1 (* HCoop
Domtool (http
://hcoop
.sourceforge
.net
/)
2 * Copyright (c
) 2006, Adam Chlipala
4 * This program is free software
; you can redistribute it
and/or
5 * modify it under the terms
of the GNU General Public License
6 * as published by the Free Software Foundation
; either version
2
7 * of the License
, or (at your option
) any later version
.
9 * This program is distributed
in the hope that it will be useful
,
10 * but WITHOUT ANY WARRANTY
; without even the implied warranty
of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE
. See the
12 * GNU General Public License for more details
.
14 * You should have received a copy
of the GNU General Public License
15 * along
with this program
; if not
, write to the Free Software
16 * Foundation
, Inc
., 51 Franklin Street
, Fifth Floor
, Boston
, MA
02110-1301, USA
.
21 structure Main
:> MAIN
= struct
23 open Ast MsgTypes Print
25 structure SM
= StringMap
27 fun init () = Acl
.read Config
.aclFile
31 val prog
= Parse
.parse fname
33 if !ErrorMsg
.anyErrors
then
36 Tycheck
.checkFile
G (Defaults
.tInit ()) prog
41 val dir
= Posix
.FileSys
.opendir Config
.libRoot
44 case Posix
.FileSys
.readdir dir
of
45 NONE
=> (Posix
.FileSys
.closedir dir
;
48 if String.isSuffix
".dtl" fname
then
49 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
56 val (_
, files
) = Order
.order files
58 if !ErrorMsg
.anyErrors
then
61 (Tycheck
.allowExterns ();
62 foldl (fn (fname
, G
) => check
' G fname
) Env
.empty files
63 before Tycheck
.disallowExterns ())
68 val _
= ErrorMsg
.reset ()
69 val _
= Env
.preTycheck ()
73 if !ErrorMsg
.anyErrors
then
77 val _
= Tycheck
.disallowExterns ()
78 val _
= ErrorMsg
.reset ()
79 val prog
= Parse
.parse fname
81 if !ErrorMsg
.anyErrors
then
85 val G
' = Tycheck
.checkFile
b (Defaults
.tInit ()) prog
87 if !ErrorMsg
.anyErrors
then
97 val (G
, body
) = check fname
99 if !ErrorMsg
.anyErrors
then
105 val body
' = Reduce
.reduceExp G body
107 (*printd (PD
.hovBox (PD
.PPS
.Rel
0,
108 [PD
.string "Result:",
119 if !ErrorMsg
.anyErrors
then
122 Eval
.exec (Defaults
.eInit ()) body
'
123 | NONE
=> raise ErrorMsg
.Error
126 Config
.dispatcher ^
":" ^
Int.toString Config
.dispatcherPort
128 fun requestContext f
=
130 val uid
= Posix
.ProcEnv
.getuid ()
131 val user
= Posix
.SysDB
.Passwd
.name (Posix
.SysDB
.getpwuid uid
)
133 val () = Acl
.read Config
.aclFile
134 val () = Domain
.setUser user
138 val context
= OpenSSL
.context (Config
.certDir ^
"/" ^ user ^
".pem",
139 Config
.keyDir ^
"/" ^ user ^
"/key.pem",
147 val (user
, context
) = requestContext f
149 (user
, OpenSSL
.connect (context
, dispatcher
))
154 val (user
, bio
) = requestBio (fn () => ignore (check fname
))
156 val inf
= TextIO.openIn fname
159 case TextIO.inputLine inf
of
160 NONE
=> String.concat (List.rev lines
)
161 | SOME line
=> loop (line
:: lines
)
166 Msg
.send (bio
, MsgConfig code
);
168 NONE
=> print
"Server closed connection unexpectedly.\n"
171 MsgOk
=> print
"Configuration succeeded.\n"
172 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
173 | _
=> print
"Unexpected server reply.\n";
176 handle ErrorMsg
.Error
=> ()
178 fun requestGrant acl
=
180 val (user
, bio
) = requestBio (fn () => ())
182 Msg
.send (bio
, MsgGrant acl
);
184 NONE
=> print
"Server closed connection unexpectedly.\n"
187 MsgOk
=> print
"Grant succeeded.\n"
188 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
189 | _
=> print
"Unexpected server reply.\n";
193 fun requestRevoke acl
=
195 val (user
, bio
) = requestBio (fn () => ())
197 Msg
.send (bio
, MsgRevoke acl
);
199 NONE
=> print
"Server closed connection unexpectedly.\n"
202 MsgOk
=> print
"Revoke succeeded.\n"
203 | MsgError s
=> print ("Revoke failed: " ^ s ^
"\n")
204 | _
=> print
"Unexpected server reply.\n";
210 val () = Acl
.read Config
.aclFile
212 val context
= OpenSSL
.context (Config
.serverCert
,
215 val _
= Domain
.set_context context
217 val sock
= OpenSSL
.listen (context
, Config
.dispatcherPort
)
220 case OpenSSL
.accept sock
of
224 val user
= OpenSSL
.peerCN bio
225 val () = print ("\nConnection from " ^ user ^
"\n")
226 val () = Domain
.setUser user
230 NONE
=> (OpenSSL
.close bio
231 handle OpenSSL
.OpenSSL _
=> ();
237 val _
= print
"Configuration:\n"
241 val outname
= OS
.FileSys
.tmpName ()
242 val outf
= TextIO.openOut outname
244 TextIO.output (outf
, code
);
245 TextIO.closeOut outf
;
247 Msg
.send (bio
, MsgOk
))
248 handle ErrorMsg
.Error
=>
249 (print
"Compilation error\n";
251 MsgError
"Error during configuration evaluation"))
252 | OpenSSL
.OpenSSL s
=>
253 (print
"OpenSSL error\n";
256 ("Error during configuration evaluation: "
258 OS
.FileSys
.remove outname
;
259 (ignore (OpenSSL
.readChar bio
);
261 handle OpenSSL
.OpenSSL _
=> ();
266 if Acl
.query
{user
= user
, class
= "group", value
= "root"} then
268 Acl
.write Config
.aclFile
;
269 Msg
.send (bio
, MsgOk
);
270 print ("Granted permission " ^ #value acl ^
" to " ^ #user acl ^
" in " ^ #class acl ^
".\n"))
271 handle OpenSSL
.OpenSSL s
=>
272 (print
"OpenSSL error\n";
275 ("Error during granting: "
277 (ignore (OpenSSL
.readChar bio
);
279 handle OpenSSL
.OpenSSL _
=> ();
282 ((Msg
.send (bio
, MsgError
"Not authorized to grant privileges");
283 print
"Unauthorized user asked to grant a permission!\n";
284 ignore (OpenSSL
.readChar bio
);
286 handle OpenSSL
.OpenSSL _
=> ();
290 if Acl
.query
{user
= user
, class
= "group", value
= "root"} then
292 Acl
.write Config
.aclFile
;
293 Msg
.send (bio
, MsgOk
);
294 print ("Revoked permission " ^ #value acl ^
" from " ^ #user acl ^
" in " ^ #class acl ^
".\n"))
295 handle OpenSSL
.OpenSSL s
=>
296 (print
"OpenSSL error\n";
299 ("Error during revocation: "
301 (ignore (OpenSSL
.readChar bio
);
303 handle OpenSSL
.OpenSSL _
=> ();
306 ((Msg
.send (bio
, MsgError
"Not authorized to revoke privileges");
307 print
"Unauthorized user asked to revoke a permission!\n";
308 ignore (OpenSSL
.readChar bio
);
310 handle OpenSSL
.OpenSSL _
=> ();
314 (Msg
.send (bio
, MsgError
"Unexpected command")
315 handle OpenSSL
.OpenSSL _
=> ();
317 handle OpenSSL
.OpenSSL _
=> ();
322 handle OpenSSL
.OpenSSL s
=>
323 (print ("OpenSSL error: " ^ s ^
"\n");
325 handle OpenSSL
.OpenSSL _
=> ();
327 | OS
.SysErr (s
, _
) =>
328 (print ("System error: " ^ s ^
"\n");
330 handle OpenSSL
.OpenSSL _
=> ();
333 print
"Listening for connections....\n";
335 OpenSSL
.shutdown sock
340 val host
= Slave
.hostname ()
342 val context
= OpenSSL
.context (Config
.certDir ^
"/" ^ host ^
".pem",
343 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
346 val sock
= OpenSSL
.listen (context
, Config
.slavePort
)
349 case OpenSSL
.accept sock
of
353 val peer
= OpenSSL
.peerCN bio
354 val () = print ("\nConnection from " ^ peer ^
"\n")
356 if peer
<> Config
.dispatcherName
then
357 (print
"Not authorized!\n";
363 NONE
=> print
"Dispatcher closed connection unexpectedly\n"
366 MsgFile file
=> loop
' (file
:: files
)
367 | MsgDoFiles
=> (Slave
.handleChanges files
;
368 Msg
.send (bio
, MsgOk
))
369 | _
=> (print
"Dispatcher sent unexpected command\n";
370 Msg
.send (bio
, MsgError
"Unexpected command"))
373 ignore (OpenSSL
.readChar bio
);
377 end handle OpenSSL
.OpenSSL s
=>
378 (print ("OpenSSL error: "^ s ^
"\n");
380 handle OpenSSL
.OpenSSL _
=> ();
382 | OS
.SysErr (s
, _
) =>
383 (print ("System error: "^ s ^
"\n");
385 handle OpenSSL
.OpenSSL _
=> ();
389 OpenSSL
.shutdown sock
392 fun autodocBasis outdir
=
394 val dir
= Posix
.FileSys
.opendir Config
.libRoot
397 case Posix
.FileSys
.readdir dir
of
398 NONE
=> (Posix
.FileSys
.closedir dir
;
401 if String.isSuffix
".dtl" fname
then
402 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
410 Autodoc
.autodoc
{outdir
= outdir
, infiles
= files
}