2011-07-28 13:19:55 +02:00
|
|
|
/*
|
2016-01-28 15:07:31 +01:00
|
|
|
Copyright (c) 2007-2016 Contributors as noted in the AUTHORS file
|
2011-07-28 13:19:55 +02:00
|
|
|
|
2015-06-02 22:33:55 +02:00
|
|
|
This file is part of libzmq, the ZeroMQ core engine in C++.
|
2011-07-28 13:19:55 +02:00
|
|
|
|
2015-06-02 22:33:55 +02:00
|
|
|
libzmq is free software; you can redistribute it and/or modify it under
|
|
|
|
the terms of the GNU Lesser General Public License (LGPL) as published
|
|
|
|
by the Free Software Foundation; either version 3 of the License, or
|
2011-07-28 13:19:55 +02:00
|
|
|
(at your option) any later version.
|
|
|
|
|
2015-06-02 22:33:55 +02:00
|
|
|
As a special exception, the Contributors give you permission to link
|
|
|
|
this library with independent modules to produce an executable,
|
|
|
|
regardless of the license terms of these independent modules, and to
|
|
|
|
copy and distribute the resulting executable under terms of your choice,
|
|
|
|
provided that you also meet, for each linked independent module, the
|
|
|
|
terms and conditions of the license of that module. An independent
|
|
|
|
module is a module which is not derived from or based on this library.
|
|
|
|
If you modify this library, you must extend this exception to your
|
|
|
|
version of the library.
|
|
|
|
|
|
|
|
libzmq is distributed in the hope that it will be useful, but WITHOUT
|
|
|
|
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
|
|
|
License for more details.
|
2011-07-28 13:19:55 +02:00
|
|
|
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2016-02-18 10:56:52 -06:00
|
|
|
#include "precompiled.hpp"
|
2011-07-28 13:46:16 +02:00
|
|
|
#include "ipc_listener.hpp"
|
|
|
|
|
|
|
|
#if !defined ZMQ_HAVE_WINDOWS && !defined ZMQ_HAVE_OPENVMS
|
|
|
|
|
2011-07-28 13:19:55 +02:00
|
|
|
#include <new>
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
|
2011-08-16 12:44:34 +02:00
|
|
|
#include "stream_engine.hpp"
|
2011-08-18 11:08:22 +02:00
|
|
|
#include "ipc_address.hpp"
|
2011-07-28 13:19:55 +02:00
|
|
|
#include "io_thread.hpp"
|
2011-09-15 10:00:23 +02:00
|
|
|
#include "session_base.hpp"
|
2011-07-28 13:19:55 +02:00
|
|
|
#include "config.hpp"
|
|
|
|
#include "err.hpp"
|
2011-09-02 15:34:12 +02:00
|
|
|
#include "ip.hpp"
|
2012-05-04 02:32:46 +01:00
|
|
|
#include "socket_base.hpp"
|
2011-07-28 13:19:55 +02:00
|
|
|
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <sys/un.h>
|
2016-03-14 08:49:11 -07:00
|
|
|
#include <sys/stat.h>
|
2011-07-28 13:19:55 +02:00
|
|
|
|
2016-02-22 02:21:34 +00:00
|
|
|
#ifdef ZMQ_HAVE_LOCAL_PEERCRED
|
2018-02-01 11:46:09 +01:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/ucred.h>
|
2013-12-04 13:56:12 -08:00
|
|
|
#endif
|
|
|
|
#ifdef ZMQ_HAVE_SO_PEERCRED
|
2018-02-01 11:46:09 +01:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <pwd.h>
|
|
|
|
#include <grp.h>
|
|
|
|
#if defined ZMQ_HAVE_OPENBSD
|
|
|
|
#define ucred sockpeercred
|
|
|
|
#endif
|
2013-12-04 13:56:12 -08:00
|
|
|
#endif
|
|
|
|
|
2016-03-14 08:49:11 -07:00
|
|
|
const char *zmq::ipc_listener_t::tmp_env_vars[] = {
|
2018-02-01 11:46:09 +01:00
|
|
|
"TMPDIR", "TEMPDIR", "TMP",
|
|
|
|
0 // Sentinel
|
2016-03-14 08:49:11 -07:00
|
|
|
};
|
|
|
|
|
2018-02-01 11:46:09 +01:00
|
|
|
int zmq::ipc_listener_t::create_wildcard_address (std::string &path_,
|
|
|
|
std::string &file_)
|
2016-03-14 08:49:11 -07:00
|
|
|
{
|
|
|
|
std::string tmp_path;
|
|
|
|
|
|
|
|
// If TMPDIR, TEMPDIR, or TMP are available and are directories, create
|
|
|
|
// the socket directory there.
|
|
|
|
const char **tmp_env = tmp_env_vars;
|
2018-02-01 11:46:09 +01:00
|
|
|
while (tmp_path.empty () && *tmp_env != 0) {
|
|
|
|
char *tmpdir = getenv (*tmp_env);
|
2016-03-14 08:49:11 -07:00
|
|
|
struct stat statbuf;
|
|
|
|
|
|
|
|
// Confirm it is actually a directory before trying to use
|
2018-02-01 11:46:09 +01:00
|
|
|
if (tmpdir != 0 && ::stat (tmpdir, &statbuf) == 0
|
|
|
|
&& S_ISDIR (statbuf.st_mode)) {
|
|
|
|
tmp_path.assign (tmpdir);
|
|
|
|
if (*(tmp_path.rbegin ()) != '/') {
|
|
|
|
tmp_path.push_back ('/');
|
2016-03-14 08:49:11 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try the next environment variable
|
|
|
|
++tmp_env;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Append a directory name
|
2018-02-01 11:46:09 +01:00
|
|
|
tmp_path.append ("tmpXXXXXX");
|
2016-03-14 08:49:11 -07:00
|
|
|
|
|
|
|
// We need room for tmp_path + trailing NUL
|
2018-02-01 11:46:09 +01:00
|
|
|
std::vector<char> buffer (tmp_path.length () + 1);
|
2016-06-09 21:49:56 +01:00
|
|
|
strcpy (&buffer[0], tmp_path.c_str ());
|
2016-03-14 08:49:11 -07:00
|
|
|
|
2016-04-10 22:45:35 +01:00
|
|
|
#ifdef HAVE_MKDTEMP
|
2016-03-14 08:49:11 -07:00
|
|
|
// Create the directory. POSIX requires that mkdtemp() creates the
|
|
|
|
// directory with 0700 permissions, meaning the only possible race
|
|
|
|
// with socket creation could be the same user. However, since
|
|
|
|
// each socket is created in a directory created by mkdtemp(), and
|
|
|
|
// mkdtemp() guarantees a unique directory name, there will be no
|
|
|
|
// collision.
|
2016-06-09 21:49:56 +01:00
|
|
|
if (mkdtemp (&buffer[0]) == 0) {
|
2016-03-14 08:49:11 -07:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-06-09 21:49:56 +01:00
|
|
|
path_.assign (&buffer[0]);
|
2016-04-10 22:45:35 +01:00
|
|
|
file_.assign (path_ + "/socket");
|
|
|
|
#else
|
|
|
|
// Silence -Wunused-parameter. #pragma and __attribute__((unused)) are not
|
|
|
|
// very portable unfortunately...
|
|
|
|
(void) path_;
|
2016-06-09 21:49:56 +01:00
|
|
|
int fd = mkstemp (&buffer[0]);
|
2016-04-10 22:45:35 +01:00
|
|
|
if (fd == -1)
|
2018-02-01 11:46:09 +01:00
|
|
|
return -1;
|
2016-04-10 22:45:35 +01:00
|
|
|
::close (fd);
|
|
|
|
|
2016-06-09 21:49:56 +01:00
|
|
|
file_.assign (&buffer[0]);
|
2016-04-10 22:45:35 +01:00
|
|
|
#endif
|
2016-03-14 08:49:11 -07:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-07-28 13:19:55 +02:00
|
|
|
zmq::ipc_listener_t::ipc_listener_t (io_thread_t *io_thread_,
|
2018-02-01 11:46:09 +01:00
|
|
|
socket_base_t *socket_,
|
|
|
|
const options_t &options_) :
|
2011-07-28 13:19:55 +02:00
|
|
|
own_t (io_thread_, options_),
|
|
|
|
io_object_t (io_thread_),
|
|
|
|
has_file (false),
|
|
|
|
s (retired_fd),
|
|
|
|
socket (socket_)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
zmq::ipc_listener_t::~ipc_listener_t ()
|
|
|
|
{
|
2012-06-12 14:28:32 +01:00
|
|
|
zmq_assert (s == retired_fd);
|
2011-07-28 13:19:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void zmq::ipc_listener_t::process_plug ()
|
|
|
|
{
|
|
|
|
// Start polling for incoming connections.
|
|
|
|
handle = add_fd (s);
|
|
|
|
set_pollin (handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
void zmq::ipc_listener_t::process_term (int linger_)
|
|
|
|
{
|
|
|
|
rm_fd (handle);
|
2012-04-21 18:56:10 +04:00
|
|
|
close ();
|
2011-07-28 13:19:55 +02:00
|
|
|
own_t::process_term (linger_);
|
|
|
|
}
|
|
|
|
|
|
|
|
void zmq::ipc_listener_t::in_event ()
|
|
|
|
{
|
|
|
|
fd_t fd = accept ();
|
|
|
|
|
|
|
|
// If connection was reset by the peer in the meantime, just ignore it.
|
|
|
|
// TODO: Handle specific errors like ENFILE/EMFILE etc.
|
2012-05-04 02:32:46 +01:00
|
|
|
if (fd == retired_fd) {
|
2018-02-01 11:46:09 +01:00
|
|
|
socket->event_accept_failed (endpoint, zmq_errno ());
|
2011-07-28 13:19:55 +02:00
|
|
|
return;
|
2012-05-04 02:32:46 +01:00
|
|
|
}
|
2011-07-28 13:19:55 +02:00
|
|
|
|
|
|
|
// Create the engine object for this connection.
|
2018-02-01 11:46:09 +01:00
|
|
|
stream_engine_t *engine =
|
|
|
|
new (std::nothrow) stream_engine_t (fd, options, endpoint);
|
2011-07-28 13:19:55 +02:00
|
|
|
alloc_assert (engine);
|
|
|
|
|
|
|
|
// Choose I/O thread to run connecter in. Given that we are already
|
|
|
|
// running in an I/O thread, there must be at least one available.
|
|
|
|
io_thread_t *io_thread = choose_io_thread (options.affinity);
|
|
|
|
zmq_assert (io_thread);
|
|
|
|
|
2016-03-14 08:49:11 -07:00
|
|
|
// Create and launch a session object.
|
2018-02-01 11:46:09 +01:00
|
|
|
session_base_t *session =
|
|
|
|
session_base_t::create (io_thread, false, socket, options, NULL);
|
2011-09-15 10:00:23 +02:00
|
|
|
errno_assert (session);
|
2011-07-28 13:19:55 +02:00
|
|
|
session->inc_seqnum ();
|
|
|
|
launch_child (session);
|
|
|
|
send_attach (session, engine, false);
|
2012-11-17 11:29:47 +00:00
|
|
|
socket->event_accepted (endpoint, fd);
|
2011-07-28 13:19:55 +02:00
|
|
|
}
|
|
|
|
|
2012-02-18 20:44:41 +00:00
|
|
|
int zmq::ipc_listener_t::get_address (std::string &addr_)
|
2012-02-08 22:06:46 +00:00
|
|
|
{
|
2012-02-18 20:44:41 +00:00
|
|
|
struct sockaddr_storage ss;
|
2012-06-05 09:44:02 -05:00
|
|
|
#ifdef ZMQ_HAVE_HPUX
|
|
|
|
int sl = sizeof (ss);
|
|
|
|
#else
|
2012-02-18 20:44:41 +00:00
|
|
|
socklen_t sl = sizeof (ss);
|
2012-06-05 09:44:02 -05:00
|
|
|
#endif
|
2012-04-18 23:42:11 +04:00
|
|
|
int rc = getsockname (s, (sockaddr *) &ss, &sl);
|
2012-02-11 15:09:03 +00:00
|
|
|
if (rc != 0) {
|
2012-04-18 23:42:11 +04:00
|
|
|
addr_.clear ();
|
2012-02-11 15:09:03 +00:00
|
|
|
return rc;
|
2012-02-08 22:06:46 +00:00
|
|
|
}
|
2012-02-17 21:45:17 +00:00
|
|
|
|
2012-04-18 23:42:11 +04:00
|
|
|
ipc_address_t addr ((struct sockaddr *) &ss, sl);
|
|
|
|
return addr.to_string (addr_);
|
2012-02-08 22:06:46 +00:00
|
|
|
}
|
|
|
|
|
2011-07-28 13:46:16 +02:00
|
|
|
int zmq::ipc_listener_t::set_address (const char *addr_)
|
2011-07-28 13:19:55 +02:00
|
|
|
{
|
2013-06-15 16:11:50 +08:00
|
|
|
// Create addr on stack for auto-cleanup
|
|
|
|
std::string addr (addr_);
|
|
|
|
|
|
|
|
// Allow wildcard file
|
2018-02-01 11:46:09 +01:00
|
|
|
if (options.use_fd == -1 && addr[0] == '*') {
|
|
|
|
if (create_wildcard_address (tmp_socket_dirname, addr) < 0) {
|
2013-12-19 21:06:22 +01:00
|
|
|
return -1;
|
2016-03-14 08:49:11 -07:00
|
|
|
}
|
2012-02-08 22:06:46 +00:00
|
|
|
}
|
2012-02-18 20:44:41 +00:00
|
|
|
|
2011-07-28 13:46:16 +02:00
|
|
|
// Get rid of the file associated with the UNIX domain socket that
|
|
|
|
// may have been left behind by the previous run of the application.
|
2016-02-01 12:33:17 +00:00
|
|
|
// MUST NOT unlink if the FD is managed by the user, or it will stop
|
|
|
|
// working after the first client connects. The user will take care of
|
|
|
|
// cleaning up the file after the service is stopped.
|
2016-02-09 09:36:14 +00:00
|
|
|
if (options.use_fd == -1) {
|
2018-02-01 11:46:09 +01:00
|
|
|
::unlink (addr.c_str ());
|
2016-02-01 12:33:17 +00:00
|
|
|
}
|
2011-08-18 11:08:22 +02:00
|
|
|
filename.clear ();
|
2011-07-28 13:19:55 +02:00
|
|
|
|
2011-08-18 11:08:22 +02:00
|
|
|
// Initialise the address structure.
|
|
|
|
ipc_address_t address;
|
2018-02-01 11:46:09 +01:00
|
|
|
int rc = address.resolve (addr.c_str ());
|
2016-03-14 08:49:11 -07:00
|
|
|
if (rc != 0) {
|
2018-02-01 11:46:09 +01:00
|
|
|
if (!tmp_socket_dirname.empty ()) {
|
2016-03-14 08:49:11 -07:00
|
|
|
// We need to preserve errno to return to the user
|
|
|
|
int errno_ = errno;
|
2018-02-01 11:46:09 +01:00
|
|
|
::rmdir (tmp_socket_dirname.c_str ());
|
|
|
|
tmp_socket_dirname.clear ();
|
2016-03-14 08:49:11 -07:00
|
|
|
errno = errno_;
|
|
|
|
}
|
2011-07-28 13:46:16 +02:00
|
|
|
return -1;
|
2016-03-14 08:49:11 -07:00
|
|
|
}
|
2011-07-28 13:19:55 +02:00
|
|
|
|
2012-05-04 02:32:46 +01:00
|
|
|
address.to_string (endpoint);
|
|
|
|
|
2016-02-09 09:36:14 +00:00
|
|
|
if (options.use_fd != -1) {
|
|
|
|
s = options.use_fd;
|
2016-02-01 12:33:17 +00:00
|
|
|
} else {
|
|
|
|
// Create a listening socket.
|
|
|
|
s = open_socket (AF_UNIX, SOCK_STREAM, 0);
|
2016-03-14 08:49:11 -07:00
|
|
|
if (s == -1) {
|
2018-02-01 11:46:09 +01:00
|
|
|
if (!tmp_socket_dirname.empty ()) {
|
2016-03-14 08:49:11 -07:00
|
|
|
// We need to preserve errno to return to the user
|
|
|
|
int errno_ = errno;
|
2018-02-01 11:46:09 +01:00
|
|
|
::rmdir (tmp_socket_dirname.c_str ());
|
|
|
|
tmp_socket_dirname.clear ();
|
2016-03-14 08:49:11 -07:00
|
|
|
errno = errno_;
|
|
|
|
}
|
2016-02-01 12:33:17 +00:00
|
|
|
return -1;
|
2016-03-14 08:49:11 -07:00
|
|
|
}
|
2016-02-01 12:33:17 +00:00
|
|
|
|
|
|
|
// Bind the socket to the file path.
|
|
|
|
rc = bind (s, address.addr (), address.addrlen ());
|
|
|
|
if (rc != 0)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
// Listen for incoming connections.
|
|
|
|
rc = listen (s, options.backlog);
|
|
|
|
if (rc != 0)
|
|
|
|
goto error;
|
|
|
|
}
|
2011-07-28 16:32:08 +02:00
|
|
|
|
2018-02-01 11:46:09 +01:00
|
|
|
filename.assign (addr.c_str ());
|
2011-07-28 13:46:16 +02:00
|
|
|
has_file = true;
|
2011-07-28 13:19:55 +02:00
|
|
|
|
2012-11-17 11:29:47 +00:00
|
|
|
socket->event_listening (endpoint, s);
|
2012-02-18 20:44:41 +00:00
|
|
|
return 0;
|
2012-06-13 14:48:27 +02:00
|
|
|
|
|
|
|
error:
|
|
|
|
int err = errno;
|
|
|
|
close ();
|
|
|
|
errno = err;
|
|
|
|
return -1;
|
2011-07-28 13:19:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int zmq::ipc_listener_t::close ()
|
|
|
|
{
|
|
|
|
zmq_assert (s != retired_fd);
|
2017-10-06 09:53:59 +01:00
|
|
|
int fd_for_event = s;
|
2011-07-28 13:19:55 +02:00
|
|
|
int rc = ::close (s);
|
2012-07-11 17:59:22 +02:00
|
|
|
errno_assert (rc == 0);
|
2011-07-28 13:19:55 +02:00
|
|
|
|
2012-07-12 01:47:36 +02:00
|
|
|
s = retired_fd;
|
|
|
|
|
2016-03-14 08:49:11 -07:00
|
|
|
if (has_file && options.use_fd == -1) {
|
|
|
|
rc = 0;
|
|
|
|
|
2018-02-01 11:46:09 +01:00
|
|
|
if (rc == 0 && !tmp_socket_dirname.empty ()) {
|
|
|
|
rc = ::rmdir (tmp_socket_dirname.c_str ());
|
|
|
|
tmp_socket_dirname.clear ();
|
2016-03-14 08:49:11 -07:00
|
|
|
}
|
|
|
|
|
2012-05-04 02:32:46 +01:00
|
|
|
if (rc != 0) {
|
2018-02-01 11:46:09 +01:00
|
|
|
socket->event_close_failed (endpoint, zmq_errno ());
|
2011-07-28 13:19:55 +02:00
|
|
|
return -1;
|
2012-05-04 02:32:46 +01:00
|
|
|
}
|
2011-07-28 13:19:55 +02:00
|
|
|
}
|
|
|
|
|
2017-10-06 09:53:59 +01:00
|
|
|
socket->event_closed (endpoint, fd_for_event);
|
2011-07-28 13:19:55 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-12-04 13:56:12 -08:00
|
|
|
#if defined ZMQ_HAVE_SO_PEERCRED
|
|
|
|
|
|
|
|
bool zmq::ipc_listener_t::filter (fd_t sock)
|
|
|
|
{
|
2018-02-01 11:46:09 +01:00
|
|
|
if (options.ipc_uid_accept_filters.empty ()
|
|
|
|
&& options.ipc_pid_accept_filters.empty ()
|
|
|
|
&& options.ipc_gid_accept_filters.empty ())
|
2013-12-04 13:56:12 -08:00
|
|
|
return true;
|
|
|
|
|
|
|
|
struct ucred cred;
|
|
|
|
socklen_t size = sizeof (cred);
|
|
|
|
|
|
|
|
if (getsockopt (sock, SOL_SOCKET, SO_PEERCRED, &cred, &size))
|
|
|
|
return false;
|
2018-02-01 11:46:09 +01:00
|
|
|
if (options.ipc_uid_accept_filters.find (cred.uid)
|
|
|
|
!= options.ipc_uid_accept_filters.end ()
|
|
|
|
|| options.ipc_gid_accept_filters.find (cred.gid)
|
|
|
|
!= options.ipc_gid_accept_filters.end ()
|
|
|
|
|| options.ipc_pid_accept_filters.find (cred.pid)
|
|
|
|
!= options.ipc_pid_accept_filters.end ())
|
2013-12-04 13:56:12 -08:00
|
|
|
return true;
|
|
|
|
|
|
|
|
struct passwd *pw;
|
|
|
|
struct group *gr;
|
|
|
|
|
|
|
|
if (!(pw = getpwuid (cred.uid)))
|
|
|
|
return false;
|
2018-02-01 11:46:09 +01:00
|
|
|
for (options_t::ipc_gid_accept_filters_t::const_iterator it =
|
|
|
|
options.ipc_gid_accept_filters.begin ();
|
|
|
|
it != options.ipc_gid_accept_filters.end (); it++) {
|
2013-12-04 13:56:12 -08:00
|
|
|
if (!(gr = getgrgid (*it)))
|
|
|
|
continue;
|
2013-12-06 00:46:14 -08:00
|
|
|
for (char **mem = gr->gr_mem; *mem; mem++) {
|
2013-12-04 13:56:12 -08:00
|
|
|
if (!strcmp (*mem, pw->pw_name))
|
|
|
|
return true;
|
2013-12-06 00:46:14 -08:00
|
|
|
}
|
2013-12-04 13:56:12 -08:00
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
#elif defined ZMQ_HAVE_LOCAL_PEERCRED
|
|
|
|
|
|
|
|
bool zmq::ipc_listener_t::filter (fd_t sock)
|
|
|
|
{
|
2018-02-01 11:46:09 +01:00
|
|
|
if (options.ipc_uid_accept_filters.empty ()
|
|
|
|
&& options.ipc_gid_accept_filters.empty ())
|
2013-12-04 13:56:12 -08:00
|
|
|
return true;
|
|
|
|
|
|
|
|
struct xucred cred;
|
|
|
|
socklen_t size = sizeof (cred);
|
|
|
|
|
|
|
|
if (getsockopt (sock, 0, LOCAL_PEERCRED, &cred, &size))
|
|
|
|
return false;
|
|
|
|
if (cred.cr_version != XUCRED_VERSION)
|
|
|
|
return false;
|
2018-02-01 11:46:09 +01:00
|
|
|
if (options.ipc_uid_accept_filters.find (cred.cr_uid)
|
|
|
|
!= options.ipc_uid_accept_filters.end ())
|
2013-12-04 13:56:12 -08:00
|
|
|
return true;
|
|
|
|
for (int i = 0; i < cred.cr_ngroups; i++) {
|
2018-02-01 11:46:09 +01:00
|
|
|
if (options.ipc_gid_accept_filters.find (cred.cr_groups[i])
|
|
|
|
!= options.ipc_gid_accept_filters.end ())
|
2013-12-04 13:56:12 -08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2011-07-28 13:19:55 +02:00
|
|
|
zmq::fd_t zmq::ipc_listener_t::accept ()
|
|
|
|
{
|
2011-07-28 16:32:08 +02:00
|
|
|
// Accept one connection and deal with different failure modes.
|
2012-09-30 11:52:43 -07:00
|
|
|
// The situation where connection cannot be accepted due to insufficient
|
|
|
|
// resources is considered valid and treated by ignoring the connection.
|
2011-07-28 13:19:55 +02:00
|
|
|
zmq_assert (s != retired_fd);
|
2017-11-17 18:40:53 +00:00
|
|
|
#if defined ZMQ_HAVE_SOCK_CLOEXEC && defined HAVE_ACCEPT4
|
2016-07-31 01:50:07 +02:00
|
|
|
fd_t sock = ::accept4 (s, NULL, NULL, SOCK_CLOEXEC);
|
2016-07-30 21:22:50 +02:00
|
|
|
#else
|
2011-07-28 13:19:55 +02:00
|
|
|
fd_t sock = ::accept (s, NULL, NULL);
|
2016-07-30 21:22:50 +02:00
|
|
|
#endif
|
2011-07-28 16:32:08 +02:00
|
|
|
if (sock == -1) {
|
2018-02-01 11:46:09 +01:00
|
|
|
errno_assert (errno == EAGAIN || errno == EWOULDBLOCK || errno == EINTR
|
|
|
|
|| errno == ECONNABORTED || errno == EPROTO
|
|
|
|
|| errno == ENFILE);
|
2011-07-28 13:19:55 +02:00
|
|
|
return retired_fd;
|
2011-07-28 16:32:08 +02:00
|
|
|
}
|
2013-12-04 13:56:12 -08:00
|
|
|
|
2018-02-01 11:46:09 +01:00
|
|
|
#if (!defined ZMQ_HAVE_SOCK_CLOEXEC || !defined HAVE_ACCEPT4) \
|
|
|
|
&& defined FD_CLOEXEC
|
2014-04-02 12:25:40 -04:00
|
|
|
// Race condition can cause socket not to be closed (if fork happens
|
|
|
|
// between accept and this point).
|
|
|
|
int rc = fcntl (sock, F_SETFD, FD_CLOEXEC);
|
|
|
|
errno_assert (rc != -1);
|
|
|
|
#endif
|
|
|
|
|
2013-12-04 13:56:12 -08:00
|
|
|
// IPC accept() filters
|
|
|
|
#if defined ZMQ_HAVE_SO_PEERCRED || defined ZMQ_HAVE_LOCAL_PEERCRED
|
|
|
|
if (!filter (sock)) {
|
|
|
|
int rc = ::close (sock);
|
|
|
|
errno_assert (rc == 0);
|
|
|
|
return retired_fd;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-01-03 23:55:57 +01:00
|
|
|
if (zmq::set_nosigpipe (sock)) {
|
|
|
|
#ifdef ZMQ_HAVE_WINDOWS
|
|
|
|
int rc = closesocket (sock);
|
|
|
|
wsa_assert (rc != SOCKET_ERROR);
|
|
|
|
#else
|
|
|
|
int rc = ::close (sock);
|
|
|
|
errno_assert (rc == 0);
|
|
|
|
#endif
|
|
|
|
return retired_fd;
|
|
|
|
}
|
|
|
|
|
2011-07-28 13:19:55 +02:00
|
|
|
return sock;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|