mirror of
https://github.com/ElementsProject/lightning.git
synced 2024-11-19 18:11:28 +01:00
f376a9c24c
Didn't generally fixup inside comments and the bech32 code: reformatting that is just anti-social. Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
711 lines
19 KiB
C
711 lines
19 KiB
C
#include <arpa/inet.h>
|
|
#include <assert.h>
|
|
#include <ccan/build_assert/build_assert.h>
|
|
#include <ccan/err/err.h>
|
|
#include <ccan/io/io.h>
|
|
#include <ccan/mem/mem.h>
|
|
#include <ccan/str/hex/hex.h>
|
|
#include <ccan/tal/str/str.h>
|
|
#include <common/base32.h>
|
|
#include <common/type_to_string.h>
|
|
#include <common/utils.h>
|
|
#include <common/wireaddr.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <netdb.h>
|
|
#include <netinet/in.h>
|
|
#include <sodium/randombytes.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
#include <wire/wire.h>
|
|
|
|
bool wireaddr_eq(const struct wireaddr *a, const struct wireaddr *b)
|
|
{
|
|
if (a->type != b->type)
|
|
return false;
|
|
if (a->port != b->port)
|
|
return false;
|
|
return memeq(a->addr, a->addrlen, b->addr, b->addrlen);
|
|
}
|
|
|
|
/* Returns false if we didn't parse it, and *cursor == NULL if malformed. */
|
|
bool fromwire_wireaddr(const u8 **cursor, size_t *max, struct wireaddr *addr)
|
|
{
|
|
addr->type = fromwire_u8(cursor, max);
|
|
|
|
switch (addr->type) {
|
|
case ADDR_TYPE_IPV4:
|
|
addr->addrlen = 4;
|
|
break;
|
|
case ADDR_TYPE_IPV6:
|
|
addr->addrlen = 16;
|
|
break;
|
|
case ADDR_TYPE_TOR_V2:
|
|
addr->addrlen = TOR_V2_ADDRLEN;
|
|
break;
|
|
case ADDR_TYPE_TOR_V3:
|
|
addr->addrlen = TOR_V3_ADDRLEN;
|
|
break;
|
|
default:
|
|
return false;
|
|
}
|
|
fromwire(cursor, max, addr->addr, addr->addrlen);
|
|
addr->port = fromwire_u16(cursor, max);
|
|
|
|
return *cursor != NULL;
|
|
}
|
|
|
|
void towire_wireaddr(u8 **pptr, const struct wireaddr *addr)
|
|
{
|
|
towire_u8(pptr, addr->type);
|
|
towire(pptr, addr->addr, addr->addrlen);
|
|
towire_u16(pptr, addr->port);
|
|
}
|
|
|
|
enum addr_listen_announce fromwire_addr_listen_announce(const u8 **cursor,
|
|
size_t *max)
|
|
{
|
|
return fromwire_u8(cursor, max);
|
|
}
|
|
|
|
void towire_addr_listen_announce(u8 **pptr, enum addr_listen_announce ala)
|
|
{
|
|
towire_u8(pptr, ala);
|
|
}
|
|
|
|
void towire_wireaddr_internal(u8 **pptr, const struct wireaddr_internal *addr)
|
|
{
|
|
towire_u8(pptr, addr->itype);
|
|
switch (addr->itype) {
|
|
case ADDR_INTERNAL_SOCKNAME:
|
|
towire_u8_array(pptr, (const u8 *)addr->u.sockname,
|
|
sizeof(addr->u.sockname));
|
|
return;
|
|
case ADDR_INTERNAL_AUTOTOR:
|
|
towire_wireaddr(pptr, &addr->u.torservice.address);
|
|
towire_u16(pptr, addr->u.torservice.port);
|
|
return;
|
|
case ADDR_INTERNAL_STATICTOR:
|
|
towire_wireaddr(pptr, &addr->u.torservice.address);
|
|
towire_u8_array(pptr, (const u8 *)addr->u.torservice.blob,
|
|
sizeof(addr->u.torservice.blob));
|
|
towire_u16(pptr, addr->u.torservice.port);
|
|
return;
|
|
case ADDR_INTERNAL_ALLPROTO:
|
|
towire_u16(pptr, addr->u.port);
|
|
return;
|
|
case ADDR_INTERNAL_WIREADDR:
|
|
towire_wireaddr(pptr, &addr->u.wireaddr);
|
|
return;
|
|
case ADDR_INTERNAL_FORPROXY:
|
|
towire_u8_array(pptr, (const u8 *)addr->u.unresolved.name,
|
|
sizeof(addr->u.unresolved.name));
|
|
towire_u16(pptr, addr->u.unresolved.port);
|
|
return;
|
|
}
|
|
abort();
|
|
}
|
|
|
|
bool fromwire_wireaddr_internal(const u8 **cursor, size_t *max,
|
|
struct wireaddr_internal *addr)
|
|
{
|
|
addr->itype = fromwire_u8(cursor, max);
|
|
switch (addr->itype) {
|
|
case ADDR_INTERNAL_SOCKNAME:
|
|
fromwire_u8_array(cursor, max, (u8 *)addr->u.sockname,
|
|
sizeof(addr->u.sockname));
|
|
/* Must be NUL terminated */
|
|
if (!memchr(addr->u.sockname, 0, sizeof(addr->u.sockname)))
|
|
fromwire_fail(cursor, max);
|
|
return *cursor != NULL;
|
|
case ADDR_INTERNAL_ALLPROTO:
|
|
addr->u.port = fromwire_u16(cursor, max);
|
|
return *cursor != NULL;
|
|
case ADDR_INTERNAL_AUTOTOR:
|
|
fromwire_wireaddr(cursor, max, &addr->u.torservice.address);
|
|
addr->u.torservice.port = fromwire_u16(cursor, max);
|
|
return *cursor != NULL;
|
|
case ADDR_INTERNAL_STATICTOR:
|
|
fromwire_wireaddr(cursor, max, &addr->u.torservice.address);
|
|
fromwire_u8_array(cursor, max, (u8 *)addr->u.torservice.blob,
|
|
sizeof(addr->u.torservice.blob));
|
|
addr->u.torservice.port = fromwire_u16(cursor, max);
|
|
return *cursor != NULL;
|
|
case ADDR_INTERNAL_WIREADDR:
|
|
return fromwire_wireaddr(cursor, max, &addr->u.wireaddr);
|
|
case ADDR_INTERNAL_FORPROXY:
|
|
fromwire_u8_array(cursor, max, (u8 *)addr->u.unresolved.name,
|
|
sizeof(addr->u.unresolved.name));
|
|
/* Must be NUL terminated */
|
|
if (!memchr(addr->u.unresolved.name, 0,
|
|
sizeof(addr->u.unresolved.name)))
|
|
fromwire_fail(cursor, max);
|
|
addr->u.unresolved.port = fromwire_u16(cursor, max);
|
|
return *cursor != NULL;
|
|
}
|
|
fromwire_fail(cursor, max);
|
|
return false;
|
|
}
|
|
|
|
void wireaddr_from_ipv4(struct wireaddr *addr,
|
|
const struct in_addr *ip4,
|
|
const u16 port)
|
|
{
|
|
addr->type = ADDR_TYPE_IPV4;
|
|
addr->addrlen = sizeof(*ip4);
|
|
addr->port = port;
|
|
memset(addr->addr, 0, sizeof(addr->addr));
|
|
memcpy(addr->addr, ip4, addr->addrlen);
|
|
}
|
|
|
|
void wireaddr_from_ipv6(struct wireaddr *addr,
|
|
const struct in6_addr *ip6,
|
|
const u16 port)
|
|
{
|
|
addr->type = ADDR_TYPE_IPV6;
|
|
addr->addrlen = sizeof(*ip6);
|
|
addr->port = port;
|
|
memset(addr->addr, 0, sizeof(addr->addr));
|
|
memcpy(&addr->addr, ip6, addr->addrlen);
|
|
}
|
|
|
|
bool wireaddr_to_ipv4(const struct wireaddr *addr, struct sockaddr_in *s4)
|
|
{
|
|
if (addr->type != ADDR_TYPE_IPV4)
|
|
return false;
|
|
memset(s4, 0, sizeof(*s4));
|
|
s4->sin_family = AF_INET;
|
|
s4->sin_port = htons(addr->port);
|
|
assert(addr->addrlen == sizeof(s4->sin_addr));
|
|
memcpy(&s4->sin_addr, addr->addr, sizeof(s4->sin_addr));
|
|
return true;
|
|
}
|
|
|
|
bool wireaddr_to_ipv6(const struct wireaddr *addr, struct sockaddr_in6 *s6)
|
|
{
|
|
if (addr->type != ADDR_TYPE_IPV6)
|
|
return false;
|
|
memset(s6, 0, sizeof(*s6));
|
|
s6->sin6_family = AF_INET6;
|
|
s6->sin6_port = htons(addr->port);
|
|
assert(addr->addrlen == sizeof(s6->sin6_addr));
|
|
memcpy(&s6->sin6_addr, addr->addr, sizeof(s6->sin6_addr));
|
|
return true;
|
|
}
|
|
|
|
bool wireaddr_is_wildcard(const struct wireaddr *addr)
|
|
{
|
|
switch (addr->type) {
|
|
case ADDR_TYPE_IPV6:
|
|
case ADDR_TYPE_IPV4:
|
|
return memeqzero(addr->addr, addr->addrlen);
|
|
case ADDR_TYPE_TOR_V2:
|
|
case ADDR_TYPE_TOR_V3:
|
|
return false;
|
|
}
|
|
abort();
|
|
}
|
|
|
|
char *fmt_wireaddr_internal(const tal_t *ctx,
|
|
const struct wireaddr_internal *a)
|
|
{
|
|
switch (a->itype) {
|
|
case ADDR_INTERNAL_SOCKNAME:
|
|
return tal_fmt(ctx, "%s", a->u.sockname);
|
|
case ADDR_INTERNAL_ALLPROTO:
|
|
return tal_fmt(ctx, ":%u", a->u.port);
|
|
case ADDR_INTERNAL_WIREADDR:
|
|
return fmt_wireaddr(ctx, &a->u.wireaddr);
|
|
case ADDR_INTERNAL_FORPROXY:
|
|
return tal_fmt(ctx, "%s:%u",
|
|
a->u.unresolved.name, a->u.unresolved.port);
|
|
case ADDR_INTERNAL_AUTOTOR:
|
|
return tal_fmt(ctx, "autotor:%s",
|
|
fmt_wireaddr(tmpctx, &a->u.torservice.address));
|
|
case ADDR_INTERNAL_STATICTOR:
|
|
return tal_fmt(ctx, "statictor:%s",
|
|
fmt_wireaddr(tmpctx, &a->u.torservice.address));
|
|
}
|
|
abort();
|
|
}
|
|
REGISTER_TYPE_TO_STRING(wireaddr_internal, fmt_wireaddr_internal);
|
|
|
|
char *fmt_wireaddr_without_port(const tal_t * ctx, const struct wireaddr *a)
|
|
{
|
|
char *ret, *hex;
|
|
char addrstr[INET6_ADDRSTRLEN];
|
|
|
|
switch (a->type) {
|
|
case ADDR_TYPE_IPV4:
|
|
if (!inet_ntop(AF_INET, a->addr, addrstr, INET_ADDRSTRLEN))
|
|
return "Unprintable-ipv4-address";
|
|
return tal_fmt(ctx, "%s", addrstr);
|
|
case ADDR_TYPE_IPV6:
|
|
if (!inet_ntop(AF_INET6, a->addr, addrstr, INET6_ADDRSTRLEN))
|
|
return "Unprintable-ipv6-address";
|
|
return tal_fmt(ctx, "[%s]", addrstr);
|
|
case ADDR_TYPE_TOR_V2:
|
|
case ADDR_TYPE_TOR_V3:
|
|
return tal_fmt(ctx, "%s.onion",
|
|
b32_encode(tmpctx, a->addr, a->addrlen));
|
|
}
|
|
|
|
hex = tal_hexstr(ctx, a->addr, a->addrlen);
|
|
ret = tal_fmt(ctx, "Unknown type %u %s", a->type, hex);
|
|
tal_free(hex);
|
|
return ret;
|
|
}
|
|
|
|
char *fmt_wireaddr(const tal_t *ctx, const struct wireaddr *a)
|
|
{
|
|
char *ret = fmt_wireaddr_without_port(ctx, a);
|
|
tal_append_fmt(&ret, ":%u", a->port);
|
|
return ret;
|
|
}
|
|
REGISTER_TYPE_TO_STRING(wireaddr, fmt_wireaddr);
|
|
|
|
/* Valid forms:
|
|
*
|
|
* [anything]:<number>
|
|
* anything-without-colons-or-left-brace:<number>
|
|
* anything-without-colons
|
|
* string-with-multiple-colons
|
|
*
|
|
* Returns false if it wasn't one of these forms. If it returns true,
|
|
* it only overwrites *port if it was specified by <number> above.
|
|
*/
|
|
static bool separate_address_and_port(const tal_t *ctx, const char *arg,
|
|
char **addr, u16 *port)
|
|
{
|
|
char *portcolon;
|
|
|
|
if (strstarts(arg, "[")) {
|
|
char *end = strchr(arg, ']');
|
|
if (!end)
|
|
return false;
|
|
/* Copy inside [] */
|
|
*addr = tal_strndup(ctx, arg + 1, end - arg - 1);
|
|
portcolon = strchr(end+1, ':');
|
|
} else {
|
|
portcolon = strchr(arg, ':');
|
|
if (portcolon) {
|
|
/* Disregard if there's more than one : or if it's at
|
|
the end */
|
|
if (portcolon != strrchr(arg, ':')
|
|
|| portcolon[1] == '\0')
|
|
portcolon = NULL;
|
|
}
|
|
if (portcolon)
|
|
*addr = tal_strndup(ctx, arg, portcolon - arg);
|
|
else
|
|
*addr = tal_strdup(ctx, arg);
|
|
}
|
|
|
|
if (portcolon) {
|
|
char *endp;
|
|
*port = strtol(portcolon + 1, &endp, 10);
|
|
return *port != 0 && *endp == '\0';
|
|
}
|
|
return true;
|
|
}
|
|
|
|
struct wireaddr *
|
|
wireaddr_from_hostname(const tal_t *ctx,
|
|
const char *hostname,
|
|
const u16 port, bool *no_dns,
|
|
struct sockaddr *broken_reply,
|
|
const char **err_msg)
|
|
{
|
|
struct wireaddr *addrs;
|
|
struct sockaddr_in6 *sa6;
|
|
struct sockaddr_in *sa4;
|
|
struct addrinfo *addrinfo, *addrinfos;
|
|
struct addrinfo hints;
|
|
int gai_err;
|
|
|
|
addrs = tal_arr(ctx, struct wireaddr, 0);
|
|
if (no_dns)
|
|
*no_dns = false;
|
|
|
|
/* Don't do lookup on onion addresses. */
|
|
if (strends(hostname, ".onion")) {
|
|
u8 *dec = b32_decode(tmpctx, hostname,
|
|
strlen(hostname) - strlen(".onion"));
|
|
tal_resize(&addrs, 1);
|
|
if (tal_count(dec) == TOR_V2_ADDRLEN) {
|
|
addrs[0].type = ADDR_TYPE_TOR_V2;
|
|
} else if (tal_count(dec) == TOR_V3_ADDRLEN) {
|
|
addrs[0].type = ADDR_TYPE_TOR_V3;
|
|
} else {
|
|
if (err_msg)
|
|
*err_msg = "Invalid Tor address";
|
|
return tal_free(addrs);
|
|
}
|
|
|
|
addrs[0].addrlen = tal_count(dec);
|
|
addrs[0].port = port;
|
|
memcpy(addrs[0].addr, dec, tal_count(dec));
|
|
return addrs;
|
|
}
|
|
|
|
/* Tell them we wanted DNS and fail. */
|
|
if (no_dns) {
|
|
if (err_msg)
|
|
*err_msg = "Needed DNS, but lookups suppressed";
|
|
*no_dns = true;
|
|
return tal_free(addrs);
|
|
}
|
|
|
|
memset(&hints, 0, sizeof(hints));
|
|
hints.ai_family = AF_UNSPEC;
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
hints.ai_protocol = 0;
|
|
hints.ai_flags = AI_ADDRCONFIG;
|
|
gai_err = getaddrinfo(hostname, tal_fmt(tmpctx, "%d", port),
|
|
&hints, &addrinfos);
|
|
if (gai_err != 0) {
|
|
if (err_msg)
|
|
*err_msg = gai_strerror(gai_err);
|
|
return tal_free(addrs);
|
|
}
|
|
|
|
if (broken_reply != NULL && memeq(addrinfos->ai_addr, addrinfos->ai_addrlen, broken_reply, tal_count(broken_reply)))
|
|
goto cleanup;
|
|
|
|
for (addrinfo = addrinfos; addrinfo; addrinfo = addrinfo->ai_next) {
|
|
struct wireaddr addr;
|
|
if (addrinfo->ai_family == AF_INET) {
|
|
sa4 = (struct sockaddr_in *) addrinfo->ai_addr;
|
|
wireaddr_from_ipv4(&addr, &sa4->sin_addr, port);
|
|
} else if (addrinfo->ai_family == AF_INET6) {
|
|
sa6 = (struct sockaddr_in6 *) addrinfo->ai_addr;
|
|
wireaddr_from_ipv6(&addr, &sa6->sin6_addr, port);
|
|
} else
|
|
/* Ignore any other address types. */
|
|
continue;
|
|
tal_arr_expand(&addrs, addr);
|
|
}
|
|
|
|
cleanup:
|
|
/* Clean up */
|
|
freeaddrinfo(addrinfos);
|
|
if (tal_count(addrs))
|
|
return addrs;
|
|
return tal_free(addrs);
|
|
}
|
|
|
|
bool parse_wireaddr(const char *arg, struct wireaddr *addr, u16 defport,
|
|
bool *no_dns, const char **err_msg)
|
|
{
|
|
struct in6_addr v6;
|
|
struct in_addr v4;
|
|
u16 port;
|
|
char *ip;
|
|
bool res;
|
|
|
|
res = false;
|
|
port = defport;
|
|
if (err_msg)
|
|
*err_msg = NULL;
|
|
|
|
if (!separate_address_and_port(tmpctx, arg, &ip, &port))
|
|
goto finish;
|
|
|
|
if (streq(ip, "localhost"))
|
|
ip = "127.0.0.1";
|
|
else if (streq(ip, "ip6-localhost"))
|
|
ip = "::1";
|
|
|
|
memset(&addr->addr, 0, sizeof(addr->addr));
|
|
|
|
if (inet_pton(AF_INET, ip, &v4) == 1) {
|
|
wireaddr_from_ipv4(addr, &v4, port);
|
|
res = true;
|
|
} else if (inet_pton(AF_INET6, ip, &v6) == 1) {
|
|
wireaddr_from_ipv6(addr, &v6, port);
|
|
res = true;
|
|
}
|
|
|
|
/* Resolve with getaddrinfo */
|
|
if (!res) {
|
|
struct wireaddr *addresses = wireaddr_from_hostname(NULL, ip, port,
|
|
no_dns, NULL, err_msg);
|
|
if (addresses) {
|
|
*addr = addresses[0];
|
|
tal_free(addresses);
|
|
res = true;
|
|
}
|
|
}
|
|
|
|
finish:
|
|
if (!res && err_msg && !*err_msg)
|
|
*err_msg = "Error parsing hostname";
|
|
return res;
|
|
}
|
|
|
|
bool parse_wireaddr_internal(const char *arg, struct wireaddr_internal *addr,
|
|
u16 port, bool wildcard_ok, bool dns_ok,
|
|
bool unresolved_ok,
|
|
const char **err_msg)
|
|
{
|
|
u16 splitport;
|
|
char *ip = NULL;
|
|
char *service_addr;
|
|
bool needed_dns = false;
|
|
|
|
/* Addresses starting with '/' are local socket paths */
|
|
if (arg[0] == '/') {
|
|
addr->itype = ADDR_INTERNAL_SOCKNAME;
|
|
|
|
/* Check if the path is too long */
|
|
if (strlen(arg) >= sizeof(addr->u.sockname)) {
|
|
if (err_msg)
|
|
*err_msg = "Socket name too long";
|
|
return false;
|
|
}
|
|
/* Zero it out for passing across the wire */
|
|
memset(addr->u.sockname, 0, sizeof(addr->u.sockname));
|
|
strcpy(addr->u.sockname, arg);
|
|
return true;
|
|
}
|
|
|
|
/* 'autotor:' is a special prefix meaning talk to Tor to create
|
|
* an onion address. */
|
|
if (strstarts(arg, "autotor:")) {
|
|
addr->itype = ADDR_INTERNAL_AUTOTOR;
|
|
addr->u.torservice.port = DEFAULT_PORT;
|
|
/* Format is separated by slash. */
|
|
char **parts = tal_strsplit(tmpctx, arg, "/", STR_EMPTY_OK);
|
|
|
|
for (size_t i = 1; i < tal_count(parts)-1; i++) {
|
|
if (tal_strreg(tmpctx, parts[i], "torport")) {
|
|
char *endp = NULL;
|
|
char **parts_2 = tal_strsplit(tmpctx, parts[i], "=", STR_EMPTY_OK);
|
|
if (tal_count(parts_2) == 3) {
|
|
addr->u.torservice.port = strtol((const char *)parts_2[1], &endp, 10);
|
|
if (addr->u.torservice.port <= 0 || *endp != '\0') {
|
|
if (err_msg)
|
|
*err_msg = "Bad :torport: number";
|
|
return false;
|
|
}
|
|
} else {
|
|
if (err_msg)
|
|
*err_msg = "Bad :torport: format";
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
|
|
service_addr = tal_fmt(tmpctx, "%s", parts[0] + strlen("autotor:"));
|
|
|
|
return parse_wireaddr(service_addr,
|
|
&addr->u.torservice.address, 9051,
|
|
dns_ok ? NULL : &needed_dns,
|
|
err_msg);
|
|
}
|
|
|
|
/* 'statictor:' is a special prefix meaning talk to Tor to create
|
|
* an static onion address from a blob or node id */
|
|
if (strstarts(arg, "statictor:")) {
|
|
bool use_magic_blob = true;
|
|
addr->itype = ADDR_INTERNAL_STATICTOR;
|
|
addr->u.torservice.port = DEFAULT_PORT;
|
|
memset(&(addr->u.torservice.blob[0]), 0, sizeof(addr->u.torservice.blob));
|
|
|
|
/* Format is separated by slash. */
|
|
char **parts = tal_strsplit(tmpctx, arg, "/", STR_EMPTY_OK);
|
|
for (size_t i = 1; i < tal_count(parts)-1; i++) {
|
|
if (tal_strreg(tmpctx, parts[i], "torport")) {
|
|
char *endp = NULL;
|
|
char **parts_eq = tal_strsplit(tmpctx, parts[i], "=", STR_EMPTY_OK);
|
|
if (tal_count(parts_eq) == 3) {
|
|
addr->u.torservice.port = strtol((const char *)parts_eq[1], &endp, 10);
|
|
if (addr->u.torservice.port <= 0 || *endp != '\0') {
|
|
if (err_msg)
|
|
*err_msg = "Bad :torport: number";
|
|
return false;
|
|
}
|
|
} else {
|
|
if (err_msg)
|
|
*err_msg = "Bad :torport: format";
|
|
return false;
|
|
}
|
|
}
|
|
if (tal_strreg(tmpctx, parts[i], "torblob")) {
|
|
char **parts_eq = tal_strsplit(tmpctx, parts[i], "=", STR_EMPTY_OK);
|
|
if (tal_count(parts_eq) == 3) {
|
|
if (strlen((char *)parts_eq[1]) == 0) {
|
|
if (err_msg)
|
|
*err_msg = "Blob too short";
|
|
return false;
|
|
}
|
|
strncpy((char *)&(addr->u.torservice.blob[0]), (const char *)parts_eq[1], TOR_V3_BLOBLEN);
|
|
use_magic_blob = false;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (use_magic_blob) {
|
|
/* when statictor called just with the service address and or port generate the unique onion */
|
|
strncpy((char *)&(addr->u.torservice.blob[0]), tal_fmt(tmpctx, STATIC_TOR_MAGIC_STRING), strlen(STATIC_TOR_MAGIC_STRING));
|
|
}
|
|
|
|
service_addr = tal_fmt(tmpctx, "%s", parts[0] + strlen("statictor:"));
|
|
|
|
return parse_wireaddr(service_addr,
|
|
&addr->u.torservice.address, 9051,
|
|
dns_ok ? NULL : &needed_dns,
|
|
err_msg);
|
|
}
|
|
|
|
splitport = port;
|
|
if (!separate_address_and_port(tmpctx, arg, &ip, &splitport)) {
|
|
if (err_msg) {
|
|
*err_msg = tal_fmt(tmpctx, "Error parsing hostname %s %s", (char *)arg, ip);
|
|
}
|
|
return false;
|
|
}
|
|
|
|
/* An empty string means IPv4 and IPv6 (which under Linux by default
|
|
* means just IPv6, and IPv4 gets autobound). */
|
|
if (wildcard_ok && streq(ip, "")) {
|
|
addr->itype = ADDR_INTERNAL_ALLPROTO;
|
|
addr->u.port = splitport;
|
|
return true;
|
|
}
|
|
|
|
addr->itype = ADDR_INTERNAL_WIREADDR;
|
|
if (parse_wireaddr(arg, &addr->u.wireaddr, port,
|
|
dns_ok ? NULL : &needed_dns, err_msg))
|
|
return true;
|
|
|
|
if (!needed_dns || !unresolved_ok)
|
|
return false;
|
|
|
|
/* We can't do DNS, so keep unresolved. */
|
|
if (!wireaddr_from_unresolved(addr, ip, splitport)) {
|
|
if (err_msg)
|
|
*err_msg = "Name too long";
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool wireaddr_from_unresolved(struct wireaddr_internal *addr,
|
|
const char *name, u16 port)
|
|
{
|
|
addr->itype = ADDR_INTERNAL_FORPROXY;
|
|
if (strlen(name) >= sizeof(addr->u.unresolved.name))
|
|
return false;
|
|
|
|
memset(addr->u.unresolved.name, 0, sizeof(addr->u.unresolved.name));
|
|
strcpy(addr->u.unresolved.name, name);
|
|
addr->u.unresolved.port = port;
|
|
return true;
|
|
}
|
|
|
|
void wireaddr_from_sockname(struct wireaddr_internal *addr,
|
|
const char *sockname)
|
|
{
|
|
addr->itype = ADDR_INTERNAL_SOCKNAME;
|
|
memset(addr->u.sockname, 0, sizeof(addr->u.sockname));
|
|
strncpy(addr->u.sockname, sockname, sizeof(addr->u.sockname)-1);
|
|
}
|
|
|
|
bool wireaddr_to_sockname(const struct wireaddr_internal *addr,
|
|
struct sockaddr_un *sun)
|
|
{
|
|
if (addr->itype != ADDR_INTERNAL_SOCKNAME)
|
|
return false;
|
|
sun->sun_family = AF_LOCAL;
|
|
BUILD_ASSERT(sizeof(sun->sun_path) == sizeof(addr->u.sockname));
|
|
memcpy(sun->sun_path, addr->u.sockname, sizeof(addr->u.sockname));
|
|
return true;
|
|
}
|
|
|
|
struct addrinfo *wireaddr_internal_to_addrinfo(const tal_t *ctx,
|
|
const struct wireaddr_internal *wireaddr)
|
|
{
|
|
struct addrinfo *ai = talz(ctx, struct addrinfo);
|
|
struct sockaddr_un *sun;
|
|
|
|
ai->ai_socktype = SOCK_STREAM;
|
|
|
|
switch (wireaddr->itype) {
|
|
case ADDR_INTERNAL_SOCKNAME:
|
|
sun = tal(ai, struct sockaddr_un);
|
|
wireaddr_to_sockname(wireaddr, sun);
|
|
ai->ai_family = sun->sun_family;
|
|
ai->ai_addrlen = sizeof(*sun);
|
|
ai->ai_addr = (struct sockaddr *)sun;
|
|
return ai;
|
|
case ADDR_INTERNAL_ALLPROTO:
|
|
case ADDR_INTERNAL_AUTOTOR:
|
|
case ADDR_INTERNAL_STATICTOR:
|
|
case ADDR_INTERNAL_FORPROXY:
|
|
break;
|
|
case ADDR_INTERNAL_WIREADDR:
|
|
return wireaddr_to_addrinfo(ctx, &wireaddr->u.wireaddr);
|
|
}
|
|
abort();
|
|
}
|
|
|
|
struct addrinfo *wireaddr_to_addrinfo(const tal_t *ctx,
|
|
const struct wireaddr *wireaddr)
|
|
{
|
|
struct addrinfo *ai = talz(ctx, struct addrinfo);
|
|
struct sockaddr_in *sin;
|
|
struct sockaddr_in6 *sin6;
|
|
|
|
ai->ai_socktype = SOCK_STREAM;
|
|
|
|
switch (wireaddr->type) {
|
|
case ADDR_TYPE_IPV4:
|
|
sin = tal(ai, struct sockaddr_in);
|
|
wireaddr_to_ipv4(wireaddr, sin);
|
|
ai->ai_family = sin->sin_family;
|
|
ai->ai_addrlen = sizeof(*sin);
|
|
ai->ai_addr = (struct sockaddr *)sin;
|
|
return ai;
|
|
case ADDR_TYPE_IPV6:
|
|
sin6 = tal(ai, struct sockaddr_in6);
|
|
wireaddr_to_ipv6(wireaddr, sin6);
|
|
ai->ai_family = sin6->sin6_family;
|
|
ai->ai_addrlen = sizeof(*sin6);
|
|
ai->ai_addr = (struct sockaddr *)sin6;
|
|
return ai;
|
|
case ADDR_TYPE_TOR_V2:
|
|
case ADDR_TYPE_TOR_V3:
|
|
break;
|
|
}
|
|
abort();
|
|
}
|
|
|
|
bool all_tor_addresses(const struct wireaddr_internal *wireaddr)
|
|
{
|
|
for (int i = 0; i < tal_count(wireaddr); i++) {
|
|
switch (wireaddr[i].itype) {
|
|
case ADDR_INTERNAL_SOCKNAME:
|
|
return false;
|
|
case ADDR_INTERNAL_FORPROXY:
|
|
abort();
|
|
case ADDR_INTERNAL_ALLPROTO:
|
|
return false;
|
|
case ADDR_INTERNAL_AUTOTOR:
|
|
case ADDR_INTERNAL_STATICTOR:
|
|
continue;
|
|
case ADDR_INTERNAL_WIREADDR:
|
|
switch (wireaddr[i].u.wireaddr.type) {
|
|
case ADDR_TYPE_IPV4:
|
|
case ADDR_TYPE_IPV6:
|
|
return false;
|
|
case ADDR_TYPE_TOR_V2:
|
|
case ADDR_TYPE_TOR_V3:
|
|
continue;
|
|
}
|
|
}
|
|
abort();
|
|
}
|
|
return true;
|
|
}
|