2012-05-02 16:58:39 +00:00
|
|
|
/*
|
|
|
|
Copyright (C) 2010-2012 Paul Gardner-Stephen, Serval Project.
|
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
|
|
modify it under the terms of the GNU General Public License
|
|
|
|
as published by the Free Software Foundation; either version 2
|
|
|
|
of the License, or (at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
Android does unix domain sockets, but only stream sockets, not datagram sockets.
|
|
|
|
So we need a separate monitor interface for Android. A bit of a pain, but in
|
|
|
|
fact it lets us make a very Android/Java-friendly interface, without any binary
|
|
|
|
data structures (except for a binary extent for an audio sample block).
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "serval.h"
|
2012-05-11 21:54:52 +00:00
|
|
|
#include "rhizome.h"
|
2012-05-02 16:58:39 +00:00
|
|
|
#include <sys/stat.h>
|
|
|
|
|
2012-05-21 02:52:50 +00:00
|
|
|
#if defined(LOCAL_PEERCRED) && !defined(SO_PEERCRED)
|
|
|
|
#define SO_PEERCRED LOCAL_PEERCRED
|
|
|
|
#endif
|
2012-05-03 02:41:13 +00:00
|
|
|
|
2012-05-03 17:46:06 +00:00
|
|
|
#define MONITOR_LINE_LENGTH 160
|
2012-05-02 16:58:39 +00:00
|
|
|
#define MONITOR_DATA_SIZE MAX_AUDIO_BYTES
|
|
|
|
struct monitor_context {
|
2012-07-02 03:49:54 +00:00
|
|
|
struct sched_ent alarm;
|
2012-05-02 16:58:39 +00:00
|
|
|
int flags;
|
|
|
|
char line[MONITOR_LINE_LENGTH];
|
|
|
|
int line_length;
|
|
|
|
#define MONITOR_STATE_COMMAND 1
|
|
|
|
#define MONITOR_STATE_DATA 2
|
|
|
|
int state;
|
|
|
|
unsigned char buffer[MONITOR_DATA_SIZE];
|
|
|
|
int data_expected;
|
|
|
|
int data_offset;
|
|
|
|
int sample_codec;
|
|
|
|
int sample_call_session_token;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define MAX_MONITOR_SOCKETS 8
|
|
|
|
int monitor_socket_count=0;
|
|
|
|
struct monitor_context monitor_sockets[MAX_MONITOR_SOCKETS];
|
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
int monitor_process_command(struct monitor_context *c);
|
|
|
|
int monitor_process_data(struct monitor_context *c);
|
2012-06-25 07:20:23 +00:00
|
|
|
static void monitor_new_client(int s);
|
2012-05-02 16:58:39 +00:00
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
struct sched_ent named_socket;
|
2012-07-02 06:34:00 +00:00
|
|
|
struct profile_total named_stats;
|
|
|
|
struct profile_total client_stats;
|
2012-05-02 16:58:39 +00:00
|
|
|
|
|
|
|
int monitor_setup_sockets()
|
|
|
|
{
|
|
|
|
struct sockaddr_un name;
|
|
|
|
int len;
|
2012-07-02 03:49:54 +00:00
|
|
|
int sock;
|
2012-05-02 16:58:39 +00:00
|
|
|
|
2012-05-28 05:24:33 +00:00
|
|
|
bzero(&name, sizeof(name));
|
2012-05-02 16:58:39 +00:00
|
|
|
name.sun_family = AF_UNIX;
|
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
if ((sock = socket(AF_UNIX, SOCK_STREAM, 0))==-1) {
|
2012-05-28 05:24:33 +00:00
|
|
|
WHY_perror("socket");
|
|
|
|
goto error;
|
|
|
|
}
|
2012-05-03 18:14:41 +00:00
|
|
|
|
2012-05-28 05:24:33 +00:00
|
|
|
#ifdef linux
|
2012-06-21 05:05:05 +00:00
|
|
|
/* Use abstract namespace as Android has no writable FS which supports sockets.
|
|
|
|
Abstract namespace is just plain better, anyway, as no dead files end up
|
|
|
|
hanging around. */
|
2012-05-28 05:24:33 +00:00
|
|
|
name.sun_path[0]=0;
|
|
|
|
/* XXX: 104 comes from OSX sys/un.h - no #define (note Linux has UNIX_PATH_MAX and it's 108(!)) */
|
2012-06-21 05:05:05 +00:00
|
|
|
snprintf(&name.sun_path[1],104-2,
|
|
|
|
confValueGet("monitor.socket",DEFAULT_MONITOR_SOCKET_NAME));
|
2012-05-28 05:24:33 +00:00
|
|
|
/* Doesn't include trailing nul */
|
|
|
|
len = 1+strlen(&name.sun_path[1]) + sizeof(name.sun_family);
|
|
|
|
#else
|
2012-06-22 10:04:01 +00:00
|
|
|
snprintf(name.sun_path,104-1,"%s/%s",
|
2012-06-21 05:05:05 +00:00
|
|
|
serval_instancepath(),
|
|
|
|
confValueGet("monitor.socket",DEFAULT_MONITOR_SOCKET_NAME));
|
2012-05-28 05:24:33 +00:00
|
|
|
unlink(name.sun_path);
|
|
|
|
/* Includes trailing nul */
|
2012-05-29 00:18:22 +00:00
|
|
|
len = 1+strlen(name.sun_path) + sizeof(name.sun_family);
|
2012-05-28 05:24:33 +00:00
|
|
|
#endif
|
2012-05-02 16:58:39 +00:00
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
if(bind(sock, (struct sockaddr *)&name, len)==-1) {
|
2012-05-28 05:24:33 +00:00
|
|
|
WHY_perror("bind");
|
|
|
|
goto error;
|
|
|
|
}
|
2012-07-02 03:49:54 +00:00
|
|
|
if(listen(sock,MAX_MONITOR_SOCKETS)==-1) {
|
2012-05-28 05:24:33 +00:00
|
|
|
WHY_perror("listen");
|
|
|
|
goto error;
|
|
|
|
}
|
2012-05-17 03:43:42 +00:00
|
|
|
|
2012-05-28 05:24:33 +00:00
|
|
|
int reuseP=1;
|
2012-07-02 03:49:54 +00:00
|
|
|
if(setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
|
2012-05-28 05:24:33 +00:00
|
|
|
&reuseP, sizeof(reuseP)) < 0) {
|
|
|
|
WHY_perror("setsockopt");
|
|
|
|
WHY("Could not indicate reuse addresses. Not necessarily a problem (yet)");
|
2012-05-02 16:58:39 +00:00
|
|
|
}
|
2012-05-28 05:24:33 +00:00
|
|
|
|
|
|
|
int send_buffer_size=64*1024;
|
2012-07-02 03:49:54 +00:00
|
|
|
if(setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
|
2012-05-28 05:24:33 +00:00
|
|
|
&send_buffer_size, sizeof(send_buffer_size))==-1)
|
|
|
|
WHY_perror("setsockopt");
|
2012-06-28 06:07:36 +00:00
|
|
|
if (debug&(DEBUG_IO|DEBUG_VERBOSE_IO)) DEBUG("Monitor server socket setup");
|
2012-05-02 16:58:39 +00:00
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
named_socket.function=monitor_poll;
|
2012-07-02 05:50:30 +00:00
|
|
|
named_stats.name="monitor_poll";
|
|
|
|
named_socket.stats=&named_stats;
|
2012-07-02 03:49:54 +00:00
|
|
|
named_socket.poll.fd=sock;
|
|
|
|
named_socket.poll.events=POLLIN;
|
|
|
|
watch(&named_socket);
|
2012-05-02 16:58:39 +00:00
|
|
|
return 0;
|
|
|
|
|
2012-05-28 05:24:33 +00:00
|
|
|
error:
|
2012-07-02 03:49:54 +00:00
|
|
|
close(sock);
|
2012-05-28 05:24:33 +00:00
|
|
|
return -1;
|
2012-05-02 16:58:39 +00:00
|
|
|
}
|
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
void monitor_poll(struct sched_ent *alarm)
|
2012-05-02 16:58:39 +00:00
|
|
|
{
|
2012-07-03 05:43:39 +00:00
|
|
|
int s;
|
2012-05-08 22:05:05 +00:00
|
|
|
unsigned char buffer[1024];
|
|
|
|
struct sockaddr *ignored_address=(struct sockaddr *)&buffer[0];
|
2012-05-02 16:58:39 +00:00
|
|
|
socklen_t ignored_length=sizeof(ignored_address);
|
|
|
|
|
|
|
|
/* Check for new connections */
|
2012-06-22 11:06:59 +00:00
|
|
|
/* We don't care about the peer's address */
|
2012-06-25 07:20:23 +00:00
|
|
|
ignored_length = 0;
|
2012-05-10 04:37:11 +00:00
|
|
|
while (
|
2012-05-03 03:59:48 +00:00
|
|
|
#ifdef HAVE_LINUX_IF_H
|
2012-07-02 03:49:54 +00:00
|
|
|
(s = accept4(alarm->poll.fd, NULL, &ignored_length,O_NONBLOCK))
|
2012-05-03 03:59:48 +00:00
|
|
|
#else
|
2012-07-02 03:49:54 +00:00
|
|
|
(s = accept(alarm->poll.fd,NULL, &ignored_length))
|
2012-05-03 03:59:48 +00:00
|
|
|
#endif
|
2012-05-10 04:37:11 +00:00
|
|
|
!= -1
|
|
|
|
) {
|
2012-06-25 07:20:23 +00:00
|
|
|
monitor_new_client(s);
|
2012-05-02 16:58:39 +00:00
|
|
|
}
|
2012-06-28 06:07:36 +00:00
|
|
|
if (errno != EAGAIN) {
|
|
|
|
#ifdef HAVE_LINUX_IF_H
|
|
|
|
WHY_perror("accept4(O_NONBLOCK)");
|
|
|
|
#else
|
2012-06-22 11:06:59 +00:00
|
|
|
WHY_perror("accept");
|
2012-06-28 06:07:36 +00:00
|
|
|
#endif
|
|
|
|
}
|
2012-06-22 03:55:41 +00:00
|
|
|
}
|
2012-05-02 16:58:39 +00:00
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
void monitor_client_close(struct monitor_context *c){
|
|
|
|
struct monitor_context *last;
|
|
|
|
|
|
|
|
unwatch(&c->alarm);
|
|
|
|
close(c->alarm.poll.fd);
|
|
|
|
c->alarm.poll.fd=-1;
|
|
|
|
|
|
|
|
monitor_socket_count--;
|
|
|
|
last = &monitor_sockets[monitor_socket_count];
|
|
|
|
if (last != c){
|
|
|
|
unwatch(&last->alarm);
|
|
|
|
bcopy(last, c,
|
|
|
|
sizeof(struct monitor_context));
|
|
|
|
watch(&c->alarm);
|
|
|
|
}
|
|
|
|
}
|
2012-05-02 16:58:39 +00:00
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
void monitor_client_poll(struct sched_ent *alarm)
|
2012-06-22 03:55:41 +00:00
|
|
|
{
|
2012-05-02 16:58:39 +00:00
|
|
|
/* Read from any open connections */
|
2012-07-02 03:49:54 +00:00
|
|
|
struct monitor_context *c=(struct monitor_context *)alarm;
|
|
|
|
errno=0;
|
|
|
|
int bytes;
|
|
|
|
|
|
|
|
switch(c->state) {
|
|
|
|
case MONITOR_STATE_COMMAND:
|
|
|
|
bytes = 1;
|
|
|
|
while(bytes == 1) {
|
|
|
|
if (c->line_length >= MONITOR_LINE_LENGTH) {
|
|
|
|
/* line too long */
|
|
|
|
c->line[MONITOR_LINE_LENGTH-1] = 0;
|
|
|
|
monitor_process_command(c);
|
|
|
|
bytes = -1;
|
|
|
|
break;
|
2012-05-02 16:58:39 +00:00
|
|
|
}
|
2012-07-02 03:49:54 +00:00
|
|
|
bytes = read(c->alarm.poll.fd, &c->line[c->line_length], 1);
|
2012-06-22 11:06:59 +00:00
|
|
|
if (bytes < 1) {
|
2012-05-02 16:58:39 +00:00
|
|
|
switch(errno) {
|
2012-07-02 03:49:54 +00:00
|
|
|
case EINTR:
|
|
|
|
case ENOTRECOVERABLE:
|
2012-05-02 16:58:39 +00:00
|
|
|
/* transient errors */
|
2012-07-02 03:49:54 +00:00
|
|
|
WHY_perror("read");
|
|
|
|
break;
|
|
|
|
case EAGAIN:
|
2012-05-03 17:46:06 +00:00
|
|
|
break;
|
2012-05-02 16:58:39 +00:00
|
|
|
default:
|
2012-07-02 03:49:54 +00:00
|
|
|
WHY_perror("read");
|
2012-05-02 16:58:39 +00:00
|
|
|
/* all other errors; close socket */
|
2012-07-03 00:56:22 +00:00
|
|
|
INFO("Tearing down monitor client");
|
2012-07-02 03:49:54 +00:00
|
|
|
monitor_client_close(c);
|
|
|
|
return;
|
2012-05-02 16:58:39 +00:00
|
|
|
}
|
2012-07-02 03:49:54 +00:00
|
|
|
}
|
|
|
|
if (bytes > 0 && (c->line[c->line_length] != '\r')) {
|
|
|
|
c->line_length += bytes;
|
|
|
|
if (c->line[c->line_length-1] == '\n') {
|
|
|
|
/* got command */
|
|
|
|
c->line[c->line_length-1] = 0; /* trim new line for easier parsing */
|
|
|
|
monitor_process_command(c);
|
|
|
|
break;
|
2012-05-02 16:58:39 +00:00
|
|
|
}
|
2012-07-02 03:49:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case MONITOR_STATE_DATA:
|
|
|
|
bytes = read(c->alarm.poll.fd,
|
|
|
|
&c->buffer[c->data_offset],
|
|
|
|
c->data_expected-c->data_offset);
|
|
|
|
if (bytes < 1) {
|
|
|
|
switch(errno) {
|
|
|
|
case EAGAIN: case EINTR:
|
|
|
|
/* transient errors */
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* all other errors; close socket */
|
|
|
|
WHYF("Tearing down monitor client due to errno=%d",
|
|
|
|
errno);
|
|
|
|
monitor_client_close(c);
|
|
|
|
return;
|
2012-05-02 16:58:39 +00:00
|
|
|
}
|
2012-07-02 03:49:54 +00:00
|
|
|
} else {
|
|
|
|
c->data_offset += bytes;
|
|
|
|
if (c->data_offset >= c->data_expected)
|
|
|
|
{
|
|
|
|
/* we have the binary data we were expecting. */
|
|
|
|
monitor_process_data(c);
|
|
|
|
c->state = MONITOR_STATE_COMMAND;
|
|
|
|
}
|
2012-05-02 16:58:39 +00:00
|
|
|
}
|
2012-07-02 03:49:54 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
c->state = MONITOR_STATE_COMMAND;
|
|
|
|
WHY("fixed monitor connection state");
|
2012-05-02 16:58:39 +00:00
|
|
|
}
|
2012-06-22 03:55:41 +00:00
|
|
|
return;
|
2012-05-02 16:58:39 +00:00
|
|
|
}
|
2012-06-25 07:20:23 +00:00
|
|
|
|
|
|
|
static void monitor_new_client(int s) {
|
2012-06-22 11:06:59 +00:00
|
|
|
#ifdef linux
|
|
|
|
struct ucred ucred;
|
|
|
|
socklen_t len;
|
2012-07-03 05:43:39 +00:00
|
|
|
int res;
|
2012-06-22 11:06:59 +00:00
|
|
|
#else
|
|
|
|
gid_t othergid;
|
|
|
|
#endif
|
|
|
|
uid_t otheruid;
|
|
|
|
struct monitor_context *c;
|
|
|
|
|
2012-06-27 07:24:42 +00:00
|
|
|
SET_NONBLOCKING(s);
|
2012-06-22 11:06:59 +00:00
|
|
|
|
|
|
|
#ifdef linux
|
|
|
|
len = sizeof(ucred);
|
|
|
|
res = getsockopt(s, SOL_SOCKET, SO_PEERCRED, &ucred, &len);
|
|
|
|
if (res) {
|
|
|
|
WHY_perror("getsockopt(SO_PEERCRED)");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
if (len < sizeof(ucred)) {
|
|
|
|
WHYF("getsockopt(SO_PEERCRED) returned the wrong size (Got %d expected %d)", len, sizeof(ucred));
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
otheruid = ucred.uid;
|
|
|
|
#else
|
|
|
|
if (getpeereid(s, &otheruid, &othergid) != 0) {
|
|
|
|
WHY_perror("getpeereid()");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (otheruid != getuid()) {
|
|
|
|
WHYF("monitor.socket client has wrong uid (%d versus %d)", otheruid,getuid());
|
|
|
|
WRITE_STR(s, "\nCLOSE:Incorrect UID\n");
|
|
|
|
goto error;
|
2012-07-02 03:49:54 +00:00
|
|
|
}
|
|
|
|
if (monitor_socket_count >= MAX_MONITOR_SOCKETS
|
2012-06-22 11:06:59 +00:00
|
|
|
||monitor_socket_count < 0) {
|
|
|
|
WRITE_STR(s, "\nCLOSE:All sockets busy\n");
|
|
|
|
goto error;
|
|
|
|
}
|
2012-07-02 03:49:54 +00:00
|
|
|
|
|
|
|
c = &monitor_sockets[monitor_socket_count++];
|
|
|
|
c->alarm.function = monitor_client_poll;
|
2012-07-02 05:50:30 +00:00
|
|
|
client_stats.name = "monitor_client_poll";
|
|
|
|
c->alarm.stats=&client_stats;
|
2012-07-02 03:49:54 +00:00
|
|
|
c->alarm.poll.fd = s;
|
|
|
|
c->alarm.poll.events=POLLIN;
|
|
|
|
c->line_length = 0;
|
|
|
|
c->state = MONITOR_STATE_COMMAND;
|
|
|
|
WRITE_STR(s,"\nMONITOR:You are talking to servald\n");
|
|
|
|
INFOF("Got %d clients", monitor_socket_count);
|
|
|
|
watch(&c->alarm);
|
2012-06-26 02:50:49 +00:00
|
|
|
|
2012-06-22 11:06:59 +00:00
|
|
|
return;
|
|
|
|
|
|
|
|
error:
|
|
|
|
close(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
int monitor_process_command(struct monitor_context *c)
|
2012-05-02 16:58:39 +00:00
|
|
|
{
|
|
|
|
int callSessionToken,sampleType,bytes;
|
2012-05-03 17:46:06 +00:00
|
|
|
char sid[MONITOR_LINE_LENGTH],localDid[MONITOR_LINE_LENGTH];
|
2012-05-03 18:14:41 +00:00
|
|
|
char remoteDid[MONITOR_LINE_LENGTH],digits[MONITOR_LINE_LENGTH];
|
2012-05-02 17:30:34 +00:00
|
|
|
overlay_mdp_frame mdp;
|
2012-07-02 03:49:54 +00:00
|
|
|
char *cmd = c->line;
|
2012-06-27 07:24:42 +00:00
|
|
|
IN();
|
|
|
|
|
2012-05-02 17:30:34 +00:00
|
|
|
mdp.packetTypeAndFlags=MDP_VOMPEVENT;
|
2012-05-02 16:58:39 +00:00
|
|
|
|
|
|
|
c->line_length=0;
|
|
|
|
|
2012-05-03 17:46:06 +00:00
|
|
|
if (strlen(cmd)>MONITOR_LINE_LENGTH) {
|
2012-07-02 03:49:54 +00:00
|
|
|
WRITE_STR(c->alarm.poll.fd,"\nERROR:Command too long\n");
|
2012-06-27 07:24:42 +00:00
|
|
|
RETURN(-1);
|
2012-05-02 17:30:34 +00:00
|
|
|
}
|
|
|
|
|
2012-05-03 17:54:53 +00:00
|
|
|
char msg[1024];
|
2012-05-10 22:30:09 +00:00
|
|
|
int flag;
|
2012-05-03 17:54:53 +00:00
|
|
|
|
2012-05-03 18:14:41 +00:00
|
|
|
if (cmd[0]=='*') {
|
|
|
|
/* command with content */
|
|
|
|
int ofs=0;
|
|
|
|
if (sscanf(cmd,"*%d:%n",&bytes,&ofs)==1) {
|
|
|
|
/* work out rest of command */
|
|
|
|
cmd=&cmd[ofs];
|
2012-05-02 16:58:39 +00:00
|
|
|
c->state=MONITOR_STATE_DATA;
|
|
|
|
c->data_expected=bytes;
|
|
|
|
c->data_offset=0;
|
2012-05-03 18:14:41 +00:00
|
|
|
c->sample_codec=-1;
|
|
|
|
|
|
|
|
if (sscanf(cmd,"AUDIO:%x:%d",
|
|
|
|
&callSessionToken,&sampleType)==2)
|
|
|
|
{
|
|
|
|
/* Start getting sample */
|
|
|
|
c->sample_call_session_token=callSessionToken;
|
|
|
|
c->sample_codec=sampleType;
|
2012-06-27 07:24:42 +00:00
|
|
|
RETURN(0);
|
2012-05-03 18:14:41 +00:00
|
|
|
}
|
2012-05-02 16:58:39 +00:00
|
|
|
}
|
2012-05-03 18:14:41 +00:00
|
|
|
}
|
2012-05-02 16:58:39 +00:00
|
|
|
else if (!strcasecmp(cmd,"monitor vomp"))
|
|
|
|
c->flags|=MONITOR_VOMP;
|
|
|
|
else if (!strcasecmp(cmd,"ignore vomp"))
|
|
|
|
c->flags&=~MONITOR_VOMP;
|
|
|
|
else if (!strcasecmp(cmd,"monitor rhizome"))
|
|
|
|
c->flags|=MONITOR_RHIZOME;
|
|
|
|
else if (!strcasecmp(cmd,"ignore rhizome"))
|
|
|
|
c->flags&=~MONITOR_RHIZOME;
|
2012-05-21 03:34:54 +00:00
|
|
|
else if (!strcasecmp(cmd,"monitor peers"))
|
|
|
|
c->flags|=MONITOR_PEERS;
|
|
|
|
else if (!strcasecmp(cmd,"ignore peers"))
|
|
|
|
c->flags&=~MONITOR_PEERS;
|
2012-05-10 22:30:09 +00:00
|
|
|
else if (sscanf(cmd,"FASTAUDIO:%x:%d",&callSessionToken,&flag)==2)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for(i=0;i<vomp_call_count;i++)
|
|
|
|
if (vomp_call_states[i].local.session==callSessionToken
|
|
|
|
||callSessionToken==0) {
|
|
|
|
vomp_call_states[i].fast_audio=flag;
|
|
|
|
vomp_call_states[i].local.last_state=-1;
|
|
|
|
monitor_call_status(&vomp_call_states[i]);
|
|
|
|
}
|
|
|
|
}
|
2012-05-03 17:46:06 +00:00
|
|
|
else if (sscanf(cmd,"call %s %s %s",sid,localDid,remoteDid)==3) {
|
2012-06-28 06:07:36 +00:00
|
|
|
DEBUG("here");
|
2012-05-08 05:02:13 +00:00
|
|
|
if (sid[0]=='*') {
|
|
|
|
/* For testing, pick a peer and call them */
|
|
|
|
int bin,slot;
|
|
|
|
for(bin=0;bin<overlay_bin_count;bin++)
|
|
|
|
for(slot=0;slot<overlay_bin_size;slot++)
|
|
|
|
{
|
|
|
|
if (!overlay_nodes[bin][slot].sid[0])
|
|
|
|
{
|
|
|
|
continue; }
|
|
|
|
strcpy(sid,overlay_render_sid(overlay_nodes[bin][slot].sid));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2012-05-02 17:30:34 +00:00
|
|
|
mdp.vompevent.flags=VOMPEVENT_DIAL;
|
2012-05-03 17:54:53 +00:00
|
|
|
int cn=0,in=0,kp=0;
|
|
|
|
if(!keyring_next_identity(keyring,&cn,&in,&kp))
|
|
|
|
{
|
2012-07-02 03:49:54 +00:00
|
|
|
WRITE_STR(c->alarm.poll.fd,"\nERROR:no local identity, so cannot place call\n");
|
2012-05-03 17:54:53 +00:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
bcopy(keyring->contexts[cn]->identities[in]
|
|
|
|
->keypairs[kp]->public_key,
|
|
|
|
&mdp.vompevent.local_sid[0],SID_SIZE);
|
|
|
|
stowSid(&mdp.vompevent.remote_sid[0],0,sid);
|
|
|
|
vomp_mdp_event(&mdp,NULL,0);
|
|
|
|
}
|
2012-06-28 06:07:36 +00:00
|
|
|
DEBUG("here");
|
2012-05-02 17:30:34 +00:00
|
|
|
}
|
2012-05-06 23:01:53 +00:00
|
|
|
else if (sscanf(cmd,"status %x",&callSessionToken)==1) {
|
|
|
|
int i;
|
|
|
|
for(i=0;i<vomp_call_count;i++)
|
|
|
|
if (vomp_call_states[i].local.session==callSessionToken
|
|
|
|
||callSessionToken==0) {
|
|
|
|
vomp_call_states[i].local.last_state=0;
|
|
|
|
monitor_call_status(&vomp_call_states[i]);
|
|
|
|
}
|
|
|
|
} else if (sscanf(cmd,"pickup %x",&callSessionToken)==1) {
|
2012-05-02 17:30:34 +00:00
|
|
|
mdp.vompevent.flags=VOMPEVENT_PICKUP;
|
|
|
|
mdp.vompevent.call_session_token=callSessionToken;
|
|
|
|
vomp_mdp_event(&mdp,NULL,0);
|
|
|
|
}
|
2012-05-03 17:46:06 +00:00
|
|
|
else if (sscanf(cmd,"hangup %x",&callSessionToken)==1) {
|
2012-05-02 17:30:34 +00:00
|
|
|
mdp.vompevent.flags=VOMPEVENT_HANGUP;
|
|
|
|
mdp.vompevent.call_session_token=callSessionToken;
|
|
|
|
vomp_mdp_event(&mdp,NULL,0);
|
2012-05-03 18:14:41 +00:00
|
|
|
} else if (sscanf(cmd,"dtmf %x %s",&callSessionToken,digits)==2) {
|
|
|
|
mdp.vompevent.flags=VOMPEVENT_AUDIOPACKET;
|
|
|
|
mdp.vompevent.call_session_token=callSessionToken;
|
|
|
|
|
|
|
|
/* One digit per sample block. */
|
|
|
|
mdp.vompevent.audio_sample_codec=VOMP_CODEC_DTMF;
|
|
|
|
mdp.vompevent.audio_sample_bytes=1;
|
|
|
|
|
|
|
|
int i;
|
|
|
|
for(i=0;i<strlen(digits);i++) {
|
|
|
|
int digit=vomp_parse_dtmf_digit(digits[i]);
|
|
|
|
if (digit<0) {
|
2012-05-08 03:25:57 +00:00
|
|
|
snprintf(msg,1024,"\nERROR: invalid DTMF digit 0x%02x\n",digit);
|
2012-07-02 03:49:54 +00:00
|
|
|
WRITE_STR(c->alarm.poll.fd,msg);
|
2012-05-03 18:14:41 +00:00
|
|
|
}
|
|
|
|
mdp.vompevent.audio_bytes[mdp.vompevent.audio_sample_bytes]
|
|
|
|
=(digit<<4); /* 80ms standard tone duration, so that it is a multiple
|
|
|
|
of the majority of codec time units (70ms is the nominal
|
|
|
|
DTMF tone length for most systems). */
|
|
|
|
if (overlay_mdp_send(&mdp,0,0)) WHY("Send DTMF failed.");
|
|
|
|
}
|
|
|
|
|
2012-05-02 17:30:34 +00:00
|
|
|
}
|
2012-05-02 16:58:39 +00:00
|
|
|
|
2012-05-08 03:25:57 +00:00
|
|
|
snprintf(msg,1024,"\nMONITORSTATUS:%d\n",c->flags);
|
2012-07-02 03:49:54 +00:00
|
|
|
WRITE_STR(c->alarm.poll.fd,msg);
|
2012-05-02 16:58:39 +00:00
|
|
|
|
2012-06-27 07:24:42 +00:00
|
|
|
RETURN(0);
|
2012-05-02 16:58:39 +00:00
|
|
|
}
|
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
int monitor_process_data(struct monitor_context *c)
|
2012-05-02 16:58:39 +00:00
|
|
|
{
|
|
|
|
/* Called when we have received an entire data sample */
|
|
|
|
c->state=MONITOR_STATE_COMMAND;
|
|
|
|
|
2012-06-28 06:07:36 +00:00
|
|
|
if (vomp_sample_size(c->sample_codec)!=c->data_offset) {
|
|
|
|
WARNF("Ignoring sample block of incorrect size (expected %d, got %d bytes for codec %d)",
|
2012-06-18 00:07:24 +00:00
|
|
|
vomp_sample_size(c->sample_codec), c->data_offset, c->sample_codec);
|
2012-06-28 06:07:36 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2012-05-02 16:58:39 +00:00
|
|
|
|
|
|
|
vomp_call_state *call=vomp_find_call_by_session(c->sample_call_session_token);
|
|
|
|
if (!call) {
|
2012-07-02 03:49:54 +00:00
|
|
|
WRITE_STR(c->alarm.poll.fd,"\nERROR:No such call\n");
|
2012-05-02 16:58:39 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
overlay_mdp_frame mdp;
|
|
|
|
mdp.packetTypeAndFlags=MDP_VOMPEVENT;
|
|
|
|
mdp.vompevent.flags=VOMPEVENT_AUDIOPACKET;
|
|
|
|
mdp.vompevent.call_session_token=c->sample_call_session_token;
|
|
|
|
mdp.vompevent.audio_sample_codec=c->sample_codec;
|
|
|
|
bcopy(&c->buffer[0],&mdp.vompevent.audio_bytes[0],
|
|
|
|
vomp_sample_size(c->sample_codec));
|
2012-05-06 12:53:58 +00:00
|
|
|
mdp.vompevent.audio_sample_bytes=vomp_sample_size(c->sample_codec);
|
2012-05-02 16:58:39 +00:00
|
|
|
|
2012-06-28 06:07:36 +00:00
|
|
|
if (overlay_mdp_send(&mdp,0,0)) WARN("Send audio failed.");
|
2012-05-02 16:58:39 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2012-05-02 17:30:34 +00:00
|
|
|
|
2012-05-11 21:54:52 +00:00
|
|
|
int monitor_announce_bundle(rhizome_manifest *m)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
char msg[1024];
|
2012-05-23 06:34:00 +00:00
|
|
|
const char *service = rhizome_manifest_get(m, "service", NULL, 0);
|
|
|
|
const char *sender = rhizome_manifest_get(m, "sender", NULL, 0);
|
|
|
|
const char *recipient = rhizome_manifest_get(m, "recipient", NULL, 0);
|
|
|
|
snprintf(msg,1024,"\nBUNDLE:%s:%s:%lld:%lld:%s:%s:%s\n",
|
|
|
|
/* XXX bit of a hack here, since SIDs and cryptosign public keys have the same length */
|
2012-05-11 21:54:52 +00:00
|
|
|
overlay_render_sid(m->cryptoSignPublic),
|
2012-05-23 06:34:00 +00:00
|
|
|
service ? service : "",
|
2012-05-11 21:54:52 +00:00
|
|
|
m->version,
|
|
|
|
m->fileLength,
|
2012-05-23 06:34:00 +00:00
|
|
|
sender,
|
|
|
|
recipient,
|
2012-05-11 21:54:52 +00:00
|
|
|
m->dataFileName?m->dataFileName:"");
|
2012-07-02 03:49:54 +00:00
|
|
|
for(i=monitor_socket_count -1;i>=0;i--)
|
2012-05-11 21:54:52 +00:00
|
|
|
{
|
|
|
|
if (!(monitor_sockets[i].flags&MONITOR_RHIZOME))
|
|
|
|
continue;
|
2012-07-02 03:49:54 +00:00
|
|
|
errno=0;
|
2012-06-27 07:24:42 +00:00
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
SET_NONBLOCKING(monitor_sockets[i].alarm.poll.fd);
|
|
|
|
WRITE_STR(monitor_sockets[i].alarm.poll.fd,msg);
|
2012-06-27 07:24:42 +00:00
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
SET_BLOCKING(monitor_sockets[i].alarm.poll.fd);
|
2012-06-27 07:24:42 +00:00
|
|
|
|
2012-07-02 03:49:54 +00:00
|
|
|
if (errno&&(errno!=EINTR)&&(errno!=EAGAIN)) {
|
|
|
|
/* error sending update, so kill monitor socket */
|
2012-07-03 00:56:22 +00:00
|
|
|
WHY_perror("write");
|
|
|
|
INFO("Tearing down monitor client");
|
2012-07-02 03:49:54 +00:00
|
|
|
monitor_client_close(&monitor_sockets[i]);
|
2012-05-11 21:54:52 +00:00
|
|
|
}
|
2012-07-02 03:49:54 +00:00
|
|
|
}
|
2012-05-11 21:54:52 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-05-02 17:30:34 +00:00
|
|
|
int monitor_call_status(vomp_call_state *call)
|
|
|
|
{
|
2012-05-02 18:07:03 +00:00
|
|
|
int i;
|
|
|
|
char msg[1024];
|
2012-05-03 18:28:34 +00:00
|
|
|
int show=0;
|
2012-06-27 07:24:42 +00:00
|
|
|
IN();
|
2012-05-03 18:28:34 +00:00
|
|
|
if (call->local.state>call->local.last_state) show=1;
|
|
|
|
if (call->remote.state>call->remote.last_state) show=1;
|
|
|
|
call->local.last_state=call->local.state;
|
|
|
|
call->remote.last_state=call->remote.state;
|
|
|
|
if (show) {
|
2012-06-28 06:07:36 +00:00
|
|
|
if (0) DEBUG("sending call status to monitor");
|
2012-05-10 22:30:09 +00:00
|
|
|
snprintf(msg,1024,"\nCALLSTATUS:%06x:%06x:%d:%d:%d:%s:%s:%s:%s\n",
|
2012-05-03 18:28:34 +00:00
|
|
|
call->local.session,call->remote.session,
|
2012-05-04 18:28:02 +00:00
|
|
|
call->local.state,call->remote.state,
|
2012-05-10 22:30:09 +00:00
|
|
|
call->fast_audio,
|
2012-05-04 18:28:02 +00:00
|
|
|
overlay_render_sid(call->local.sid),
|
|
|
|
overlay_render_sid(call->remote.sid),
|
|
|
|
call->local.did,call->remote.did);
|
2012-05-08 22:05:05 +00:00
|
|
|
msg[1023]=0;
|
2012-07-02 03:49:54 +00:00
|
|
|
for(i=monitor_socket_count -1;i>=0;i--)
|
2012-05-03 18:28:34 +00:00
|
|
|
{
|
|
|
|
if (!(monitor_sockets[i].flags&MONITOR_VOMP))
|
2012-05-02 18:07:03 +00:00
|
|
|
continue;
|
2012-05-03 18:28:34 +00:00
|
|
|
errno=0;
|
2012-07-02 03:49:54 +00:00
|
|
|
SET_NONBLOCKING(monitor_sockets[i].alarm.poll.fd);
|
|
|
|
WRITE_STR(monitor_sockets[i].alarm.poll.fd,msg);
|
|
|
|
SET_BLOCKING(monitor_sockets[i].alarm.poll.fd);
|
2012-05-03 18:28:34 +00:00
|
|
|
if (errno&&(errno!=EINTR)&&(errno!=EAGAIN)) {
|
|
|
|
/* error sending update, so kill monitor socket */
|
2012-06-28 06:07:36 +00:00
|
|
|
WHY_perror("write");
|
|
|
|
INFOF("Tearing down monitor client #%d", i);
|
2012-07-02 03:49:54 +00:00
|
|
|
monitor_client_close(&monitor_sockets[i]);
|
2012-05-02 18:07:03 +00:00
|
|
|
}
|
|
|
|
}
|
2012-05-03 18:28:34 +00:00
|
|
|
}
|
2012-06-27 07:24:42 +00:00
|
|
|
RETURN(0);
|
2012-05-02 17:30:34 +00:00
|
|
|
}
|
|
|
|
|
2012-05-18 10:50:18 +00:00
|
|
|
int monitor_announce_peer(unsigned char *sid)
|
|
|
|
{
|
2012-06-25 05:30:07 +00:00
|
|
|
char msg[1024];
|
|
|
|
int n = snprintf(msg, sizeof msg, "\nNEWPEER:%s\n",overlay_render_sid(sid));
|
|
|
|
monitor_tell_clients(msg, n, MONITOR_PEERS);
|
2012-05-18 10:50:18 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-05-02 17:30:34 +00:00
|
|
|
int monitor_send_audio(vomp_call_state *call,overlay_mdp_frame *audio)
|
|
|
|
{
|
2012-06-28 06:07:36 +00:00
|
|
|
if (0) DEBUGF("Tell call monitor about audio for call %06x:%06x",
|
2012-05-08 22:05:05 +00:00
|
|
|
call->local.session,call->remote.session);
|
2012-05-02 18:07:03 +00:00
|
|
|
int sample_bytes=vomp_sample_size(audio->vompevent.audio_sample_codec);
|
2012-06-25 05:30:07 +00:00
|
|
|
char msg[1024 + MAX_AUDIO_BYTES];
|
2012-05-03 18:14:41 +00:00
|
|
|
/* All commands followed by binary data start with *len:, so that
|
2012-05-08 03:25:57 +00:00
|
|
|
they can be easily parsed at the far end, even if not supported.
|
|
|
|
Put newline at start of these so that receiving data in command
|
|
|
|
mode doesn't confuse the parser. */
|
2012-06-25 05:30:07 +00:00
|
|
|
int msglen = snprintf(msg, 1024,
|
2012-05-08 03:25:57 +00:00
|
|
|
"\n*%d:AUDIOPACKET:%06x:%06x:%d:%d:%d:%lld:%lld\n",
|
2012-05-03 18:14:41 +00:00
|
|
|
sample_bytes,
|
2012-05-02 18:07:03 +00:00
|
|
|
call->local.session,call->remote.session,
|
|
|
|
call->local.state,call->remote.state,
|
|
|
|
audio->vompevent.audio_sample_codec,
|
|
|
|
audio->vompevent.audio_sample_starttime,
|
|
|
|
audio->vompevent.audio_sample_endtime);
|
2012-06-25 05:30:07 +00:00
|
|
|
bcopy(&audio->vompevent.audio_bytes[0], &msg[msglen], sample_bytes);
|
2012-05-02 18:07:03 +00:00
|
|
|
msglen+=sample_bytes;
|
2012-06-26 05:04:39 +00:00
|
|
|
msg[msglen++]='\n';
|
2012-06-25 05:30:07 +00:00
|
|
|
monitor_tell_clients(msg, msglen, MONITOR_VOMP);
|
2012-05-18 10:50:18 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-06-25 05:30:07 +00:00
|
|
|
int monitor_tell_clients(char *msg, int msglen, int mask)
|
2012-05-18 10:50:18 +00:00
|
|
|
{
|
2012-05-02 18:07:03 +00:00
|
|
|
int i;
|
2012-06-27 07:24:42 +00:00
|
|
|
IN();
|
2012-07-02 03:49:54 +00:00
|
|
|
for(i=monitor_socket_count -1;i>=0;i--)
|
2012-05-02 18:07:03 +00:00
|
|
|
{
|
2012-05-21 03:17:19 +00:00
|
|
|
if (!(monitor_sockets[i].flags&mask))
|
2012-05-02 18:11:26 +00:00
|
|
|
continue;
|
2012-05-02 18:07:03 +00:00
|
|
|
errno=0;
|
2012-07-02 03:49:54 +00:00
|
|
|
SET_NONBLOCKING(monitor_sockets[i].alarm.poll.fd);
|
|
|
|
write(monitor_sockets[i].alarm.poll.fd, msg, msglen);
|
|
|
|
SET_BLOCKING(monitor_sockets[i].alarm.poll.fd);
|
2012-05-08 22:05:05 +00:00
|
|
|
// WHYF("Writing AUDIOPACKET to client");
|
2012-05-02 18:07:03 +00:00
|
|
|
if (errno&&(errno!=EINTR)&&(errno!=EAGAIN)) {
|
|
|
|
/* error sending update, so kill monitor socket */
|
2012-06-28 06:07:36 +00:00
|
|
|
WHY_perror("write");
|
|
|
|
INFOF("Tearing down monitor client #%d", i);
|
2012-07-02 03:49:54 +00:00
|
|
|
monitor_client_close(&monitor_sockets[i]);
|
2012-05-02 18:07:03 +00:00
|
|
|
}
|
|
|
|
}
|
2012-06-27 07:24:42 +00:00
|
|
|
RETURN(0);
|
2012-05-02 17:30:34 +00:00
|
|
|
}
|