1 (* HCoop
Domtool (http
://hcoop
.sourceforge
.net
/)
2 * Copyright (c
) 2006-2009, Adam Chlipala
4 * This program is free software
; you can redistribute it
and/or
5 * modify it under the terms
of the GNU General Public License
6 * as published by the Free Software Foundation
; either version
2
7 * of the License
, or (at your option
) any later version
.
9 * This program is distributed
in the hope that it will be useful
,
10 * but WITHOUT ANY WARRANTY
; without even the implied warranty
of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE
. See the
12 * GNU General Public License for more details
.
14 * You should have received a copy
of the GNU General Public License
15 * along
with this program
; if not
, write to the Free Software
16 * Foundation
, Inc
., 51 Franklin Street
, Fifth Floor
, Boston
, MA
02110-1301, USA
.
21 structure Main
:> MAIN
= struct
23 open Ast MsgTypes Print
25 structure SM
= StringMap
27 fun init () = Acl
.read Config
.aclFile
29 fun isLib fname
= OS
.Path
.file fname
= "lib.dtl"
31 fun wrapFile (fname
, file
) =
32 case (isLib fname
, file
) of
33 (true, (comment
, ds
, SOME e
)) =>
37 (comment
, ds
, SOME (ELocal (e
, (ESkip
, loc
)), loc
))
43 val prog
= Parse
.parse fname
44 val prog
= wrapFile (fname
, prog
)
46 if !ErrorMsg
.anyErrors
then
52 Option
.app (Unused
.check G
) (#
3 prog
);
53 Tycheck
.checkFile
G (Defaults
.tInit prog
) prog
)
58 val dir
= Posix
.FileSys
.opendir Config
.libRoot
61 case Posix
.FileSys
.readdir dir
of
62 NONE
=> (Posix
.FileSys
.closedir dir
;
65 if String.isSuffix
".dtl" fname
then
66 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
73 val (_
, files
) = Order
.order NONE files
75 if !ErrorMsg
.anyErrors
then
78 (Tycheck
.allowExterns ();
79 foldl (fn (fname
, G
) => check
' G fname
) Env
.empty files
80 before Tycheck
.disallowExterns ())
83 (* val b
= basis () *)
87 val _
= ErrorMsg
.reset ()
88 val _
= Env
.preTycheck ()
90 if !ErrorMsg
.anyErrors
then
94 val _
= Tycheck
.disallowExterns ()
95 val _
= ErrorMsg
.reset ()
96 val prog
= Parse
.parse fname
97 val prog
= wrapFile (fname
, prog
)
99 if !ErrorMsg
.anyErrors
then
103 val G
' = Tycheck
.checkFile
G (Defaults
.tInit prog
) prog
105 if !ErrorMsg
.anyErrors
then
111 Option
.app (Unused
.check G
) (#
3 prog
);
118 String.sub (s
, 0) <> #
"."
119 andalso CharVector
.all (fn ch
=> Char.isAlphaNum ch
orelse ch
= #
"." orelse ch
= #
"_" orelse ch
= #
"-") s
124 case Posix
.ProcEnv
.getenv
"DOMTOOL_USER" of
127 val uid
= Posix
.ProcEnv
.getuid ()
129 Posix
.SysDB
.Passwd
.name (Posix
.SysDB
.getpwuid uid
)
133 Acl
.read Config
.aclFile
;
138 fun checkDir
' dname
=
142 val dir
= Posix
.FileSys
.opendir dname
145 case Posix
.FileSys
.readdir dir
of
146 NONE
=> (Posix
.FileSys
.closedir dir
;
150 loop (OS
.Path
.joinDirFile
{dir
= dname
,
157 val (_
, files
) = Order
.order (SOME b
) files
159 if !ErrorMsg
.anyErrors
then
162 (foldl (fn (fname
, G
) => check
' G fname
) b files
;
163 if !ErrorMsg
.anyErrors
then
175 val (G
, body
) = check G fname
177 if !ErrorMsg
.anyErrors
then
183 val body
' = Reduce
.reduceExp G body
185 (*printd (PD
.hovBox (PD
.PPS
.Rel
0,
186 [PD
.string "Result:",
194 (*(Defaults
.eInit ())*)
196 fun eval G evs fname
=
197 case reduce G fname
of
199 if !ErrorMsg
.anyErrors
then
203 val evs
' = Eval
.exec
' evs body
'
207 |
(G
, NONE
) => (G
, evs
)
210 Config
.dispatcher ^
":" ^
Int.toString Config
.dispatcherPort
213 "localhost:" ^
Int.toString Config
.slavePort
216 (OpenSSL
.context
false x
)
217 handle e
as OpenSSL
.OpenSSL s
=>
218 (print
"Couldn't find your certificate.\nYou probably haven't been given any Domtool privileges.\n";
219 print ("I looked in: " ^ #
1 x ^
"\n");
220 print ("Additional information: " ^ s ^
"\n");
223 fun requestContext f
=
225 val user
= setupUser ()
229 val context
= context (Config
.certDir ^
"/" ^ user ^
".pem",
230 Config
.keyDir ^
"/" ^ user ^
"/key.pem",
236 fun requestBio
' printErr f
=
238 val (user
, context
) = requestContext f
240 (user
, OpenSSL
.connect
printErr (context
, dispatcher
))
243 val requestBio
= requestBio
' true
245 fun requestSlaveBio
' printErr
=
247 val (user
, context
) = requestContext (fn () => ())
249 (user
, OpenSSL
.connect
printErr (context
, self
))
252 fun requestSlaveBio () = requestSlaveBio
' true
254 fun request (fname
, libOpt
) =
256 val (user
, bio
) = requestBio (fn () =>
259 val env
= case libOpt
of
261 | SOME lib
=> #
1 (check env lib
)
263 ignore (check env fname
)
268 val inf
= TextIO.openIn fname
271 case TextIO.inputLine inf
of
272 NONE
=> String.concat (rev lines
)
273 | SOME line
=> loop (line
:: lines
)
276 before TextIO.closeIn inf
279 val code
= readFile fname
280 val msg
= case libOpt
of
281 NONE
=> MsgConfig code
282 | SOME fname
' => MsgMultiConfig
[readFile fname
', code
]
286 NONE
=> print
"Server closed connection unexpectedly.\n"
289 MsgOk
=> print
"Configuration succeeded.\n"
290 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
291 | _
=> print
"Unexpected server reply.\n";
294 handle ErrorMsg
.Error
=> ()
296 fun requestDir dname
=
298 val _
= if Posix
.FileSys
.access (dname
, []) then
301 (print ("Can't access " ^ dname ^
".\n");
302 print
"Did you mean to run domtool on a specific file, instead of asking for all\n";
303 print
"files in your ~/.domtool directory?\n";
304 OS
.Process
.exit OS
.Process
.failure
)
306 val _
= ErrorMsg
.reset ()
308 val (user
, bio
) = requestBio (fn () => checkDir
' dname
)
312 val dir
= Posix
.FileSys
.opendir dname
315 case Posix
.FileSys
.readdir dir
of
316 NONE
=> (Posix
.FileSys
.closedir dir
;
320 loop (OS
.Path
.joinDirFile
{dir
= dname
,
327 val (_
, files
) = Order
.order (SOME b
) files
329 val _
= if !ErrorMsg
.anyErrors
then
334 val codes
= map (fn fname
=>
336 val inf
= TextIO.openIn fname
339 case TextIO.inputLine inf
of
340 NONE
=> String.concat (rev lines
)
341 | SOME line
=> loop (line
:: lines
)
344 before TextIO.closeIn inf
347 if !ErrorMsg
.anyErrors
then
350 (Msg
.send (bio
, MsgMultiConfig codes
);
352 NONE
=> print
"Server closed connection unexpectedly.\n"
355 MsgOk
=> print
"Configuration succeeded.\n"
356 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
357 | _
=> print
"Unexpected server reply.\n";
360 handle ErrorMsg
.Error
=> ()
364 val (_
, bio
) = requestBio
' false (fn () => ())
369 handle _
=> OS
.Process
.failure
371 fun requestShutdown () =
373 val (_
, bio
) = requestBio (fn () => ())
375 Msg
.send (bio
, MsgShutdown
);
380 MsgOk
=> print
"Shutdown begun.\n"
381 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
382 | _
=> print
"Unexpected server reply.\n";
386 fun requestSlavePing () =
388 val (_
, bio
) = requestSlaveBio
' false
393 handle _
=> OS
.Process
.failure
395 fun requestSlaveShutdown () =
397 val (_
, bio
) = requestSlaveBio ()
399 Msg
.send (bio
, MsgShutdown
);
404 MsgOk
=> print
"Shutdown begun.\n"
405 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
406 | _
=> print
"Unexpected server reply.\n";
410 fun requestGrant acl
=
412 val (user
, bio
) = requestBio (fn () => ())
414 Msg
.send (bio
, MsgGrant acl
);
416 NONE
=> print
"Server closed connection unexpectedly.\n"
419 MsgOk
=> print
"Grant succeeded.\n"
420 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
421 | _
=> print
"Unexpected server reply.\n";
425 fun requestRevoke acl
=
427 val (user
, bio
) = requestBio (fn () => ())
429 Msg
.send (bio
, MsgRevoke acl
);
431 NONE
=> print
"Server closed connection unexpectedly.\n"
434 MsgOk
=> print
"Revoke succeeded.\n"
435 | MsgError s
=> print ("Revoke failed: " ^ s ^
"\n")
436 | _
=> print
"Unexpected server reply.\n";
440 fun requestListPerms user
=
442 val (_
, bio
) = requestBio (fn () => ())
444 Msg
.send (bio
, MsgListPerms user
);
445 (case Msg
.recv bio
of
446 NONE
=> (print
"Server closed connection unexpectedly.\n";
450 MsgPerms perms
=> SOME perms
451 | MsgError s
=> (print ("Listing failed: " ^ s ^
"\n");
453 | _
=> (print
"Unexpected server reply.\n";
455 before OpenSSL
.close bio
458 fun requestWhoHas perm
=
460 val (_
, bio
) = requestBio (fn () => ())
462 Msg
.send (bio
, MsgWhoHas perm
);
463 (case Msg
.recv bio
of
464 NONE
=> (print
"Server closed connection unexpectedly.\n";
468 MsgWhoHasResponse users
=> SOME users
469 | MsgError s
=> (print ("whohas failed: " ^ s ^
"\n");
471 | _
=> (print
"Unexpected server reply.\n";
473 before OpenSSL
.close bio
476 fun requestRegen () =
478 val (_
, bio
) = requestBio (fn () => ())
480 Msg
.send (bio
, MsgRegenerate
);
482 NONE
=> print
"Server closed connection unexpectedly.\n"
485 MsgOk
=> print
"Regeneration succeeded.\n"
486 | MsgError s
=> print ("Regeneration failed: " ^ s ^
"\n")
487 | _
=> print
"Unexpected server reply.\n";
491 fun requestRegenTc () =
493 val (_
, bio
) = requestBio (fn () => ())
495 Msg
.send (bio
, MsgRegenerateTc
);
497 NONE
=> print
"Server closed connection unexpectedly.\n"
500 MsgOk
=> print
"All configuration validated.\n"
501 | MsgError s
=> print ("Configuration validation failed: " ^ s ^
"\n")
502 | _
=> print
"Unexpected server reply.\n";
506 fun requestRmdom dom
=
508 val (_
, bio
) = requestBio (fn () => ())
510 Msg
.send (bio
, MsgRmdom dom
);
512 NONE
=> print
"Server closed connection unexpectedly.\n"
515 MsgOk
=> print
"Removal succeeded.\n"
516 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
517 | _
=> print
"Unexpected server reply.\n";
521 fun requestRmuser user
=
523 val (_
, bio
) = requestBio (fn () => ())
525 Msg
.send (bio
, MsgRmuser user
);
527 NONE
=> print
"Server closed connection unexpectedly.\n"
530 MsgOk
=> print
"Removal succeeded.\n"
531 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
532 | _
=> print
"Unexpected server reply.\n";
536 fun requestDbUser dbtype
=
538 val (_
, context
) = requestContext (fn () => ())
539 val bio
= OpenSSL
.connect
true (context
,
540 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
542 Msg
.send (bio
, MsgCreateDbUser dbtype
);
544 NONE
=> print
"Server closed connection unexpectedly.\n"
547 MsgOk
=> print
"Your user has been created.\n"
548 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
549 | _
=> print
"Unexpected server reply.\n";
553 fun requestDbPasswd rc
=
555 val (_
, context
) = requestContext (fn () => ())
556 val bio
= OpenSSL
.connect
true (context
,
557 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
559 Msg
.send (bio
, MsgDbPasswd rc
);
561 NONE
=> print
"Server closed connection unexpectedly.\n"
564 MsgOk
=> print
"Your password has been changed.\n"
565 | MsgError s
=> print ("Password set failed: " ^ s ^
"\n")
566 | _
=> print
"Unexpected server reply.\n";
570 fun requestDbTable p
=
572 val (user
, context
) = requestContext (fn () => ())
573 val bio
= OpenSSL
.connect
true (context
,
574 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
576 Msg
.send (bio
, MsgCreateDb p
);
578 NONE
=> print
"Server closed connection unexpectedly.\n"
581 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been created.\n")
582 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
583 | _
=> print
"Unexpected server reply.\n";
587 fun requestDbDrop p
=
589 val (user
, context
) = requestContext (fn () => ())
590 val bio
= OpenSSL
.connect
true (context
,
591 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
593 Msg
.send (bio
, MsgDropDb p
);
595 NONE
=> print
"Server closed connection unexpectedly.\n"
598 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been dropped.\n")
599 | MsgError s
=> print ("Drop failed: " ^ s ^
"\n")
600 | _
=> print
"Unexpected server reply.\n";
604 fun requestDbGrant p
=
606 val (user
, context
) = requestContext (fn () => ())
607 val bio
= OpenSSL
.connect
true (context
,
608 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
610 Msg
.send (bio
, MsgGrantDb p
);
612 NONE
=> print
"Server closed connection unexpectedly.\n"
615 MsgOk
=> print ("You've been granted all allowed privileges to database " ^ user ^
"_" ^ #dbname p ^
".\n")
616 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
617 | _
=> print
"Unexpected server reply.\n";
621 fun requestListMailboxes domain
=
623 val (_
, bio
) = requestBio (fn () => ())
625 Msg
.send (bio
, MsgListMailboxes domain
);
626 (case Msg
.recv bio
of
627 NONE
=> Vmail
.Error
"Server closed connection unexpectedly."
630 MsgMailboxes users
=> (Msg
.send (bio
, MsgOk
);
632 | MsgError s
=> Vmail
.Error ("Listing failed: " ^ s
)
633 | _
=> Vmail
.Error
"Unexpected server reply.")
634 before OpenSSL
.close bio
637 fun requestNewMailbox p
=
639 val (_
, bio
) = requestBio (fn () => ())
641 Msg
.send (bio
, MsgNewMailbox p
);
643 NONE
=> print
"Server closed connection unexpectedly.\n"
646 MsgOk
=> print ("A mapping for " ^ #user p ^
"@" ^ #domain p ^
" has been created.\n")
647 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
648 | _
=> print
"Unexpected server reply.\n";
652 fun requestPasswdMailbox p
=
654 val (_
, bio
) = requestBio (fn () => ())
656 Msg
.send (bio
, MsgPasswdMailbox p
);
658 NONE
=> print
"Server closed connection unexpectedly.\n"
661 MsgOk
=> print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n")
662 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
663 | _
=> print
"Unexpected server reply.\n";
667 fun requestRmMailbox p
=
669 val (_
, bio
) = requestBio (fn () => ())
671 Msg
.send (bio
, MsgRmMailbox p
);
673 NONE
=> print
"Server closed connection unexpectedly.\n"
676 MsgOk
=> print ("The mapping for mailbox " ^ #user p ^
"@" ^ #domain p ^
" has been deleted.\n")
677 | MsgError s
=> print ("Remove failed: " ^ s ^
"\n")
678 | _
=> print
"Unexpected server reply.\n";
682 fun requestSaQuery addr
=
684 val (_
, bio
) = requestBio (fn () => ())
686 Msg
.send (bio
, MsgSaQuery addr
);
687 (case Msg
.recv bio
of
688 NONE
=> print
"Server closed connection unexpectedly.\n"
691 MsgSaStatus b
=> (print ("SpamAssassin filtering for " ^ addr ^
" is "
692 ^
(if b
then "ON" else "OFF") ^
".\n");
693 Msg
.send (bio
, MsgOk
))
694 | MsgError s
=> print ("Query failed: " ^ s ^
"\n")
695 | _
=> print
"Unexpected server reply.\n")
696 before OpenSSL
.close bio
701 val (_
, bio
) = requestBio (fn () => ())
703 Msg
.send (bio
, MsgSaSet p
);
705 NONE
=> print
"Server closed connection unexpectedly.\n"
708 MsgOk
=> print ("SpamAssassin filtering for " ^ #
1 p ^
" is now "
709 ^
(if #
2 p
then "ON" else "OFF") ^
".\n")
710 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
711 | _
=> print
"Unexpected server reply.\n";
715 fun requestSmtpLog domain
=
717 val (_
, bio
) = requestBio (fn () => ())
719 val _
= Msg
.send (bio
, MsgSmtpLogReq domain
)
723 NONE
=> print
"Server closed connection unexpectedly.\n"
727 | MsgSmtpLogRes line
=> (print line
;
729 | MsgError s
=> print ("Log search failed: " ^ s ^
"\n")
730 | _
=> print
"Unexpected server reply.\n"
736 fun requestMysqlFixperms () =
738 val (_
, context
) = requestContext (fn () => ())
739 val bio
= OpenSSL
.connect
true (context
,
740 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
742 Msg
.send (bio
, MsgMysqlFixperms
);
744 NONE
=> print
"Server closed connection unexpectedly.\n"
747 MsgOk
=> print
"Permissions granted.\n"
748 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
749 | _
=> print
"Unexpected server reply.\n";
753 fun requestApt
{node
, pkg
} =
755 val (user
, context
) = requestContext (fn () => ())
756 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
759 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
761 val _
= Msg
.send (bio
, MsgQuery (QApt pkg
))
765 NONE
=> (print
"Server closed connection unexpectedly.\n";
769 MsgYes
=> (print
"Package is installed.\n";
771 | MsgNo
=> (print
"Package is not installed.\n";
773 | MsgError s
=> (print ("APT query failed: " ^ s ^
"\n");
775 | _
=> (print
"Unexpected server reply.\n";
779 before OpenSSL
.close bio
782 fun requestAptExists
{node
, pkg
} =
784 val (user
, context
) = requestContext (fn () => ())
785 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
788 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
790 val _
= Msg
.send (bio
, MsgQuery (QAptExists pkg
))
794 NONE
=> (print
"Server closed connection unexpectedly.\n";
798 MsgAptQuery
{section
,description
} => (print
"Package exists.\n";
799 print ("Section: " ^ section ^
"\n");
800 print ("Description: " ^ description ^
"\n");
802 | MsgNo
=> (print
"Package does not exist.\n";
804 (* It might be the Wrong
Thing (tm
) to use MsgNo like this
*))
805 | MsgError s
=> (print ("APT existence query failed: " ^ s ^
"\n");
807 | _
=> (print
"Unexpected server reply.\n";
811 before OpenSSL
.close bio
814 fun requestCron
{node
, uname
} =
816 val (user
, context
) = requestContext (fn () => ())
817 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
820 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
822 val _
= Msg
.send (bio
, MsgQuery (QCron uname
))
826 NONE
=> (print
"Server closed connection unexpectedly.\n";
830 MsgYes
=> (print
"User has cron permissions.\n";
832 | MsgNo
=> (print
"User does not have cron permissions.\n";
834 | MsgError s
=> (print ("Cron query failed: " ^ s ^
"\n");
836 | _
=> (print
"Unexpected server reply.\n";
840 before OpenSSL
.close bio
843 fun requestFtp
{node
, uname
} =
845 val (user
, context
) = requestContext (fn () => ())
846 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
849 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
851 val _
= Msg
.send (bio
, MsgQuery (QFtp uname
))
855 NONE
=> (print
"Server closed connection unexpectedly.\n";
859 MsgYes
=> (print
"User has FTP permissions.\n";
861 | MsgNo
=> (print
"User does not have FTP permissions.\n";
863 | MsgError s
=> (print ("FTP query failed: " ^ s ^
"\n");
865 | _
=> (print
"Unexpected server reply.\n";
869 before OpenSSL
.close bio
872 fun requestTrustedPath
{node
, uname
} =
874 val (user
, context
) = requestContext (fn () => ())
875 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
878 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
880 val _
= Msg
.send (bio
, MsgQuery (QTrustedPath uname
))
884 NONE
=> (print
"Server closed connection unexpectedly.\n";
888 MsgYes
=> (print
"User has trusted path restriction.\n";
890 | MsgNo
=> (print
"User does not have trusted path restriction.\n";
892 | MsgError s
=> (print ("Trusted path query failed: " ^ s ^
"\n");
894 | _
=> (print
"Unexpected server reply.\n";
898 before OpenSSL
.close bio
901 fun requestSocketPerm
{node
, uname
} =
903 val (user
, context
) = requestContext (fn () => ())
904 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
907 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
909 val _
= Msg
.send (bio
, MsgQuery (QSocket uname
))
913 NONE
=> (print
"Server closed connection unexpectedly.\n";
917 MsgSocket p
=> (case p
of
919 | Client
=> print
"Client\n"
920 | Server
=> print
"Server\n"
921 | Nada
=> print
"Nada\n";
923 | MsgError s
=> (print ("Socket permission query failed: " ^ s ^
"\n");
925 | _
=> (print
"Unexpected server reply.\n";
929 before OpenSSL
.close bio
932 fun requestFirewall
{node
, uname
} =
934 val (user
, context
) = requestContext (fn () => ())
935 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
938 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
940 val _
= Msg
.send (bio
, MsgQuery (QFirewall
{node
= node
, user
= uname
}))
944 NONE
=> (print
"Server closed connection unexpectedly.\n";
948 MsgFirewall ls
=> (app (fn s
=> (print s
; print
"\n")) ls
;
950 | MsgError s
=> (print ("Firewall query failed: " ^ s ^
"\n");
952 | _
=> (print
"Unexpected server reply.\n";
956 before OpenSSL
.close bio
959 fun requestDescribe dom
=
961 val (_
, bio
) = requestBio (fn () => ())
963 Msg
.send (bio
, MsgDescribe dom
);
965 NONE
=> print
"Server closed connection unexpectedly.\n"
968 MsgDescription s
=> print s
969 | MsgError s
=> print ("Description failed: " ^ s ^
"\n")
970 | _
=> print
"Unexpected server reply.\n";
974 fun requestReUsers () =
976 val (_
, bio
) = requestBio (fn () => ())
978 Msg
.send (bio
, MsgReUsers
);
980 NONE
=> print
"Server closed connection unexpectedly.\n"
983 MsgOk
=> print
"Callbacks run.\n"
984 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
985 | _
=> print
"Unexpected server reply.\n";
989 fun requestFirewallRegen node
=
991 val (user
, context
) = requestContext (fn () => ())
992 val bio
= OpenSSL
.connect
true (context
, Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
993 (* Only supporting on slave nodes
*)
995 val _
= Msg
.send (bio
, MsgFirewallRegen
)
997 fun handleResult () =
999 NONE
=> (print
"Server closed connection unexpectedly.\n";
1003 MsgOk
=> (print
"Firewall regenerated.\n";
1005 | MsgError s
=> (print ("Firewall regeneration failed: " ^ s ^
"\n");
1007 | _
=> (print
"Unexpected server reply.\n";
1011 before OpenSSL
.close bio
1014 structure SS
= StringSet
1016 fun domainList dname
=
1018 val dir
= Posix
.FileSys
.opendir dname
1020 fun visitNode dset
=
1021 case Posix
.FileSys
.readdir dir
of
1025 val path
= OS
.Path
.joinDirFile
{dir
= dname
,
1028 fun visitDomains (path
, bfor
, dset
) =
1030 val dir
= Posix
.FileSys
.opendir path
1033 case Posix
.FileSys
.readdir dir
of
1037 val path
= OS
.Path
.joinDirFile
{dir
= path
,
1040 if Posix
.FileSys
.ST
.isDir (Posix
.FileSys
.stat path
) then
1042 val bfor
= dname
:: bfor
1044 loop (visitDomains (path
, bfor
,
1046 String.concatWith
"." bfor
)))
1053 before Posix
.FileSys
.closedir dir
1056 visitNode (visitDomains (path
, [], dset
))
1060 before Posix
.FileSys
.closedir dir
1063 fun regenerateEither tc checker context
=
1065 val () = print
"Starting regeneration....\n"
1071 domainList Config
.resultRoot
1079 val _
= ErrorMsg
.reset ()
1082 val () = Tycheck
.disallowExterns ()
1084 val () = ifReal (fn () =>
1085 (ignore (OS
.Process
.system ("rm -rf " ^ Config
.oldResultRoot ^
"/*"));
1086 ignore (OS
.Process
.system ("cp -r " ^ Config
.resultRoot
1087 ^
"/* " ^ Config
.oldResultRoot ^
"/"));
1088 Domain
.resetGlobal ()))
1092 fun contactNode (node
, ip
) =
1093 if node
= Config
.defaultNode
then
1094 Domain
.resetLocal ()
1096 val bio
= OpenSSL
.connect
true (context
,
1099 ^
Int.toString Config
.slavePort
)
1101 Msg
.send (bio
, MsgRegenerate
);
1102 case Msg
.recv bio
of
1103 NONE
=> print
"Slave closed connection unexpectedly\n"
1106 MsgOk
=> print ("Slave " ^ node ^
" pre-regeneration finished\n")
1107 | MsgError s
=> print ("Slave " ^ node
1108 ^
" returned error: " ^
1110 | _
=> print ("Slave " ^ node
1111 ^
" returned unexpected command\n");
1114 handle OpenSSL
.OpenSSL s
=> print ("OpenSSL error: " ^ s ^
"\n")
1118 val _
= Domain
.setUser user
1119 val _
= ErrorMsg
.reset ()
1121 val dname
= Config
.domtoolDir user
1123 if Posix
.FileSys
.access (dname
, []) then
1125 val dir
= Posix
.FileSys
.opendir dname
1128 case Posix
.FileSys
.readdir dir
of
1129 NONE
=> (Posix
.FileSys
.closedir dir
;
1132 if notTmp fname
then
1133 loop (OS
.Path
.joinDirFile
{dir
= dname
,
1140 val (_
, files
) = Order
.order (SOME b
) files
1142 fun checker
' (file
, (G
, evs
)) =
1145 if !ErrorMsg
.anyErrors
then
1147 print ("User " ^ user ^
"'s configuration has errors!\n");
1151 ignore (foldl checker
' (basis (), Defaults
.eInit ()) files
)
1153 else if String.isSuffix
"_admin" user
then
1156 (print ("Couldn't access " ^ user ^
"'s ~/.domtool directory.\n");
1159 handle IO
.Io
{name
, function
, ...} =>
1160 (print ("IO error processing user " ^ user ^
": " ^ function ^
": " ^ name ^
"\n");
1162 | exn
as OS
.SysErr (s
, _
) => (print ("System error processing user " ^ user ^
": " ^ s ^
"\n");
1164 | ErrorMsg
.Error
=> (ErrorMsg
.reset ();
1165 print ("User " ^ user ^
" had a compilation error.\n");
1167 | _
=> (print
"Unknown exception during regeneration!\n";
1170 ifReal (fn () => (app contactNode Config
.nodeIps
;
1172 app
doUser (Acl
.users ());
1175 val domainsAfter
= domainList Config
.resultRoot
1176 val domainsGone
= SS
.difference (domainsBefore
, domainsAfter
)
1178 if SS
.isEmpty domainsGone
then
1181 (print
"Domains to kill:";
1182 SS
.app (fn s
=> (print
" "; print s
)) domainsGone
;
1185 Domain
.rmdom
' Config
.oldResultRoot (SS
.listItems domainsGone
));
1192 val regenerate
= regenerateEither
false eval
1193 val regenerateTc
= regenerateEither
true
1194 (fn G
=> fn evs
=> fn file
=>
1195 (#
1 (check G file
), evs
))
1197 fun usersChanged () =
1198 (Domain
.onUsersChange ();
1199 ignore (OS
.Process
.system Config
.publish_reusers
))
1203 val doms
= Acl
.class
{user
= user
, class
= "domain"}
1204 val doms
= List.filter (fn dom
=>
1205 case Acl
.whoHas
{class
= "domain", value
= dom
} of
1207 | _
=> false) (StringSet
.listItems doms
)
1214 fun now () = Date
.toString (Date
.fromTimeUniv (Time
.now ()))
1218 QApt pkg
=> if Apt
.installed pkg
then MsgYes
else MsgNo
1219 | QAptExists pkg
=> (case Apt
.info pkg
of
1220 SOME
{section
, description
} => MsgAptQuery
{section
= section
, description
= description
}
1222 | QCron user
=> if Cron
.allowed user
then MsgYes
else MsgNo
1223 | QFtp user
=> if Ftp
.allowed user
then MsgYes
else MsgNo
1224 | QTrustedPath user
=> if TrustedPath
.query user
then MsgYes
else MsgNo
1225 | QSocket user
=> MsgSocket (SocketPerm
.query user
)
1226 | QFirewall
{node
, user
} => MsgFirewall (Firewall
.query (node
, user
))
1228 fun describeQuery q
=
1230 QApt pkg
=> "Requested installation status of package " ^ pkg
1231 | QAptExists pkg
=> "Requested if package " ^ pkg ^
" exists"
1232 | QCron user
=> "Asked about cron permissions for user " ^ user
1233 | QFtp user
=> "Asked about FTP permissions for user " ^ user
1234 | QTrustedPath user
=> "Asked about trusted path settings for user " ^ user
1235 | QSocket user
=> "Asked about socket permissions for user " ^ user
1236 | QFirewall
{node
, user
} => "Asked about firewall rules on " ^ node ^
" for user " ^ user
1238 fun doIt
' loop bio f cleanup
=
1240 (msgLocal
, SOME msgRemote
) =>
1243 Msg
.send (bio
, MsgError msgRemote
))
1244 |
(msgLocal
, NONE
) =>
1247 Msg
.send (bio
, MsgOk
)))
1248 handle e
as (OpenSSL
.OpenSSL s
) =>
1249 (print ("OpenSSL error: " ^ s ^
"\n");
1250 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1251 Msg
.send (bio
, MsgError ("OpenSSL error: " ^ s
))
1252 handle OpenSSL
.OpenSSL _
=> ())
1253 | OS
.SysErr (s
, _
) =>
1254 (print
"System error: ";
1257 Msg
.send (bio
, MsgError ("System error: " ^ s
))
1258 handle OpenSSL
.OpenSSL _
=> ())
1263 Msg
.send (bio
, MsgError ("Failure: " ^ s
))
1264 handle OpenSSL
.OpenSSL _
=> ())
1266 (print
"Compilation error\n";
1267 Msg
.send (bio
, MsgError
"Error during configuration evaluation")
1268 handle OpenSSL
.OpenSSL _
=> ());
1270 ignore (OpenSSL
.readChar bio
);
1272 handle OpenSSL
.OpenSSL _
=> ();
1277 val host
= Slave
.hostname ()
1279 val () = Acl
.read Config
.aclFile
1281 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1282 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1284 val _
= Domain
.set_context context
1286 val sock
= OpenSSL
.listen (context
, Config
.dispatcherPort
)
1289 (case OpenSSL
.accept sock
of
1293 val user
= OpenSSL
.peerCN bio
1294 val () = print ("\nConnection from " ^ user ^
" at " ^
now () ^
"\n")
1295 val () = Domain
.setUser user
1296 val doIt
= doIt
' loop bio
1298 fun doConfig codes
=
1300 val _
= print
"Configuration:\n"
1301 val _
= app (fn s
=> (print s
; print
"\n")) codes
1304 val outname
= OS
.FileSys
.tmpName ()
1306 fun doOne (code
, (G
, evs
)) =
1308 val outf
= TextIO.openOut outname
1310 TextIO.output (outf
, code
);
1311 TextIO.closeOut outf
;
1315 doIt (fn () => (Env
.pre ();
1316 ignore (foldl
doOne (basis (), Defaults
.eInit ()) codes
);
1318 Msg
.send (bio
, MsgOk
);
1319 ("Configuration complete.", NONE
)))
1320 (fn () => OS
.FileSys
.remove outname
)
1324 case String.fields (fn ch
=> ch
= #
"@") s
of
1326 if user
= user
' then
1330 |
[user
', domain
] =>
1331 if Domain
.validEmailUser user
' andalso Domain
.yourDomain domain
then
1332 SOME (SetSA
.Email s
)
1338 case Msg
.recv bio
of
1339 NONE
=> (OpenSSL
.close bio
1340 handle OpenSSL
.OpenSSL _
=> ();
1344 MsgConfig code
=> doConfig
[code
]
1345 | MsgMultiConfig codes
=> doConfig codes
1348 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1349 orelse Acl
.query
{user
= user
, class
= "priv", value
= "shutdown"} then
1350 print ("Domtool dispatcher shutting down at " ^
now () ^
"\n\n")
1352 (print
"Unauthorized shutdown command!\n";
1354 handle OpenSSL
.OpenSSL _
=> ();
1359 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1361 Acl
.write Config
.aclFile
;
1362 if #class acl
= "user" then
1366 ("Granted permission " ^ #value acl ^
" to " ^ #user acl ^
" in " ^ #class acl ^
".",
1369 ("Unauthorized user asked to grant a permission!",
1370 SOME
"Not authorized to grant privileges"))
1375 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1377 Acl
.write Config
.aclFile
;
1378 ("Revoked permission " ^ #value acl ^
" from " ^ #user acl ^
" in " ^ #class acl ^
".",
1381 ("Unauthorized user asked to revoke a permission!",
1382 SOME
"Not authorized to revoke privileges"))
1385 | MsgListPerms user
=>
1387 (Msg
.send (bio
, MsgPerms (Acl
.queryAll user
));
1388 ("Sent permission list for user " ^ user ^
".",
1394 (Msg
.send (bio
, MsgWhoHasResponse (Acl
.whoHas perm
));
1395 ("Sent whohas response for " ^ #class perm ^
" / " ^ #value perm ^
".",
1401 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1402 orelse List.all (fn dom
=> Domain
.validDomain dom
1403 andalso Acl
.queryDomain
{user
= user
, domain
= dom
}) doms
then
1406 Acl
.revokeFromAll
{class
= "domain", value
= dom
}) doms
;
1407 Acl
.write Config
.aclFile
;*)
1408 ("Removed domains" ^
foldl (fn (d
, s
) => s ^
" " ^ d
) "" doms ^
".",
1411 ("Unauthorized user asked to remove a domain!",
1412 SOME
"Not authorized to remove that domain"))
1417 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1418 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1419 (if regenerate context
then
1420 ("Regenerated all configuration.",
1423 ("Error regenerating configuration!",
1424 SOME
"Error regenerating configuration! Consult /var/log/domtool.log."))
1426 ("Unauthorized user asked to regenerate!",
1427 SOME
"Not authorized to regenerate"))
1430 | MsgRegenerateTc
=>
1432 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1433 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1434 (if regenerateTc context
then
1435 ("Checked all configuration.",
1438 ("Found a compilation error!",
1439 SOME
"Found a compilation error! Consult /var/log/domtool.log."))
1441 ("Unauthorized user asked to regenerate -tc!",
1442 SOME
"Not authorized to regenerate -tc"))
1445 | MsgRmuser user
' =>
1447 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1449 Acl
.write Config
.aclFile
;
1450 ("Removed user " ^ user
' ^
".",
1453 ("Unauthorized user asked to remove a user!",
1454 SOME
"Not authorized to remove users"))
1457 | MsgListMailboxes domain
=>
1459 if not (Domain
.yourDomain domain
) then
1460 ("User wasn't authorized to list mailboxes for " ^ domain
,
1461 SOME
"You're not authorized to configure that domain.")
1463 case Vmail
.list domain
of
1464 Vmail
.Listing users
=> (Msg
.send (bio
, MsgMailboxes users
);
1465 ("Sent mailbox list for " ^ domain
,
1467 | Vmail
.Error msg
=> ("Error listing mailboxes for " ^ domain ^
": " ^ msg
,
1471 | MsgNewMailbox
{domain
, user
= emailUser
, passwd
, mailbox
} =>
1473 if not (Domain
.yourDomain domain
) then
1474 ("User wasn't authorized to add a mailbox to " ^ domain
,
1475 SOME
"You're not authorized to configure that domain.")
1476 else if not (Domain
.validEmailUser emailUser
) then
1477 ("Invalid e-mail username " ^ emailUser
,
1478 SOME
"Invalid e-mail username")
1479 else if not (CharVector
.all
Char.isGraph passwd
) then
1480 ("Invalid password",
1481 SOME
"Invalid password; may only contain printable, non-space characters")
1482 else if not (Domain
.yourPath mailbox
) then
1483 ("User wasn't authorized to add a mailbox at " ^ mailbox
,
1484 SOME ("You're not authorized to use that mailbox location. ("
1487 case Vmail
.add
{requester
= user
,
1488 domain
= domain
, user
= emailUser
,
1489 passwd
= passwd
, mailbox
= mailbox
} of
1490 NONE
=> ("Added mailbox " ^ emailUser ^
"@" ^ domain ^
" at " ^ mailbox
,
1492 | SOME msg
=> ("Error adding mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1496 | MsgPasswdMailbox
{domain
, user
= emailUser
, passwd
} =>
1498 if not (Domain
.yourDomain domain
) then
1499 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1500 SOME
"You're not authorized to configure that domain.")
1501 else if not (Domain
.validEmailUser emailUser
) then
1502 ("Invalid e-mail username " ^ emailUser
,
1503 SOME
"Invalid e-mail username")
1504 else if not (CharVector
.all
Char.isGraph passwd
) then
1505 ("Invalid password",
1506 SOME
"Invalid password; may only contain printable, non-space characters")
1508 case Vmail
.passwd
{domain
= domain
, user
= emailUser
,
1510 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1512 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1516 | MsgRmMailbox
{domain
, user
= emailUser
} =>
1518 if not (Domain
.yourDomain domain
) then
1519 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1520 SOME
"You're not authorized to configure that domain.")
1521 else if not (Domain
.validEmailUser emailUser
) then
1522 ("Invalid e-mail username " ^ emailUser
,
1523 SOME
"Invalid e-mail username")
1525 case Vmail
.rm
{domain
= domain
, user
= emailUser
} of
1526 NONE
=> ("Deleted mailbox " ^ emailUser ^
"@" ^ domain
,
1528 | SOME msg
=> ("Error deleting mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1532 | MsgSaQuery addr
=>
1534 case checkAddr addr
of
1535 NONE
=> ("User tried to query SA filtering for " ^ addr
,
1536 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1537 | SOME addr
' => (Msg
.send (bio
, MsgSaStatus (SetSA
.query addr
'));
1538 ("Queried SA filtering status for " ^ addr
,
1542 |
MsgSaSet (addr
, b
) =>
1544 case checkAddr addr
of
1545 NONE
=> ("User tried to set SA filtering for " ^ addr
,
1546 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1547 | SOME addr
' => (SetSA
.set (addr
', b
);
1548 Msg
.send (bio
, MsgOk
);
1549 ("Set SA filtering status for " ^ addr ^
" to "
1550 ^
(if b
then "ON" else "OFF"),
1554 | MsgSmtpLogReq domain
=>
1556 if not (Domain
.yourDomain domain
) then
1557 ("Unauthorized user tried to request SMTP logs for " ^ domain
,
1558 SOME
"You aren't authorized to configure that domain.")
1560 (SmtpLog
.search (fn line
=> Msg
.send (bio
, MsgSmtpLogRes line
))
1562 ("Requested SMTP logs for " ^ domain
,
1567 doIt (fn () => (Msg
.send (bio
, answerQuery q
);
1571 | MsgDescribe dom
=>
1572 doIt (fn () => if not (Domain
.validDomain dom
) then
1573 ("Requested description of invalid domain " ^ dom
,
1574 SOME
"Invalid domain name")
1575 else if not (Domain
.yourDomain dom
1576 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"}) then
1577 ("Requested description of " ^ dom ^
", but not allowed access",
1578 SOME
"Access denied")
1580 (Msg
.send (bio
, MsgDescription (Domain
.describe dom
));
1581 ("Sent description of domain " ^ dom
,
1586 doIt (fn () => if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1587 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1589 ("Users change callbacks run", NONE
))
1591 ("Unauthorized user asked to reusers!",
1592 SOME
"You aren't authorized to regenerate files."))
1596 doIt (fn () => ("Unexpected command",
1597 SOME
"Unexpected command"))
1602 handle e
as (OpenSSL
.OpenSSL s
) =>
1603 (print ("OpenSSL error: " ^ s ^
"\n");
1604 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1606 handle OpenSSL
.OpenSSL _
=> ();
1608 | OS
.SysErr (s
, _
) =>
1609 (print ("System error: " ^ s ^
"\n");
1611 handle OpenSSL
.OpenSSL _
=> ();
1613 | IO
.Io
{name
, function
, cause
} =>
1614 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1615 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1617 handle OpenSSL
.OpenSSL _
=> ();
1619 | OS
.Path
.InvalidArc
=>
1620 (print
"Invalid arc\n";
1622 handle OpenSSL
.OpenSSL _
=> ();
1625 (print
"Unknown exception in main loop!\n";
1626 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1628 handle OpenSSL
.OpenSSL _
=> ();
1630 handle e
as (OpenSSL
.OpenSSL s
) =>
1631 (print ("OpenSSL error: " ^ s ^
"\n");
1632 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1634 | OS
.SysErr (s
, _
) =>
1635 (print ("System error: " ^ s ^
"\n");
1637 | IO
.Io
{name
, function
, cause
} =>
1638 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1639 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1642 (print
"Unknown exception in main loop!\n";
1643 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1646 print ("Domtool dispatcher starting up at " ^
now () ^
"\n");
1647 print
"Listening for connections....\n";
1649 OpenSSL
.shutdown sock
1654 val host
= Slave
.hostname ()
1656 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1657 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1660 val sock
= OpenSSL
.listen (context
, Config
.slavePort
)
1662 val _
= print ("Slave server starting at " ^
now () ^
"\n")
1665 (case OpenSSL
.accept sock
of
1669 val peer
= OpenSSL
.peerCN bio
1670 val () = print ("\nConnection from " ^ peer ^
" at " ^
now () ^
"\n")
1672 if peer
= Config
.dispatcherName
then let
1674 case Msg
.recv bio
of
1675 NONE
=> print
"Dispatcher closed connection unexpectedly\n"
1678 MsgFile file
=> loop
' (file
:: files
)
1679 | MsgDoFiles
=> (Slave
.handleChanges files
;
1680 Msg
.send (bio
, MsgOk
))
1681 | MsgRegenerate
=> (Domain
.resetLocal ();
1682 Msg
.send (bio
, MsgOk
))
1683 | MsgVmailChanged
=> (if Vmail
.doChanged () then
1684 Msg
.send (bio
, MsgOk
)
1686 Msg
.send (bio
, MsgError
"userdb update failed"))
1687 | _
=> (print
"Dispatcher sent unexpected command\n";
1688 Msg
.send (bio
, MsgError
"Unexpected command"))
1691 ignore (OpenSSL
.readChar bio
);
1695 else if peer
= "domtool" then
1696 case Msg
.recv bio
of
1697 SOME MsgShutdown
=> (OpenSSL
.close bio
;
1698 print ("Shutting down at " ^
now () ^
"\n\n"))
1699 | _
=> (OpenSSL
.close bio
;
1703 val doIt
= doIt
' loop bio
1706 case Msg
.recv bio
of
1707 NONE
=> (OpenSSL
.close bio
1708 handle OpenSSL
.OpenSSL _
=> ();
1712 (MsgQuery q
) => (print (describeQuery q ^
"\n");
1713 Msg
.send (bio
, answerQuery q
);
1714 ignore (OpenSSL
.readChar bio
);
1717 | MsgCreateDbUser
{dbtype
, passwd
} =>
1719 case Dbms
.lookup dbtype
of
1720 NONE
=> ("Database user creation request with unknown datatype type " ^ dbtype
,
1721 SOME ("Unknown database type " ^ dbtype
))
1723 case #adduser handler
{user
= user
, passwd
= passwd
} of
1724 NONE
=> ("Added " ^ dbtype ^
" user " ^ user ^
".",
1727 ("Error adding a " ^ dbtype ^
" user " ^ user ^
": " ^ msg
,
1728 SOME ("Error adding user: " ^ msg
)))
1731 | MsgDbPasswd
{dbtype
, passwd
} =>
1733 case Dbms
.lookup dbtype
of
1734 NONE
=> ("Database passwd request with unknown datatype type " ^ dbtype
,
1735 SOME ("Unknown database type " ^ dbtype
))
1737 case #passwd handler
{user
= user
, passwd
= passwd
} of
1738 NONE
=> ("Changed " ^ dbtype ^
" password of user " ^ user ^
".",
1741 ("Error setting " ^ dbtype ^
" password of user " ^ user ^
": " ^ msg
,
1742 SOME ("Error adding user: " ^ msg
)))
1745 | MsgCreateDb
{dbtype
, dbname
, encoding
} =>
1747 if Dbms
.validDbname dbname
then
1748 case Dbms
.lookup dbtype
of
1749 NONE
=> ("Database creation request with unknown datatype type " ^ dbtype
,
1750 SOME ("Unknown database type " ^ dbtype
))
1752 if not (Dbms
.validEncoding encoding
) then
1753 ("Invalid encoding " ^ valOf encoding ^
" requested for database creation.",
1754 SOME
"Invalid encoding")
1756 case #createdb handler
{user
= user
, dbname
= dbname
, encoding
= encoding
} of
1757 NONE
=> ("Created database " ^ user ^
"_" ^ dbname ^
".",
1759 | SOME msg
=> ("Error creating database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1760 SOME ("Error creating database: " ^ msg
))
1762 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1763 SOME ("Invalid database name " ^ dbname
)))
1766 | MsgDropDb
{dbtype
, dbname
} =>
1768 if Dbms
.validDbname dbname
then
1769 case Dbms
.lookup dbtype
of
1770 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1771 SOME ("Unknown database type " ^ dbtype
))
1773 case #dropdb handler
{user
= user
, dbname
= dbname
} of
1774 NONE
=> ("Drop database " ^ user ^
"_" ^ dbname ^
".",
1776 | SOME msg
=> ("Error dropping database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1777 SOME ("Error dropping database: " ^ msg
))
1779 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1780 SOME ("Invalid database name " ^ dbname
)))
1783 | MsgGrantDb
{dbtype
, dbname
} =>
1785 if Dbms
.validDbname dbname
then
1786 case Dbms
.lookup dbtype
of
1787 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1788 SOME ("Unknown database type " ^ dbtype
))
1790 case #grant handler
{user
= user
, dbname
= dbname
} of
1791 NONE
=> ("Grant permissions to database " ^ user ^
"_" ^ dbname ^
".",
1793 | SOME msg
=> ("Error granting permissions to database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1794 SOME ("Error granting permissions to database: " ^ msg
))
1796 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1797 SOME ("Invalid database name " ^ dbname
)))
1799 | MsgMysqlFixperms
=>
1800 (print
"Starting mysql-fixperms\n";
1801 doIt (fn () => if OS
.Process
.isSuccess
1802 (OS
.Process
.system
"/usr/bin/sudo -H /afs/hcoop.net/common/etc/scripts/mysql-grant-table-drop") then
1803 ("Requested mysql-fixperms",
1806 ("Requested mysql-fixperms, but execution failed!",
1807 SOME
"Script execution failed."))
1809 | MsgFirewallRegen
=>
1810 doIt (fn () => (Acl
.read Config
.aclFile
;
1811 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1812 if List.exists (fn x
=> x
= host
) Config
.Firewall
.firewallNodes
then
1813 if (Firewall
.generateFirewallConfig (Firewall
.parseRules ()) andalso Firewall
.publishConfig ())
1815 ("Firewall rules regenerated.", NONE
)
1817 ("Rules regeneration failed!", SOME
"Script execution failed.")
1818 else ("Node not controlled by domtool firewall.", SOME (host
))
1820 ("Not authorized to regenerate firewall.", SOME ("Unauthorized user " ^ user ^
" attempted to regenerated firewall"))))
1823 | _
=> (OpenSSL
.close bio
;
1826 end handle OpenSSL
.OpenSSL s
=>
1827 (print ("OpenSSL error: " ^ s ^
"\n");
1829 handle OpenSSL
.OpenSSL _
=> ();
1831 | e
as OS
.SysErr (s
, _
) =>
1832 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1833 print ("System error: "^ s ^
"\n");
1835 handle OpenSSL
.OpenSSL _
=> ();
1837 | IO
.Io
{function
, name
, ...} =>
1838 (print ("IO error: " ^ function ^
": " ^ name ^
"\n");
1840 handle OpenSSL
.OpenSSL _
=> ();
1843 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1844 print
"Uncaught exception!\n";
1846 handle OpenSSL
.OpenSSL _
=> ();
1848 handle OpenSSL
.OpenSSL s
=>
1849 (print ("OpenSSL error: " ^ s ^
"\n");
1852 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1853 print
"Uncaught exception!\n";
1857 OpenSSL
.shutdown sock
1862 val dir
= Posix
.FileSys
.opendir Config
.libRoot
1865 case Posix
.FileSys
.readdir dir
of
1866 NONE
=> (Posix
.FileSys
.closedir dir
;
1869 if String.isSuffix
".dtl" fname
then
1870 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
1879 fun autodocBasis outdir
=
1880 Autodoc
.autodoc
{outdir
= outdir
, infiles
= listBasis ()}