1 (* HCoop
Domtool (http
://hcoop
.sourceforge
.net
/)
2 * Copyright (c
) 2006-2009, Adam Chlipala
3 * Copyright (c
) 2012,2013,2014 Clinton Ebadi
<clinton@unknownlamer
.org
>
5 * This program is free software
; you can redistribute it
and/or
6 * modify it under the terms
of the GNU General Public License
7 * as published by the Free Software Foundation
; either version
2
8 * of the License
, or (at your option
) any later version
.
10 * This program is distributed
in the hope that it will be useful
,
11 * but WITHOUT ANY WARRANTY
; without even the implied warranty
of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE
. See the
13 * GNU General Public License for more details
.
15 * You should have received a copy
of the GNU General Public License
16 * along
with this program
; if not
, write to the Free Software
17 * Foundation
, Inc
., 51 Franklin Street
, Fifth Floor
, Boston
, MA
02110-1301, USA
.
22 structure Main
:> MAIN
= struct
24 open Ast MsgTypes Print
26 structure SM
= StringMap
28 fun init () = Acl
.read Config
.aclFile
30 fun isLib fname
= OS
.Path
.file fname
= "lib.dtl"
32 fun wrapFile (fname
, file
) =
33 case (isLib fname
, file
) of
34 (true, (comment
, ds
, SOME e
)) =>
38 (comment
, ds
, SOME (ELocal (e
, (ESkip
, loc
)), loc
))
44 val prog
= Parse
.parse fname
45 val prog
= wrapFile (fname
, prog
)
47 if !ErrorMsg
.anyErrors
then
53 Option
.app (Unused
.check G
) (#
3 prog
);
54 Tycheck
.checkFile G prog
)
59 val dir
= Posix
.FileSys
.opendir Config
.libRoot
62 case Posix
.FileSys
.readdir dir
of
63 NONE
=> (Posix
.FileSys
.closedir dir
;
66 if String.isSuffix
".dtl" fname
then
67 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
74 val (_
, files
) = Order
.order NONE files
76 if !ErrorMsg
.anyErrors
then
79 (Tycheck
.allowExterns ();
80 foldl (fn (fname
, G
) => check
' G fname
) Env
.empty files
81 before Tycheck
.disallowExterns ())
84 (* val b
= basis () *)
88 val _
= ErrorMsg
.reset ()
89 val _
= Env
.preTycheck ()
91 if !ErrorMsg
.anyErrors
then
95 val _
= Tycheck
.disallowExterns ()
96 val _
= ErrorMsg
.reset ()
97 val prog
= Parse
.parse fname
98 val prog
= wrapFile (fname
, prog
)
100 if !ErrorMsg
.anyErrors
then
104 val G
' = Tycheck
.checkFile G prog
106 if !ErrorMsg
.anyErrors
then
112 Option
.app (Unused
.check G
) (#
3 prog
);
119 String.sub (s
, 0) <> #
"."
120 andalso CharVector
.all (fn ch
=> Char.isAlphaNum ch
orelse ch
= #
"." orelse ch
= #
"_" orelse ch
= #
"-") s
125 case Posix
.ProcEnv
.getenv
"DOMTOOL_USER" of
128 val uid
= Posix
.ProcEnv
.getuid ()
130 Posix
.SysDB
.Passwd
.name (Posix
.SysDB
.getpwuid uid
)
134 Acl
.read Config
.aclFile
;
139 fun checkDir
' dname
=
143 val dir
= Posix
.FileSys
.opendir dname
146 case Posix
.FileSys
.readdir dir
of
147 NONE
=> (Posix
.FileSys
.closedir dir
;
151 loop (OS
.Path
.joinDirFile
{dir
= dname
,
158 val (_
, files
) = Order
.order (SOME b
) files
160 if !ErrorMsg
.anyErrors
then
163 (foldl (fn (fname
, G
) => check
' G fname
) b files
;
164 if !ErrorMsg
.anyErrors
then
176 val (G
, body
) = check G fname
178 if !ErrorMsg
.anyErrors
then
184 val body
' = Reduce
.reduceExp G body
186 (*printd (PD
.hovBox (PD
.PPS
.Rel
0,
187 [PD
.string "Result:",
195 (*(Defaults
.eInit ())*)
197 val toplevel
= Env
.initialDynEnvVals Reduce
.reduceExp
199 fun eval G evs fname
=
200 case reduce G fname
of
202 if !ErrorMsg
.anyErrors
then
206 val evs
' = Eval
.exec
' (toplevel G
, evs
) body
'
210 |
(G
, NONE
) => (G
, evs
)
213 Domain
.nodeIp Config
.dispatcherName ^
":" ^
Int.toString Config
.dispatcherPort
216 "localhost:" ^
Int.toString Config
.slavePort
219 (OpenSSL
.context
false x
)
220 handle e
as OpenSSL
.OpenSSL s
=>
221 (print
"Couldn't find your certificate.\nYou probably haven't been given any Domtool privileges.\n";
222 print ("I looked in: " ^ #
1 x ^
"\n");
223 print ("Additional information: " ^ s ^
"\n");
226 fun requestContext f
=
228 val user
= setupUser ()
232 val context
= context (Config
.certDir ^
"/" ^ user ^
".pem",
233 Config
.keyDir ^
"/" ^ user ^
"/key.pem",
239 fun requestBio
' printErr f
=
241 val (user
, context
) = requestContext f
243 (user
, OpenSSL
.connect
printErr (context
, dispatcher
))
246 val requestBio
= requestBio
' true
248 fun requestSlaveBio
' printErr
=
250 val (user
, context
) = requestContext (fn () => ())
252 (user
, OpenSSL
.connect
printErr (context
, self
))
255 fun requestSlaveBio () = requestSlaveBio
' true
257 fun request (fname
, libOpt
) =
259 val (user
, bio
) = requestBio (fn () =>
262 val env
= case libOpt
of
264 | SOME lib
=> #
1 (check env lib
)
266 ignore (check env fname
)
271 val inf
= TextIO.openIn fname
274 case TextIO.inputLine inf
of
275 NONE
=> String.concat (rev lines
)
276 | SOME line
=> loop (line
:: lines
)
279 before TextIO.closeIn inf
282 val code
= readFile fname
283 val msg
= case libOpt
of
284 NONE
=> MsgConfig code
285 | SOME fname
' => MsgMultiConfig
[readFile fname
', code
]
289 NONE
=> print
"Server closed connection unexpectedly.\n"
292 MsgOk
=> print
"Configuration succeeded.\n"
293 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
294 | _
=> print
"Unexpected server reply.\n";
297 handle ErrorMsg
.Error
=> ()
299 fun requestDir dname
=
301 val _
= if Posix
.FileSys
.access (dname
, []) then
304 (print ("Can't access " ^ dname ^
".\n");
305 print
"Did you mean to run domtool on a specific file, instead of asking for all\n";
306 print
"files in your ~/.domtool directory?\n";
307 OS
.Process
.exit OS
.Process
.failure
)
309 val _
= ErrorMsg
.reset ()
311 val (user
, bio
) = requestBio (fn () => checkDir
' dname
)
315 val dir
= Posix
.FileSys
.opendir dname
318 case Posix
.FileSys
.readdir dir
of
319 NONE
=> (Posix
.FileSys
.closedir dir
;
323 loop (OS
.Path
.joinDirFile
{dir
= dname
,
330 val (_
, files
) = Order
.order (SOME b
) files
332 val _
= if !ErrorMsg
.anyErrors
then
337 val codes
= map (fn fname
=>
339 val inf
= TextIO.openIn fname
342 case TextIO.inputLine inf
of
343 NONE
=> String.concat (rev lines
)
344 | SOME line
=> loop (line
:: lines
)
347 before TextIO.closeIn inf
350 if !ErrorMsg
.anyErrors
then
353 (Msg
.send (bio
, MsgMultiConfig codes
);
355 NONE
=> print
"Server closed connection unexpectedly.\n"
358 MsgOk
=> print
"Configuration succeeded.\n"
359 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
360 | _
=> print
"Unexpected server reply.\n";
363 handle ErrorMsg
.Error
=> ()
367 val (_
, bio
) = requestBio
' false (fn () => ())
372 handle _
=> OS
.Process
.failure
374 fun requestShutdown () =
376 val (_
, bio
) = requestBio (fn () => ())
378 Msg
.send (bio
, MsgShutdown
);
383 MsgOk
=> print
"Shutdown begun.\n"
384 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
385 | _
=> print
"Unexpected server reply.\n";
389 fun requestSlavePing () =
391 val (_
, bio
) = requestSlaveBio
' false
396 handle _
=> OS
.Process
.failure
398 fun requestSlaveShutdown () =
400 val (_
, bio
) = requestSlaveBio ()
402 Msg
.send (bio
, MsgShutdown
);
407 MsgOk
=> print
"Shutdown begun.\n"
408 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
409 | _
=> print
"Unexpected server reply.\n";
413 fun requestGrant acl
=
415 val (user
, bio
) = requestBio (fn () => ())
417 Msg
.send (bio
, MsgGrant acl
);
419 NONE
=> print
"Server closed connection unexpectedly.\n"
422 MsgOk
=> print
"Grant succeeded.\n"
423 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
424 | _
=> print
"Unexpected server reply.\n";
428 fun requestRevoke acl
=
430 val (user
, bio
) = requestBio (fn () => ())
432 Msg
.send (bio
, MsgRevoke acl
);
434 NONE
=> print
"Server closed connection unexpectedly.\n"
437 MsgOk
=> print
"Revoke succeeded.\n"
438 | MsgError s
=> print ("Revoke failed: " ^ s ^
"\n")
439 | _
=> print
"Unexpected server reply.\n";
443 fun requestListPerms user
=
445 val (_
, bio
) = requestBio (fn () => ())
447 Msg
.send (bio
, MsgListPerms user
);
448 (case Msg
.recv bio
of
449 NONE
=> (print
"Server closed connection unexpectedly.\n";
453 MsgPerms perms
=> SOME perms
454 | MsgError s
=> (print ("Listing failed: " ^ s ^
"\n");
456 | _
=> (print
"Unexpected server reply.\n";
458 before OpenSSL
.close bio
461 fun requestWhoHas perm
=
463 val (_
, bio
) = requestBio (fn () => ())
465 Msg
.send (bio
, MsgWhoHas perm
);
466 (case Msg
.recv bio
of
467 NONE
=> (print
"Server closed connection unexpectedly.\n";
471 MsgWhoHasResponse users
=> SOME users
472 | MsgError s
=> (print ("whohas failed: " ^ s ^
"\n");
474 | _
=> (print
"Unexpected server reply.\n";
476 before OpenSSL
.close bio
479 fun requestRegen () =
481 val (_
, bio
) = requestBio (fn () => ())
483 Msg
.send (bio
, MsgRegenerate
);
485 NONE
=> print
"Server closed connection unexpectedly.\n"
488 MsgOk
=> print
"Regeneration succeeded.\n"
489 | MsgError s
=> print ("Regeneration failed: " ^ s ^
"\n")
490 | _
=> print
"Unexpected server reply.\n";
494 fun requestRegenTc () =
496 val (_
, bio
) = requestBio (fn () => ())
498 Msg
.send (bio
, MsgRegenerateTc
);
500 NONE
=> print
"Server closed connection unexpectedly.\n"
503 MsgOk
=> print
"All configuration validated.\n"
504 | MsgError s
=> print ("Configuration validation failed: " ^ s ^
"\n")
505 | _
=> print
"Unexpected server reply.\n";
509 fun requestRmdom dom
=
511 val (_
, bio
) = requestBio (fn () => ())
513 Msg
.send (bio
, MsgRmdom dom
);
515 NONE
=> print
"Server closed connection unexpectedly.\n"
518 MsgOk
=> print
"Removal succeeded.\n"
519 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
520 | _
=> print
"Unexpected server reply.\n";
524 fun requestRmuser user
=
526 val (_
, bio
) = requestBio (fn () => ())
528 Msg
.send (bio
, MsgRmuser user
);
530 NONE
=> print
"Server closed connection unexpectedly.\n"
533 MsgOk
=> print
"Removal succeeded.\n"
534 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
535 | _
=> print
"Unexpected server reply.\n";
539 fun requestDbUser dbtype
=
541 val (_
, context
) = requestContext (fn () => ())
542 val bio
= OpenSSL
.connect
true (context
,
543 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
545 Msg
.send (bio
, MsgCreateDbUser dbtype
);
547 NONE
=> print
"Server closed connection unexpectedly.\n"
550 MsgOk
=> print
"Your user has been created.\n"
551 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
552 | _
=> print
"Unexpected server reply.\n";
556 fun requestDbPasswd rc
=
558 val (_
, context
) = requestContext (fn () => ())
559 val bio
= OpenSSL
.connect
true (context
,
560 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
562 Msg
.send (bio
, MsgDbPasswd rc
);
564 NONE
=> print
"Server closed connection unexpectedly.\n"
567 MsgOk
=> print
"Your password has been changed.\n"
568 | MsgError s
=> print ("Password set failed: " ^ s ^
"\n")
569 | _
=> print
"Unexpected server reply.\n";
573 fun requestDbTable p
=
575 val (user
, context
) = requestContext (fn () => ())
576 val bio
= OpenSSL
.connect
true (context
,
577 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
579 Msg
.send (bio
, MsgCreateDb p
);
581 NONE
=> print
"Server closed connection unexpectedly.\n"
584 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been created.\n")
585 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
586 | _
=> print
"Unexpected server reply.\n";
590 fun requestDbDrop p
=
592 val (user
, context
) = requestContext (fn () => ())
593 val bio
= OpenSSL
.connect
true (context
,
594 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
596 Msg
.send (bio
, MsgDropDb p
);
598 NONE
=> print
"Server closed connection unexpectedly.\n"
601 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been dropped.\n")
602 | MsgError s
=> print ("Drop failed: " ^ s ^
"\n")
603 | _
=> print
"Unexpected server reply.\n";
607 fun requestDbGrant p
=
609 val (user
, context
) = requestContext (fn () => ())
610 val bio
= OpenSSL
.connect
true (context
,
611 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
613 Msg
.send (bio
, MsgGrantDb p
);
615 NONE
=> print
"Server closed connection unexpectedly.\n"
618 MsgOk
=> print ("You've been granted all allowed privileges to database " ^ user ^
"_" ^ #dbname p ^
".\n")
619 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
620 | _
=> print
"Unexpected server reply.\n";
624 fun requestListMailboxes domain
=
626 val (_
, bio
) = requestBio (fn () => ())
628 Msg
.send (bio
, MsgListMailboxes domain
);
629 (case Msg
.recv bio
of
630 NONE
=> Vmail
.Error
"Server closed connection unexpectedly."
633 MsgMailboxes users
=> (Msg
.send (bio
, MsgOk
);
635 | MsgError s
=> Vmail
.Error ("Listing failed: " ^ s
)
636 | _
=> Vmail
.Error
"Unexpected server reply.")
637 before OpenSSL
.close bio
640 fun requestNewMailbox p
=
642 val (_
, bio
) = requestBio (fn () => ())
644 Msg
.send (bio
, MsgNewMailbox p
);
646 NONE
=> print
"Server closed connection unexpectedly.\n"
649 MsgOk
=> print ("A mapping for " ^ #user p ^
"@" ^ #domain p ^
" has been created.\n")
650 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
651 | _
=> print
"Unexpected server reply.\n";
655 fun requestPasswdMailbox p
=
657 val (_
, bio
) = requestBio (fn () => ())
659 Msg
.send (bio
, MsgPasswdMailbox p
);
661 NONE
=> print
"Server closed connection unexpectedly.\n"
664 MsgOk
=> print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n")
665 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
666 | _
=> print
"Unexpected server reply.\n";
670 fun requestPortalPasswdMailbox p
=
672 val (_
, bio
) = requestBio (fn () => ())
674 Msg
.send (bio
, MsgPortalPasswdMailbox p
);
676 NONE
=> print
"Server closed connection unexpectedly.\n"
679 MsgOk
=> print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n")
680 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
681 | _
=> print
"Unexpected server reply.\n";
685 fun requestRmMailbox p
=
687 val (_
, bio
) = requestBio (fn () => ())
689 Msg
.send (bio
, MsgRmMailbox p
);
691 NONE
=> print
"Server closed connection unexpectedly.\n"
694 MsgOk
=> print ("The mapping for mailbox " ^ #user p ^
"@" ^ #domain p ^
" has been deleted.\n")
695 | MsgError s
=> print ("Remove failed: " ^ s ^
"\n")
696 | _
=> print
"Unexpected server reply.\n";
700 fun requestSaQuery addr
=
702 val (_
, bio
) = requestBio (fn () => ())
704 Msg
.send (bio
, MsgSaQuery addr
);
705 (case Msg
.recv bio
of
706 NONE
=> print
"Server closed connection unexpectedly.\n"
709 MsgSaStatus b
=> (print ("SpamAssassin filtering for " ^ addr ^
" is "
710 ^
(if b
then "ON" else "OFF") ^
".\n");
711 Msg
.send (bio
, MsgOk
))
712 | MsgError s
=> print ("Query failed: " ^ s ^
"\n")
713 | _
=> print
"Unexpected server reply.\n")
714 before OpenSSL
.close bio
719 val (_
, bio
) = requestBio (fn () => ())
721 Msg
.send (bio
, MsgSaSet p
);
723 NONE
=> print
"Server closed connection unexpectedly.\n"
726 MsgOk
=> print ("SpamAssassin filtering for " ^ #
1 p ^
" is now "
727 ^
(if #
2 p
then "ON" else "OFF") ^
".\n")
728 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
729 | _
=> print
"Unexpected server reply.\n";
733 fun requestSmtpLog domain
=
735 val (_
, bio
) = requestBio (fn () => ())
737 val _
= Msg
.send (bio
, MsgSmtpLogReq domain
)
741 NONE
=> print
"Server closed connection unexpectedly.\n"
745 | MsgSmtpLogRes line
=> (print line
;
747 | MsgError s
=> print ("Log search failed: " ^ s ^
"\n")
748 | _
=> print
"Unexpected server reply.\n"
754 fun requestMysqlFixperms () =
756 val (_
, context
) = requestContext (fn () => ())
757 val bio
= OpenSSL
.connect
true (context
,
758 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
760 Msg
.send (bio
, MsgMysqlFixperms
);
762 NONE
=> print
"Server closed connection unexpectedly.\n"
765 MsgOk
=> print
"Permissions granted.\n"
766 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
767 | _
=> print
"Unexpected server reply.\n";
771 fun requestApt
{node
, pkg
} =
773 val (user
, context
) = requestContext (fn () => ())
774 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
777 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
779 val _
= Msg
.send (bio
, MsgQuery (QApt pkg
))
783 NONE
=> (print
"Server closed connection unexpectedly.\n";
787 MsgYes
=> (print
"Package is installed.\n";
789 | MsgNo
=> (print
"Package is not installed.\n";
791 | MsgError s
=> (print ("APT query failed: " ^ s ^
"\n");
793 | _
=> (print
"Unexpected server reply.\n";
797 before OpenSSL
.close bio
800 fun requestAptExists
{node
, pkg
} =
802 val (user
, context
) = requestContext (fn () => ())
803 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
806 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
808 val _
= Msg
.send (bio
, MsgQuery (QAptExists pkg
))
812 NONE
=> (print
"Server closed connection unexpectedly.\n";
816 MsgAptQuery
{section
,description
} => (print
"Package exists.\n";
817 print ("Section: " ^ section ^
"\n");
818 print ("Description: " ^ description ^
"\n");
820 | MsgNo
=> (print
"Package does not exist.\n";
822 (* It might be the Wrong
Thing (tm
) to use MsgNo like this
*))
823 | MsgError s
=> (print ("APT existence query failed: " ^ s ^
"\n");
825 | _
=> (print
"Unexpected server reply.\n";
829 before OpenSSL
.close bio
832 fun requestCron
{node
, uname
} =
834 val (user
, context
) = requestContext (fn () => ())
835 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
838 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
840 val _
= Msg
.send (bio
, MsgQuery (QCron uname
))
844 NONE
=> (print
"Server closed connection unexpectedly.\n";
848 MsgYes
=> (print
"User has cron permissions.\n";
850 | MsgNo
=> (print
"User does not have cron permissions.\n";
852 | MsgError s
=> (print ("Cron query failed: " ^ s ^
"\n");
854 | _
=> (print
"Unexpected server reply.\n";
858 before OpenSSL
.close bio
861 fun requestFtp
{node
, uname
} =
863 val (user
, context
) = requestContext (fn () => ())
864 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
867 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
869 val _
= Msg
.send (bio
, MsgQuery (QFtp uname
))
873 NONE
=> (print
"Server closed connection unexpectedly.\n";
877 MsgYes
=> (print
"User has FTP permissions.\n";
879 | MsgNo
=> (print
"User does not have FTP permissions.\n";
881 | MsgError s
=> (print ("FTP query failed: " ^ s ^
"\n");
883 | _
=> (print
"Unexpected server reply.\n";
887 before OpenSSL
.close bio
890 fun requestTrustedPath
{node
, uname
} =
892 val (user
, context
) = requestContext (fn () => ())
893 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
896 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
898 val _
= Msg
.send (bio
, MsgQuery (QTrustedPath uname
))
902 NONE
=> (print
"Server closed connection unexpectedly.\n";
906 MsgYes
=> (print
"User has trusted path restriction.\n";
908 | MsgNo
=> (print
"User does not have trusted path restriction.\n";
910 | MsgError s
=> (print ("Trusted path query failed: " ^ s ^
"\n");
912 | _
=> (print
"Unexpected server reply.\n";
916 before OpenSSL
.close bio
919 fun requestSocketPerm
{node
, uname
} =
921 val (user
, context
) = requestContext (fn () => ())
922 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
925 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
927 val _
= Msg
.send (bio
, MsgQuery (QSocket uname
))
931 NONE
=> (print
"Server closed connection unexpectedly.\n";
935 MsgSocket p
=> (case p
of
937 | Client
=> print
"Client\n"
938 | Server
=> print
"Server\n"
939 | Nada
=> print
"Nada\n";
941 | MsgError s
=> (print ("Socket permission query failed: " ^ s ^
"\n");
943 | _
=> (print
"Unexpected server reply.\n";
947 before OpenSSL
.close bio
950 fun requestFirewall
{node
, uname
} =
952 val (user
, context
) = requestContext (fn () => ())
953 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
956 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
958 val _
= Msg
.send (bio
, MsgQuery (QFirewall
{node
= node
, user
= uname
}))
962 NONE
=> (print
"Server closed connection unexpectedly.\n";
966 MsgFirewall ls
=> (app (fn s
=> (print s
; print
"\n")) ls
;
968 | MsgError s
=> (print ("Firewall query failed: " ^ s ^
"\n");
970 | _
=> (print
"Unexpected server reply.\n";
974 before OpenSSL
.close bio
977 fun requestDescribe dom
=
979 val (_
, bio
) = requestBio (fn () => ())
981 Msg
.send (bio
, MsgDescribe dom
);
983 NONE
=> print
"Server closed connection unexpectedly.\n"
986 MsgDescription s
=> print s
987 | MsgError s
=> print ("Description failed: " ^ s ^
"\n")
988 | _
=> print
"Unexpected server reply.\n";
992 fun requestReUsers () =
994 val (_
, bio
) = requestBio (fn () => ())
996 Msg
.send (bio
, MsgReUsers
);
998 NONE
=> print
"Server closed connection unexpectedly.\n"
1001 MsgOk
=> print
"Callbacks run.\n"
1002 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
1003 | _
=> print
"Unexpected server reply.\n";
1007 fun requestFirewallRegen node
=
1009 val (user
, context
) = requestContext (fn () => ())
1010 val bio
= OpenSSL
.connect
true (context
, Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
1011 (* Only supporting on slave nodes
*)
1013 val _
= Msg
.send (bio
, MsgFirewallRegen
)
1015 fun handleResult () =
1016 case Msg
.recv bio
of
1017 NONE
=> (print
"Server closed connection unexpectedly.\n";
1021 MsgOk
=> (print
"Firewall regenerated.\n";
1023 | MsgError s
=> (print ("Firewall regeneration failed: " ^ s ^
"\n");
1025 | _
=> (print
"Unexpected server reply.\n";
1029 before OpenSSL
.close bio
1032 structure SS
= StringSet
1034 fun domainList dname
=
1036 val dir
= Posix
.FileSys
.opendir dname
1038 fun visitNode dset
=
1039 case Posix
.FileSys
.readdir dir
of
1043 val path
= OS
.Path
.joinDirFile
{dir
= dname
,
1046 fun visitDomains (path
, bfor
, dset
) =
1048 val dir
= Posix
.FileSys
.opendir path
1051 case Posix
.FileSys
.readdir dir
of
1055 val path
= OS
.Path
.joinDirFile
{dir
= path
,
1058 if Posix
.FileSys
.ST
.isDir (Posix
.FileSys
.stat path
) then
1060 val bfor
= dname
:: bfor
1062 loop (visitDomains (path
, bfor
,
1064 String.concatWith
"." bfor
)))
1071 before Posix
.FileSys
.closedir dir
1074 visitNode (visitDomains (path
, [], dset
))
1078 before Posix
.FileSys
.closedir dir
1081 fun regenerateEither tc checker context
=
1083 val () = print
"Starting regeneration....\n"
1089 domainList Config
.resultRoot
1097 val _
= ErrorMsg
.reset ()
1100 val () = Tycheck
.disallowExterns ()
1102 val () = ifReal (fn () =>
1103 (ignore (OS
.Process
.system ("rm -rf " ^ Config
.oldResultRoot ^
"/*"));
1104 ignore (OS
.Process
.system ("cp -r " ^ Config
.resultRoot
1105 ^
"/* " ^ Config
.oldResultRoot ^
"/"));
1106 Domain
.resetGlobal ()))
1110 fun contactNode (node
, ip
) =
1111 if node
= Config
.dispatcherName
then
1112 Domain
.resetLocal ()
1114 val bio
= OpenSSL
.connect
true (context
,
1117 ^
Int.toString Config
.slavePort
)
1119 Msg
.send (bio
, MsgRegenerate
);
1120 case Msg
.recv bio
of
1121 NONE
=> print
"Slave closed connection unexpectedly\n"
1124 MsgOk
=> print ("Slave " ^ node ^
" pre-regeneration finished\n")
1125 | MsgError s
=> print ("Slave " ^ node
1126 ^
" returned error: " ^
1128 | _
=> print ("Slave " ^ node
1129 ^
" returned unexpected command\n");
1132 handle OpenSSL
.OpenSSL s
=> print ("OpenSSL error: " ^ s ^
"\n")
1136 val _
= Domain
.setUser user
1137 val _
= ErrorMsg
.reset ()
1139 val dname
= Config
.domtoolDir user
1141 if Posix
.FileSys
.access (dname
, []) then
1143 val dir
= Posix
.FileSys
.opendir dname
1146 case Posix
.FileSys
.readdir dir
of
1147 NONE
=> (Posix
.FileSys
.closedir dir
;
1150 if notTmp fname
then
1151 loop (OS
.Path
.joinDirFile
{dir
= dname
,
1158 val (_
, files
) = Order
.order (SOME b
) files
1160 fun checker
' (file
, (G
, evs
)) =
1163 if !ErrorMsg
.anyErrors
then
1165 print ("User " ^ user ^
"'s configuration has errors!\n");
1169 let val basis
' = basis () in
1170 ignore (foldl checker
' (basis
', SM
.empty
) files
)
1173 else if String.isSuffix
"_admin" user
then
1176 (print ("Couldn't access " ^ user ^
"'s ~/.domtool directory.\n");
1179 handle IO
.Io
{name
, function
, ...} =>
1180 (print ("IO error processing user " ^ user ^
": " ^ function ^
": " ^ name ^
"\n");
1182 | exn
as OS
.SysErr (s
, _
) => (print ("System error processing user " ^ user ^
": " ^ s ^
"\n");
1184 | ErrorMsg
.Error
=> (ErrorMsg
.reset ();
1185 print ("User " ^ user ^
" had a compilation error.\n");
1187 | _
=> (print
"Unknown exception during regeneration!\n";
1190 ifReal (fn () => (app contactNode Config
.nodeIps
;
1192 app
doUser (Acl
.users ());
1195 val domainsAfter
= domainList Config
.resultRoot
1196 val domainsGone
= SS
.difference (domainsBefore
, domainsAfter
)
1198 if SS
.isEmpty domainsGone
then
1201 (print
"Domains to kill:";
1202 SS
.app (fn s
=> (print
" "; print s
)) domainsGone
;
1205 Domain
.rmdom
' Config
.oldResultRoot (SS
.listItems domainsGone
));
1212 val regenerate
= regenerateEither
false eval
1213 val regenerateTc
= regenerateEither
true
1214 (fn G
=> fn evs
=> fn file
=>
1215 (#
1 (check G file
), evs
))
1217 fun usersChanged () =
1218 (Domain
.onUsersChange ();
1219 ignore (OS
.Process
.system Config
.publish_reusers
))
1223 val doms
= Acl
.class
{user
= user
, class
= "domain"}
1224 val doms
= List.filter (fn dom
=>
1225 case Acl
.whoHas
{class
= "domain", value
= dom
} of
1227 | _
=> false) (StringSet
.listItems doms
)
1234 fun now () = Date
.toString (Date
.fromTimeUniv (Time
.now ()))
1238 QApt pkg
=> if Apt
.installed pkg
then MsgYes
else MsgNo
1239 | QAptExists pkg
=> (case Apt
.info pkg
of
1240 SOME
{section
, description
} => MsgAptQuery
{section
= section
, description
= description
}
1242 | QCron user
=> if Cron
.allowed user
then MsgYes
else MsgNo
1243 | QFtp user
=> if Ftp
.allowed user
then MsgYes
else MsgNo
1244 | QTrustedPath user
=> if TrustedPath
.query user
then MsgYes
else MsgNo
1245 | QSocket user
=> MsgSocket (SocketPerm
.query user
)
1246 | QFirewall
{node
, user
} => MsgFirewall (Firewall
.query (node
, user
))
1248 fun describeQuery q
=
1250 QApt pkg
=> "Requested installation status of package " ^ pkg
1251 | QAptExists pkg
=> "Requested if package " ^ pkg ^
" exists"
1252 | QCron user
=> "Asked about cron permissions for user " ^ user
1253 | QFtp user
=> "Asked about FTP permissions for user " ^ user
1254 | QTrustedPath user
=> "Asked about trusted path settings for user " ^ user
1255 | QSocket user
=> "Asked about socket permissions for user " ^ user
1256 | QFirewall
{node
, user
} => "Asked about firewall rules on " ^ node ^
" for user " ^ user
1258 fun doIt
' loop bio f cleanup
=
1260 (msgLocal
, SOME msgRemote
) =>
1263 Msg
.send (bio
, MsgError msgRemote
))
1264 |
(msgLocal
, NONE
) =>
1267 Msg
.send (bio
, MsgOk
)))
1268 handle e
as (OpenSSL
.OpenSSL s
) =>
1269 (print ("OpenSSL error: " ^ s ^
"\n");
1270 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1271 Msg
.send (bio
, MsgError ("OpenSSL error: " ^ s
))
1272 handle OpenSSL
.OpenSSL _
=> ())
1273 | OS
.SysErr (s
, _
) =>
1274 (print
"System error: ";
1277 Msg
.send (bio
, MsgError ("System error: " ^ s
))
1278 handle OpenSSL
.OpenSSL _
=> ())
1283 Msg
.send (bio
, MsgError ("Failure: " ^ s
))
1284 handle OpenSSL
.OpenSSL _
=> ())
1286 (print
"Compilation error\n";
1287 Msg
.send (bio
, MsgError
"Error during configuration evaluation")
1288 handle OpenSSL
.OpenSSL _
=> ());
1290 ignore (OpenSSL
.readChar bio
);
1292 handle OpenSSL
.OpenSSL _
=> ();
1297 val host
= Slave
.hostname ()
1299 val () = Acl
.read Config
.aclFile
1301 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1302 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1304 val _
= Domain
.set_context context
1306 val sock
= OpenSSL
.listen (context
, Config
.dispatcherPort
)
1309 (case OpenSSL
.accept sock
of
1313 val user
= OpenSSL
.peerCN bio
1314 val () = print ("\nConnection from " ^ user ^
" at " ^
now () ^
"\n")
1315 val () = Domain
.setUser user
1316 val doIt
= doIt
' loop bio
1318 fun doConfig codes
=
1320 val _
= print
"Configuration:\n"
1321 val _
= app (fn s
=> (print s
; print
"\n")) codes
1324 val outname
= OS
.FileSys
.tmpName ()
1326 fun doOne (code
, (G
, evs
)) =
1328 val outf
= TextIO.openOut outname
1330 TextIO.output (outf
, code
);
1331 TextIO.closeOut outf
;
1335 doIt (fn () => (Env
.pre ();
1336 let val basis
' = basis () in
1337 ignore (foldl
doOne (basis
', SM
.empty
) codes
)
1340 Msg
.send (bio
, MsgOk
);
1341 ("Configuration complete.", NONE
)))
1342 (fn () => OS
.FileSys
.remove outname
)
1346 case String.fields (fn ch
=> ch
= #
"@") s
of
1348 if user
= user
' then
1352 |
[user
', domain
] =>
1353 if Domain
.validEmailUser user
' andalso Domain
.yourDomain domain
then
1354 SOME (SetSA
.Email s
)
1360 case Msg
.recv bio
of
1361 NONE
=> (OpenSSL
.close bio
1362 handle OpenSSL
.OpenSSL _
=> ();
1366 MsgConfig code
=> doConfig
[code
]
1367 | MsgMultiConfig codes
=> doConfig codes
1370 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1371 orelse Acl
.query
{user
= user
, class
= "priv", value
= "shutdown"} then
1372 print ("Domtool dispatcher shutting down at " ^
now () ^
"\n\n")
1374 (print
"Unauthorized shutdown command!\n";
1376 handle OpenSSL
.OpenSSL _
=> ();
1381 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1383 Acl
.write Config
.aclFile
;
1384 if #class acl
= "user" then
1388 ("Granted permission " ^ #value acl ^
" to " ^ #user acl ^
" in " ^ #class acl ^
".",
1391 ("Unauthorized user asked to grant a permission!",
1392 SOME
"Not authorized to grant privileges"))
1397 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1399 Acl
.write Config
.aclFile
;
1400 ("Revoked permission " ^ #value acl ^
" from " ^ #user acl ^
" in " ^ #class acl ^
".",
1403 ("Unauthorized user asked to revoke a permission!",
1404 SOME
"Not authorized to revoke privileges"))
1407 | MsgListPerms user
=>
1409 (Msg
.send (bio
, MsgPerms (Acl
.queryAll user
));
1410 ("Sent permission list for user " ^ user ^
".",
1416 (Msg
.send (bio
, MsgWhoHasResponse (Acl
.whoHas perm
));
1417 ("Sent whohas response for " ^ #class perm ^
" / " ^ #value perm ^
".",
1423 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1424 orelse List.all (fn dom
=> Domain
.validDomain dom
1425 andalso Acl
.queryDomain
{user
= user
, domain
= dom
}) doms
then
1428 Acl
.revokeFromAll
{class
= "domain", value
= dom
}) doms
;
1429 Acl
.write Config
.aclFile
;*)
1430 ("Removed domains" ^
foldl (fn (d
, s
) => s ^
" " ^ d
) "" doms ^
".",
1433 ("Unauthorized user asked to remove a domain!",
1434 SOME
"Not authorized to remove that domain"))
1439 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1440 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1441 (if regenerate context
then
1442 ("Regenerated all configuration.",
1445 ("Error regenerating configuration!",
1446 SOME
"Error regenerating configuration! Consult /var/log/domtool.log."))
1448 ("Unauthorized user asked to regenerate!",
1449 SOME
"Not authorized to regenerate"))
1452 | MsgRegenerateTc
=>
1454 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1455 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1456 (if regenerateTc context
then
1457 ("Checked all configuration.",
1460 ("Found a compilation error!",
1461 SOME
"Found a compilation error! Consult /var/log/domtool.log."))
1463 ("Unauthorized user asked to regenerate -tc!",
1464 SOME
"Not authorized to regenerate -tc"))
1467 | MsgRmuser user
' =>
1469 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1471 Acl
.write Config
.aclFile
;
1472 ("Removed user " ^ user
' ^
".",
1475 ("Unauthorized user asked to remove a user!",
1476 SOME
"Not authorized to remove users"))
1479 | MsgListMailboxes domain
=>
1481 if not (Domain
.yourDomain domain
) then
1482 ("User wasn't authorized to list mailboxes for " ^ domain
,
1483 SOME
"You're not authorized to configure that domain.")
1485 case Vmail
.list domain
of
1486 Vmail
.Listing users
=> (Msg
.send (bio
, MsgMailboxes users
);
1487 ("Sent mailbox list for " ^ domain
,
1489 | Vmail
.Error msg
=> ("Error listing mailboxes for " ^ domain ^
": " ^ msg
,
1493 | MsgNewMailbox
{domain
, user
= emailUser
, passwd
, mailbox
} =>
1495 if not (Domain
.yourDomain domain
) then
1496 ("User wasn't authorized to add a mailbox to " ^ domain
,
1497 SOME
"You're not authorized to configure that domain.")
1498 else if not (Domain
.validEmailUser emailUser
) then
1499 ("Invalid e-mail username " ^ emailUser
,
1500 SOME
"Invalid e-mail username")
1501 else if not (CharVector
.all
Char.isGraph passwd
) then
1502 ("Invalid password",
1503 SOME
"Invalid password; may only contain printable, non-space characters")
1504 else if not (Domain
.yourPath mailbox
) then
1505 ("User wasn't authorized to add a mailbox at " ^ mailbox
,
1506 SOME ("You're not authorized to use that mailbox location. ("
1509 case Vmail
.add
{requester
= user
,
1510 domain
= domain
, user
= emailUser
,
1511 passwd
= passwd
, mailbox
= mailbox
} of
1512 NONE
=> ("Added mailbox " ^ emailUser ^
"@" ^ domain ^
" at " ^ mailbox
,
1514 | SOME msg
=> ("Error adding mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1518 | MsgPasswdMailbox
{domain
, user
= emailUser
, passwd
} =>
1520 if not (Domain
.yourDomain domain
) then
1521 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1522 SOME
"You're not authorized to configure that domain.")
1523 else if not (Domain
.validEmailUser emailUser
) then
1524 ("Invalid e-mail username " ^ emailUser
,
1525 SOME
"Invalid e-mail username")
1526 else if not (CharVector
.all
Char.isGraph passwd
) then
1527 ("Invalid password",
1528 SOME
"Invalid password; may only contain printable, non-space characters")
1530 case Vmail
.passwd
{domain
= domain
, user
= emailUser
,
1532 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1534 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1538 | MsgPortalPasswdMailbox
{domain
, user
= emailUser
, oldpasswd
, newpasswd
} =>
1540 if not (Acl
.query
{user
= user
, class
= "priv", value
= "vmail"}) then
1541 ("User is not authorized to run portal vmail password",
1542 SOME
"You're not authorized to use the portal password command")
1543 else if not (Domain
.validEmailUser emailUser
) then
1544 ("Invalid e-mail username " ^ emailUser
,
1545 SOME
"Invalid e-mail username")
1546 else if not (CharVector
.all
Char.isGraph oldpasswd
1547 andalso CharVector
.all
Char.isGraph newpasswd
) then
1548 ("Invalid password",
1549 SOME
"Invalid password; may only contain printable, non-space characters")
1551 case Vmail
.portalpasswd
{domain
= domain
, user
= emailUser
,
1552 oldpasswd
= oldpasswd
, newpasswd
= newpasswd
} of
1553 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1555 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1559 | MsgRmMailbox
{domain
, user
= emailUser
} =>
1561 if not (Domain
.yourDomain domain
) then
1562 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1563 SOME
"You're not authorized to configure that domain.")
1564 else if not (Domain
.validEmailUser emailUser
) then
1565 ("Invalid e-mail username " ^ emailUser
,
1566 SOME
"Invalid e-mail username")
1568 case Vmail
.rm
{domain
= domain
, user
= emailUser
} of
1569 NONE
=> ("Deleted mailbox " ^ emailUser ^
"@" ^ domain
,
1571 | SOME msg
=> ("Error deleting mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1575 | MsgSaQuery addr
=>
1577 case checkAddr addr
of
1578 NONE
=> ("User tried to query SA filtering for " ^ addr
,
1579 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1580 | SOME addr
' => (Msg
.send (bio
, MsgSaStatus (SetSA
.query addr
'));
1581 ("Queried SA filtering status for " ^ addr
,
1585 |
MsgSaSet (addr
, b
) =>
1587 case checkAddr addr
of
1588 NONE
=> ("User tried to set SA filtering for " ^ addr
,
1589 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1590 | SOME addr
' => (SetSA
.set (addr
', b
);
1592 Msg
.send (bio
, MsgOk
);
1593 ("Set SA filtering status for " ^ addr ^
" to "
1594 ^
(if b
then "ON" else "OFF"),
1598 | MsgSmtpLogReq domain
=>
1600 if not (Domain
.yourDomain domain
) then
1601 ("Unauthorized user tried to request SMTP logs for " ^ domain
,
1602 SOME
"You aren't authorized to configure that domain.")
1604 (SmtpLog
.search (fn line
=> Msg
.send (bio
, MsgSmtpLogRes line
))
1606 ("Requested SMTP logs for " ^ domain
,
1611 doIt (fn () => (Msg
.send (bio
, answerQuery q
);
1615 | MsgDescribe dom
=>
1616 doIt (fn () => if not (Domain
.validDomain dom
) then
1617 ("Requested description of invalid domain " ^ dom
,
1618 SOME
"Invalid domain name")
1619 else if not (Domain
.yourDomain dom
1620 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"}) then
1621 ("Requested description of " ^ dom ^
", but not allowed access",
1622 SOME
"Access denied")
1624 (Msg
.send (bio
, MsgDescription (Domain
.describe dom
));
1625 ("Sent description of domain " ^ dom
,
1630 doIt (fn () => if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1631 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1633 ("Users change callbacks run", NONE
))
1635 ("Unauthorized user asked to reusers!",
1636 SOME
"You aren't authorized to regenerate files."))
1640 doIt (fn () => ("Unexpected command",
1641 SOME
"Unexpected command"))
1646 handle e
as (OpenSSL
.OpenSSL s
) =>
1647 (print ("OpenSSL error: " ^ s ^
"\n");
1648 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1650 handle OpenSSL
.OpenSSL _
=> ();
1652 | OS
.SysErr (s
, _
) =>
1653 (print ("System error: " ^ s ^
"\n");
1655 handle OpenSSL
.OpenSSL _
=> ();
1657 | IO
.Io
{name
, function
, cause
} =>
1658 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1659 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1661 handle OpenSSL
.OpenSSL _
=> ();
1663 | OS
.Path
.InvalidArc
=>
1664 (print
"Invalid arc\n";
1666 handle OpenSSL
.OpenSSL _
=> ();
1669 (print
"Unknown exception in main loop!\n";
1670 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1672 handle OpenSSL
.OpenSSL _
=> ();
1674 handle e
as (OpenSSL
.OpenSSL s
) =>
1675 (print ("OpenSSL error: " ^ s ^
"\n");
1676 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1678 | OS
.SysErr (s
, _
) =>
1679 (print ("System error: " ^ s ^
"\n");
1681 | IO
.Io
{name
, function
, cause
} =>
1682 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1683 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1686 (print
"Unknown exception in main loop!\n";
1687 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1690 print ("Domtool dispatcher starting up at " ^
now () ^
"\n");
1691 print
"Listening for connections....\n";
1693 OpenSSL
.shutdown sock
1698 val host
= Slave
.hostname ()
1700 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1701 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1704 val sock
= OpenSSL
.listen (context
, Config
.slavePort
)
1706 val _
= print ("Slave server starting at " ^
now () ^
"\n")
1709 (case OpenSSL
.accept sock
of
1713 val peer
= OpenSSL
.peerCN bio
1714 val () = print ("\nConnection from " ^ peer ^
" at " ^
now () ^
"\n")
1716 if peer
= Config
.dispatcherName
then let
1718 case Msg
.recv bio
of
1719 NONE
=> print
"Dispatcher closed connection unexpectedly\n"
1722 MsgFile file
=> loop
' (file
:: files
)
1723 | MsgDoFiles
=> (Slave
.handleChanges files
;
1724 Msg
.send (bio
, MsgOk
))
1725 | MsgRegenerate
=> (Domain
.resetLocal ();
1726 Msg
.send (bio
, MsgOk
))
1727 | MsgVmailChanged
=> (if Vmail
.doChanged () then
1728 Msg
.send (bio
, MsgOk
)
1730 Msg
.send (bio
, MsgError
"userdb update failed"))
1731 | MsgSaChanged
=> (if Slave
.shell
[Config
.SpamAssassin
.postReload
] then
1732 Msg
.send (bio
, MsgOk
)
1734 Msg
.send (bio
, MsgError
"Error reloading SpamAssassin addresses"))
1735 | _
=> (print
"Dispatcher sent unexpected command\n";
1736 Msg
.send (bio
, MsgError
"Unexpected command"))
1739 ignore (OpenSSL
.readChar bio
);
1743 else if peer
= "domtool" then
1744 case Msg
.recv bio
of
1745 SOME MsgShutdown
=> (OpenSSL
.close bio
;
1746 print ("Shutting down at " ^
now () ^
"\n\n"))
1747 | _
=> (OpenSSL
.close bio
;
1751 val doIt
= doIt
' loop bio
1754 case Msg
.recv bio
of
1755 NONE
=> (OpenSSL
.close bio
1756 handle OpenSSL
.OpenSSL _
=> ();
1760 (MsgQuery q
) => (print (describeQuery q ^
"\n");
1761 Msg
.send (bio
, answerQuery q
);
1762 ignore (OpenSSL
.readChar bio
);
1765 | MsgCreateDbUser
{dbtype
, passwd
} =>
1767 case Dbms
.lookup dbtype
of
1768 NONE
=> ("Database user creation request with unknown datatype type " ^ dbtype
,
1769 SOME ("Unknown database type " ^ dbtype
))
1771 case #adduser handler
{user
= user
, passwd
= passwd
} of
1772 NONE
=> ("Added " ^ dbtype ^
" user " ^ user ^
".",
1775 ("Error adding a " ^ dbtype ^
" user " ^ user ^
": " ^ msg
,
1776 SOME ("Error adding user: " ^ msg
)))
1779 | MsgDbPasswd
{dbtype
, passwd
} =>
1781 case Dbms
.lookup dbtype
of
1782 NONE
=> ("Database passwd request with unknown datatype type " ^ dbtype
,
1783 SOME ("Unknown database type " ^ dbtype
))
1785 case #passwd handler
{user
= user
, passwd
= passwd
} of
1786 NONE
=> ("Changed " ^ dbtype ^
" password of user " ^ user ^
".",
1789 ("Error setting " ^ dbtype ^
" password of user " ^ user ^
": " ^ msg
,
1790 SOME ("Error adding user: " ^ msg
)))
1793 | MsgCreateDb
{dbtype
, dbname
, encoding
} =>
1795 if Dbms
.validDbname dbname
then
1796 case Dbms
.lookup dbtype
of
1797 NONE
=> ("Database creation request with unknown datatype type " ^ dbtype
,
1798 SOME ("Unknown database type " ^ dbtype
))
1800 if not (Dbms
.validEncoding encoding
) then
1801 ("Invalid encoding " ^ valOf encoding ^
" requested for database creation.",
1802 SOME
"Invalid encoding")
1804 case #createdb handler
{user
= user
, dbname
= dbname
, encoding
= encoding
} of
1805 NONE
=> ("Created database " ^ user ^
"_" ^ dbname ^
".",
1807 | SOME msg
=> ("Error creating database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1808 SOME ("Error creating database: " ^ msg
))
1810 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1811 SOME ("Invalid database name " ^ dbname
)))
1814 | MsgDropDb
{dbtype
, dbname
} =>
1816 if Dbms
.validDbname dbname
then
1817 case Dbms
.lookup dbtype
of
1818 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1819 SOME ("Unknown database type " ^ dbtype
))
1821 case #dropdb handler
{user
= user
, dbname
= dbname
} of
1822 NONE
=> ("Drop database " ^ user ^
"_" ^ dbname ^
".",
1824 | SOME msg
=> ("Error dropping database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1825 SOME ("Error dropping database: " ^ msg
))
1827 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1828 SOME ("Invalid database name " ^ dbname
)))
1831 | MsgGrantDb
{dbtype
, dbname
} =>
1833 if Dbms
.validDbname dbname
then
1834 case Dbms
.lookup dbtype
of
1835 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1836 SOME ("Unknown database type " ^ dbtype
))
1838 case #grant handler
{user
= user
, dbname
= dbname
} of
1839 NONE
=> ("Grant permissions to database " ^ user ^
"_" ^ dbname ^
".",
1841 | SOME msg
=> ("Error granting permissions to database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1842 SOME ("Error granting permissions to database: " ^ msg
))
1844 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1845 SOME ("Invalid database name " ^ dbname
)))
1847 | MsgMysqlFixperms
=>
1848 (print
"Starting mysql-fixperms\n";
1849 doIt (fn () => if OS
.Process
.isSuccess
1850 (OS
.Process
.system
"/usr/bin/sudo -H /afs/hcoop.net/common/etc/scripts/mysql-grant-table-drop") then
1851 ("Requested mysql-fixperms",
1854 ("Requested mysql-fixperms, but execution failed!",
1855 SOME
"Script execution failed."))
1857 | MsgFirewallRegen
=>
1858 doIt (fn () => (Acl
.read Config
.aclFile
;
1859 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1860 if List.exists (fn x
=> x
= host
) Config
.Firewall
.firewallNodes
then
1861 if (Firewall
.generateFirewallConfig (Firewall
.parseRules ()) andalso Firewall
.publishConfig ())
1863 ("Firewall rules regenerated.", NONE
)
1865 ("Rules regeneration failed!", SOME
"Script execution failed.")
1866 else ("Node not controlled by domtool firewall.", SOME (host
))
1868 ("Not authorized to regenerate firewall.", SOME ("Unauthorized user " ^ user ^
" attempted to regenerated firewall"))))
1871 | _
=> (OpenSSL
.close bio
;
1874 end handle OpenSSL
.OpenSSL s
=>
1875 (print ("OpenSSL error: " ^ s ^
"\n");
1877 handle OpenSSL
.OpenSSL _
=> ();
1879 | e
as OS
.SysErr (s
, _
) =>
1880 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1881 print ("System error: "^ s ^
"\n");
1883 handle OpenSSL
.OpenSSL _
=> ();
1885 | IO
.Io
{function
, name
, ...} =>
1886 (print ("IO error: " ^ function ^
": " ^ name ^
"\n");
1888 handle OpenSSL
.OpenSSL _
=> ();
1891 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1892 print
"Uncaught exception!\n";
1894 handle OpenSSL
.OpenSSL _
=> ();
1896 handle OpenSSL
.OpenSSL s
=>
1897 (print ("OpenSSL error: " ^ s ^
"\n");
1900 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1901 print
"Uncaught exception!\n";
1905 OpenSSL
.shutdown sock
1910 val dir
= Posix
.FileSys
.opendir Config
.libRoot
1913 case Posix
.FileSys
.readdir dir
of
1914 NONE
=> (Posix
.FileSys
.closedir dir
;
1917 if String.isSuffix
".dtl" fname
then
1918 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
1927 fun autodocBasis outdir
=
1928 Autodoc
.autodoc
{outdir
= outdir
, infiles
= listBasis ()}