1 (* HCoop
Domtool (http
://hcoop
.sourceforge
.net
/)
2 * Copyright (c
) 2006-2007, Adam Chlipala
4 * This program is free software
; you can redistribute it
and/or
5 * modify it under the terms
of the GNU General Public License
6 * as published by the Free Software Foundation
; either version
2
7 * of the License
, or (at your option
) any later version
.
9 * This program is distributed
in the hope that it will be useful
,
10 * but WITHOUT ANY WARRANTY
; without even the implied warranty
of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE
. See the
12 * GNU General Public License for more details
.
14 * You should have received a copy
of the GNU General Public License
15 * along
with this program
; if not
, write to the Free Software
16 * Foundation
, Inc
., 51 Franklin Street
, Fifth Floor
, Boston
, MA
02110-1301, USA
.
21 structure Main
:> MAIN
= struct
23 open Ast MsgTypes Print
25 structure SM
= StringMap
27 fun init () = Acl
.read Config
.aclFile
31 val prog
= Parse
.parse fname
33 if !ErrorMsg
.anyErrors
then
36 Tycheck
.checkFile
G (Defaults
.tInit ()) prog
41 val dir
= Posix
.FileSys
.opendir Config
.libRoot
44 case Posix
.FileSys
.readdir dir
of
45 NONE
=> (Posix
.FileSys
.closedir dir
;
48 if String.isSuffix
".dtl" fname
then
49 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
56 val (_
, files
) = Order
.order NONE files
58 if !ErrorMsg
.anyErrors
then
61 (Tycheck
.allowExterns ();
62 foldl (fn (fname
, G
) => check
' G fname
) Env
.empty files
63 before Tycheck
.disallowExterns ())
68 val _
= ErrorMsg
.reset ()
69 val _
= Env
.preTycheck ()
73 if !ErrorMsg
.anyErrors
then
77 val _
= Tycheck
.disallowExterns ()
78 val _
= ErrorMsg
.reset ()
79 val prog
= Parse
.parse fname
81 if !ErrorMsg
.anyErrors
then
85 val G
' = Tycheck
.checkFile
b (Defaults
.tInit ()) prog
87 if !ErrorMsg
.anyErrors
then
96 String.sub (s
, 0) <> #
"."
97 andalso CharVector
.all (fn ch
=> Char.isAlphaNum ch
orelse ch
= #
"." orelse ch
= #
"_" orelse ch
= #
"-") s
103 val dir
= Posix
.FileSys
.opendir dname
106 case Posix
.FileSys
.readdir dir
of
107 NONE
=> (Posix
.FileSys
.closedir dir
;
111 loop (OS
.Path
.joinDirFile
{dir
= dname
,
118 val (_
, files
) = Order
.order (SOME b
) files
120 if !ErrorMsg
.anyErrors
then
123 (foldl (fn (fname
, G
) => check
' G fname
) b files
;
124 if !ErrorMsg
.anyErrors
then
132 val (G
, body
) = check fname
134 if !ErrorMsg
.anyErrors
then
140 val body
' = Reduce
.reduceExp G body
142 (*printd (PD
.hovBox (PD
.PPS
.Rel
0,
143 [PD
.string "Result:",
154 if !ErrorMsg
.anyErrors
then
157 Eval
.exec (Defaults
.eInit ()) body
'
158 | NONE
=> raise ErrorMsg
.Error
163 if !ErrorMsg
.anyErrors
then
166 ignore (Eval
.exec
' (Defaults
.eInit ()) body
')
167 | NONE
=> raise ErrorMsg
.Error
170 Config
.dispatcher ^
":" ^
Int.toString Config
.dispatcherPort
173 "localhost:" ^
Int.toString Config
.slavePort
176 (OpenSSL
.context
false x
)
177 handle e
as OpenSSL
.OpenSSL s
=>
178 (print
"Couldn't find your certificate.\nYou probably haven't been given any Domtool privileges.\n";
179 print ("Additional information: " ^ s ^
"\n");
185 case Posix
.ProcEnv
.getenv
"DOMTOOL_USER" of
188 val uid
= Posix
.ProcEnv
.getuid ()
190 Posix
.SysDB
.Passwd
.name (Posix
.SysDB
.getpwuid uid
)
194 Acl
.read Config
.aclFile
;
199 fun requestContext f
=
201 val user
= setupUser ()
205 val context
= context (Config
.certDir ^
"/" ^ user ^
".pem",
206 Config
.keyDir ^
"/" ^ user ^
"/key.pem",
214 val (user
, context
) = requestContext f
216 (user
, OpenSSL
.connect (context
, dispatcher
))
219 fun requestSlaveBio () =
221 val (user
, context
) = requestContext (fn () => ())
223 (user
, OpenSSL
.connect (context
, self
))
228 val (user
, bio
) = requestBio (fn () => ignore (check fname
))
230 val inf
= TextIO.openIn fname
233 case TextIO.inputLine inf
of
234 NONE
=> String.concat (List.rev lines
)
235 | SOME line
=> loop (line
:: lines
)
240 Msg
.send (bio
, MsgConfig code
);
242 NONE
=> print
"Server closed connection unexpectedly.\n"
245 MsgOk
=> print
"Configuration succeeded.\n"
246 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
247 | _
=> print
"Unexpected server reply.\n";
250 handle ErrorMsg
.Error
=> ()
252 fun requestDir dname
=
254 val _
= if Posix
.FileSys
.access (dname
, []) then
257 (print ("Can't access " ^ dname ^
".\n");
258 print
"Did you mean to run domtool on a specific file, instead of asking for all\n";
259 print
"files in your ~/domtool directory?\n";
260 OS
.Process
.exit OS
.Process
.failure
)
262 val _
= ErrorMsg
.reset ()
264 val (user
, bio
) = requestBio (fn () => checkDir dname
)
268 val dir
= Posix
.FileSys
.opendir dname
271 case Posix
.FileSys
.readdir dir
of
272 NONE
=> (Posix
.FileSys
.closedir dir
;
276 loop (OS
.Path
.joinDirFile
{dir
= dname
,
283 val (_
, files
) = Order
.order (SOME b
) files
285 val _
= if !ErrorMsg
.anyErrors
then
290 val codes
= map (fn fname
=>
292 val inf
= TextIO.openIn fname
295 case TextIO.inputLine inf
of
296 NONE
=> String.concat (rev lines
)
297 | SOME line
=> loop (line
:: lines
)
300 before TextIO.closeIn inf
303 if !ErrorMsg
.anyErrors
then
306 (Msg
.send (bio
, MsgMultiConfig codes
);
308 NONE
=> print
"Server closed connection unexpectedly.\n"
311 MsgOk
=> print
"Configuration succeeded.\n"
312 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
313 | _
=> print
"Unexpected server reply.\n";
316 handle ErrorMsg
.Error
=> ()
320 val (_
, bio
) = requestBio (fn () => ())
325 handle _
=> OS
.Process
.failure
327 fun requestShutdown () =
329 val (_
, bio
) = requestBio (fn () => ())
331 Msg
.send (bio
, MsgShutdown
);
333 NONE
=> print
"Server closed connection unexpectedly.\n"
336 MsgOk
=> print
"Shutdown begun.\n"
337 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
338 | _
=> print
"Unexpected server reply.\n";
342 fun requestSlavePing () =
344 val (_
, bio
) = requestSlaveBio ()
349 handle _
=> OS
.Process
.failure
351 fun requestSlaveShutdown () =
353 val (_
, bio
) = requestSlaveBio ()
355 Msg
.send (bio
, MsgShutdown
);
357 NONE
=> print
"Server closed connection unexpectedly.\n"
360 MsgOk
=> print
"Shutdown begun.\n"
361 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
362 | _
=> print
"Unexpected server reply.\n";
366 fun requestGrant acl
=
368 val (user
, bio
) = requestBio (fn () => ())
370 Msg
.send (bio
, MsgGrant acl
);
372 NONE
=> print
"Server closed connection unexpectedly.\n"
375 MsgOk
=> print
"Grant succeeded.\n"
376 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
377 | _
=> print
"Unexpected server reply.\n";
381 fun requestRevoke acl
=
383 val (user
, bio
) = requestBio (fn () => ())
385 Msg
.send (bio
, MsgRevoke acl
);
387 NONE
=> print
"Server closed connection unexpectedly.\n"
390 MsgOk
=> print
"Revoke succeeded.\n"
391 | MsgError s
=> print ("Revoke failed: " ^ s ^
"\n")
392 | _
=> print
"Unexpected server reply.\n";
396 fun requestListPerms user
=
398 val (_
, bio
) = requestBio (fn () => ())
400 Msg
.send (bio
, MsgListPerms user
);
401 (case Msg
.recv bio
of
402 NONE
=> (print
"Server closed connection unexpectedly.\n";
406 MsgPerms perms
=> SOME perms
407 | MsgError s
=> (print ("Listing failed: " ^ s ^
"\n");
409 | _
=> (print
"Unexpected server reply.\n";
411 before OpenSSL
.close bio
414 fun requestWhoHas perm
=
416 val (_
, bio
) = requestBio (fn () => ())
418 Msg
.send (bio
, MsgWhoHas perm
);
419 (case Msg
.recv bio
of
420 NONE
=> (print
"Server closed connection unexpectedly.\n";
424 MsgWhoHasResponse users
=> SOME users
425 | MsgError s
=> (print ("whohas failed: " ^ s ^
"\n");
427 | _
=> (print
"Unexpected server reply.\n";
429 before OpenSSL
.close bio
432 fun requestRegen () =
434 val (_
, bio
) = requestBio (fn () => ())
436 Msg
.send (bio
, MsgRegenerate
);
438 NONE
=> print
"Server closed connection unexpectedly.\n"
441 MsgOk
=> print
"Regeneration succeeded.\n"
442 | MsgError s
=> print ("Regeneration failed: " ^ s ^
"\n")
443 | _
=> print
"Unexpected server reply.\n";
447 fun requestRegenTc () =
449 val (_
, bio
) = requestBio (fn () => ())
451 Msg
.send (bio
, MsgRegenerateTc
);
453 NONE
=> print
"Server closed connection unexpectedly.\n"
456 MsgOk
=> print
"All configuration validated.\n"
457 | MsgError s
=> print ("Configuration validation failed: " ^ s ^
"\n")
458 | _
=> print
"Unexpected server reply.\n";
462 fun requestRmdom dom
=
464 val (_
, bio
) = requestBio (fn () => ())
466 Msg
.send (bio
, MsgRmdom dom
);
468 NONE
=> print
"Server closed connection unexpectedly.\n"
471 MsgOk
=> print
"Removal succeeded.\n"
472 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
473 | _
=> print
"Unexpected server reply.\n";
477 fun requestRmuser user
=
479 val (_
, bio
) = requestBio (fn () => ())
481 Msg
.send (bio
, MsgRmuser user
);
483 NONE
=> print
"Server closed connection unexpectedly.\n"
486 MsgOk
=> print
"Removal succeeded.\n"
487 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
488 | _
=> print
"Unexpected server reply.\n";
492 fun requestDbUser dbtype
=
494 val (_
, bio
) = requestBio (fn () => ())
496 Msg
.send (bio
, MsgCreateDbUser dbtype
);
498 NONE
=> print
"Server closed connection unexpectedly.\n"
501 MsgOk
=> print
"Your user has been created.\n"
502 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
503 | _
=> print
"Unexpected server reply.\n";
507 fun requestDbPasswd rc
=
509 val (_
, bio
) = requestBio (fn () => ())
511 Msg
.send (bio
, MsgDbPasswd rc
);
513 NONE
=> print
"Server closed connection unexpectedly.\n"
516 MsgOk
=> print
"Your password has been changed.\n"
517 | MsgError s
=> print ("Password set failed: " ^ s ^
"\n")
518 | _
=> print
"Unexpected server reply.\n";
522 fun requestDbTable p
=
524 val (user
, bio
) = requestBio (fn () => ())
526 Msg
.send (bio
, MsgCreateDbTable p
);
528 NONE
=> print
"Server closed connection unexpectedly.\n"
531 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been created.\n")
532 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
533 | _
=> print
"Unexpected server reply.\n";
537 fun requestDbDrop p
=
539 val (user
, bio
) = requestBio (fn () => ())
541 Msg
.send (bio
, MsgDropDb p
);
543 NONE
=> print
"Server closed connection unexpectedly.\n"
546 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been dropped.\n")
547 | MsgError s
=> print ("Drop failed: " ^ s ^
"\n")
548 | _
=> print
"Unexpected server reply.\n";
552 fun requestListMailboxes domain
=
554 val (_
, bio
) = requestBio (fn () => ())
556 Msg
.send (bio
, MsgListMailboxes domain
);
557 (case Msg
.recv bio
of
558 NONE
=> Vmail
.Error
"Server closed connection unexpectedly."
561 MsgMailboxes users
=> (Msg
.send (bio
, MsgOk
);
563 | MsgError s
=> Vmail
.Error ("Creation failed: " ^ s
)
564 | _
=> Vmail
.Error
"Unexpected server reply.")
565 before OpenSSL
.close bio
568 fun requestNewMailbox p
=
570 val (_
, bio
) = requestBio (fn () => ())
572 Msg
.send (bio
, MsgNewMailbox p
);
574 NONE
=> print
"Server closed connection unexpectedly.\n"
577 MsgOk
=> print ("A mapping for " ^ #user p ^
"@" ^ #domain p ^
" has been created.\n")
578 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
579 | _
=> print
"Unexpected server reply.\n";
583 fun requestPasswdMailbox p
=
585 val (_
, bio
) = requestBio (fn () => ())
587 Msg
.send (bio
, MsgPasswdMailbox p
);
589 NONE
=> print
"Server closed connection unexpectedly.\n"
592 MsgOk
=> print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n")
593 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
594 | _
=> print
"Unexpected server reply.\n";
598 fun requestRmMailbox p
=
600 val (_
, bio
) = requestBio (fn () => ())
602 Msg
.send (bio
, MsgRmMailbox p
);
604 NONE
=> print
"Server closed connection unexpectedly.\n"
607 MsgOk
=> print ("The mapping for mailbox " ^ #user p ^
"@" ^ #domain p ^
" has been deleted.\n")
608 | MsgError s
=> print ("Remove failed: " ^ s ^
"\n")
609 | _
=> print
"Unexpected server reply.\n";
613 fun requestSaQuery addr
=
615 val (_
, bio
) = requestBio (fn () => ())
617 Msg
.send (bio
, MsgSaQuery addr
);
618 (case Msg
.recv bio
of
619 NONE
=> print
"Server closed connection unexpectedly.\n"
622 MsgSaStatus b
=> (print ("SpamAssassin filtering for " ^ addr ^
" is "
623 ^
(if b
then "ON" else "OFF") ^
".\n");
624 Msg
.send (bio
, MsgOk
))
625 | MsgError s
=> print ("Query failed: " ^ s ^
"\n")
626 | _
=> print
"Unexpected server reply.\n")
627 before OpenSSL
.close bio
632 val (_
, bio
) = requestBio (fn () => ())
634 Msg
.send (bio
, MsgSaSet p
);
636 NONE
=> print
"Server closed connection unexpectedly.\n"
639 MsgOk
=> print ("SpamAssassin filtering for " ^ #
1 p ^
" is now "
640 ^
(if #
2 p
then "ON" else "OFF") ^
".\n")
641 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
642 | _
=> print
"Unexpected server reply.\n";
646 fun requestSmtpLog domain
=
648 val (_
, bio
) = requestBio (fn () => ())
650 val _
= Msg
.send (bio
, MsgSmtpLogReq domain
)
654 NONE
=> print
"Server closed connection unexpectedly.\n"
658 | MsgSmtpLogRes line
=> (print line
;
660 | MsgError s
=> print ("Log search failed: " ^ s ^
"\n")
661 | _
=> print
"Unexpected server reply.\n"
667 fun requestApt
{node
, pkg
} =
669 val (user
, context
) = requestContext (fn () => ())
670 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
673 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
675 val _
= Msg
.send (bio
, MsgQuery (QApt pkg
))
679 NONE
=> (print
"Server closed connection unexpectedly.\n";
683 MsgYes
=> (print
"Package is installed.\n";
685 | MsgNo
=> (print
"Package is not installed.\n";
687 | MsgError s
=> (print ("APT query failed: " ^ s ^
"\n");
689 | _
=> (print
"Unexpected server reply.\n";
693 before OpenSSL
.close bio
696 fun requestCron
{node
, uname
} =
698 val (user
, context
) = requestContext (fn () => ())
699 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
702 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
704 val _
= Msg
.send (bio
, MsgQuery (QCron uname
))
708 NONE
=> (print
"Server closed connection unexpectedly.\n";
712 MsgYes
=> (print
"User has cron permissions.\n";
714 | MsgNo
=> (print
"User does not have cron permissions.\n";
716 | MsgError s
=> (print ("Cron query failed: " ^ s ^
"\n");
718 | _
=> (print
"Unexpected server reply.\n";
722 before OpenSSL
.close bio
725 fun requestFtp
{node
, uname
} =
727 val (user
, context
) = requestContext (fn () => ())
728 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
731 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
733 val _
= Msg
.send (bio
, MsgQuery (QFtp uname
))
737 NONE
=> (print
"Server closed connection unexpectedly.\n";
741 MsgYes
=> (print
"User has FTP permissions.\n";
743 | MsgNo
=> (print
"User does not have FTP permissions.\n";
745 | MsgError s
=> (print ("FTP query failed: " ^ s ^
"\n");
747 | _
=> (print
"Unexpected server reply.\n";
751 before OpenSSL
.close bio
754 fun requestTrustedPath
{node
, uname
} =
756 val (user
, context
) = requestContext (fn () => ())
757 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
760 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
762 val _
= Msg
.send (bio
, MsgQuery (QTrustedPath uname
))
766 NONE
=> (print
"Server closed connection unexpectedly.\n";
770 MsgYes
=> (print
"User has trusted path restriction.\n";
772 | MsgNo
=> (print
"User does not have trusted path restriction.\n";
774 | MsgError s
=> (print ("Trusted path query failed: " ^ s ^
"\n");
776 | _
=> (print
"Unexpected server reply.\n";
780 before OpenSSL
.close bio
783 fun requestSocketPerm
{node
, uname
} =
785 val (user
, context
) = requestContext (fn () => ())
786 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
789 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
791 val _
= Msg
.send (bio
, MsgQuery (QSocket uname
))
795 NONE
=> (print
"Server closed connection unexpectedly.\n";
799 MsgSocket p
=> (case p
of
801 | Client
=> print
"Client\n"
802 | Server
=> print
"Server\n"
803 | Nada
=> print
"Nada\n";
805 | MsgError s
=> (print ("Socket permission query failed: " ^ s ^
"\n");
807 | _
=> (print
"Unexpected server reply.\n";
811 before OpenSSL
.close bio
814 fun requestFirewall
{node
, uname
} =
816 val (user
, context
) = requestContext (fn () => ())
817 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
820 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
822 val _
= Msg
.send (bio
, MsgQuery (QFirewall uname
))
826 NONE
=> (print
"Server closed connection unexpectedly.\n";
830 MsgFirewall ls
=> (app (fn s
=> (print s
; print
"\n")) ls
;
832 | MsgError s
=> (print ("Firewall query failed: " ^ s ^
"\n");
834 | _
=> (print
"Unexpected server reply.\n";
838 before OpenSSL
.close bio
841 fun regenerate context
=
843 val _
= ErrorMsg
.reset ()
846 val () = Tycheck
.disallowExterns ()
848 val () = Domain
.resetGlobal ()
852 fun contactNode (node
, ip
) =
853 if node
= Config
.defaultNode
then
856 val bio
= OpenSSL
.connect (context
,
859 ^
Int.toString Config
.slavePort
)
861 Msg
.send (bio
, MsgRegenerate
);
863 NONE
=> print
"Slave closed connection unexpectedly\n"
866 MsgOk
=> print ("Slave " ^ node ^
" pre-regeneration finished\n")
867 | MsgError s
=> print ("Slave " ^ node
868 ^
" returned error: " ^
870 | _
=> print ("Slave " ^ node
871 ^
" returned unexpected command\n");
874 handle OpenSSL
.OpenSSL s
=> print ("OpenSSL error: " ^ s ^
"\n")
878 val _
= Domain
.setUser user
879 val _
= ErrorMsg
.reset ()
881 val dname
= Config
.domtoolDir user
883 if Posix
.FileSys
.access (dname
, []) then
885 val dir
= Posix
.FileSys
.opendir dname
888 case Posix
.FileSys
.readdir dir
of
889 NONE
=> (Posix
.FileSys
.closedir dir
;
893 loop (OS
.Path
.joinDirFile
{dir
= dname
,
900 val (_
, files
) = Order
.order (SOME b
) files
902 if !ErrorMsg
.anyErrors
then
904 print ("User " ^ user ^
"'s configuration has errors!\n"))
912 | OS
.SysErr (s
, _
) => (print ("System error processing user " ^ user ^
": " ^ s ^
"\n");
914 | ErrorMsg
.Error
=> (ErrorMsg
.reset ();
915 print ("User " ^ user ^
" had a compilation error.\n");
917 | _
=> (print
"Unknown exception during regeneration!\n";
920 app contactNode Config
.nodeIps
;
922 app
doUser (Acl
.users ());
927 fun regenerateTc context
=
929 val _
= ErrorMsg
.reset ()
932 val () = Tycheck
.disallowExterns ()
934 val () = Domain
.resetGlobal ()
940 val _
= Domain
.setUser user
941 val _
= ErrorMsg
.reset ()
943 val dname
= Config
.domtoolDir user
945 if Posix
.FileSys
.access (dname
, []) then
947 val dir
= Posix
.FileSys
.opendir dname
950 case Posix
.FileSys
.readdir dir
of
951 NONE
=> (Posix
.FileSys
.closedir dir
;
955 loop (OS
.Path
.joinDirFile
{dir
= dname
,
962 val (_
, files
) = Order
.order (SOME b
) files
964 if !ErrorMsg
.anyErrors
then
966 print ("User " ^ user ^
"'s configuration has errors!\n");
969 app (ignore
o check
) files
975 | OS
.SysErr (s
, _
) => print ("System error processing user " ^ user ^
": " ^ s ^
"\n")
976 | ErrorMsg
.Error
=> (ErrorMsg
.reset ();
977 print ("User " ^ user ^
" had a compilation error.\n"))
978 | _
=> print
"Unknown exception during -tc regeneration!\n"
980 app
doUser (Acl
.users ());
986 val doms
= Acl
.class
{user
= user
, class
= "domain"}
987 val doms
= List.filter (fn dom
=>
988 case Acl
.whoHas
{class
= "domain", value
= dom
} of
990 | _
=> false) (StringSet
.listItems doms
)
996 fun now () = Date
.toString (Date
.fromTimeUniv (Time
.now ()))
1000 QApt pkg
=> if Apt
.installed pkg
then MsgYes
else MsgNo
1001 | QCron user
=> if Cron
.allowed user
then MsgYes
else MsgNo
1002 | QFtp user
=> if Ftp
.allowed user
then MsgYes
else MsgNo
1003 | QTrustedPath user
=> if TrustedPath
.query user
then MsgYes
else MsgNo
1004 | QSocket user
=> MsgSocket (SocketPerm
.query user
)
1005 | QFirewall user
=> MsgFirewall (Firewall
.query user
)
1007 fun describeQuery q
=
1009 QApt pkg
=> "Requested installation status of package " ^ pkg
1010 | QCron user
=> "Asked about cron permissions for user " ^ user
1011 | QFtp user
=> "Asked about FTP permissions for user " ^ user
1012 | QTrustedPath user
=> "Asked about trusted path settings for user " ^ user
1013 | QSocket user
=> "Asked about socket permissions for user " ^ user
1014 | QFirewall user
=> "Asked about firewall rules for user " ^ user
1018 val () = Acl
.read Config
.aclFile
1020 val context
= context (Config
.serverCert
,
1023 val _
= Domain
.set_context context
1025 val sock
= OpenSSL
.listen (context
, Config
.dispatcherPort
)
1028 case OpenSSL
.accept sock
of
1032 val user
= OpenSSL
.peerCN bio
1033 val () = print ("\nConnection from " ^ user ^
" at " ^
now () ^
"\n")
1034 val () = Domain
.setUser user
1036 fun doIt f cleanup
=
1038 (msgLocal
, SOME msgRemote
) =>
1041 Msg
.send (bio
, MsgError msgRemote
))
1042 |
(msgLocal
, NONE
) =>
1045 Msg
.send (bio
, MsgOk
)))
1046 handle e
as (OpenSSL
.OpenSSL s
) =>
1047 (print ("OpenSSL error: " ^ s ^
"\n");
1048 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1049 Msg
.send (bio
, MsgError ("OpenSSL error: " ^ s
))
1050 handle OpenSSL
.OpenSSL _
=> ())
1051 | OS
.SysErr (s
, _
) =>
1052 (print
"System error: ";
1055 Msg
.send (bio
, MsgError ("System error: " ^ s
))
1056 handle OpenSSL
.OpenSSL _
=> ())
1061 Msg
.send (bio
, MsgError ("Failure: " ^ s
))
1062 handle OpenSSL
.OpenSSL _
=> ())
1064 (print
"Compilation error\n";
1065 Msg
.send (bio
, MsgError
"Error during configuration evaluation")
1066 handle OpenSSL
.OpenSSL _
=> ());
1068 ignore (OpenSSL
.readChar bio
);
1070 handle OpenSSL
.OpenSSL _
=> ();
1073 fun doConfig codes
=
1075 val _
= print
"Configuration:\n"
1076 val _
= app (fn s
=> (print s
; print
"\n")) codes
1079 val outname
= OS
.FileSys
.tmpName ()
1083 val outf
= TextIO.openOut outname
1085 TextIO.output (outf
, code
);
1086 TextIO.closeOut outf
;
1090 doIt (fn () => (Env
.pre ();
1093 Msg
.send (bio
, MsgOk
);
1094 ("Configuration complete.", NONE
)))
1095 (fn () => OS
.FileSys
.remove outname
)
1099 case String.fields (fn ch
=> ch
= #
"@") s
of
1101 if user
= user
' then
1105 |
[user
', domain
] =>
1106 if Domain
.validEmailUser user
' andalso Domain
.yourDomain domain
then
1107 SOME (SetSA
.Email s
)
1113 case Msg
.recv bio
of
1114 NONE
=> (OpenSSL
.close bio
1115 handle OpenSSL
.OpenSSL _
=> ();
1119 MsgConfig code
=> doConfig
[code
]
1120 | MsgMultiConfig codes
=> doConfig codes
1123 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1124 orelse Acl
.query
{user
= user
, class
= "priv", value
= "shutdown"} then
1125 print ("Domtool dispatcher shutting down at " ^
now () ^
"\n\n")
1127 (print
"Unauthorized shutdown command!\n";
1129 handle OpenSSL
.OpenSSL _
=> ();
1134 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1136 Acl
.write Config
.aclFile
;
1137 ("Granted permission " ^ #value acl ^
" to " ^ #user acl ^
" in " ^ #class acl ^
".",
1140 ("Unauthorized user asked to grant a permission!",
1141 SOME
"Not authorized to grant privileges"))
1146 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1148 Acl
.write Config
.aclFile
;
1149 ("Revoked permission " ^ #value acl ^
" from " ^ #user acl ^
" in " ^ #class acl ^
".",
1152 ("Unauthorized user asked to revoke a permission!",
1153 SOME
"Not authorized to revoke privileges"))
1156 | MsgListPerms user
=>
1158 (Msg
.send (bio
, MsgPerms (Acl
.queryAll user
));
1159 ("Sent permission list for user " ^ user ^
".",
1165 (Msg
.send (bio
, MsgWhoHasResponse (Acl
.whoHas perm
));
1166 ("Sent whohas response for " ^ #class perm ^
" / " ^ #value perm ^
".",
1172 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1173 orelse List.all (fn dom
=> Acl
.query
{user
= user
, class
= "domain", value
= dom
}) doms
then
1176 Acl
.revokeFromAll
{class
= "domain", value
= dom
}) doms
;
1177 Acl
.write Config
.aclFile
;
1178 ("Removed domains" ^
foldl (fn (d
, s
) => s ^
" " ^ d
) "" doms ^
".",
1181 ("Unauthorized user asked to remove a domain!",
1182 SOME
"Not authorized to remove that domain"))
1187 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1188 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1189 (if regenerate context
then
1190 ("Regenerated all configuration.",
1193 ("Error regenerating configuration!",
1194 SOME
"Error regenerating configuration! Consult /var/log/domtool.log."))
1196 ("Unauthorized user asked to regenerate!",
1197 SOME
"Not authorized to regenerate"))
1200 | MsgRegenerateTc
=>
1202 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1203 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1204 (if regenerateTc context
then
1205 ("Checked all configuration.",
1208 ("Found a compilation error!",
1209 SOME
"Found a compilation error! Consult /var/log/domtool.log."))
1211 ("Unauthorized user asked to regenerate -tc!",
1212 SOME
"Not authorized to regenerate -tc"))
1215 | MsgRmuser user
' =>
1217 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1219 Acl
.write Config
.aclFile
;
1220 ("Removed user " ^ user
' ^
".",
1223 ("Unauthorized user asked to remove a user!",
1224 SOME
"Not authorized to remove users"))
1227 | MsgCreateDbUser
{dbtype
, passwd
} =>
1229 case Dbms
.lookup dbtype
of
1230 NONE
=> ("Database user creation request with unknown datatype type " ^ dbtype
,
1231 SOME ("Unknown database type " ^ dbtype
))
1233 case #adduser handler
{user
= user
, passwd
= passwd
} of
1234 NONE
=> ("Added " ^ dbtype ^
" user " ^ user ^
".",
1237 ("Error adding a " ^ dbtype ^
" user " ^ user ^
": " ^ msg
,
1238 SOME ("Error adding user: " ^ msg
)))
1241 | MsgDbPasswd
{dbtype
, passwd
} =>
1243 case Dbms
.lookup dbtype
of
1244 NONE
=> ("Database passwd request with unknown datatype type " ^ dbtype
,
1245 SOME ("Unknown database type " ^ dbtype
))
1247 case #passwd handler
{user
= user
, passwd
= passwd
} of
1248 NONE
=> ("Changed " ^ dbtype ^
" password of user " ^ user ^
".",
1251 ("Error setting " ^ dbtype ^
" password of user " ^ user ^
": " ^ msg
,
1252 SOME ("Error adding user: " ^ msg
)))
1255 | MsgCreateDbTable
{dbtype
, dbname
} =>
1257 if Dbms
.validDbname dbname
then
1258 case Dbms
.lookup dbtype
of
1259 NONE
=> ("Database creation request with unknown datatype type " ^ dbtype
,
1260 SOME ("Unknown database type " ^ dbtype
))
1262 case #createdb handler
{user
= user
, dbname
= dbname
} of
1263 NONE
=> ("Created database " ^ user ^
"_" ^ dbname ^
".",
1265 | SOME msg
=> ("Error creating database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1266 SOME ("Error creating database: " ^ msg
))
1268 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1269 SOME ("Invalid database name " ^ dbname
)))
1272 | MsgDropDb
{dbtype
, dbname
} =>
1274 if Dbms
.validDbname dbname
then
1275 case Dbms
.lookup dbtype
of
1276 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1277 SOME ("Unknown database type " ^ dbtype
))
1279 case #dropdb handler
{user
= user
, dbname
= dbname
} of
1280 NONE
=> ("Drop database " ^ user ^
"_" ^ dbname ^
".",
1282 | SOME msg
=> ("Error dropping database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1283 SOME ("Error dropping database: " ^ msg
))
1285 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1286 SOME ("Invalid database name " ^ dbname
)))
1289 | MsgListMailboxes domain
=>
1291 if not (Domain
.yourDomain domain
) then
1292 ("User wasn't authorized to list mailboxes for " ^ domain
,
1293 SOME
"You're not authorized to configure that domain.")
1295 case Vmail
.list domain
of
1296 Vmail
.Listing users
=> (Msg
.send (bio
, MsgMailboxes users
);
1297 ("Sent mailbox list for " ^ domain
,
1299 | Vmail
.Error msg
=> ("Error listing mailboxes for " ^ domain ^
": " ^ msg
,
1303 | MsgNewMailbox
{domain
, user
= emailUser
, passwd
, mailbox
} =>
1305 if not (Domain
.yourDomain domain
) then
1306 ("User wasn't authorized to add a mailbox to " ^ domain
,
1307 SOME
"You're not authorized to configure that domain.")
1308 else if not (Domain
.validEmailUser emailUser
) then
1309 ("Invalid e-mail username " ^ emailUser
,
1310 SOME
"Invalid e-mail username")
1311 else if not (CharVector
.all
Char.isGraph passwd
) then
1312 ("Invalid password",
1313 SOME
"Invalid password; may only contain printable, non-space characters")
1314 else if not (Domain
.yourPath mailbox
) then
1315 ("User wasn't authorized to add a mailbox at " ^ mailbox
,
1316 SOME
"You're not authorized to use that mailbox location.")
1318 case Vmail
.add
{requester
= user
,
1319 domain
= domain
, user
= emailUser
,
1320 passwd
= passwd
, mailbox
= mailbox
} of
1321 NONE
=> ("Added mailbox " ^ emailUser ^
"@" ^ domain ^
" at " ^ mailbox
,
1323 | SOME msg
=> ("Error adding mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1327 | MsgPasswdMailbox
{domain
, user
= emailUser
, passwd
} =>
1329 if not (Domain
.yourDomain domain
) then
1330 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1331 SOME
"You're not authorized to configure that domain.")
1332 else if not (Domain
.validEmailUser emailUser
) then
1333 ("Invalid e-mail username " ^ emailUser
,
1334 SOME
"Invalid e-mail username")
1335 else if not (CharVector
.all
Char.isGraph passwd
) then
1336 ("Invalid password",
1337 SOME
"Invalid password; may only contain printable, non-space characters")
1339 case Vmail
.passwd
{domain
= domain
, user
= emailUser
,
1341 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1343 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1347 | MsgRmMailbox
{domain
, user
= emailUser
} =>
1349 if not (Domain
.yourDomain domain
) then
1350 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1351 SOME
"You're not authorized to configure that domain.")
1352 else if not (Domain
.validEmailUser emailUser
) then
1353 ("Invalid e-mail username " ^ emailUser
,
1354 SOME
"Invalid e-mail username")
1356 case Vmail
.rm
{domain
= domain
, user
= emailUser
} of
1357 NONE
=> ("Deleted mailbox " ^ emailUser ^
"@" ^ domain
,
1359 | SOME msg
=> ("Error deleting mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1363 | MsgSaQuery addr
=>
1365 case checkAddr addr
of
1366 NONE
=> ("User tried to query SA filtering for " ^ addr
,
1367 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1368 | SOME addr
' => (Msg
.send (bio
, MsgSaStatus (SetSA
.query addr
'));
1369 ("Queried SA filtering status for " ^ addr
,
1373 |
MsgSaSet (addr
, b
) =>
1375 case checkAddr addr
of
1376 NONE
=> ("User tried to set SA filtering for " ^ addr
,
1377 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1378 | SOME addr
' => (SetSA
.set (addr
', b
);
1379 Msg
.send (bio
, MsgOk
);
1380 ("Set SA filtering status for " ^ addr ^
" to "
1381 ^
(if b
then "ON" else "OFF"),
1385 | MsgSmtpLogReq domain
=>
1387 if not (Domain
.yourDomain domain
) then
1388 ("Unauthorized user tried to request SMTP logs for " ^ domain
,
1389 SOME
"You aren't authorized to configure that domain.")
1391 (SmtpLog
.search (fn line
=> Msg
.send (bio
, MsgSmtpLogRes line
))
1393 ("Requested SMTP logs for " ^ domain
,
1398 doIt (fn () => (Msg
.send (bio
, answerQuery q
);
1404 doIt (fn () => ("Unexpected command",
1405 SOME
"Unexpected command"))
1410 handle e
as (OpenSSL
.OpenSSL s
) =>
1411 (print ("OpenSSL error: " ^ s ^
"\n");
1412 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1414 handle OpenSSL
.OpenSSL _
=> ();
1416 | OS
.SysErr (s
, _
) =>
1417 (print ("System error: " ^ s ^
"\n");
1419 handle OpenSSL
.OpenSSL _
=> ();
1421 | IO
.Io
{name
, function
, cause
} =>
1422 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1423 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1425 handle OpenSSL
.OpenSSL _
=> ();
1428 (print
"Unknown exception in main loop!\n";
1429 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1431 handle OpenSSL
.OpenSSL _
=> ();
1434 print ("Domtool dispatcher starting up at " ^
now () ^
"\n");
1435 print
"Listening for connections....\n";
1437 OpenSSL
.shutdown sock
1442 val host
= Slave
.hostname ()
1444 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1445 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1448 val sock
= OpenSSL
.listen (context
, Config
.slavePort
)
1450 val _
= print ("Slave server starting at " ^
now () ^
"\n")
1453 case OpenSSL
.accept sock
of
1457 val peer
= OpenSSL
.peerCN bio
1458 val () = print ("\nConnection from " ^ peer ^
" at " ^
now () ^
"\n")
1460 if peer
= Config
.dispatcherName
then let
1462 case Msg
.recv bio
of
1463 NONE
=> print
"Dispatcher closed connection unexpectedly\n"
1466 MsgFile file
=> loop
' (file
:: files
)
1467 | MsgDoFiles
=> (Slave
.handleChanges files
;
1468 Msg
.send (bio
, MsgOk
))
1469 | MsgRegenerate
=> (Domain
.resetLocal ();
1470 Msg
.send (bio
, MsgOk
))
1471 | _
=> (print
"Dispatcher sent unexpected command\n";
1472 Msg
.send (bio
, MsgError
"Unexpected command"))
1475 ignore (OpenSSL
.readChar bio
);
1479 else if peer
= "domtool" then
1480 case Msg
.recv bio
of
1481 SOME MsgShutdown
=> (OpenSSL
.close bio
;
1482 print ("Shutting down at " ^
now () ^
"\n\n"))
1483 | _
=> (OpenSSL
.close bio
;
1486 case Msg
.recv bio
of
1487 SOME (MsgQuery q
) => (print (describeQuery q ^
"\n");
1488 Msg
.send (bio
, answerQuery q
);
1489 ignore (OpenSSL
.readChar bio
);
1492 | _
=> (OpenSSL
.close bio
;
1494 end handle OpenSSL
.OpenSSL s
=>
1495 (print ("OpenSSL error: "^ s ^
"\n");
1497 handle OpenSSL
.OpenSSL _
=> ();
1499 | e
as OS
.SysErr (s
, _
) =>
1500 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1501 print ("System error: "^ s ^
"\n");
1503 handle OpenSSL
.OpenSSL _
=> ();
1507 OpenSSL
.shutdown sock
1512 val dir
= Posix
.FileSys
.opendir Config
.libRoot
1515 case Posix
.FileSys
.readdir dir
of
1516 NONE
=> (Posix
.FileSys
.closedir dir
;
1519 if String.isSuffix
".dtl" fname
then
1520 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
1529 fun autodocBasis outdir
=
1530 Autodoc
.autodoc
{outdir
= outdir
, infiles
= listBasis ()}