2 Bacula(R) - The Network Backup Solution
4 Copyright (C) 2000-2015 Kern Sibbald
5 Copyright (C) 2000-2014 Free Software Foundation Europe e.V.
7 The original author of Bacula is Kern Sibbald, with contributions
8 from many others, a complete list can be found in the file AUTHORS.
10 You may use this file and others of this release according to the
11 license defined in the LICENSE file, which includes the Affero General
12 Public License, v3.0 ("AGPLv3") and some additional permissions and
13 terms pursuant to its AGPLv3 Section 7.
15 This notice must be preserved when any source code is
16 conveyed and/or propagated.
18 Bacula(R) is a registered trademark of Kern Sibbald.
21 * Bacula Sock Class definition
22 * Note, the old non-class code is in bnet.c, and the
23 * new class code associated with this file is in bsock.c
25 * Kern Sibbald, May MM
27 * Zero msglen from other end indicates soft eof (usually
28 * end of some binary data stream, but not end of conversation).
30 * Negative msglen, is special "signal" (no data follows).
31 * See below for SIGNAL codes.
38 struct btimer_t; /* forward reference */
40 /* Effectively disable the bsock time out */
41 #define BSOCK_TIMEOUT 3600 * 24 * 200; /* default 200 days */
42 btimer_t *start_bsock_timer(BSOCK *bs, uint32_t wait);
43 void stop_bsock_timer(btimer_t *wid);
48 * Note, keep this public part before the private otherwise
49 * bat breaks on some systems such as RedHat.
52 uint64_t read_seqno; /* read sequence number */
53 POOLMEM *msg; /* message pool buffer */
54 POOLMEM *errmsg; /* edited error message */
55 RES *res; /* Resource to which we are connected */
56 FILE *m_spool_fd; /* spooling file */
57 TLS_CONNECTION *tls; /* associated tls connection */
58 IPADDR *src_addr; /* IP address to source connections from */
59 uint32_t in_msg_no; /* input message number */
60 uint32_t out_msg_no; /* output message number */
61 uint32_t *pout_msg_no; /* pointer to the above */
62 int32_t msglen; /* message length */
63 volatile time_t timer_start; /* time started read/write */
64 volatile time_t timeout; /* timeout BSOCK after this interval */
65 int m_fd; /* socket file descriptor */
66 int b_errno; /* bsock errno */
67 int m_blocking; /* blocking state (0 = nonblocking, 1 = blocking) */
68 volatile int errors; /* incremented for each error on socket */
69 volatile bool m_suppress_error_msgs; /* set to suppress error messages */
71 struct sockaddr client_addr; /* client's IP address */
72 struct sockaddr_in peer_addr; /* peer's IP address */
75 BSOCK *m_next; /* next BSOCK if duped (not actually used) */
76 JCR *m_jcr; /* jcr or NULL for error msgs */
77 pthread_mutex_t m_rmutex; /* for read locking if use_locking set */
78 pthread_mutex_t m_wmutex; /* for write locking if use_locking set */
79 pthread_mutex_t *pm_rmutex; /* Pointer to the read mutex */
80 pthread_mutex_t *pm_wmutex; /* Pointer to the write mutex */
81 char *m_who; /* Name of daemon to which we are talking */
82 char *m_host; /* Host name/IP */
83 int m_port; /* desired port */
84 btimer_t *m_tid; /* timer id */
85 boffset_t m_data_end; /* offset of data written */
86 boffset_t m_last_data_end; /* offset of last valid data written */
87 int32_t m_FileIndex; /* attr spool FI */
88 int32_t m_lastFileIndex; /* last valid attr spool FI */
89 uint32_t m_flags; /* Special flags */
90 volatile bool m_timed_out: 1; /* timed out in read/write */
91 volatile bool m_terminated: 1; /* set when BNET_TERMINATE arrives */
92 bool m_closed: 1; /* set when socket is closed */
93 bool m_duped: 1; /* set if duped BSOCK */
94 bool m_spool: 1; /* set for spooling */
95 bool m_use_locking: 1; /* set to use locking */
97 int64_t m_bwlimit; /* set to limit bandwidth */
98 int64_t m_nb_bytes; /* bytes sent/recv since the last tick */
99 btime_t m_last_tick; /* last tick used by bwlimit */
101 void fin_init(JCR * jcr, int sockfd, const char *who, const char *host, int port,
102 struct sockaddr *lclient_addr);
103 bool open(JCR *jcr, const char *name, char *host, char *service,
104 int port, utime_t heart_beat, int *fatal);
107 /* methods -- in bsock.c */
110 bool connect(JCR * jcr, int retry_interval, utime_t max_retry_time,
111 utime_t heart_beat, const char *name, char *host,
112 char *service, int port, int verbose);
114 bool send() { return send(0); };
115 bool send(int flags);
116 bool fsend(const char*, ...);
117 bool signal(int signal);
118 void close(); /* close connection and destroy packet */
119 void destroy(); /* destroy socket packet */
120 const char *bstrerror(); /* last error on socket */
121 int get_peer(char *buf, socklen_t buflen);
122 bool despool(void update_attr_spool_size(ssize_t size), ssize_t tsize);
123 bool set_buffer_size(uint32_t size, int rw);
124 int set_nonblocking();
126 void restore_blocking(int flags);
127 void set_killable(bool killable);
128 int wait_data(int sec, int usec=0);
129 int wait_data_intr(int sec, int usec=0);
130 bool authenticate_director(const char *name, const char *password,
131 TLS_CONTEXT *tls_ctx, char *response, int response_len);
132 bool set_locking(); /* in bsock.c */
133 void clear_locking(); /* in bsock.c */
134 void set_source_address(dlist *src_addr_list);
135 void control_bwlimit(int bytes); /* in bsock.c */
137 /* Inline functions */
138 void suppress_error_messages(bool flag) { m_suppress_error_msgs = flag; };
139 void set_jcr(JCR *jcr) { m_jcr = jcr; };
140 void set_who(char *who) { m_who = who; };
141 void set_host(char *host) { m_host = host; };
142 void set_port(int port) { m_port = port; };
143 char *who() const { return m_who; };
144 char *host() const { return m_host; };
145 int port() const { return m_port; };
146 JCR *jcr() const { return m_jcr; };
147 JCR *get_jcr() const { return m_jcr; };
148 bool is_spooling() const { return m_spool; };
149 bool is_duped() const { return m_duped; };
150 bool is_terminated() const { return m_terminated; };
151 bool is_timed_out() const { return m_timed_out; };
152 bool is_closed() const { return m_closed; };
153 bool is_open() const { return !m_closed; };
154 bool is_stop() const { return errors || is_terminated() || is_closed(); }
155 bool is_error() { errno = b_errno; return errors; };
156 void set_data_end(int32_t FileIndex) {
157 if (m_spool && FileIndex > m_FileIndex) {
158 m_lastFileIndex = m_FileIndex;
159 m_last_data_end = m_data_end;
160 m_FileIndex = FileIndex;
161 m_data_end = ftello(m_spool_fd);
164 boffset_t get_last_data_end() { return m_last_data_end; };
165 int32_t get_lastFileIndex() { return m_lastFileIndex; };
166 void set_bwlimit(int64_t maxspeed) { m_bwlimit = maxspeed; };
167 bool use_bwlimit() { return m_bwlimit > 0;};
168 void set_spooling() { m_spool = true; };
169 void clear_spooling() { m_spool = false; };
170 void set_duped() { m_duped = true; };
171 void set_timed_out() { m_timed_out = true; };
172 void clear_timed_out() { m_timed_out = false; };
173 void set_terminated() { m_terminated = true; };
174 void set_closed() { m_closed = true; };
175 void start_timer(int sec) { m_tid = start_bsock_timer(this, sec); };
176 void stop_timer() { stop_bsock_timer(m_tid); };
182 * Signal definitions for use in bsock->signal()
183 * Note! These must be negative. There are signals that are generated
184 * by the bsock software not by the OS ...
187 BNET_EOD = -1, /* End of data stream, new data may follow */
188 BNET_EOD_POLL = -2, /* End of data and poll all in one */
189 BNET_STATUS = -3, /* Send full status */
190 BNET_TERMINATE = -4, /* Conversation terminated, doing close() */
191 BNET_POLL = -5, /* Poll request, I'm hanging on a read */
192 BNET_HEARTBEAT = -6, /* Heartbeat Response requested */
193 BNET_HB_RESPONSE = -7, /* Only response permited to HB */
194 BNET_xxxxxxPROMPT = -8, /* No longer used -- Prompt for subcommand */
195 BNET_BTIME = -9, /* Send UTC btime */
196 BNET_BREAK = -10, /* Stop current command -- ctl-c */
197 BNET_START_SELECT = -11, /* Start of a selection list */
198 BNET_END_SELECT = -12, /* End of a select list */
199 BNET_INVALID_CMD = -13, /* Invalid command sent */
200 BNET_CMD_FAILED = -14, /* Command failed */
201 BNET_CMD_OK = -15, /* Command succeeded */
202 BNET_CMD_BEGIN = -16, /* Start command execution */
203 BNET_MSGS_PENDING = -17, /* Messages pending */
204 BNET_MAIN_PROMPT = -18, /* Server ready and waiting */
205 BNET_SELECT_INPUT = -19, /* Return selection input */
206 BNET_WARNING_MSG = -20, /* Warning message */
207 BNET_ERROR_MSG = -21, /* Error message -- command failed */
208 BNET_INFO_MSG = -22, /* Info message -- status line */
209 BNET_RUN_CMD = -23, /* Run command follows */
210 BNET_YESNO = -24, /* Request yes no response */
211 BNET_START_RTREE = -25, /* Start restore tree mode */
212 BNET_END_RTREE = -26, /* End restore tree mode */
213 BNET_SUB_PROMPT = -27, /* Indicate we are at a subprompt */
214 BNET_TEXT_INPUT = -28 /* Get text input from user */
217 #define BNET_SETBUF_READ 1 /* Arg for bnet_set_buffer_size */
218 #define BNET_SETBUF_WRITE 2 /* Arg for bnet_set_buffer_size */
221 * Return status from bnet_recv()
222 * Note, the HARDEOF and ERROR refer to comm status/problems
223 * rather than the BNET_xxx above, which are software signals.
232 * TLS enabling values. Value is important for comparison, ie:
233 * if (tls_remote_need < BNET_TLS_REQUIRED) { ... }
236 BNET_TLS_NONE = 0, /* cannot do TLS */
237 BNET_TLS_OK = 1, /* can do, but not required on my end */
238 BNET_TLS_REQUIRED = 2 /* TLS is required */
241 int32_t read_nbytes(BSOCK * bsock, char *ptr, int32_t nbytes);
242 int32_t write_nbytes(BSOCK * bsock, char *ptr, int32_t nbytes);
246 * Completely release the socket packet, and NULL the pointer
248 #define free_bsock(a) do{if(a){(a)->close(); (a)->destroy(); (a)=NULL;}} while(0)
251 * Does the socket exist and is it open?
253 #define is_bsock_open(a) ((a) && (a)->is_open())
255 #endif /* __BSOCK_H_ */