1 (* HCoop
Domtool (http
://hcoop
.sourceforge
.net
/)
2 * Copyright (c
) 2006-2007, Adam Chlipala
4 * This program is free software
; you can redistribute it
and/or
5 * modify it under the terms
of the GNU General Public License
6 * as published by the Free Software Foundation
; either version
2
7 * of the License
, or (at your option
) any later version
.
9 * This program is distributed
in the hope that it will be useful
,
10 * but WITHOUT ANY WARRANTY
; without even the implied warranty
of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE
. See the
12 * GNU General Public License for more details
.
14 * You should have received a copy
of the GNU General Public License
15 * along
with this program
; if not
, write to the Free Software
16 * Foundation
, Inc
., 51 Franklin Street
, Fifth Floor
, Boston
, MA
02110-1301, USA
.
21 structure Main
:> MAIN
= struct
23 open Ast MsgTypes Print
25 structure SM
= StringMap
27 fun init () = Acl
.read Config
.aclFile
31 val prog
= Parse
.parse fname
33 if !ErrorMsg
.anyErrors
then
36 Tycheck
.checkFile
G (Defaults
.tInit ()) prog
41 val dir
= Posix
.FileSys
.opendir Config
.libRoot
44 case Posix
.FileSys
.readdir dir
of
45 NONE
=> (Posix
.FileSys
.closedir dir
;
48 if String.isSuffix
".dtl" fname
then
49 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
56 val (_
, files
) = Order
.order NONE files
58 if !ErrorMsg
.anyErrors
then
61 (Tycheck
.allowExterns ();
62 foldl (fn (fname
, G
) => check
' G fname
) Env
.empty files
63 before Tycheck
.disallowExterns ())
68 val _
= ErrorMsg
.reset ()
69 val _
= Env
.preTycheck ()
73 if !ErrorMsg
.anyErrors
then
77 val _
= Tycheck
.disallowExterns ()
78 val _
= ErrorMsg
.reset ()
79 val prog
= Parse
.parse fname
81 if !ErrorMsg
.anyErrors
then
85 val G
' = Tycheck
.checkFile
b (Defaults
.tInit ()) prog
87 if !ErrorMsg
.anyErrors
then
96 String.sub (s
, 0) <> #
"."
97 andalso CharVector
.all (fn ch
=> Char.isAlphaNum ch
orelse ch
= #
"." orelse ch
= #
"_" orelse ch
= #
"-") s
102 case Posix
.ProcEnv
.getenv
"DOMTOOL_USER" of
105 val uid
= Posix
.ProcEnv
.getuid ()
107 Posix
.SysDB
.Passwd
.name (Posix
.SysDB
.getpwuid uid
)
111 Acl
.read Config
.aclFile
;
116 fun checkDir
' dname
=
120 val dir
= Posix
.FileSys
.opendir dname
123 case Posix
.FileSys
.readdir dir
of
124 NONE
=> (Posix
.FileSys
.closedir dir
;
128 loop (OS
.Path
.joinDirFile
{dir
= dname
,
135 val (_
, files
) = Order
.order (SOME b
) files
137 if !ErrorMsg
.anyErrors
then
140 (foldl (fn (fname
, G
) => check
' G fname
) b files
;
141 if !ErrorMsg
.anyErrors
then
153 val (G
, body
) = check fname
155 if !ErrorMsg
.anyErrors
then
161 val body
' = Reduce
.reduceExp G body
163 (*printd (PD
.hovBox (PD
.PPS
.Rel
0,
164 [PD
.string "Result:",
175 if !ErrorMsg
.anyErrors
then
178 Eval
.exec (Defaults
.eInit ()) body
'
184 if !ErrorMsg
.anyErrors
then
187 ignore (Eval
.exec
' (Defaults
.eInit ()) body
')
191 Config
.dispatcher ^
":" ^
Int.toString Config
.dispatcherPort
194 "localhost:" ^
Int.toString Config
.slavePort
197 (OpenSSL
.context
false x
)
198 handle e
as OpenSSL
.OpenSSL s
=>
199 (print
"Couldn't find your certificate.\nYou probably haven't been given any Domtool privileges.\n";
200 print ("I looked in: " ^ #
1 x ^
"\n");
201 print ("Additional information: " ^ s ^
"\n");
204 fun requestContext f
=
206 val user
= setupUser ()
210 val context
= context (Config
.certDir ^
"/" ^ user ^
".pem",
211 Config
.keyDir ^
"/" ^ user ^
"/key.pem",
219 val (user
, context
) = requestContext f
221 (user
, OpenSSL
.connect (context
, dispatcher
))
224 fun requestSlaveBio () =
226 val (user
, context
) = requestContext (fn () => ())
228 (user
, OpenSSL
.connect (context
, self
))
233 val (user
, bio
) = requestBio (fn () => ignore (check fname
))
235 val inf
= TextIO.openIn fname
238 case TextIO.inputLine inf
of
239 NONE
=> String.concat (List.rev lines
)
240 | SOME line
=> loop (line
:: lines
)
245 Msg
.send (bio
, MsgConfig code
);
247 NONE
=> print
"Server closed connection unexpectedly.\n"
250 MsgOk
=> print
"Configuration succeeded.\n"
251 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
252 | _
=> print
"Unexpected server reply.\n";
255 handle ErrorMsg
.Error
=> ()
257 fun requestDir dname
=
259 val _
= if Posix
.FileSys
.access (dname
, []) then
262 (print ("Can't access " ^ dname ^
".\n");
263 print
"Did you mean to run domtool on a specific file, instead of asking for all\n";
264 print
"files in your ~/.domtool directory?\n";
265 OS
.Process
.exit OS
.Process
.failure
)
267 val _
= ErrorMsg
.reset ()
269 val (user
, bio
) = requestBio (fn () => checkDir
' dname
)
273 val dir
= Posix
.FileSys
.opendir dname
276 case Posix
.FileSys
.readdir dir
of
277 NONE
=> (Posix
.FileSys
.closedir dir
;
281 loop (OS
.Path
.joinDirFile
{dir
= dname
,
288 val (_
, files
) = Order
.order (SOME b
) files
290 val _
= if !ErrorMsg
.anyErrors
then
291 (print
"J\n";raise ErrorMsg
.Error
)
295 val codes
= map (fn fname
=>
297 val inf
= TextIO.openIn fname
300 case TextIO.inputLine inf
of
301 NONE
=> String.concat (rev lines
)
302 | SOME line
=> loop (line
:: lines
)
305 before TextIO.closeIn inf
308 if !ErrorMsg
.anyErrors
then
311 (Msg
.send (bio
, MsgMultiConfig codes
);
313 NONE
=> print
"Server closed connection unexpectedly.\n"
316 MsgOk
=> print
"Configuration succeeded.\n"
317 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
318 | _
=> print
"Unexpected server reply.\n";
321 handle ErrorMsg
.Error
=> ()
325 val (_
, bio
) = requestBio (fn () => ())
330 handle _
=> OS
.Process
.failure
332 fun requestShutdown () =
334 val (_
, bio
) = requestBio (fn () => ())
336 Msg
.send (bio
, MsgShutdown
);
338 NONE
=> print
"Server closed connection unexpectedly.\n"
341 MsgOk
=> print
"Shutdown begun.\n"
342 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
343 | _
=> print
"Unexpected server reply.\n";
347 fun requestSlavePing () =
349 val (_
, bio
) = requestSlaveBio ()
354 handle _
=> OS
.Process
.failure
356 fun requestSlaveShutdown () =
358 val (_
, bio
) = requestSlaveBio ()
360 Msg
.send (bio
, MsgShutdown
);
362 NONE
=> print
"Server closed connection unexpectedly.\n"
365 MsgOk
=> print
"Shutdown begun.\n"
366 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
367 | _
=> print
"Unexpected server reply.\n";
371 fun requestGrant acl
=
373 val (user
, bio
) = requestBio (fn () => ())
375 Msg
.send (bio
, MsgGrant acl
);
377 NONE
=> print
"Server closed connection unexpectedly.\n"
380 MsgOk
=> print
"Grant succeeded.\n"
381 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
382 | _
=> print
"Unexpected server reply.\n";
386 fun requestRevoke acl
=
388 val (user
, bio
) = requestBio (fn () => ())
390 Msg
.send (bio
, MsgRevoke acl
);
392 NONE
=> print
"Server closed connection unexpectedly.\n"
395 MsgOk
=> print
"Revoke succeeded.\n"
396 | MsgError s
=> print ("Revoke failed: " ^ s ^
"\n")
397 | _
=> print
"Unexpected server reply.\n";
401 fun requestListPerms user
=
403 val (_
, bio
) = requestBio (fn () => ())
405 Msg
.send (bio
, MsgListPerms user
);
406 (case Msg
.recv bio
of
407 NONE
=> (print
"Server closed connection unexpectedly.\n";
411 MsgPerms perms
=> SOME perms
412 | MsgError s
=> (print ("Listing failed: " ^ s ^
"\n");
414 | _
=> (print
"Unexpected server reply.\n";
416 before OpenSSL
.close bio
419 fun requestWhoHas perm
=
421 val (_
, bio
) = requestBio (fn () => ())
423 Msg
.send (bio
, MsgWhoHas perm
);
424 (case Msg
.recv bio
of
425 NONE
=> (print
"Server closed connection unexpectedly.\n";
429 MsgWhoHasResponse users
=> SOME users
430 | MsgError s
=> (print ("whohas failed: " ^ s ^
"\n");
432 | _
=> (print
"Unexpected server reply.\n";
434 before OpenSSL
.close bio
437 fun requestRegen () =
439 val (_
, bio
) = requestBio (fn () => ())
441 Msg
.send (bio
, MsgRegenerate
);
443 NONE
=> print
"Server closed connection unexpectedly.\n"
446 MsgOk
=> print
"Regeneration succeeded.\n"
447 | MsgError s
=> print ("Regeneration failed: " ^ s ^
"\n")
448 | _
=> print
"Unexpected server reply.\n";
452 fun requestRegenTc () =
454 val (_
, bio
) = requestBio (fn () => ())
456 Msg
.send (bio
, MsgRegenerateTc
);
458 NONE
=> print
"Server closed connection unexpectedly.\n"
461 MsgOk
=> print
"All configuration validated.\n"
462 | MsgError s
=> print ("Configuration validation failed: " ^ s ^
"\n")
463 | _
=> print
"Unexpected server reply.\n";
467 fun requestRmdom dom
=
469 val (_
, bio
) = requestBio (fn () => ())
471 Msg
.send (bio
, MsgRmdom dom
);
473 NONE
=> print
"Server closed connection unexpectedly.\n"
476 MsgOk
=> print
"Removal succeeded.\n"
477 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
478 | _
=> print
"Unexpected server reply.\n";
482 fun requestRmuser user
=
484 val (_
, bio
) = requestBio (fn () => ())
486 Msg
.send (bio
, MsgRmuser user
);
488 NONE
=> print
"Server closed connection unexpectedly.\n"
491 MsgOk
=> print
"Removal succeeded.\n"
492 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
493 | _
=> print
"Unexpected server reply.\n";
497 fun requestDbUser dbtype
=
499 val (_
, bio
) = requestBio (fn () => ())
501 Msg
.send (bio
, MsgCreateDbUser dbtype
);
503 NONE
=> print
"Server closed connection unexpectedly.\n"
506 MsgOk
=> print
"Your user has been created.\n"
507 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
508 | _
=> print
"Unexpected server reply.\n";
512 fun requestDbPasswd rc
=
514 val (_
, bio
) = requestBio (fn () => ())
516 Msg
.send (bio
, MsgDbPasswd rc
);
518 NONE
=> print
"Server closed connection unexpectedly.\n"
521 MsgOk
=> print
"Your password has been changed.\n"
522 | MsgError s
=> print ("Password set failed: " ^ s ^
"\n")
523 | _
=> print
"Unexpected server reply.\n";
527 fun requestDbTable p
=
529 val (user
, bio
) = requestBio (fn () => ())
531 Msg
.send (bio
, MsgCreateDb p
);
533 NONE
=> print
"Server closed connection unexpectedly.\n"
536 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been created.\n")
537 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
538 | _
=> print
"Unexpected server reply.\n";
542 fun requestDbDrop p
=
544 val (user
, bio
) = requestBio (fn () => ())
546 Msg
.send (bio
, MsgDropDb p
);
548 NONE
=> print
"Server closed connection unexpectedly.\n"
551 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been dropped.\n")
552 | MsgError s
=> print ("Drop failed: " ^ s ^
"\n")
553 | _
=> print
"Unexpected server reply.\n";
557 fun requestDbGrant p
=
559 val (user
, bio
) = requestBio (fn () => ())
561 Msg
.send (bio
, MsgGrantDb p
);
563 NONE
=> print
"Server closed connection unexpectedly.\n"
566 MsgOk
=> print ("You've been granted all allowed privileges to database " ^ user ^
"_" ^ #dbname p ^
".\n")
567 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
568 | _
=> print
"Unexpected server reply.\n";
572 fun requestListMailboxes domain
=
574 val (_
, bio
) = requestBio (fn () => ())
576 Msg
.send (bio
, MsgListMailboxes domain
);
577 (case Msg
.recv bio
of
578 NONE
=> Vmail
.Error
"Server closed connection unexpectedly."
581 MsgMailboxes users
=> (Msg
.send (bio
, MsgOk
);
583 | MsgError s
=> Vmail
.Error ("Listing failed: " ^ s
)
584 | _
=> Vmail
.Error
"Unexpected server reply.")
585 before OpenSSL
.close bio
588 fun requestNewMailbox p
=
590 val (_
, bio
) = requestBio (fn () => ())
592 Msg
.send (bio
, MsgNewMailbox p
);
594 NONE
=> print
"Server closed connection unexpectedly.\n"
597 MsgOk
=> print ("A mapping for " ^ #user p ^
"@" ^ #domain p ^
" has been created.\n")
598 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
599 | _
=> print
"Unexpected server reply.\n";
603 fun requestPasswdMailbox p
=
605 val (_
, bio
) = requestBio (fn () => ())
607 Msg
.send (bio
, MsgPasswdMailbox p
);
609 NONE
=> print
"Server closed connection unexpectedly.\n"
612 MsgOk
=> print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n")
613 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
614 | _
=> print
"Unexpected server reply.\n";
618 fun requestRmMailbox p
=
620 val (_
, bio
) = requestBio (fn () => ())
622 Msg
.send (bio
, MsgRmMailbox p
);
624 NONE
=> print
"Server closed connection unexpectedly.\n"
627 MsgOk
=> print ("The mapping for mailbox " ^ #user p ^
"@" ^ #domain p ^
" has been deleted.\n")
628 | MsgError s
=> print ("Remove failed: " ^ s ^
"\n")
629 | _
=> print
"Unexpected server reply.\n";
633 fun requestSaQuery addr
=
635 val (_
, bio
) = requestBio (fn () => ())
637 Msg
.send (bio
, MsgSaQuery addr
);
638 (case Msg
.recv bio
of
639 NONE
=> print
"Server closed connection unexpectedly.\n"
642 MsgSaStatus b
=> (print ("SpamAssassin filtering for " ^ addr ^
" is "
643 ^
(if b
then "ON" else "OFF") ^
".\n");
644 Msg
.send (bio
, MsgOk
))
645 | MsgError s
=> print ("Query failed: " ^ s ^
"\n")
646 | _
=> print
"Unexpected server reply.\n")
647 before OpenSSL
.close bio
652 val (_
, bio
) = requestBio (fn () => ())
654 Msg
.send (bio
, MsgSaSet p
);
656 NONE
=> print
"Server closed connection unexpectedly.\n"
659 MsgOk
=> print ("SpamAssassin filtering for " ^ #
1 p ^
" is now "
660 ^
(if #
2 p
then "ON" else "OFF") ^
".\n")
661 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
662 | _
=> print
"Unexpected server reply.\n";
666 fun requestSmtpLog domain
=
668 val (_
, bio
) = requestBio (fn () => ())
670 val _
= Msg
.send (bio
, MsgSmtpLogReq domain
)
674 NONE
=> print
"Server closed connection unexpectedly.\n"
678 | MsgSmtpLogRes line
=> (print line
;
680 | MsgError s
=> print ("Log search failed: " ^ s ^
"\n")
681 | _
=> print
"Unexpected server reply.\n"
687 fun requestMysqlFixperms () =
689 val (_
, bio
) = requestBio (fn () => ())
691 Msg
.send (bio
, MsgMysqlFixperms
);
693 NONE
=> print
"Server closed connection unexpectedly.\n"
696 MsgOk
=> print
"Permissions granted.\n"
697 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
698 | _
=> print
"Unexpected server reply.\n";
702 fun requestApt
{node
, pkg
} =
704 val (user
, context
) = requestContext (fn () => ())
705 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
708 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
710 val _
= Msg
.send (bio
, MsgQuery (QApt pkg
))
714 NONE
=> (print
"Server closed connection unexpectedly.\n";
718 MsgYes
=> (print
"Package is installed.\n";
720 | MsgNo
=> (print
"Package is not installed.\n";
722 | MsgError s
=> (print ("APT query failed: " ^ s ^
"\n");
724 | _
=> (print
"Unexpected server reply.\n";
728 before OpenSSL
.close bio
731 fun requestCron
{node
, uname
} =
733 val (user
, context
) = requestContext (fn () => ())
734 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
737 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
739 val _
= Msg
.send (bio
, MsgQuery (QCron uname
))
743 NONE
=> (print
"Server closed connection unexpectedly.\n";
747 MsgYes
=> (print
"User has cron permissions.\n";
749 | MsgNo
=> (print
"User does not have cron permissions.\n";
751 | MsgError s
=> (print ("Cron query failed: " ^ s ^
"\n");
753 | _
=> (print
"Unexpected server reply.\n";
757 before OpenSSL
.close bio
760 fun requestFtp
{node
, uname
} =
762 val (user
, context
) = requestContext (fn () => ())
763 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
766 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
768 val _
= Msg
.send (bio
, MsgQuery (QFtp uname
))
772 NONE
=> (print
"Server closed connection unexpectedly.\n";
776 MsgYes
=> (print
"User has FTP permissions.\n";
778 | MsgNo
=> (print
"User does not have FTP permissions.\n";
780 | MsgError s
=> (print ("FTP query failed: " ^ s ^
"\n");
782 | _
=> (print
"Unexpected server reply.\n";
786 before OpenSSL
.close bio
789 fun requestTrustedPath
{node
, uname
} =
791 val (user
, context
) = requestContext (fn () => ())
792 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
795 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
797 val _
= Msg
.send (bio
, MsgQuery (QTrustedPath uname
))
801 NONE
=> (print
"Server closed connection unexpectedly.\n";
805 MsgYes
=> (print
"User has trusted path restriction.\n";
807 | MsgNo
=> (print
"User does not have trusted path restriction.\n";
809 | MsgError s
=> (print ("Trusted path query failed: " ^ s ^
"\n");
811 | _
=> (print
"Unexpected server reply.\n";
815 before OpenSSL
.close bio
818 fun requestSocketPerm
{node
, uname
} =
820 val (user
, context
) = requestContext (fn () => ())
821 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
824 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
826 val _
= Msg
.send (bio
, MsgQuery (QSocket uname
))
830 NONE
=> (print
"Server closed connection unexpectedly.\n";
834 MsgSocket p
=> (case p
of
836 | Client
=> print
"Client\n"
837 | Server
=> print
"Server\n"
838 | Nada
=> print
"Nada\n";
840 | MsgError s
=> (print ("Socket permission query failed: " ^ s ^
"\n");
842 | _
=> (print
"Unexpected server reply.\n";
846 before OpenSSL
.close bio
849 fun requestFirewall
{node
, uname
} =
851 val (user
, context
) = requestContext (fn () => ())
852 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
855 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
857 val _
= Msg
.send (bio
, MsgQuery (QFirewall uname
))
861 NONE
=> (print
"Server closed connection unexpectedly.\n";
865 MsgFirewall ls
=> (app (fn s
=> (print s
; print
"\n")) ls
;
867 | MsgError s
=> (print ("Firewall query failed: " ^ s ^
"\n");
869 | _
=> (print
"Unexpected server reply.\n";
873 before OpenSSL
.close bio
876 fun requestDescribe dom
=
878 val (_
, bio
) = requestBio (fn () => ())
880 Msg
.send (bio
, MsgDescribe dom
);
882 NONE
=> print
"Server closed connection unexpectedly.\n"
885 MsgDescription s
=> print s
886 | MsgError s
=> print ("Description failed: " ^ s ^
"\n")
887 | _
=> print
"Unexpected server reply.\n";
891 structure SS
= StringSet
893 fun domainList dname
=
895 val dir
= Posix
.FileSys
.opendir dname
898 case Posix
.FileSys
.readdir dir
of
902 val path
= OS
.Path
.joinDirFile
{dir
= dname
,
905 fun visitDomains (path
, bfor
, dset
) =
907 val dir
= Posix
.FileSys
.opendir path
910 case Posix
.FileSys
.readdir dir
of
914 val path
= OS
.Path
.joinDirFile
{dir
= path
,
917 if Posix
.FileSys
.ST
.isDir (Posix
.FileSys
.stat path
) then
919 val bfor
= dname
:: bfor
921 loop (visitDomains (path
, bfor
,
923 String.concatWith
"." bfor
)))
930 before Posix
.FileSys
.closedir dir
933 visitNode (visitDomains (path
, [], dset
))
937 before Posix
.FileSys
.closedir dir
940 fun regenerateEither tc checker context
=
942 val () = print
"Starting regeneration....\n"
948 domainList Config
.resultRoot
956 val _
= ErrorMsg
.reset ()
959 val () = Tycheck
.disallowExterns ()
961 val () = ifReal (fn () =>
962 (ignore (OS
.Process
.system ("rm -rf " ^ Config
.oldResultRoot ^
"/*"));
963 ignore (OS
.Process
.system ("cp -r " ^ Config
.resultRoot
964 ^
"/* " ^ Config
.oldResultRoot ^
"/"));
965 Domain
.resetGlobal ()))
969 fun contactNode (node
, ip
) =
970 if node
= Config
.defaultNode
then
973 val bio
= OpenSSL
.connect (context
,
976 ^
Int.toString Config
.slavePort
)
978 Msg
.send (bio
, MsgRegenerate
);
980 NONE
=> print
"Slave closed connection unexpectedly\n"
983 MsgOk
=> print ("Slave " ^ node ^
" pre-regeneration finished\n")
984 | MsgError s
=> print ("Slave " ^ node
985 ^
" returned error: " ^
987 | _
=> print ("Slave " ^ node
988 ^
" returned unexpected command\n");
991 handle OpenSSL
.OpenSSL s
=> print ("OpenSSL error: " ^ s ^
"\n")
995 val _
= Domain
.setUser user
996 val _
= ErrorMsg
.reset ()
998 val dname
= Config
.domtoolDir user
1000 if Posix
.FileSys
.access (dname
, []) then
1002 val dir
= Posix
.FileSys
.opendir dname
1005 case Posix
.FileSys
.readdir dir
of
1006 NONE
=> (Posix
.FileSys
.closedir dir
;
1009 if notTmp fname
then
1010 loop (OS
.Path
.joinDirFile
{dir
= dname
,
1017 val (_
, files
) = Order
.order (SOME b
) files
1019 if !ErrorMsg
.anyErrors
then
1021 print ("User " ^ user ^
"'s configuration has errors!\n");
1030 handle IO
.Io
{name
, function
, ...} =>
1031 (print ("IO error processing user " ^ user ^
": " ^ function ^
": " ^ name ^
"\n");
1033 | exn
as OS
.SysErr (s
, _
) => (print ("System error processing user " ^ user ^
": " ^ s ^
"\n");
1035 | ErrorMsg
.Error
=> (ErrorMsg
.reset ();
1036 print ("User " ^ user ^
" had a compilation error.\n");
1038 | _
=> (print
"Unknown exception during regeneration!\n";
1041 ifReal (fn () => (app contactNode Config
.nodeIps
;
1043 app
doUser (Acl
.users ());
1046 val domainsAfter
= domainList Config
.resultRoot
1047 val domainsGone
= SS
.difference (domainsBefore
, domainsAfter
)
1049 if SS
.isEmpty domainsGone
then
1052 (print
"Domains to kill:";
1053 SS
.app (fn s
=> (print
" "; print s
)) domainsGone
;
1056 Domain
.rmdom
' Config
.oldResultRoot (SS
.listItems domainsGone
));
1063 val regenerate
= regenerateEither
false eval
'
1064 val regenerateTc
= regenerateEither
true (ignore
o check
)
1068 val doms
= Acl
.class
{user
= user
, class
= "domain"}
1069 val doms
= List.filter (fn dom
=>
1070 case Acl
.whoHas
{class
= "domain", value
= dom
} of
1072 | _
=> false) (StringSet
.listItems doms
)
1078 fun now () = Date
.toString (Date
.fromTimeUniv (Time
.now ()))
1082 QApt pkg
=> if Apt
.installed pkg
then MsgYes
else MsgNo
1083 | QCron user
=> if Cron
.allowed user
then MsgYes
else MsgNo
1084 | QFtp user
=> if Ftp
.allowed user
then MsgYes
else MsgNo
1085 | QTrustedPath user
=> if TrustedPath
.query user
then MsgYes
else MsgNo
1086 | QSocket user
=> MsgSocket (SocketPerm
.query user
)
1087 | QFirewall user
=> MsgFirewall (Firewall
.query user
)
1089 fun describeQuery q
=
1091 QApt pkg
=> "Requested installation status of package " ^ pkg
1092 | QCron user
=> "Asked about cron permissions for user " ^ user
1093 | QFtp user
=> "Asked about FTP permissions for user " ^ user
1094 | QTrustedPath user
=> "Asked about trusted path settings for user " ^ user
1095 | QSocket user
=> "Asked about socket permissions for user " ^ user
1096 | QFirewall user
=> "Asked about firewall rules for user " ^ user
1100 val () = Acl
.read Config
.aclFile
1102 val context
= context (Config
.serverCert
,
1105 val _
= Domain
.set_context context
1107 val sock
= OpenSSL
.listen (context
, Config
.dispatcherPort
)
1110 (case OpenSSL
.accept sock
of
1114 val user
= OpenSSL
.peerCN bio
1115 val () = print ("\nConnection from " ^ user ^
" at " ^
now () ^
"\n")
1116 val () = Domain
.setUser user
1118 fun doIt f cleanup
=
1120 (msgLocal
, SOME msgRemote
) =>
1123 Msg
.send (bio
, MsgError msgRemote
))
1124 |
(msgLocal
, NONE
) =>
1127 Msg
.send (bio
, MsgOk
)))
1128 handle e
as (OpenSSL
.OpenSSL s
) =>
1129 (print ("OpenSSL error: " ^ s ^
"\n");
1130 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1131 Msg
.send (bio
, MsgError ("OpenSSL error: " ^ s
))
1132 handle OpenSSL
.OpenSSL _
=> ())
1133 | OS
.SysErr (s
, _
) =>
1134 (print
"System error: ";
1137 Msg
.send (bio
, MsgError ("System error: " ^ s
))
1138 handle OpenSSL
.OpenSSL _
=> ())
1143 Msg
.send (bio
, MsgError ("Failure: " ^ s
))
1144 handle OpenSSL
.OpenSSL _
=> ())
1146 (print
"Compilation error\n";
1147 Msg
.send (bio
, MsgError
"Error during configuration evaluation")
1148 handle OpenSSL
.OpenSSL _
=> ());
1150 ignore (OpenSSL
.readChar bio
);
1152 handle OpenSSL
.OpenSSL _
=> ();
1155 fun doConfig codes
=
1157 val _
= print
"Configuration:\n"
1158 val _
= app (fn s
=> (print s
; print
"\n")) codes
1161 val outname
= OS
.FileSys
.tmpName ()
1165 val outf
= TextIO.openOut outname
1167 TextIO.output (outf
, code
);
1168 TextIO.closeOut outf
;
1172 doIt (fn () => (Env
.pre ();
1175 Msg
.send (bio
, MsgOk
);
1176 ("Configuration complete.", NONE
)))
1177 (fn () => OS
.FileSys
.remove outname
)
1181 case String.fields (fn ch
=> ch
= #
"@") s
of
1183 if user
= user
' then
1187 |
[user
', domain
] =>
1188 if Domain
.validEmailUser user
' andalso Domain
.yourDomain domain
then
1189 SOME (SetSA
.Email s
)
1195 case Msg
.recv bio
of
1196 NONE
=> (OpenSSL
.close bio
1197 handle OpenSSL
.OpenSSL _
=> ();
1201 MsgConfig code
=> doConfig
[code
]
1202 | MsgMultiConfig codes
=> doConfig codes
1205 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1206 orelse Acl
.query
{user
= user
, class
= "priv", value
= "shutdown"} then
1207 print ("Domtool dispatcher shutting down at " ^
now () ^
"\n\n")
1209 (print
"Unauthorized shutdown command!\n";
1211 handle OpenSSL
.OpenSSL _
=> ();
1216 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1218 Acl
.write Config
.aclFile
;
1219 ("Granted permission " ^ #value acl ^
" to " ^ #user acl ^
" in " ^ #class acl ^
".",
1222 ("Unauthorized user asked to grant a permission!",
1223 SOME
"Not authorized to grant privileges"))
1228 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1230 Acl
.write Config
.aclFile
;
1231 ("Revoked permission " ^ #value acl ^
" from " ^ #user acl ^
" in " ^ #class acl ^
".",
1234 ("Unauthorized user asked to revoke a permission!",
1235 SOME
"Not authorized to revoke privileges"))
1238 | MsgListPerms user
=>
1240 (Msg
.send (bio
, MsgPerms (Acl
.queryAll user
));
1241 ("Sent permission list for user " ^ user ^
".",
1247 (Msg
.send (bio
, MsgWhoHasResponse (Acl
.whoHas perm
));
1248 ("Sent whohas response for " ^ #class perm ^
" / " ^ #value perm ^
".",
1254 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1255 orelse List.all (fn dom
=> Acl
.query
{user
= user
, class
= "domain", value
= dom
}) doms
then
1258 Acl
.revokeFromAll
{class
= "domain", value
= dom
}) doms
;
1259 Acl
.write Config
.aclFile
;
1260 ("Removed domains" ^
foldl (fn (d
, s
) => s ^
" " ^ d
) "" doms ^
".",
1263 ("Unauthorized user asked to remove a domain!",
1264 SOME
"Not authorized to remove that domain"))
1269 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1270 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1271 (if regenerate context
then
1272 ("Regenerated all configuration.",
1275 ("Error regenerating configuration!",
1276 SOME
"Error regenerating configuration! Consult /var/log/domtool.log."))
1278 ("Unauthorized user asked to regenerate!",
1279 SOME
"Not authorized to regenerate"))
1282 | MsgRegenerateTc
=>
1284 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1285 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1286 (if regenerateTc context
then
1287 ("Checked all configuration.",
1290 ("Found a compilation error!",
1291 SOME
"Found a compilation error! Consult /var/log/domtool.log."))
1293 ("Unauthorized user asked to regenerate -tc!",
1294 SOME
"Not authorized to regenerate -tc"))
1297 | MsgRmuser user
' =>
1299 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1301 Acl
.write Config
.aclFile
;
1302 ("Removed user " ^ user
' ^
".",
1305 ("Unauthorized user asked to remove a user!",
1306 SOME
"Not authorized to remove users"))
1309 | MsgCreateDbUser
{dbtype
, passwd
} =>
1311 case Dbms
.lookup dbtype
of
1312 NONE
=> ("Database user creation request with unknown datatype type " ^ dbtype
,
1313 SOME ("Unknown database type " ^ dbtype
))
1315 case #adduser handler
{user
= user
, passwd
= passwd
} of
1316 NONE
=> ("Added " ^ dbtype ^
" user " ^ user ^
".",
1319 ("Error adding a " ^ dbtype ^
" user " ^ user ^
": " ^ msg
,
1320 SOME ("Error adding user: " ^ msg
)))
1323 | MsgDbPasswd
{dbtype
, passwd
} =>
1325 case Dbms
.lookup dbtype
of
1326 NONE
=> ("Database passwd request with unknown datatype type " ^ dbtype
,
1327 SOME ("Unknown database type " ^ dbtype
))
1329 case #passwd handler
{user
= user
, passwd
= passwd
} of
1330 NONE
=> ("Changed " ^ dbtype ^
" password of user " ^ user ^
".",
1333 ("Error setting " ^ dbtype ^
" password of user " ^ user ^
": " ^ msg
,
1334 SOME ("Error adding user: " ^ msg
)))
1337 | MsgCreateDb
{dbtype
, dbname
} =>
1339 if Dbms
.validDbname dbname
then
1340 case Dbms
.lookup dbtype
of
1341 NONE
=> ("Database creation request with unknown datatype type " ^ dbtype
,
1342 SOME ("Unknown database type " ^ dbtype
))
1344 case #createdb handler
{user
= user
, dbname
= dbname
} of
1345 NONE
=> ("Created database " ^ user ^
"_" ^ dbname ^
".",
1347 | SOME msg
=> ("Error creating database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1348 SOME ("Error creating database: " ^ msg
))
1350 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1351 SOME ("Invalid database name " ^ dbname
)))
1354 | MsgDropDb
{dbtype
, dbname
} =>
1356 if Dbms
.validDbname dbname
then
1357 case Dbms
.lookup dbtype
of
1358 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1359 SOME ("Unknown database type " ^ dbtype
))
1361 case #dropdb handler
{user
= user
, dbname
= dbname
} of
1362 NONE
=> ("Drop database " ^ user ^
"_" ^ dbname ^
".",
1364 | SOME msg
=> ("Error dropping database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1365 SOME ("Error dropping database: " ^ msg
))
1367 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1368 SOME ("Invalid database name " ^ dbname
)))
1371 | MsgGrantDb
{dbtype
, dbname
} =>
1373 if Dbms
.validDbname dbname
then
1374 case Dbms
.lookup dbtype
of
1375 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1376 SOME ("Unknown database type " ^ dbtype
))
1378 case #grant handler
{user
= user
, dbname
= dbname
} of
1379 NONE
=> ("Grant permissions to database " ^ user ^
"_" ^ dbname ^
".",
1381 | SOME msg
=> ("Error granting permissions to database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1382 SOME ("Error granting permissions to database: " ^ msg
))
1384 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1385 SOME ("Invalid database name " ^ dbname
)))
1388 | MsgListMailboxes domain
=>
1390 if not (Domain
.yourDomain domain
) then
1391 ("User wasn't authorized to list mailboxes for " ^ domain
,
1392 SOME
"You're not authorized to configure that domain.")
1394 case Vmail
.list domain
of
1395 Vmail
.Listing users
=> (Msg
.send (bio
, MsgMailboxes users
);
1396 ("Sent mailbox list for " ^ domain
,
1398 | Vmail
.Error msg
=> ("Error listing mailboxes for " ^ domain ^
": " ^ msg
,
1402 | MsgNewMailbox
{domain
, user
= emailUser
, passwd
, mailbox
} =>
1404 if not (Domain
.yourDomain domain
) then
1405 ("User wasn't authorized to add a mailbox to " ^ domain
,
1406 SOME
"You're not authorized to configure that domain.")
1407 else if not (Domain
.validEmailUser emailUser
) then
1408 ("Invalid e-mail username " ^ emailUser
,
1409 SOME
"Invalid e-mail username")
1410 else if not (CharVector
.all
Char.isGraph passwd
) then
1411 ("Invalid password",
1412 SOME
"Invalid password; may only contain printable, non-space characters")
1413 else if not (Domain
.yourPath mailbox
) then
1414 ("User wasn't authorized to add a mailbox at " ^ mailbox
,
1415 SOME ("You're not authorized to use that mailbox location. ("
1418 case Vmail
.add
{requester
= user
,
1419 domain
= domain
, user
= emailUser
,
1420 passwd
= passwd
, mailbox
= mailbox
} of
1421 NONE
=> ("Added mailbox " ^ emailUser ^
"@" ^ domain ^
" at " ^ mailbox
,
1423 | SOME msg
=> ("Error adding mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1427 | MsgPasswdMailbox
{domain
, user
= emailUser
, passwd
} =>
1429 if not (Domain
.yourDomain domain
) then
1430 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1431 SOME
"You're not authorized to configure that domain.")
1432 else if not (Domain
.validEmailUser emailUser
) then
1433 ("Invalid e-mail username " ^ emailUser
,
1434 SOME
"Invalid e-mail username")
1435 else if not (CharVector
.all
Char.isGraph passwd
) then
1436 ("Invalid password",
1437 SOME
"Invalid password; may only contain printable, non-space characters")
1439 case Vmail
.passwd
{domain
= domain
, user
= emailUser
,
1441 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1443 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1447 | MsgRmMailbox
{domain
, user
= emailUser
} =>
1449 if not (Domain
.yourDomain domain
) then
1450 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1451 SOME
"You're not authorized to configure that domain.")
1452 else if not (Domain
.validEmailUser emailUser
) then
1453 ("Invalid e-mail username " ^ emailUser
,
1454 SOME
"Invalid e-mail username")
1456 case Vmail
.rm
{domain
= domain
, user
= emailUser
} of
1457 NONE
=> ("Deleted mailbox " ^ emailUser ^
"@" ^ domain
,
1459 | SOME msg
=> ("Error deleting mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1463 | MsgSaQuery addr
=>
1465 case checkAddr addr
of
1466 NONE
=> ("User tried to query SA filtering for " ^ addr
,
1467 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1468 | SOME addr
' => (Msg
.send (bio
, MsgSaStatus (SetSA
.query addr
'));
1469 ("Queried SA filtering status for " ^ addr
,
1473 |
MsgSaSet (addr
, b
) =>
1475 case checkAddr addr
of
1476 NONE
=> ("User tried to set SA filtering for " ^ addr
,
1477 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1478 | SOME addr
' => (SetSA
.set (addr
', b
);
1479 Msg
.send (bio
, MsgOk
);
1480 ("Set SA filtering status for " ^ addr ^
" to "
1481 ^
(if b
then "ON" else "OFF"),
1485 | MsgSmtpLogReq domain
=>
1487 if not (Domain
.yourDomain domain
) then
1488 ("Unauthorized user tried to request SMTP logs for " ^ domain
,
1489 SOME
"You aren't authorized to configure that domain.")
1491 (SmtpLog
.search (fn line
=> Msg
.send (bio
, MsgSmtpLogRes line
))
1493 ("Requested SMTP logs for " ^ domain
,
1498 doIt (fn () => (Msg
.send (bio
, answerQuery q
);
1503 | MsgMysqlFixperms
=>
1504 doIt (fn () => if OS
.Process
.isSuccess
1505 (OS
.Process
.system
"/usr/bin/sudo -H /afs/hcoop.net/common/etc/scripts/mysql-grant-table-drop") then
1506 ("Requested mysql-fixperms",
1509 ("Requested mysql-fixperms, but execution failed!",
1510 SOME
"Script execution failed."))
1513 | MsgDescribe dom
=>
1514 doIt (fn () => if not (Domain
.validDomain dom
) then
1515 ("Requested description of invalid domain " ^ dom
,
1516 SOME
"Invalid domain name")
1517 else if not (Domain
.yourDomain dom
1518 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"}) then
1519 ("Requested description of " ^ dom ^
", but not allowed access",
1520 SOME
"Access denied")
1522 (Msg
.send (bio
, MsgDescription (Domain
.describe dom
));
1523 ("Sent description of domain " ^ dom
,
1528 doIt (fn () => ("Unexpected command",
1529 SOME
"Unexpected command"))
1534 handle e
as (OpenSSL
.OpenSSL s
) =>
1535 (print ("OpenSSL error: " ^ s ^
"\n");
1536 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1538 handle OpenSSL
.OpenSSL _
=> ();
1540 | OS
.SysErr (s
, _
) =>
1541 (print ("System error: " ^ s ^
"\n");
1543 handle OpenSSL
.OpenSSL _
=> ();
1545 | IO
.Io
{name
, function
, cause
} =>
1546 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1547 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1549 handle OpenSSL
.OpenSSL _
=> ();
1551 | OS
.Path
.InvalidArc
=>
1552 (print
"Invalid arc\n";
1554 handle OpenSSL
.OpenSSL _
=> ();
1557 (print
"Unknown exception in main loop!\n";
1558 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1560 handle OpenSSL
.OpenSSL _
=> ();
1562 handle e
as (OpenSSL
.OpenSSL s
) =>
1563 (print ("OpenSSL error: " ^ s ^
"\n");
1564 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1566 | OS
.SysErr (s
, _
) =>
1567 (print ("System error: " ^ s ^
"\n");
1569 | IO
.Io
{name
, function
, cause
} =>
1570 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1571 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1574 (print
"Unknown exception in main loop!\n";
1575 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1578 print ("Domtool dispatcher starting up at " ^
now () ^
"\n");
1579 print
"Listening for connections....\n";
1581 OpenSSL
.shutdown sock
1586 val host
= Slave
.hostname ()
1588 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1589 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1592 val sock
= OpenSSL
.listen (context
, Config
.slavePort
)
1594 val _
= print ("Slave server starting at " ^
now () ^
"\n")
1597 case OpenSSL
.accept sock
of
1601 val peer
= OpenSSL
.peerCN bio
1602 val () = print ("\nConnection from " ^ peer ^
" at " ^
now () ^
"\n")
1604 if peer
= Config
.dispatcherName
then let
1606 case Msg
.recv bio
of
1607 NONE
=> print
"Dispatcher closed connection unexpectedly\n"
1610 MsgFile file
=> loop
' (file
:: files
)
1611 | MsgDoFiles
=> (Slave
.handleChanges files
;
1612 Msg
.send (bio
, MsgOk
))
1613 | MsgRegenerate
=> (Domain
.resetLocal ();
1614 Msg
.send (bio
, MsgOk
))
1615 | _
=> (print
"Dispatcher sent unexpected command\n";
1616 Msg
.send (bio
, MsgError
"Unexpected command"))
1619 ignore (OpenSSL
.readChar bio
);
1623 else if peer
= "domtool" then
1624 case Msg
.recv bio
of
1625 SOME MsgShutdown
=> (OpenSSL
.close bio
;
1626 print ("Shutting down at " ^
now () ^
"\n\n"))
1627 | _
=> (OpenSSL
.close bio
;
1630 case Msg
.recv bio
of
1631 SOME (MsgQuery q
) => (print (describeQuery q ^
"\n");
1632 Msg
.send (bio
, answerQuery q
);
1633 ignore (OpenSSL
.readChar bio
);
1636 | _
=> (OpenSSL
.close bio
;
1638 end handle OpenSSL
.OpenSSL s
=>
1639 (print ("OpenSSL error: " ^ s ^
"\n");
1641 handle OpenSSL
.OpenSSL _
=> ();
1643 | e
as OS
.SysErr (s
, _
) =>
1644 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1645 print ("System error: "^ s ^
"\n");
1647 handle OpenSSL
.OpenSSL _
=> ();
1649 | IO
.Io
{function
, name
, ...} =>
1650 (print ("IO error: " ^ function ^
": " ^ name ^
"\n");
1652 handle OpenSSL
.OpenSSL _
=> ();
1655 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1656 print
"Uncaught exception!\n";
1658 handle OpenSSL
.OpenSSL _
=> ();
1662 OpenSSL
.shutdown sock
1667 val dir
= Posix
.FileSys
.opendir Config
.libRoot
1670 case Posix
.FileSys
.readdir dir
of
1671 NONE
=> (Posix
.FileSys
.closedir dir
;
1674 if String.isSuffix
".dtl" fname
then
1675 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
1684 fun autodocBasis outdir
=
1685 Autodoc
.autodoc
{outdir
= outdir
, infiles
= listBasis ()}