1 (* HCoop
Domtool (http
://hcoop
.sourceforge
.net
/)
2 * Copyright (c
) 2006-2009, Adam Chlipala
3 * Copyright (c
) 2012,2013,2014 Clinton Ebadi
<clinton@unknownlamer
.org
>
5 * This program is free software
; you can redistribute it
and/or
6 * modify it under the terms
of the GNU General Public License
7 * as published by the Free Software Foundation
; either version
2
8 * of the License
, or (at your option
) any later version
.
10 * This program is distributed
in the hope that it will be useful
,
11 * but WITHOUT ANY WARRANTY
; without even the implied warranty
of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE
. See the
13 * GNU General Public License for more details
.
15 * You should have received a copy
of the GNU General Public License
16 * along
with this program
; if not
, write to the Free Software
17 * Foundation
, Inc
., 51 Franklin Street
, Fifth Floor
, Boston
, MA
02110-1301, USA
.
22 structure Main
:> MAIN
= struct
24 open Ast MsgTypes Print
26 structure SM
= StringMap
28 fun init () = Acl
.read Config
.aclFile
30 fun isLib fname
= OS
.Path
.file fname
= "lib.dtl"
32 fun wrapFile (fname
, file
) =
33 case (isLib fname
, file
) of
34 (true, (comment
, ds
, SOME e
)) =>
38 (comment
, ds
, SOME (ELocal (e
, (ESkip
, loc
)), loc
))
44 val prog
= Parse
.parse fname
45 val prog
= wrapFile (fname
, prog
)
47 if !ErrorMsg
.anyErrors
then
53 Option
.app (Unused
.check G
) (#
3 prog
);
54 Tycheck
.checkFile G prog
)
59 val _
= ErrorMsg
.reset ()
60 val dir
= Posix
.FileSys
.opendir Config
.libRoot
63 case Posix
.FileSys
.readdir dir
of
64 NONE
=> (Posix
.FileSys
.closedir dir
;
67 if String.isSuffix
".dtl" fname
then
68 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
75 val (_
, files
) = Order
.order NONE files
77 if !ErrorMsg
.anyErrors
then
80 (Tycheck
.allowExterns ();
81 foldl (fn (fname
, G
) => check
' G fname
) Env
.empty files
82 before Tycheck
.disallowExterns ())
85 (* val b
= basis () *)
89 val _
= ErrorMsg
.reset ()
90 val _
= Env
.preTycheck ()
92 if !ErrorMsg
.anyErrors
then
96 val _
= Tycheck
.disallowExterns ()
97 val _
= ErrorMsg
.reset ()
98 val prog
= Parse
.parse fname
99 val prog
= wrapFile (fname
, prog
)
101 if !ErrorMsg
.anyErrors
then
105 val G
' = Tycheck
.checkFile G prog
107 if !ErrorMsg
.anyErrors
then
113 Option
.app (Unused
.check G
) (#
3 prog
);
120 String.sub (s
, 0) <> #
"."
121 andalso s
<> "_darcs"
122 andalso CharVector
.all (fn ch
=> Char.isAlphaNum ch
orelse ch
= #
"." orelse ch
= #
"_" orelse ch
= #
"-") s
127 case Posix
.ProcEnv
.getenv
"DOMTOOL_USER" of
130 val uid
= Posix
.ProcEnv
.getuid ()
132 Posix
.SysDB
.Passwd
.name (Posix
.SysDB
.getpwuid uid
)
136 Acl
.read Config
.aclFile
;
141 fun checkDir
' dname
=
145 val dir
= Posix
.FileSys
.opendir dname
148 case Posix
.FileSys
.readdir dir
of
149 NONE
=> (Posix
.FileSys
.closedir dir
;
153 loop (OS
.Path
.joinDirFile
{dir
= dname
,
160 val (_
, files
) = Order
.order (SOME b
) files
162 if !ErrorMsg
.anyErrors
then
165 (foldl (fn (fname
, G
) => check
' G fname
) b files
;
166 if !ErrorMsg
.anyErrors
then
178 val (G
, body
) = check G fname
180 if !ErrorMsg
.anyErrors
then
186 val body
' = Reduce
.reduceExp G body
188 (*printd (PD
.hovBox (PD
.PPS
.Rel
0,
189 [PD
.string "Result:",
197 (*(Defaults
.eInit ())*)
199 val toplevel
= Env
.initialDynEnvVals Reduce
.reduceExp
201 fun eval G evs fname
=
202 case reduce G fname
of
204 if !ErrorMsg
.anyErrors
then
208 val evs
' = Eval
.exec
' (toplevel G
, evs
) body
'
212 |
(G
, NONE
) => (G
, evs
)
215 Domain
.nodeIp Config
.dispatcherName ^
":" ^
Int.toString Config
.dispatcherPort
218 "localhost:" ^
Int.toString Config
.slavePort
221 (OpenSSL
.context
false x
)
222 handle e
as OpenSSL
.OpenSSL s
=>
223 (print
"Couldn't find your certificate.\nYou probably haven't been given any Domtool privileges.\n";
224 print ("I looked in: " ^ #
1 x ^
"\n");
225 print ("Additional information: " ^ s ^
"\n");
228 fun requestContext f
=
230 val user
= setupUser ()
234 val context
= context (Config
.certDir ^
"/" ^ user ^
".pem",
235 Config
.keyDir ^
"/" ^ user ^
"/key.pem",
241 fun requestBio
' printErr f
=
243 val (user
, context
) = requestContext f
245 (user
, OpenSSL
.connect
printErr (context
, dispatcher
))
248 val requestBio
= requestBio
' true
250 fun requestSlaveBio
' printErr
=
252 val (user
, context
) = requestContext (fn () => ())
254 (user
, OpenSSL
.connect
printErr (context
, self
))
257 fun requestSlaveBio () = requestSlaveBio
' true
259 fun request (fname
, libOpt
) =
261 val (user
, bio
) = requestBio (fn () =>
264 val env
= case libOpt
of
266 | SOME lib
=> #
1 (check env lib
)
268 ignore (check env fname
)
273 val inf
= TextIO.openIn fname
276 case TextIO.inputLine inf
of
277 NONE
=> String.concat (rev lines
)
278 | SOME line
=> loop (line
:: lines
)
281 before TextIO.closeIn inf
284 val code
= readFile fname
285 val msg
= case libOpt
of
286 NONE
=> MsgConfig code
287 | SOME fname
' => MsgMultiConfig
[readFile fname
', code
]
291 NONE
=> print
"Server closed connection unexpectedly.\n"
294 MsgOk
=> print
"Configuration succeeded.\n"
295 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
296 | _
=> print
"Unexpected server reply.\n";
299 handle ErrorMsg
.Error
=> ()
301 fun requestDir dname
=
303 val _
= if Posix
.FileSys
.access (dname
, []) then
306 (print ("Can't access " ^ dname ^
".\n");
307 print
"Did you mean to run domtool on a specific file, instead of asking for all\n";
308 print
"files in your ~/.domtool directory?\n";
309 OS
.Process
.exit OS
.Process
.failure
)
311 val _
= ErrorMsg
.reset ()
313 val (user
, bio
) = requestBio (fn () => checkDir
' dname
)
317 val dir
= Posix
.FileSys
.opendir dname
320 case Posix
.FileSys
.readdir dir
of
321 NONE
=> (Posix
.FileSys
.closedir dir
;
325 loop (OS
.Path
.joinDirFile
{dir
= dname
,
332 val (_
, files
) = Order
.order (SOME b
) files
334 val _
= if !ErrorMsg
.anyErrors
then
339 val codes
= map (fn fname
=>
341 val inf
= TextIO.openIn fname
344 case TextIO.inputLine inf
of
345 NONE
=> String.concat (rev lines
)
346 | SOME line
=> loop (line
:: lines
)
349 before TextIO.closeIn inf
352 if !ErrorMsg
.anyErrors
then
355 (Msg
.send (bio
, MsgMultiConfig codes
);
357 NONE
=> print
"Server closed connection unexpectedly.\n"
360 MsgOk
=> print
"Configuration succeeded.\n"
361 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
362 | _
=> print
"Unexpected server reply.\n";
365 handle ErrorMsg
.Error
=> ()
369 val (_
, bio
) = requestBio
' false (fn () => ())
374 handle _
=> OS
.Process
.failure
376 fun requestShutdown () =
378 val (_
, bio
) = requestBio (fn () => ())
380 Msg
.send (bio
, MsgShutdown
);
385 MsgOk
=> print
"Shutdown begun.\n"
386 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
387 | _
=> print
"Unexpected server reply.\n";
391 fun requestSlavePing () =
393 val (_
, bio
) = requestSlaveBio
' false
398 handle _
=> OS
.Process
.failure
400 fun requestSlaveShutdown () =
402 val (_
, bio
) = requestSlaveBio ()
404 Msg
.send (bio
, MsgShutdown
);
409 MsgOk
=> print
"Shutdown begun.\n"
410 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
411 | _
=> print
"Unexpected server reply.\n";
415 fun requestGrant acl
=
417 val (user
, bio
) = requestBio (fn () => ())
419 Msg
.send (bio
, MsgGrant acl
);
421 NONE
=> print
"Server closed connection unexpectedly.\n"
424 MsgOk
=> print
"Grant succeeded.\n"
425 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
426 | _
=> print
"Unexpected server reply.\n";
430 fun requestRevoke acl
=
432 val (user
, bio
) = requestBio (fn () => ())
434 Msg
.send (bio
, MsgRevoke acl
);
436 NONE
=> print
"Server closed connection unexpectedly.\n"
439 MsgOk
=> print
"Revoke succeeded.\n"
440 | MsgError s
=> print ("Revoke failed: " ^ s ^
"\n")
441 | _
=> print
"Unexpected server reply.\n";
445 fun requestListPerms user
=
447 val (_
, bio
) = requestBio (fn () => ())
449 Msg
.send (bio
, MsgListPerms user
);
450 (case Msg
.recv bio
of
451 NONE
=> (print
"Server closed connection unexpectedly.\n";
455 MsgPerms perms
=> SOME perms
456 | MsgError s
=> (print ("Listing failed: " ^ s ^
"\n");
458 | _
=> (print
"Unexpected server reply.\n";
460 before OpenSSL
.close bio
463 fun requestWhoHas perm
=
465 val (_
, bio
) = requestBio (fn () => ())
467 Msg
.send (bio
, MsgWhoHas perm
);
468 (case Msg
.recv bio
of
469 NONE
=> (print
"Server closed connection unexpectedly.\n";
473 MsgWhoHasResponse users
=> SOME users
474 | MsgError s
=> (print ("whohas failed: " ^ s ^
"\n");
476 | _
=> (print
"Unexpected server reply.\n";
478 before OpenSSL
.close bio
481 fun requestRegen () =
483 val (_
, bio
) = requestBio (fn () => ())
485 Msg
.send (bio
, MsgRegenerate
);
487 NONE
=> print
"Server closed connection unexpectedly.\n"
490 MsgOk
=> print
"Regeneration succeeded.\n"
491 | MsgError s
=> print ("Regeneration failed: " ^ s ^
"\n")
492 | _
=> print
"Unexpected server reply.\n";
496 fun requestRegenTc () =
498 val (_
, bio
) = requestBio (fn () => ())
500 Msg
.send (bio
, MsgRegenerateTc
);
502 NONE
=> print
"Server closed connection unexpectedly.\n"
505 MsgOk
=> print
"All configuration validated.\n"
506 | MsgError s
=> print ("Configuration validation failed: " ^ s ^
"\n")
507 | _
=> print
"Unexpected server reply.\n";
511 fun requestRmdom dom
=
513 val (_
, bio
) = requestBio (fn () => ())
515 Msg
.send (bio
, MsgRmdom dom
);
517 NONE
=> print
"Server closed connection unexpectedly.\n"
520 MsgOk
=> print
"Removal succeeded.\n"
521 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
522 | _
=> print
"Unexpected server reply.\n";
526 fun requestRmuser user
=
528 val (_
, bio
) = requestBio (fn () => ())
530 Msg
.send (bio
, MsgRmuser user
);
532 NONE
=> print
"Server closed connection unexpectedly.\n"
535 MsgOk
=> print
"Removal succeeded.\n"
536 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
537 | _
=> print
"Unexpected server reply.\n";
541 fun requestDbUser dbtype
=
543 val (_
, context
) = requestContext (fn () => ())
544 val bio
= OpenSSL
.connect
true (context
,
545 Domain
.nodeIp Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
547 Msg
.send (bio
, MsgCreateDbUser dbtype
);
549 NONE
=> print
"Server closed connection unexpectedly.\n"
552 MsgOk
=> print
"Your user has been created.\n"
553 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
554 | _
=> print
"Unexpected server reply.\n";
558 fun requestDbPasswd rc
=
560 val (_
, context
) = requestContext (fn () => ())
561 val bio
= OpenSSL
.connect
true (context
,
562 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
564 Msg
.send (bio
, MsgDbPasswd rc
);
566 NONE
=> print
"Server closed connection unexpectedly.\n"
569 MsgOk
=> print
"Your password has been changed.\n"
570 | MsgError s
=> print ("Password set failed: " ^ s ^
"\n")
571 | _
=> print
"Unexpected server reply.\n";
575 fun requestDbTable p
=
577 val (user
, context
) = requestContext (fn () => ())
578 val bio
= OpenSSL
.connect
true (context
,
579 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
581 Msg
.send (bio
, MsgCreateDb p
);
583 NONE
=> print
"Server closed connection unexpectedly.\n"
586 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been created.\n")
587 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
588 | _
=> print
"Unexpected server reply.\n";
592 fun requestDbDrop p
=
594 val (user
, context
) = requestContext (fn () => ())
595 val bio
= OpenSSL
.connect
true (context
,
596 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
598 Msg
.send (bio
, MsgDropDb p
);
600 NONE
=> print
"Server closed connection unexpectedly.\n"
603 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been dropped.\n")
604 | MsgError s
=> print ("Drop failed: " ^ s ^
"\n")
605 | _
=> print
"Unexpected server reply.\n";
609 fun requestDbGrant p
=
611 val (user
, context
) = requestContext (fn () => ())
612 val bio
= OpenSSL
.connect
true (context
,
613 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
615 Msg
.send (bio
, MsgGrantDb p
);
617 NONE
=> print
"Server closed connection unexpectedly.\n"
620 MsgOk
=> print ("You've been granted all allowed privileges to database " ^ user ^
"_" ^ #dbname p ^
".\n")
621 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
622 | _
=> print
"Unexpected server reply.\n";
626 fun requestListMailboxes domain
=
628 val (_
, bio
) = requestBio (fn () => ())
630 Msg
.send (bio
, MsgListMailboxes domain
);
631 (case Msg
.recv bio
of
632 NONE
=> Vmail
.Error
"Server closed connection unexpectedly."
635 MsgMailboxes users
=> (Msg
.send (bio
, MsgOk
);
637 | MsgError s
=> Vmail
.Error ("Listing failed: " ^ s
)
638 | _
=> Vmail
.Error
"Unexpected server reply.")
639 before OpenSSL
.close bio
642 fun requestNewMailbox p
=
644 val (_
, bio
) = requestBio (fn () => ())
646 Msg
.send (bio
, MsgNewMailbox p
);
648 NONE
=> print
"Server closed connection unexpectedly.\n"
651 MsgOk
=> print ("A mapping for " ^ #user p ^
"@" ^ #domain p ^
" has been created.\n")
652 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
653 | _
=> print
"Unexpected server reply.\n";
657 fun requestPasswdMailbox p
=
659 val (_
, bio
) = requestBio (fn () => ())
661 Msg
.send (bio
, MsgPasswdMailbox p
);
663 NONE
=> print
"Server closed connection unexpectedly.\n"
666 MsgOk
=> print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n")
667 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
668 | _
=> print
"Unexpected server reply.\n";
672 fun requestPortalPasswdMailbox p
=
674 val (_
, bio
) = requestBio (fn () => ())
676 (Msg
.send (bio
, MsgPortalPasswdMailbox p
);
678 NONE
=> (print
"Server closed connection unexpectedly.\n"; OS
.Process
.failure
)
681 MsgOk
=> (print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n");
683 | MsgError s
=> (print ("Set failed: " ^ s ^
"\n"); OS
.Process
.failure
)
684 | _
=> (print
"Unexpected server reply.\n"; OS
.Process
.failure
))
685 before OpenSSL
.close bio
688 fun requestRmMailbox p
=
690 val (_
, bio
) = requestBio (fn () => ())
692 Msg
.send (bio
, MsgRmMailbox p
);
694 NONE
=> print
"Server closed connection unexpectedly.\n"
697 MsgOk
=> print ("The mapping for mailbox " ^ #user p ^
"@" ^ #domain p ^
" has been deleted.\n")
698 | MsgError s
=> print ("Remove failed: " ^ s ^
"\n")
699 | _
=> print
"Unexpected server reply.\n";
703 fun requestSaQuery addr
=
705 val (_
, bio
) = requestBio (fn () => ())
707 Msg
.send (bio
, MsgSaQuery addr
);
708 (case Msg
.recv bio
of
709 NONE
=> print
"Server closed connection unexpectedly.\n"
712 MsgSaStatus b
=> (print ("SpamAssassin filtering for " ^ addr ^
" is "
713 ^
(if b
then "ON" else "OFF") ^
".\n");
714 Msg
.send (bio
, MsgOk
))
715 | MsgError s
=> print ("Query failed: " ^ s ^
"\n")
716 | _
=> print
"Unexpected server reply.\n")
717 before OpenSSL
.close bio
722 val (_
, bio
) = requestBio (fn () => ())
724 Msg
.send (bio
, MsgSaSet p
);
726 NONE
=> print
"Server closed connection unexpectedly.\n"
729 MsgOk
=> print ("SpamAssassin filtering for " ^ #
1 p ^
" is now "
730 ^
(if #
2 p
then "ON" else "OFF") ^
".\n")
731 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
732 | _
=> print
"Unexpected server reply.\n";
736 fun requestSmtpLog domain
=
738 val (_
, bio
) = requestBio (fn () => ())
740 val _
= Msg
.send (bio
, MsgSmtpLogReq domain
)
744 NONE
=> print
"Server closed connection unexpectedly.\n"
748 | MsgSmtpLogRes line
=> (print line
;
750 | MsgError s
=> print ("Log search failed: " ^ s ^
"\n")
751 | _
=> print
"Unexpected server reply.\n"
757 fun requestMysqlFixperms () =
759 val (_
, context
) = requestContext (fn () => ())
760 val bio
= OpenSSL
.connect
true (context
,
761 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
763 Msg
.send (bio
, MsgMysqlFixperms
);
765 NONE
=> print
"Server closed connection unexpectedly.\n"
768 MsgOk
=> print
"Permissions granted.\n"
769 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
770 | _
=> print
"Unexpected server reply.\n";
774 fun requestApt
{node
, pkg
} =
776 val (user
, context
) = requestContext (fn () => ())
777 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
780 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
782 val _
= Msg
.send (bio
, MsgQuery (QApt pkg
))
786 NONE
=> (print
"Server closed connection unexpectedly.\n";
790 MsgYes
=> (print
"Package is installed.\n";
792 | MsgNo
=> (print
"Package is not installed.\n";
794 | MsgError s
=> (print ("APT query failed: " ^ s ^
"\n");
796 | _
=> (print
"Unexpected server reply.\n";
800 before OpenSSL
.close bio
803 fun requestAptExists
{node
, pkg
} =
805 val (user
, context
) = requestContext (fn () => ())
806 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
809 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
811 val _
= Msg
.send (bio
, MsgQuery (QAptExists pkg
))
815 NONE
=> (print
"Server closed connection unexpectedly.\n";
819 MsgAptQuery
{section
,description
} => (print
"Package exists.\n";
820 print ("Section: " ^ section ^
"\n");
821 print ("Description: " ^ description ^
"\n");
823 | MsgNo
=> (print
"Package does not exist.\n";
825 (* It might be the Wrong
Thing (tm
) to use MsgNo like this
*))
826 | MsgError s
=> (print ("APT existence query failed: " ^ s ^
"\n");
828 | _
=> (print
"Unexpected server reply.\n";
832 before OpenSSL
.close bio
835 fun requestCron
{node
, uname
} =
837 val (user
, context
) = requestContext (fn () => ())
838 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
841 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
843 val _
= Msg
.send (bio
, MsgQuery (QCron uname
))
847 NONE
=> (print
"Server closed connection unexpectedly.\n";
851 MsgYes
=> (print
"User has cron permissions.\n";
853 | MsgNo
=> (print
"User does not have cron permissions.\n";
855 | MsgError s
=> (print ("Cron query failed: " ^ s ^
"\n");
857 | _
=> (print
"Unexpected server reply.\n";
861 before OpenSSL
.close bio
864 fun requestFtp
{node
, uname
} =
866 val (user
, context
) = requestContext (fn () => ())
867 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
870 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
872 val _
= Msg
.send (bio
, MsgQuery (QFtp uname
))
876 NONE
=> (print
"Server closed connection unexpectedly.\n";
880 MsgYes
=> (print
"User has FTP permissions.\n";
882 | MsgNo
=> (print
"User does not have FTP permissions.\n";
884 | MsgError s
=> (print ("FTP query failed: " ^ s ^
"\n");
886 | _
=> (print
"Unexpected server reply.\n";
890 before OpenSSL
.close bio
893 fun requestTrustedPath
{node
, uname
} =
895 val (user
, context
) = requestContext (fn () => ())
896 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
899 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
901 val _
= Msg
.send (bio
, MsgQuery (QTrustedPath uname
))
905 NONE
=> (print
"Server closed connection unexpectedly.\n";
909 MsgYes
=> (print
"User has trusted path restriction.\n";
911 | MsgNo
=> (print
"User does not have trusted path restriction.\n";
913 | MsgError s
=> (print ("Trusted path query failed: " ^ s ^
"\n");
915 | _
=> (print
"Unexpected server reply.\n";
919 before OpenSSL
.close bio
922 fun requestSocketPerm
{node
, uname
} =
924 val (user
, context
) = requestContext (fn () => ())
925 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
928 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
930 val _
= Msg
.send (bio
, MsgQuery (QSocket uname
))
934 NONE
=> (print
"Server closed connection unexpectedly.\n";
938 MsgSocket p
=> (case p
of
940 | Client
=> print
"Client\n"
941 | Server
=> print
"Server\n"
942 | Nada
=> print
"Nada\n";
944 | MsgError s
=> (print ("Socket permission query failed: " ^ s ^
"\n");
946 | _
=> (print
"Unexpected server reply.\n";
950 before OpenSSL
.close bio
953 fun requestFirewall
{node
, uname
} =
955 val (user
, context
) = requestContext (fn () => ())
956 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
959 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
961 val _
= Msg
.send (bio
, MsgQuery (QFirewall
{node
= node
, user
= uname
}))
965 NONE
=> (print
"Server closed connection unexpectedly.\n";
969 MsgFirewall ls
=> (app (fn s
=> (print s
; print
"\n")) ls
;
971 | MsgError s
=> (print ("Firewall query failed: " ^ s ^
"\n");
973 | _
=> (print
"Unexpected server reply.\n";
977 before OpenSSL
.close bio
980 fun requestDescribe dom
=
982 val (_
, bio
) = requestBio (fn () => ())
984 Msg
.send (bio
, MsgDescribe dom
);
986 NONE
=> print
"Server closed connection unexpectedly.\n"
989 MsgDescription s
=> print s
990 | MsgError s
=> print ("Description failed: " ^ s ^
"\n")
991 | _
=> print
"Unexpected server reply.\n";
995 fun requestReUsers () =
997 val (_
, bio
) = requestBio (fn () => ())
999 Msg
.send (bio
, MsgReUsers
);
1000 case Msg
.recv bio
of
1001 NONE
=> print
"Server closed connection unexpectedly.\n"
1004 MsgOk
=> print
"Callbacks run.\n"
1005 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
1006 | _
=> print
"Unexpected server reply.\n";
1010 fun requestFirewallRegen node
=
1012 val (user
, context
) = requestContext (fn () => ())
1013 val bio
= OpenSSL
.connect
true (context
, Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
1014 (* Only supporting on slave nodes
*)
1016 val _
= Msg
.send (bio
, MsgFirewallRegen
)
1018 fun handleResult () =
1019 case Msg
.recv bio
of
1020 NONE
=> (print
"Server closed connection unexpectedly.\n";
1024 MsgOk
=> (print
"Firewall regenerated.\n";
1026 | MsgError s
=> (print ("Firewall regeneration failed: " ^ s ^
"\n");
1028 | _
=> (print
"Unexpected server reply.\n";
1032 before OpenSSL
.close bio
1035 structure SS
= StringSet
1037 fun domainList dname
=
1039 val dir
= Posix
.FileSys
.opendir dname
1041 fun visitNode dset
=
1042 case Posix
.FileSys
.readdir dir
of
1046 val path
= OS
.Path
.joinDirFile
{dir
= dname
,
1049 fun visitDomains (path
, bfor
, dset
) =
1051 val dir
= Posix
.FileSys
.opendir path
1054 case Posix
.FileSys
.readdir dir
of
1058 val path
= OS
.Path
.joinDirFile
{dir
= path
,
1061 if Posix
.FileSys
.ST
.isDir (Posix
.FileSys
.stat path
) then
1063 val bfor
= dname
:: bfor
1065 loop (visitDomains (path
, bfor
,
1067 String.concatWith
"." bfor
)))
1074 before Posix
.FileSys
.closedir dir
1077 visitNode (visitDomains (path
, [], dset
))
1081 before Posix
.FileSys
.closedir dir
1084 fun regenerateEither tc checker context
=
1086 val () = print
"Starting regeneration....\n"
1092 domainList Config
.resultRoot
1100 val _
= ErrorMsg
.reset ()
1103 val () = Tycheck
.disallowExterns ()
1105 val () = ifReal (fn () =>
1106 (ignore (OS
.Process
.system ("rm -rf " ^ Config
.oldResultRoot ^
"/*"));
1107 ignore (OS
.Process
.system ("cp -r " ^ Config
.resultRoot
1108 ^
"/* " ^ Config
.oldResultRoot ^
"/"));
1109 Domain
.resetGlobal ()))
1113 fun contactNode (node
, ip
, ipv6
) =
1114 if node
= Config
.dispatcherName
then
1115 Domain
.resetLocal ()
1117 val bio
= OpenSSL
.connect
true (context
,
1120 ^
Int.toString Config
.slavePort
)
1122 Msg
.send (bio
, MsgRegenerate
);
1123 case Msg
.recv bio
of
1124 NONE
=> print
"Slave closed connection unexpectedly\n"
1127 MsgOk
=> print ("Slave " ^ node ^
" pre-regeneration finished\n")
1128 | MsgError s
=> print ("Slave " ^ node
1129 ^
" returned error: " ^
1131 | _
=> print ("Slave " ^ node
1132 ^
" returned unexpected command\n");
1135 handle OpenSSL
.OpenSSL s
=> print ("OpenSSL error: " ^ s ^
"\n")
1139 val _
= Domain
.setUser user
1140 val _
= ErrorMsg
.reset ()
1142 val dname
= Config
.domtoolDir user
1144 if Posix
.FileSys
.access (dname
, []) then
1146 val dir
= Posix
.FileSys
.opendir dname
1149 case Posix
.FileSys
.readdir dir
of
1150 NONE
=> (Posix
.FileSys
.closedir dir
;
1153 if notTmp fname
then
1154 loop (OS
.Path
.joinDirFile
{dir
= dname
,
1161 val (_
, files
) = Order
.order (SOME b
) files
1163 fun checker
' (file
, (G
, evs
)) =
1166 if !ErrorMsg
.anyErrors
then
1168 print ("User " ^ user ^
"'s configuration has errors!\n");
1172 let val basis
' = basis () in
1173 ignore (foldl checker
' (basis
', SM
.empty
) files
)
1176 else if (String.isSuffix
"_admin" user
) orelse (String.isSuffix
".daemon" user
) then
1179 (print ("Couldn't access " ^ user ^
"'s ~/.domtool directory.\n");
1182 handle IO
.Io
{name
, function
, ...} =>
1183 (print ("IO error processing user " ^ user ^
": " ^ function ^
": " ^ name ^
"\n");
1185 | exn
as OS
.SysErr (s
, _
) => (print ("System error processing user " ^ user ^
": " ^ s ^
"\n");
1187 | ErrorMsg
.Error
=> (ErrorMsg
.reset ();
1188 print ("User " ^ user ^
" had a compilation error.\n");
1190 | _
=> (print
"Unknown exception during regeneration!\n";
1193 ifReal (fn () => (app contactNode Config
.nodeIps
;
1195 app
doUser (Acl
.users ());
1198 val domainsAfter
= domainList Config
.resultRoot
1199 val domainsGone
= SS
.difference (domainsBefore
, domainsAfter
)
1201 if SS
.isEmpty domainsGone
then
1204 (print
"Domains to kill:";
1205 SS
.app (fn s
=> (print
" "; print s
)) domainsGone
;
1208 Domain
.rmdom
' Config
.oldResultRoot (SS
.listItems domainsGone
));
1215 val regenerate
= regenerateEither
false eval
1216 val regenerateTc
= regenerateEither
true
1217 (fn G
=> fn evs
=> fn file
=>
1218 (#
1 (check G file
), evs
))
1220 fun usersChanged () =
1221 (Domain
.onUsersChange ();
1222 ignore (OS
.Process
.system Config
.publish_reusers
))
1226 val doms
= Acl
.class
{user
= user
, class
= "domain"}
1227 val doms
= List.filter (fn dom
=>
1228 case Acl
.whoHas
{class
= "domain", value
= dom
} of
1230 | _
=> false) (StringSet
.listItems doms
)
1237 fun now () = Date
.toString (Date
.fromTimeUniv (Time
.now ()))
1241 QApt pkg
=> if Apt
.installed pkg
then MsgYes
else MsgNo
1242 | QAptExists pkg
=> (case Apt
.info pkg
of
1243 SOME
{section
, description
} => MsgAptQuery
{section
= section
, description
= description
}
1245 | QCron user
=> if Cron
.allowed user
then MsgYes
else MsgNo
1246 | QFtp user
=> if Ftp
.allowed user
then MsgYes
else MsgNo
1247 | QTrustedPath user
=> if TrustedPath
.query user
then MsgYes
else MsgNo
1248 | QSocket user
=> MsgSocket (SocketPerm
.query user
)
1249 | QFirewall
{node
, user
} => MsgFirewall (Firewall
.query (node
, user
))
1251 fun describeQuery q
=
1253 QApt pkg
=> "Requested installation status of package " ^ pkg
1254 | QAptExists pkg
=> "Requested if package " ^ pkg ^
" exists"
1255 | QCron user
=> "Asked about cron permissions for user " ^ user
1256 | QFtp user
=> "Asked about FTP permissions for user " ^ user
1257 | QTrustedPath user
=> "Asked about trusted path settings for user " ^ user
1258 | QSocket user
=> "Asked about socket permissions for user " ^ user
1259 | QFirewall
{node
, user
} => "Asked about firewall rules on " ^ node ^
" for user " ^ user
1261 fun doIt
' loop bio f cleanup
=
1263 (msgLocal
, SOME msgRemote
) =>
1266 Msg
.send (bio
, MsgError msgRemote
))
1267 |
(msgLocal
, NONE
) =>
1270 Msg
.send (bio
, MsgOk
)))
1271 handle e
as (OpenSSL
.OpenSSL s
) =>
1272 (print ("OpenSSL error: " ^ s ^
"\n");
1273 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1274 Msg
.send (bio
, MsgError ("OpenSSL error: " ^ s
))
1275 handle OpenSSL
.OpenSSL _
=> ())
1276 | OS
.SysErr (s
, _
) =>
1277 (print
"System error: ";
1280 Msg
.send (bio
, MsgError ("System error: " ^ s
))
1281 handle OpenSSL
.OpenSSL _
=> ())
1286 Msg
.send (bio
, MsgError ("Failure: " ^ s
))
1287 handle OpenSSL
.OpenSSL _
=> ())
1289 (print
"Compilation error\n";
1290 Msg
.send (bio
, MsgError
"Error during configuration evaluation")
1291 handle OpenSSL
.OpenSSL _
=> ());
1293 ignore (OpenSSL
.readChar bio
);
1295 handle OpenSSL
.OpenSSL _
=> ();
1300 val host
= Slave
.hostname ()
1302 val () = Acl
.read Config
.aclFile
1304 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1305 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1307 val _
= Domain
.set_context context
1309 val sock
= OpenSSL
.listen (context
, Config
.dispatcherPort
)
1312 (case OpenSSL
.accept sock
of
1316 val user
= OpenSSL
.peerCN bio
1317 val () = print ("\nConnection from " ^ user ^
" at " ^
now () ^
"\n")
1318 val () = Domain
.setUser user
1319 val doIt
= doIt
' loop bio
1321 fun doConfig codes
=
1323 val _
= print
"Configuration:\n"
1324 val _
= app (fn s
=> (print s
; print
"\n")) codes
1327 val outname
= OS
.FileSys
.tmpName ()
1329 fun doOne (code
, (G
, evs
)) =
1331 val outf
= TextIO.openOut outname
1333 TextIO.output (outf
, code
);
1334 TextIO.closeOut outf
;
1338 doIt (fn () => (Env
.pre ();
1339 let val basis
' = basis () in
1340 ignore (foldl
doOne (basis
', SM
.empty
) codes
)
1343 Msg
.send (bio
, MsgOk
);
1344 ("Configuration complete.", NONE
)))
1345 (fn () => OS
.FileSys
.remove outname
)
1349 case String.fields (fn ch
=> ch
= #
"@") s
of
1351 if user
= user
' then
1355 |
[user
', domain
] =>
1356 if Domain
.validEmailUser user
' andalso Domain
.yourDomain domain
then
1357 SOME (SetSA
.Email s
)
1363 case Msg
.recv bio
of
1364 NONE
=> (OpenSSL
.close bio
1365 handle OpenSSL
.OpenSSL _
=> ();
1369 MsgConfig code
=> doConfig
[code
]
1370 | MsgMultiConfig codes
=> doConfig codes
1373 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1374 orelse Acl
.query
{user
= user
, class
= "priv", value
= "shutdown"} then
1375 print ("Domtool dispatcher shutting down at " ^
now () ^
"\n\n")
1377 (print
"Unauthorized shutdown command!\n";
1379 handle OpenSSL
.OpenSSL _
=> ();
1384 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1386 Acl
.write Config
.aclFile
;
1387 if #class acl
= "user" then
1391 ("Granted permission " ^ #value acl ^
" to " ^ #user acl ^
" in " ^ #class acl ^
".",
1394 ("Unauthorized user asked to grant a permission!",
1395 SOME
"Not authorized to grant privileges"))
1400 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1402 Acl
.write Config
.aclFile
;
1403 ("Revoked permission " ^ #value acl ^
" from " ^ #user acl ^
" in " ^ #class acl ^
".",
1406 ("Unauthorized user asked to revoke a permission!",
1407 SOME
"Not authorized to revoke privileges"))
1410 | MsgListPerms user
=>
1412 (Msg
.send (bio
, MsgPerms (Acl
.queryAll user
));
1413 ("Sent permission list for user " ^ user ^
".",
1419 (Msg
.send (bio
, MsgWhoHasResponse (Acl
.whoHas perm
));
1420 ("Sent whohas response for " ^ #class perm ^
" / " ^ #value perm ^
".",
1426 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1427 orelse List.all (fn dom
=> Domain
.validDomain dom
1428 andalso Acl
.queryDomain
{user
= user
, domain
= dom
}) doms
then
1431 Acl
.revokeFromAll
{class
= "domain", value
= dom
}) doms
;
1432 Acl
.write Config
.aclFile
;*)
1433 ("Removed domains" ^
foldl (fn (d
, s
) => s ^
" " ^ d
) "" doms ^
".",
1436 ("Unauthorized user asked to remove a domain!",
1437 SOME
"Not authorized to remove that domain"))
1442 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1443 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1444 (if regenerate context
then
1445 ("Regenerated all configuration.",
1448 ("Error regenerating configuration!",
1449 SOME
"Error regenerating configuration! Consult /var/log/domtool.log."))
1451 ("Unauthorized user asked to regenerate!",
1452 SOME
"Not authorized to regenerate"))
1455 | MsgRegenerateTc
=>
1457 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1458 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1459 (if regenerateTc context
then
1460 ("Checked all configuration.",
1463 ("Found a compilation error!",
1464 SOME
"Found a compilation error! Consult /var/log/domtool.log."))
1466 ("Unauthorized user asked to regenerate -tc!",
1467 SOME
"Not authorized to regenerate -tc"))
1470 | MsgRmuser user
' =>
1472 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1474 Acl
.write Config
.aclFile
;
1475 ("Removed user " ^ user
' ^
".",
1478 ("Unauthorized user asked to remove a user!",
1479 SOME
"Not authorized to remove users"))
1482 | MsgListMailboxes domain
=>
1484 if not (Domain
.yourDomain domain
) then
1485 ("User wasn't authorized to list mailboxes for " ^ domain
,
1486 SOME
"You're not authorized to configure that domain.")
1488 case Vmail
.list domain
of
1489 Vmail
.Listing users
=> (Msg
.send (bio
, MsgMailboxes users
);
1490 ("Sent mailbox list for " ^ domain
,
1492 | Vmail
.Error msg
=> ("Error listing mailboxes for " ^ domain ^
": " ^ msg
,
1496 | MsgNewMailbox
{domain
, user
= emailUser
, passwd
, mailbox
} =>
1498 if not (Domain
.yourDomain domain
) then
1499 ("User wasn't authorized to add a mailbox to " ^ domain
,
1500 SOME
"You're not authorized to configure that domain.")
1501 else if not (Domain
.validEmailUser emailUser
) then
1502 ("Invalid e-mail username " ^ emailUser
,
1503 SOME
"Invalid e-mail username")
1504 else if not (CharVector
.all
Char.isGraph passwd
) then
1505 ("Invalid password",
1506 SOME
"Invalid password; may only contain printable, non-space characters")
1507 else if not (Domain
.yourPath mailbox
) then
1508 ("User wasn't authorized to add a mailbox at " ^ mailbox
,
1509 SOME ("You're not authorized to use that mailbox location. ("
1512 case Vmail
.add
{requester
= user
,
1513 domain
= domain
, user
= emailUser
,
1514 passwd
= passwd
, mailbox
= mailbox
} of
1515 NONE
=> ("Added mailbox " ^ emailUser ^
"@" ^ domain ^
" at " ^ mailbox
,
1517 | SOME msg
=> ("Error adding mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1521 | MsgPasswdMailbox
{domain
, user
= emailUser
, passwd
} =>
1523 if not (Domain
.yourDomain domain
) then
1524 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1525 SOME
"You're not authorized to configure that domain.")
1526 else if not (Domain
.validEmailUser emailUser
) then
1527 ("Invalid e-mail username " ^ emailUser
,
1528 SOME
"Invalid e-mail username")
1529 else if not (CharVector
.all
Char.isGraph passwd
) then
1530 ("Invalid password",
1531 SOME
"Invalid password; may only contain printable, non-space characters")
1533 case Vmail
.passwd
{domain
= domain
, user
= emailUser
,
1535 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1537 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1541 | MsgPortalPasswdMailbox
{domain
, user
= emailUser
, oldpasswd
, newpasswd
} =>
1543 if not (Acl
.query
{user
= user
, class
= "priv", value
= "vmail"}) then
1544 ("User is not authorized to run portal vmail password",
1545 SOME
"You're not authorized to use the portal password command")
1546 else if not (Domain
.validEmailUser emailUser
) then
1547 ("Invalid e-mail username " ^ emailUser
,
1548 SOME
"Invalid e-mail username")
1549 else if not (CharVector
.all
Char.isGraph oldpasswd
1550 andalso CharVector
.all
Char.isGraph newpasswd
) then
1551 ("Invalid password",
1552 SOME
"Invalid password; may only contain printable, non-space characters")
1554 case Vmail
.portalpasswd
{domain
= domain
, user
= emailUser
,
1555 oldpasswd
= oldpasswd
, newpasswd
= newpasswd
} of
1556 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1558 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1562 | MsgRmMailbox
{domain
, user
= emailUser
} =>
1564 if not (Domain
.yourDomain domain
) then
1565 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1566 SOME
"You're not authorized to configure that domain.")
1567 else if not (Domain
.validEmailUser emailUser
) then
1568 ("Invalid e-mail username " ^ emailUser
,
1569 SOME
"Invalid e-mail username")
1571 case Vmail
.rm
{domain
= domain
, user
= emailUser
} of
1572 NONE
=> ("Deleted mailbox " ^ emailUser ^
"@" ^ domain
,
1574 | SOME msg
=> ("Error deleting mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1578 | MsgSaQuery addr
=>
1580 case checkAddr addr
of
1581 NONE
=> ("User tried to query SA filtering for " ^ addr
,
1582 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1583 | SOME addr
' => (Msg
.send (bio
, MsgSaStatus (SetSA
.query addr
'));
1584 ("Queried SA filtering status for " ^ addr
,
1588 |
MsgSaSet (addr
, b
) =>
1590 case checkAddr addr
of
1591 NONE
=> ("User tried to set SA filtering for " ^ addr
,
1592 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1593 | SOME addr
' => (SetSA
.set (addr
', b
);
1595 Msg
.send (bio
, MsgOk
);
1596 ("Set SA filtering status for " ^ addr ^
" to "
1597 ^
(if b
then "ON" else "OFF"),
1601 | MsgSmtpLogReq domain
=>
1603 if not (Domain
.yourDomain domain
) then
1604 ("Unauthorized user tried to request SMTP logs for " ^ domain
,
1605 SOME
"You aren't authorized to configure that domain.")
1607 (SmtpLog
.search (fn line
=> Msg
.send (bio
, MsgSmtpLogRes line
))
1609 ("Requested SMTP logs for " ^ domain
,
1614 doIt (fn () => (Msg
.send (bio
, answerQuery q
);
1618 | MsgDescribe dom
=>
1619 doIt (fn () => if not (Domain
.validDomain dom
) then
1620 ("Requested description of invalid domain " ^ dom
,
1621 SOME
"Invalid domain name")
1622 else if not (Domain
.yourDomain dom
1623 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"}) then
1624 ("Requested description of " ^ dom ^
", but not allowed access",
1625 SOME
"Access denied")
1627 (Msg
.send (bio
, MsgDescription (Domain
.describe dom
));
1628 ("Sent description of domain " ^ dom
,
1633 doIt (fn () => if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1634 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1636 ("Users change callbacks run", NONE
))
1638 ("Unauthorized user asked to reusers!",
1639 SOME
"You aren't authorized to regenerate files."))
1643 doIt (fn () => ("Unexpected command",
1644 SOME
"Unexpected command"))
1649 handle e
as (OpenSSL
.OpenSSL s
) =>
1650 (print ("OpenSSL error: " ^ s ^
"\n");
1651 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1653 handle OpenSSL
.OpenSSL _
=> ();
1655 | OS
.SysErr (s
, _
) =>
1656 (print ("System error: " ^ s ^
"\n");
1658 handle OpenSSL
.OpenSSL _
=> ();
1660 | IO
.Io
{name
, function
, cause
} =>
1661 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1662 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1664 handle OpenSSL
.OpenSSL _
=> ();
1666 | OS
.Path
.InvalidArc
=>
1667 (print
"Invalid arc\n";
1669 handle OpenSSL
.OpenSSL _
=> ();
1672 (print
"Unknown exception in main loop!\n";
1673 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1675 handle OpenSSL
.OpenSSL _
=> ();
1677 handle e
as (OpenSSL
.OpenSSL s
) =>
1678 (print ("OpenSSL error: " ^ s ^
"\n");
1679 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1681 | OS
.SysErr (s
, _
) =>
1682 (print ("System error: " ^ s ^
"\n");
1684 | IO
.Io
{name
, function
, cause
} =>
1685 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1686 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1689 (print
"Unknown exception in main loop!\n";
1690 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1693 print ("Domtool dispatcher starting up at " ^
now () ^
"\n");
1694 print
"Listening for connections....\n";
1696 OpenSSL
.shutdown sock
1701 val host
= Slave
.hostname ()
1703 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1704 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1707 val sock
= OpenSSL
.listen (context
, Config
.slavePort
)
1709 val _
= print ("Slave server starting at " ^
now () ^
"\n")
1712 (case OpenSSL
.accept sock
of
1716 val peer
= OpenSSL
.peerCN bio
1717 val () = print ("\nConnection from " ^ peer ^
" at " ^
now () ^
"\n")
1719 if peer
= Config
.dispatcherName
then let
1721 case Msg
.recv bio
of
1722 NONE
=> print
"Dispatcher closed connection unexpectedly\n"
1725 MsgFile file
=> loop
' (file
:: files
)
1726 | MsgDoFiles
=> (Slave
.handleChanges files
;
1727 Msg
.send (bio
, MsgOk
))
1728 | MsgRegenerate
=> (Domain
.resetLocal ();
1729 Msg
.send (bio
, MsgOk
))
1730 | MsgVmailChanged
=> (if Vmail
.doChanged () then
1731 Msg
.send (bio
, MsgOk
)
1733 Msg
.send (bio
, MsgError
"userdb update failed"))
1734 | MsgSaChanged
=> (if Slave
.shell
[Config
.SpamAssassin
.postReload
] then
1735 Msg
.send (bio
, MsgOk
)
1737 Msg
.send (bio
, MsgError
"Error reloading SpamAssassin addresses"))
1738 | _
=> (print
"Dispatcher sent unexpected command\n";
1739 Msg
.send (bio
, MsgError
"Unexpected command"))
1742 ignore (OpenSSL
.readChar bio
);
1746 else if peer
= "domtool" then
1747 case Msg
.recv bio
of
1748 SOME MsgShutdown
=> (OpenSSL
.close bio
;
1749 print ("Shutting down at " ^
now () ^
"\n\n"))
1750 | _
=> (OpenSSL
.close bio
;
1754 val doIt
= doIt
' loop bio
1757 case Msg
.recv bio
of
1758 NONE
=> (OpenSSL
.close bio
1759 handle OpenSSL
.OpenSSL _
=> ();
1763 (MsgQuery q
) => (print (describeQuery q ^
"\n");
1764 Msg
.send (bio
, answerQuery q
);
1765 ignore (OpenSSL
.readChar bio
);
1768 | MsgCreateDbUser
{dbtype
, passwd
} =>
1770 case Dbms
.lookup dbtype
of
1771 NONE
=> ("Database user creation request with unknown datatype type " ^ dbtype
,
1772 SOME ("Unknown database type " ^ dbtype
))
1774 case #adduser handler
{user
= user
, passwd
= passwd
} of
1775 NONE
=> ("Added " ^ dbtype ^
" user " ^ user ^
".",
1778 ("Error adding a " ^ dbtype ^
" user " ^ user ^
": " ^ msg
,
1779 SOME ("Error adding user: " ^ msg
)))
1782 | MsgDbPasswd
{dbtype
, passwd
} =>
1784 case Dbms
.lookup dbtype
of
1785 NONE
=> ("Database passwd request with unknown datatype type " ^ dbtype
,
1786 SOME ("Unknown database type " ^ dbtype
))
1788 case #passwd handler
{user
= user
, passwd
= passwd
} of
1789 NONE
=> ("Changed " ^ dbtype ^
" password of user " ^ user ^
".",
1792 ("Error setting " ^ dbtype ^
" password of user " ^ user ^
": " ^ msg
,
1793 SOME ("Error adding user: " ^ msg
)))
1796 | MsgCreateDb
{dbtype
, dbname
, encoding
} =>
1798 if Dbms
.validDbname dbname
then
1799 case Dbms
.lookup dbtype
of
1800 NONE
=> ("Database creation request with unknown datatype type " ^ dbtype
,
1801 SOME ("Unknown database type " ^ dbtype
))
1803 if not (Dbms
.validEncoding encoding
) then
1804 ("Invalid encoding " ^ valOf encoding ^
" requested for database creation.",
1805 SOME
"Invalid encoding")
1807 case #createdb handler
{user
= user
, dbname
= dbname
, encoding
= encoding
} of
1808 NONE
=> ("Created database " ^ user ^
"_" ^ dbname ^
".",
1810 | SOME msg
=> ("Error creating database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1811 SOME ("Error creating database: " ^ msg
))
1813 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1814 SOME ("Invalid database name " ^ dbname
)))
1817 | MsgDropDb
{dbtype
, dbname
} =>
1819 if Dbms
.validDbname dbname
then
1820 case Dbms
.lookup dbtype
of
1821 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1822 SOME ("Unknown database type " ^ dbtype
))
1824 case #dropdb handler
{user
= user
, dbname
= dbname
} of
1825 NONE
=> ("Drop database " ^ user ^
"_" ^ dbname ^
".",
1827 | SOME msg
=> ("Error dropping database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1828 SOME ("Error dropping database: " ^ msg
))
1830 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1831 SOME ("Invalid database name " ^ dbname
)))
1834 | MsgGrantDb
{dbtype
, dbname
} =>
1836 if Dbms
.validDbname dbname
then
1837 case Dbms
.lookup dbtype
of
1838 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1839 SOME ("Unknown database type " ^ dbtype
))
1841 case #grant handler
{user
= user
, dbname
= dbname
} of
1842 NONE
=> ("Grant permissions to database " ^ user ^
"_" ^ dbname ^
".",
1844 | SOME msg
=> ("Error granting permissions to database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1845 SOME ("Error granting permissions to database: " ^ msg
))
1847 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1848 SOME ("Invalid database name " ^ dbname
)))
1850 | MsgMysqlFixperms
=>
1851 (print
"Starting mysql-fixperms\n";
1852 doIt (fn () => if OS
.Process
.isSuccess
1853 (OS
.Process
.system
"/usr/bin/sudo -H /afs/hcoop.net/common/etc/scripts/mysql-grant-table-drop") then
1854 ("Requested mysql-fixperms",
1857 ("Requested mysql-fixperms, but execution failed!",
1858 SOME
"Script execution failed."))
1860 | MsgFirewallRegen
=>
1861 doIt (fn () => (Acl
.read Config
.aclFile
;
1862 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1863 if List.exists (fn x
=> x
= host
) Config
.Firewall
.firewallNodes
then
1864 if (Firewall
.generateFirewallConfig (Firewall
.parseRules ()) andalso Firewall
.publishConfig ())
1866 ("Firewall rules regenerated.", NONE
)
1868 ("Rules regeneration failed!", SOME
"Script execution failed.")
1869 else ("Node not controlled by domtool firewall.", SOME (host
))
1871 ("Not authorized to regenerate firewall.", SOME ("Unauthorized user " ^ user ^
" attempted to regenerated firewall"))))
1874 | _
=> (OpenSSL
.close bio
;
1877 end handle OpenSSL
.OpenSSL s
=>
1878 (print ("OpenSSL error: " ^ s ^
"\n");
1880 handle OpenSSL
.OpenSSL _
=> ();
1882 | e
as OS
.SysErr (s
, _
) =>
1883 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1884 print ("System error: "^ s ^
"\n");
1886 handle OpenSSL
.OpenSSL _
=> ();
1888 | IO
.Io
{function
, name
, ...} =>
1889 (print ("IO error: " ^ function ^
": " ^ name ^
"\n");
1891 handle OpenSSL
.OpenSSL _
=> ();
1894 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1895 print
"Uncaught exception!\n";
1897 handle OpenSSL
.OpenSSL _
=> ();
1899 handle OpenSSL
.OpenSSL s
=>
1900 (print ("OpenSSL error: " ^ s ^
"\n");
1903 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1904 print
"Uncaught exception!\n";
1908 OpenSSL
.shutdown sock
1913 val dir
= Posix
.FileSys
.opendir Config
.libRoot
1916 case Posix
.FileSys
.readdir dir
of
1917 NONE
=> (Posix
.FileSys
.closedir dir
;
1920 if String.isSuffix
".dtl" fname
then
1921 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
1930 fun autodocBasis outdir
=
1931 Autodoc
.autodoc
{outdir
= outdir
, infiles
= listBasis ()}