr.d_type != QType::CNAME) // CNAME must come first
597 break;
598 for(second=first;second!=rrs.end();++second)
599 if(second->dr.d_place!=DNSResourceRecord::ANSWER)
600 break;
601
602 if(second-first > 1)
603 random_shuffle(first,second);
604
605 // now shuffle the additional records
606 for(first=second;first!=rrs.end();++first)
607 if(first->dr.d_place==DNSResourceRecord::ADDITIONAL && first->dr.d_type != QType::CNAME) // CNAME must come first
608 break;
609 for(second=first;second!=rrs.end();++second)
610 if(second->dr.d_place!=DNSResourceRecord::ADDITIONAL)
611 break;
612
613 if(second-first>1)
614 random_shuffle(first,second);
615
616 // we don't shuffle the rest
617 }
618
619
620 // shuffle, maintaining some semblance of order
621 void shuffle(vector<DNSRecord>& rrs)
622 {
623 vector<DNSRecord>::iterator first, second;
624 for(first=rrs.begin();first!=rrs.end();++first)
625 if(first->d_place==DNSResourceRecord::ANSWER && first->d_type != QType::CNAME) // CNAME must come first
626 break;
627 for(second=first;second!=rrs.end();++second)
628 if(second->d_place!=DNSResourceRecord::ANSWER || second->d_type == QType::RRSIG) // leave RRSIGs at the end
629 break;
630
631 if(second-first>1)
632 random_shuffle(first,second);
633
634 // now shuffle the additional records
635 for(first=second;first!=rrs.end();++first)
636 if(first->d_place==DNSResourceRecord::ADDITIONAL && first->d_type != QType::CNAME) // CNAME must come first
637 break;
638 for(second=first; second!=rrs.end(); ++second)
639 if(second->d_place!=DNSResourceRecord::ADDITIONAL)
640 break;
641
642 if(second-first>1)
643 random_shuffle(first,second);
644
645 // we don't shuffle the rest
646 }
647
648 static uint16_t mapTypesToOrder(uint16_t type)
649 {
650 if(type == QType::CNAME)
651 return 0;
652 if(type == QType::RRSIG)
653 return 65535;
654 else
655 return 1;
656 }
657
658 // make sure rrs is sorted in d_place order to avoid surprises later
659 // then shuffle the parts that desire shuffling
660 void orderAndShuffle(vector<DNSRecord>& rrs)
661 {
662 std::stable_sort(rrs.begin(), rrs.end(), [](const DNSRecord&a, const DNSRecord& b) {
663 return std::make_tuple(a.d_place, mapTypesToOrder(a.d_type)) < std::make_tuple(b.d_place, mapTypesToOrder(b.d_type));
664 });
665 shuffle(rrs);
666 }
667
668 void normalizeTV(struct timeval& tv)
669 {
670 if(tv.tv_usec > 1000000) {
671 ++tv.tv_sec;
672 tv.tv_usec-=1000000;
673 }
674 else if(tv.tv_usec < 0) {
675 --tv.tv_sec;
676 tv.tv_usec+=1000000;
677 }
678 }
679
680 const struct timeval operator+(const struct timeval& lhs, const struct timeval& rhs)
681 {
682 struct timeval ret;
683 ret.tv_sec=lhs.tv_sec + rhs.tv_sec;
684 ret.tv_usec=lhs.tv_usec + rhs.tv_usec;
685 normalizeTV(ret);
686 return ret;
687 }
688
689 const struct timeval operator-(const struct timeval& lhs, const struct timeval& rhs)
690 {
691 struct timeval ret;
692 ret.tv_sec=lhs.tv_sec - rhs.tv_sec;
693 ret.tv_usec=lhs.tv_usec - rhs.tv_usec;
694 normalizeTV(ret);
695 return ret;
696 }
697
698 pair<string, string> splitField(const string& inp, char sepa)
699 {
700 pair<string, string> ret;
701 string::size_type cpos=inp.find(sepa);
702 if(cpos==string::npos)
703 ret.first=inp;
704 else {
705 ret.first=inp.substr(0, cpos);
706 ret.second=inp.substr(cpos+1);
707 }
708 return ret;
709 }
710
711 int logFacilityToLOG(unsigned int facility)
712 {
713 switch(facility) {
714 case 0:
715 return LOG_LOCAL0;
716 case 1:
717 return(LOG_LOCAL1);
718 case 2:
719 return(LOG_LOCAL2);
720 case 3:
721 return(LOG_LOCAL3);
722 case 4:
723 return(LOG_LOCAL4);
724 case 5:
725 return(LOG_LOCAL5);
726 case 6:
727 return(LOG_LOCAL6);
728 case 7:
729 return(LOG_LOCAL7);
730 default:
731 return -1;
732 }
733 }
734
735 string stripDot(const string& dom)
736 {
737 if(dom.empty())
738 return dom;
739
740 if(dom[dom.size()-1]!='.')
741 return dom;
742
743 return dom.substr(0,dom.size()-1);
744 }
745
746
747
748 int makeIPv6sockaddr(const std::string& addr, struct sockaddr_in6* ret)
749 {
750 if(addr.empty())
751 return -1;
752 string ourAddr(addr);
753 bool portSet = false;
754 unsigned int port;
755 if(addr[0]=='[') { // [::]:53 style address
756 string::size_type pos = addr.find(']');
757 if(pos == string::npos)
758 return -1;
759 ourAddr.assign(addr.c_str() + 1, pos-1);
760 if (pos + 1 != addr.size()) { // complete after ], no port specified
761 if (pos + 2 > addr.size() || addr[pos+1]!=':')
762 return -1;
763 try {
764 port = pdns_stou(addr.substr(pos+2));
765 portSet = true;
766 }
767 catch(const std::out_of_range&) {
768 return -1;
769 }
770 }
771 }
772 ret->sin6_scope_id=0;
773 ret->sin6_family=AF_INET6;
774
775 if(inet_pton(AF_INET6, ourAddr.c_str(), (void*)&ret->sin6_addr) != 1) {
776 struct addrinfo* res;
777 struct addrinfo hints;
778 memset(&hints, 0, sizeof(hints));
779
780 hints.ai_family = AF_INET6;
781 hints.ai_flags = AI_NUMERICHOST;
782
783 int error;
784 // getaddrinfo has anomalous return codes, anything nonzero is an error, positive or negative
785 if((error=getaddrinfo(ourAddr.c_str(), 0, &hints, &res))) {
786 return -1;
787 }
788
789 memcpy(ret, res->ai_addr, res->ai_addrlen);
790 freeaddrinfo(res);
791 }
792
793 if(portSet) {
794 if(port > 65535)
795 return -1;
796
797 ret->sin6_port = htons(port);
798 }
799
800 return 0;
801 }
802
803 int makeIPv4sockaddr(const std::string& str, struct sockaddr_in* ret)
804 {
805 if(str.empty()) {
806 return -1;
807 }
808 struct in_addr inp;
809
810 string::size_type pos = str.find(':');
811 if(pos == string::npos) { // no port specified, not touching the port
812 if(inet_aton(str.c_str(), &inp)) {
813 ret->sin_addr.s_addr=inp.s_addr;
814 return 0;
815 }
816 return -1;
817 }
818 if(!*(str.c_str() + pos + 1)) // trailing :
819 return -1;
820
821 char *eptr = (char*)str.c_str() + str.size();
822 int port = strtol(str.c_str() + pos + 1, &eptr, 10);
823 if (port < 0 || port > 65535)
824 return -1;
825
826 if(*eptr)
827 return -1;
828
829 ret->sin_port = htons(port);
830 if(inet_aton(str.substr(0, pos).c_str(), &inp)) {
831 ret->sin_addr.s_addr=inp.s_addr;
832 return 0;
833 }
834 return -1;
835 }
836
837 int makeUNsockaddr(const std::string& path, struct sockaddr_un* ret)
838 {
839 if (path.empty())
840 return -1;
841
842 memset(ret, 0, sizeof(struct sockaddr_un));
843 ret->sun_family = AF_UNIX;
844 if (path.length() >= sizeof(ret->sun_path))
845 return -1;
846
847 path.copy(ret->sun_path, sizeof(ret->sun_path), 0);
848 return 0;
849 }
850
851 //! read a line of text from a FILE* to a std::string, returns false on 'no data'
852 bool stringfgets(FILE* fp, std::string& line)
853 {
854 char buffer[1024];
855 line.clear();
856
857 do {
858 if(!fgets(buffer, sizeof(buffer), fp))
859 return !line.empty();
860
861 line.append(buffer);
862 } while(!strchr(buffer, '\n'));
863 return true;
864 }
865
866 bool readFileIfThere(const char* fname, std::string* line)
867 {
868 line->clear();
869 auto fp = std::unique_ptr<FILE, int(*)(FILE*)>(fopen(fname, "r"), fclose);
870 if(!fp)
871 return false;
872 stringfgets(fp.get(), *line);
873 fp.reset();
874
875 return true;
876 }
877
878 Regex::Regex(const string &expr)
879 {
880 if(regcomp(&d_preg, expr.c_str(), REG_ICASE|REG_NOSUB|REG_EXTENDED))
881 throw PDNSException("Regular expression did not compile");
882 }
883
884 // if you end up here because valgrind told you were are doing something wrong
885 // with msgh->msg_controllen, please refer to https://github.com/PowerDNS/pdns/pull/3962
886 // first.
887 // Note that cmsgbuf should be aligned the same as a struct cmsghdr
888 void addCMsgSrcAddr(struct msghdr* msgh, cmsgbuf_aligned* cmsgbuf, const ComboAddress* source, int itfIndex)
889 {
890 struct cmsghdr *cmsg = NULL;
891
892 if(source->sin4.sin_family == AF_INET6) {
893 struct in6_pktinfo *pkt;
894
895 msgh->msg_control = cmsgbuf;
896 static_assert(CMSG_SPACE(sizeof(*pkt)) <= sizeof(*cmsgbuf), "Buffer is too small for in6_pktinfo");
897 msgh->msg_controllen = CMSG_SPACE(sizeof(*pkt));
898
899 cmsg = CMSG_FIRSTHDR(msgh);
900 cmsg->cmsg_level = IPPROTO_IPV6;
901 cmsg->cmsg_type = IPV6_PKTINFO;
902 cmsg->cmsg_len = CMSG_LEN(sizeof(*pkt));
903
904 pkt = (struct in6_pktinfo *) CMSG_DATA(cmsg);
905 // Include the padding to stop valgrind complaining about passing uninitialized data
906 memset(pkt, 0, CMSG_SPACE(sizeof(*pkt)));
907 pkt->ipi6_addr = source->sin6.sin6_addr;
908 pkt->ipi6_ifindex = itfIndex;
909 }
910 else {
911 #if defined(IP_PKTINFO)
912 struct in_pktinfo *pkt;
913
914 msgh->msg_control = cmsgbuf;
915 static_assert(CMSG_SPACE(sizeof(*pkt)) <= sizeof(*cmsgbuf), "Buffer is too small for in_pktinfo");
916 msgh->msg_controllen = CMSG_SPACE(sizeof(*pkt));
917
918 cmsg = CMSG_FIRSTHDR(msgh);
919 cmsg->cmsg_level = IPPROTO_IP;
920 cmsg->cmsg_type = IP_PKTINFO;
921 cmsg->cmsg_len = CMSG_LEN(sizeof(*pkt));
922
923 pkt = (struct in_pktinfo *) CMSG_DATA(cmsg);
924 // Include the padding to stop valgrind complaining about passing uninitialized data
925 memset(pkt, 0, CMSG_SPACE(sizeof(*pkt)));
926 pkt->ipi_spec_dst = source->sin4.sin_addr;
927 pkt->ipi_ifindex = itfIndex;
928 #elif defined(IP_SENDSRCADDR)
929 struct in_addr *in;
930
931 msgh->msg_control = cmsgbuf;
932 static_assert(CMSG_SPACE(sizeof(*in)) <= sizeof(*cmsgbuf), "Buffer is too small for in_addr");
933 msgh->msg_controllen = CMSG_SPACE(sizeof(*in));
934
935 cmsg = CMSG_FIRSTHDR(msgh);
936 cmsg->cmsg_level = IPPROTO_IP;
937 cmsg->cmsg_type = IP_SENDSRCADDR;
938 cmsg->cmsg_len = CMSG_LEN(sizeof(*in));
939
940 // Include the padding to stop valgrind complaining about passing uninitialized data
941 in = (struct in_addr *) CMSG_DATA(cmsg);
942 memset(in, 0, CMSG_SPACE(sizeof(*in)));
943 *in = source->sin4.sin_addr;
944 #endif
945 }
946 }
947
948 unsigned int getFilenumLimit(bool hardOrSoft)
949 {
950 struct rlimit rlim;
951 if(getrlimit(RLIMIT_NOFILE, &rlim) < 0)
952 unixDie("Requesting number of available file descriptors");
953 return hardOrSoft ? rlim.rlim_max : rlim.rlim_cur;
954 }
955
956 void setFilenumLimit(unsigned int lim)
957 {
958 struct rlimit rlim;
959
960 if(getrlimit(RLIMIT_NOFILE, &rlim) < 0)
961 unixDie("Requesting number of available file descriptors");
962 rlim.rlim_cur=lim;
963 if(setrlimit(RLIMIT_NOFILE, &rlim) < 0)
964 unixDie("Setting number of available file descriptors");
965 }
966
967 #define burtlemix(a,b,c) \
968 { \
969 a -= b; a -= c; a ^= (c>>13); \
970 b -= c; b -= a; b ^= (a<<8); \
971 c -= a; c -= b; c ^= (b>>13); \
972 a -= b; a -= c; a ^= (c>>12); \
973 b -= c; b -= a; b ^= (a<<16); \
974 c -= a; c -= b; c ^= (b>>5); \
975 a -= b; a -= c; a ^= (c>>3); \
976 b -= c; b -= a; b ^= (a<<10); \
977 c -= a; c -= b; c ^= (b>>15); \
978 }
979
980 uint32_t burtle(const unsigned char* k, uint32_t length, uint32_t initval)
981 {
982 uint32_t a,b,c,len;
983
984 /* Set up the internal state */
985 len = length;
986 a = b = 0x9e3779b9; /* the golden ratio; an arbitrary value */
987 c = initval; /* the previous hash value */
988
989 /*---------------------------------------- handle most of the key */
990 while (len >= 12) {
991 a += (k[0] +((uint32_t)k[1]<<8) +((uint32_t)k[2]<<16) +((uint32_t)k[3]<<24));
992 b += (k[4] +((uint32_t)k[5]<<8) +((uint32_t)k[6]<<16) +((uint32_t)k[7]<<24));
993 c += (k[8] +((uint32_t)k[9]<<8) +((uint32_t)k[10]<<16)+((uint32_t)k[11]<<24));
994 burtlemix(a,b,c);
995 k += 12; len -= 12;
996 }
997
998 /*------------------------------------- handle the last 11 bytes */
999 c += length;
1000 switch(len) { /* all the case statements fall through */
1001 case 11: c+=((uint32_t)k[10]<<24);
1002 case 10: c+=((uint32_t)k[9]<<16);
1003 case 9 : c+=((uint32_t)k[8]<<8);
1004 /* the first byte of c is reserved for the length */
1005 case 8 : b+=((uint32_t)k[7]<<24);
1006 case 7 : b+=((uint32_t)k[6]<<16);
1007 case 6 : b+=((uint32_t)k[5]<<8);
1008 case 5 : b+=k[4];
1009 case 4 : a+=((uint32_t)k[3]<<24);
1010 case 3 : a+=((uint32_t)k[2]<<16);
1011 case 2 : a+=((uint32_t)k[1]<<8);
1012 case 1 : a+=k[0];
1013 /* case 0: nothing left to add */
1014 }
1015 burtlemix(a,b,c);
1016 /*-------------------------------------------- report the result */
1017 return c;
1018 }
1019
1020 uint32_t burtleCI(const unsigned char* k, uint32_t length, uint32_t initval)
1021 {
1022 uint32_t a,b,c,len;
1023
1024 /* Set up the internal state */
1025 len = length;
1026 a = b = 0x9e3779b9; /* the golden ratio; an arbitrary value */
1027 c = initval; /* the previous hash value */
1028
1029 /*---------------------------------------- handle most of the key */
1030 while (len >= 12) {
1031 a += (dns_tolower(k[0]) +((uint32_t)dns_tolower(k[1])<<8) +((uint32_t)dns_tolower(k[2])<<16) +((uint32_t)dns_tolower(k[3])<<24));
1032 b += (dns_tolower(k[4]) +((uint32_t)dns_tolower(k[5])<<8) +((uint32_t)dns_tolower(k[6])<<16) +((uint32_t)dns_tolower(k[7])<<24));
1033 c += (dns_tolower(k[8]) +((uint32_t)dns_tolower(k[9])<<8) +((uint32_t)dns_tolower(k[10])<<16)+((uint32_t)dns_tolower(k[11])<<24));
1034 burtlemix(a,b,c);
1035 k += 12; len -= 12;
1036 }
1037
1038 /*------------------------------------- handle the last 11 bytes */
1039 c += length;
1040 switch(len) { /* all the case statements fall through */
1041 case 11: c+=((uint32_t)dns_tolower(k[10])<<24);
1042 case 10: c+=((uint32_t)dns_tolower(k[9])<<16);
1043 case 9 : c+=((uint32_t)dns_tolower(k[8])<<8);
1044 /* the first byte of c is reserved for the length */
1045 case 8 : b+=((uint32_t)dns_tolower(k[7])<<24);
1046 case 7 : b+=((uint32_t)dns_tolower(k[6])<<16);
1047 case 6 : b+=((uint32_t)dns_tolower(k[5])<<8);
1048 case 5 : b+=dns_tolower(k[4]);
1049 case 4 : a+=((uint32_t)dns_tolower(k[3])<<24);
1050 case 3 : a+=((uint32_t)dns_tolower(k[2])<<16);
1051 case 2 : a+=((uint32_t)dns_tolower(k[1])<<8);
1052 case 1 : a+=dns_tolower(k[0]);
1053 /* case 0: nothing left to add */
1054 }
1055 burtlemix(a,b,c);
1056 /*-------------------------------------------- report the result */
1057 return c;
1058 }
1059
1060
1061 bool setSocketTimestamps(int fd)
1062 {
1063 #ifdef SO_TIMESTAMP
1064 int on=1;
1065 return setsockopt(fd, SOL_SOCKET, SO_TIMESTAMP, (char*)&on, sizeof(on)) == 0;
1066 #else
1067 return true; // we pretend this happened.
1068 #endif
1069 }
1070
1071 bool setTCPNoDelay(int sock)
1072 {
1073 int flag = 1;
1074 return setsockopt(sock, /* socket affected */
1075 IPPROTO_TCP, /* set option at TCP level */
1076 TCP_NODELAY, /* name of option */
1077 (char *) &flag, /* the cast is historical cruft */
1078 sizeof(flag)) == 0; /* length of option value */
1079 }
1080
1081
1082 bool setNonBlocking(int sock)
1083 {
1084 int flags=fcntl(sock,F_GETFL,0);
1085 if(flags<0 || fcntl(sock, F_SETFL,flags|O_NONBLOCK) <0)
1086 return false;
1087 return true;
1088 }
1089
1090 bool setBlocking(int sock)
1091 {
1092 int flags=fcntl(sock,F_GETFL,0);
1093 if(flags<0 || fcntl(sock, F_SETFL,flags&(~O_NONBLOCK)) <0)
1094 return false;
1095 return true;
1096 }
1097
1098 bool setReuseAddr(int sock)
1099 {
1100 int tmp = 1;
1101 if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (char*)&tmp, static_cast<unsigned>(sizeof tmp))<0)
1102 throw PDNSException(string("Setsockopt failed: ")+strerror(errno));
1103 return true;
1104 }
1105
1106 bool isNonBlocking(int sock)
1107 {
1108 int flags=fcntl(sock,F_GETFL,0);
1109 return flags & O_NONBLOCK;
1110 }
1111
1112 bool setReceiveSocketErrors(int sock, int af)
1113 {
1114 #ifdef __linux__
1115 int tmp = 1, ret;
1116 if (af == AF_INET) {
1117 ret = setsockopt(sock, IPPROTO_IP, IP_RECVERR, &tmp, sizeof(tmp));
1118 } else {
1119 ret = setsockopt(sock, IPPROTO_IPV6, IPV6_RECVERR, &tmp, sizeof(tmp));
1120 }
1121 if (ret < 0) {
1122 throw PDNSException(string("Setsockopt failed: ") + strerror(errno));
1123 }
1124 #endif
1125 return true;
1126 }
1127
1128 // Closes a socket.
1129 int closesocket( int socket )
1130 {
1131 int ret=::close(socket);
1132 if(ret < 0 && errno == ECONNRESET) // see ticket 192, odd BSD behaviour
1133 return 0;
1134 if(ret < 0)
1135 throw PDNSException("Error closing socket: "+stringerror());
1136 return ret;
1137 }
1138
1139 bool setCloseOnExec(int sock)
1140 {
1141 int flags=fcntl(sock,F_GETFD,0);
1142 if(flags<0 || fcntl(sock, F_SETFD,flags|FD_CLOEXEC) <0)
1143 return false;
1144 return true;
1145 }
1146
1147 string getMACAddress(const ComboAddress& ca)
1148 {
1149 string ret;
1150 #ifdef __linux__
1151 ifstream ifs("/proc/net/arp");
1152 if(!ifs)
1153 return ret;
1154 string line;
1155 string match=ca.toString()+' ';
1156 while(getline(ifs, line)) {
1157 if(boost::starts_with(line, match)) {
1158 vector<string> parts;
1159 stringtok(parts, line, " \n\t\r");
1160 if(parts.size() < 4)
1161 return ret;
1162 unsigned int tmp[6];
1163 sscanf(parts[3].c_str(), "%02x:%02x:%02x:%02x:%02x:%02x", tmp, tmp+1, tmp+2, tmp+3, tmp+4, tmp+5);
1164 for(int i = 0 ; i< 6 ; ++i)
1165 ret.append(1, (char)tmp[i]);
1166 return ret;
1167 }
1168 }
1169 #endif
1170 return ret;
1171 }
1172
1173 uint64_t udpErrorStats(const std::string& str)
1174 {
1175 #ifdef __linux__
1176 ifstream ifs("/proc/net/snmp");
1177 if(!ifs)
1178 return 0;
1179 string line;
1180 vector<string> parts;
1181 while(getline(ifs,line)) {
1182 if(boost::starts_with(line, "Udp: ") && isdigit(line[5])) {
1183 stringtok(parts, line, " \n\t\r");
1184 if(parts.size() < 7)
1185 break;
1186 if(str=="udp-rcvbuf-errors")
1187 return std::stoull(parts[5]);
1188 else if(str=="udp-sndbuf-errors")
1189 return std::stoull(parts[6]);
1190 else if(str=="udp-noport-errors")
1191 return std::stoull(parts[2]);
1192 else if(str=="udp-in-errors")
1193 return std::stoull(parts[3]);
1194 else
1195 return 0;
1196 }
1197 }
1198 #endif
1199 return 0;
1200 }
1201
1202 bool getTSIGHashEnum(const DNSName& algoName, TSIGHashEnum& algoEnum)
1203 {
1204 if (algoName == DNSName("hmac-md5.sig-alg.reg.int") || algoName == DNSName("hmac-md5"))
1205 algoEnum = TSIG_MD5;
1206 else if (algoName == DNSName("hmac-sha1"))
1207 algoEnum = TSIG_SHA1;
1208 else if (algoName == DNSName("hmac-sha224"))
1209 algoEnum = TSIG_SHA224;
1210 else if (algoName == DNSName("hmac-sha256"))
1211 algoEnum = TSIG_SHA256;
1212 else if (algoName == DNSName("hmac-sha384"))
1213 algoEnum = TSIG_SHA384;
1214 else if (algoName == DNSName("hmac-sha512"))
1215 algoEnum = TSIG_SHA512;
1216 else if (algoName == DNSName("gss-tsig"))
1217 algoEnum = TSIG_GSS;
1218 else {
1219 return false;
1220 }
1221 return true;
1222 }
1223
1224 DNSName getTSIGAlgoName(TSIGHashEnum& algoEnum)
1225 {
1226 switch(algoEnum) {
1227 case TSIG_MD5: return DNSName("hmac-md5.sig-alg.reg.int.");
1228 case TSIG_SHA1: return DNSName("hmac-sha1.");
1229 case TSIG_SHA224: return DNSName("hmac-sha224.");
1230 case TSIG_SHA256: return DNSName("hmac-sha256.");
1231 case TSIG_SHA384: return DNSName("hmac-sha384.");
1232 case TSIG_SHA512: return DNSName("hmac-sha512.");
1233 case TSIG_GSS: return DNSName("gss-tsig.");
1234 }
1235 throw PDNSException("getTSIGAlgoName does not understand given algorithm, please fix!");
1236 }
1237
1238 uint64_t getOpenFileDescriptors(const std::string&)
1239 {
1240 #ifdef __linux__
1241 DIR* dirhdl=opendir(("/proc/"+std::to_string(getpid())+"/fd/").c_str());
1242 if(!dirhdl)
1243 return 0;
1244
1245 struct dirent *entry;
1246 int ret=0;
1247 while((entry = readdir(dirhdl))) {
1248 uint32_t num;
1249 try {
1250 num = pdns_stou(entry->d_name);
1251 } catch (...) {
1252 continue; // was not a number.
1253 }
1254 if(std::to_string(num) == entry->d_name)
1255 ret++;
1256 }
1257 closedir(dirhdl);
1258 return ret;
1259
1260 #else
1261 return 0;
1262 #endif
1263 }
1264
1265 uint64_t getRealMemoryUsage(const std::string&)
1266 {
1267 #ifdef __linux__
1268 ifstream ifs("/proc/self/statm");
1269 if(!ifs)
1270 return 0;
1271
1272 uint64_t size, resident, shared, text, lib, data;
1273 ifs >> size >> resident >> shared >> text >> lib >> data;
1274
1275 return data * getpagesize();
1276 #else
1277 struct rusage ru;
1278 if (getrusage(RUSAGE_SELF, &ru) != 0)
1279 return 0;
1280 return ru.ru_maxrss * 1024;
1281 #endif
1282 }
1283
1284
1285 uint64_t getSpecialMemoryUsage(const std::string&)
1286 {
1287 #ifdef __linux__
1288 ifstream ifs("/proc/self/smaps");
1289 if(!ifs)
1290 return 0;
1291 string line;
1292 uint64_t bytes=0;
1293 string header("Private_Dirty:");
1294 while(getline(ifs, line)) {
1295 if(boost::starts_with(line, header)) {
1296 bytes += std::stoull(line.substr(header.length() + 1))*1024;
1297 }
1298 }
1299 return bytes;
1300 #else
1301 return 0;
1302 #endif
1303 }
1304
1305 uint64_t getCPUTimeUser(const std::string&)
1306 {
1307 struct rusage ru;
1308 getrusage(RUSAGE_SELF, &ru);
1309 return (ru.ru_utime.tv_sec*1000ULL + ru.ru_utime.tv_usec/1000);
1310 }
1311
1312 uint64_t getCPUTimeSystem(const std::string&)
1313 {
1314 struct rusage ru;
1315 getrusage(RUSAGE_SELF, &ru);
1316 return (ru.ru_stime.tv_sec*1000ULL + ru.ru_stime.tv_usec/1000);
1317 }
1318
1319 double DiffTime(const struct timespec& first, const struct timespec& second)
1320 {
1321 int seconds=second.tv_sec - first.tv_sec;
1322 int nseconds=second.tv_nsec - first.tv_nsec;
1323
1324 if(nseconds < 0) {
1325 seconds-=1;
1326 nseconds+=1000000000;
1327 }
1328 return seconds + nseconds/1000000000.0;
1329 }
1330
1331 double DiffTime(const struct timeval& first, const struct timeval& second)
1332 {
1333 int seconds=second.tv_sec - first.tv_sec;
1334 int useconds=second.tv_usec - first.tv_usec;
1335
1336 if(useconds < 0) {
1337 seconds-=1;
1338 useconds+=1000000;
1339 }
1340 return seconds + useconds/1000000.0;
1341 }
1342
1343 uid_t strToUID(const string &str)
1344 {
1345 uid_t result = 0;
1346 const char * cstr = str.c_str();
1347 struct passwd * pwd = getpwnam(cstr);
1348
1349 if (pwd == NULL) {
1350 long long val;
1351
1352 try {
1353 val = stoll(str);
1354 }
1355 catch(std::exception& e) {
1356 throw runtime_error((boost::format("Error: Unable to parse user ID %s") % cstr).str() );
1357 }
1358
1359 if (val < std::numeric_limits<uid_t>::min() || val > std::numeric_limits<uid_t>::max()) {
1360 throw runtime_error((boost::format("Error: Unable to parse user ID %s") % cstr).str() );
1361 }
1362
1363 result = static_cast<uid_t>(val);
1364 }
1365 else {
1366 result = pwd->pw_uid;
1367 }
1368
1369 return result;
1370 }
1371
1372 gid_t strToGID(const string &str)
1373 {
1374 gid_t result = 0;
1375 const char * cstr = str.c_str();
1376 struct group * grp = getgrnam(cstr);
1377
1378 if (grp == NULL) {
1379 long long val;
1380
1381 try {
1382 val = stoll(str);
1383 }
1384 catch(std::exception& e) {
1385 throw runtime_error((boost::format("Error: Unable to parse group ID %s") % cstr).str() );
1386 }
1387
1388 if (val < std::numeric_limits<gid_t>::min() || val > std::numeric_limits<gid_t>::max()) {
1389 throw runtime_error((boost::format("Error: Unable to parse group ID %s") % cstr).str() );
1390 }
1391
1392 result = static_cast<gid_t>(val);
1393 }
1394 else {
1395 result = grp->gr_gid;
1396 }
1397
1398 return result;
1399 }
1400
1401 unsigned int pdns_stou(const std::string& str, size_t * idx, int base)
1402 {
1403 if (str.empty()) return 0; // compatibility
1404 unsigned long result;
1405 try {
1406 result = std::stoul(str, idx, base);
1407 }
1408 catch(std::invalid_argument& e) {
1409 throw std::invalid_argument(string(e.what()) + "; (invalid argument during std::stoul); data was \""+str+"\"");
1410 }
1411 catch(std::out_of_range& e) {
1412 throw std::out_of_range(string(e.what()) + "; (out of range during std::stoul); data was \""+str+"\"");
1413 }
1414 if (result > std::numeric_limits<unsigned int>::max()) {
1415 throw std::out_of_range("stoul returned result out of unsigned int range; data was \""+str+"\"");
1416 }
1417 return static_cast<unsigned int>(result);
1418 }
1419
1420 bool isSettingThreadCPUAffinitySupported()
1421 {
1422 #ifdef HAVE_PTHREAD_SETAFFINITY_NP
1423 return true;
1424 #else
1425 return false;
1426 #endif
1427 }
1428
1429 int mapThreadToCPUList(pthread_t tid, const std::set<int>& cpus)
1430 {
1431 #ifdef HAVE_PTHREAD_SETAFFINITY_NP
1432 # ifdef __NetBSD__
1433 cpuset_t *cpuset;
1434 cpuset = cpuset_create();
1435 for (const auto cpuID : cpus) {
1436 cpuset_set(cpuID, cpuset);
1437 }
1438
1439 return pthread_setaffinity_np(tid,
1440 cpuset_size(cpuset),
1441 cpuset);
1442 # else
1443 # ifdef __FreeBSD__
1444 # define cpu_set_t cpuset_t
1445 # endif
1446 cpu_set_t cpuset;
1447 CPU_ZERO(&cpuset);
1448 for (const auto cpuID : cpus) {
1449 CPU_SET(cpuID, &cpuset);
1450 }
1451
1452 return pthread_setaffinity_np(tid,
1453 sizeof(cpuset),
1454 &cpuset);
1455 # endif
1456 #else
1457 return ENOSYS;
1458 #endif /* HAVE_PTHREAD_SETAFFINITY_NP */
1459 }
1460
1461 std::vector<ComboAddress> getResolvers(const std::string& resolvConfPath)
1462 {
1463 std::vector<ComboAddress> results;
1464
1465 ifstream ifs(resolvConfPath);
1466 if (!ifs) {
1467 return results;
1468 }
1469
1470 string line;
1471 while(std::getline(ifs, line)) {
1472 boost::trim_right_if(line, is_any_of(" \r\n\x1a"));
1473 boost::trim_left(line); // leading spaces, let's be nice
1474
1475 string::size_type tpos = line.find_first_of(";#");
1476 if (tpos != string::npos) {
1477 line.resize(tpos);
1478 }
1479
1480 if (boost::starts_with(line, "nameserver ") || boost::starts_with(line, "nameserver\t")) {
1481 vector<string> parts;
1482 stringtok(parts, line, " \t,"); // be REALLY nice
1483 for(vector<string>::const_iterator iter = parts.begin() + 1; iter != parts.end(); ++iter) {
1484 try {
1485 results.emplace_back(*iter, 53);
1486 }
1487 catch(...)
1488 {
1489 }
1490 }
1491 }
1492 }
1493
1494 return results;
1495 }
1496
1497 size_t getPipeBufferSize(int fd)
1498 {
1499 #ifdef F_GETPIPE_SZ
1500 int res = fcntl(fd, F_GETPIPE_SZ);
1501 if (res == -1) {
1502 return 0;
1503 }
1504 return res;
1505 #else
1506 errno = ENOSYS;
1507 return 0;
1508 #endif /* F_GETPIPE_SZ */
1509 }
1510
1511 bool setPipeBufferSize(int fd, size_t size)
1512 {
1513 #ifdef F_SETPIPE_SZ
1514 if (size > std::numeric_limits<int>::max()) {
1515 errno = EINVAL;
1516 return false;
1517 }
1518 int newSize = static_cast<int>(size);
1519 int res = fcntl(fd, F_SETPIPE_SZ, newSize);
1520 if (res == -1) {
1521 return false;
1522 }
1523 return true;
1524 #else
1525 errno = ENOSYS;
1526 return false;
1527 #endif /* F_SETPIPE_SZ */
1528 }