1 (* HCoop
Domtool (http
://hcoop
.sourceforge
.net
/)
2 * Copyright (c
) 2006-2007, Adam Chlipala
4 * This program is free software
; you can redistribute it
and/or
5 * modify it under the terms
of the GNU General Public License
6 * as published by the Free Software Foundation
; either version
2
7 * of the License
, or (at your option
) any later version
.
9 * This program is distributed
in the hope that it will be useful
,
10 * but WITHOUT ANY WARRANTY
; without even the implied warranty
of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE
. See the
12 * GNU General Public License for more details
.
14 * You should have received a copy
of the GNU General Public License
15 * along
with this program
; if not
, write to the Free Software
16 * Foundation
, Inc
., 51 Franklin Street
, Fifth Floor
, Boston
, MA
02110-1301, USA
.
21 structure Main
:> MAIN
= struct
23 open Ast MsgTypes Print
25 structure SM
= StringMap
27 fun init () = Acl
.read Config
.aclFile
31 val prog
= Parse
.parse fname
33 if !ErrorMsg
.anyErrors
then
36 Tycheck
.checkFile
G (Defaults
.tInit ()) prog
41 val dir
= Posix
.FileSys
.opendir Config
.libRoot
44 case Posix
.FileSys
.readdir dir
of
45 NONE
=> (Posix
.FileSys
.closedir dir
;
48 if String.isSuffix
".dtl" fname
then
49 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
56 val (_
, files
) = Order
.order NONE files
58 if !ErrorMsg
.anyErrors
then
61 (Tycheck
.allowExterns ();
62 foldl (fn (fname
, G
) => check
' G fname
) Env
.empty files
63 before Tycheck
.disallowExterns ())
68 val _
= ErrorMsg
.reset ()
69 val _
= Env
.preTycheck ()
73 if !ErrorMsg
.anyErrors
then
77 val _
= Tycheck
.disallowExterns ()
78 val _
= ErrorMsg
.reset ()
79 val prog
= Parse
.parse fname
81 if !ErrorMsg
.anyErrors
then
85 val G
' = Tycheck
.checkFile
b (Defaults
.tInit ()) prog
87 if !ErrorMsg
.anyErrors
then
95 val notTmp
= CharVector
.all (fn ch
=> Char.isAlphaNum ch
orelse ch
= #
"." orelse ch
= #
"_" orelse ch
= #
"-")
101 val dir
= Posix
.FileSys
.opendir dname
104 case Posix
.FileSys
.readdir dir
of
105 NONE
=> (Posix
.FileSys
.closedir dir
;
109 loop (OS
.Path
.joinDirFile
{dir
= dname
,
116 val (_
, files
) = Order
.order (SOME b
) files
118 if !ErrorMsg
.anyErrors
then
121 (foldl (fn (fname
, G
) => check
' G fname
) b files
;
122 if !ErrorMsg
.anyErrors
then
130 val (G
, body
) = check fname
132 if !ErrorMsg
.anyErrors
then
138 val body
' = Reduce
.reduceExp G body
140 (*printd (PD
.hovBox (PD
.PPS
.Rel
0,
141 [PD
.string "Result:",
152 if !ErrorMsg
.anyErrors
then
155 Eval
.exec (Defaults
.eInit ()) body
'
156 | NONE
=> raise ErrorMsg
.Error
161 if !ErrorMsg
.anyErrors
then
164 ignore (Eval
.exec
' (Defaults
.eInit ()) body
')
165 | NONE
=> raise ErrorMsg
.Error
168 Config
.dispatcher ^
":" ^
Int.toString Config
.dispatcherPort
171 "localhost:" ^
Int.toString Config
.slavePort
173 fun requestContext f
=
176 case Posix
.ProcEnv
.getenv
"DOMTOOL_USER" of
179 val uid
= Posix
.ProcEnv
.getuid ()
181 Posix
.SysDB
.Passwd
.name (Posix
.SysDB
.getpwuid uid
)
185 val () = Acl
.read Config
.aclFile
186 val () = Domain
.setUser user
190 val context
= OpenSSL
.context (Config
.certDir ^
"/" ^ user ^
".pem",
191 Config
.keyDir ^
"/" ^ user ^
"/key.pem",
199 val (user
, context
) = requestContext f
201 (user
, OpenSSL
.connect (context
, dispatcher
))
204 fun requestSlaveBio () =
206 val (user
, context
) = requestContext (fn () => ())
208 (user
, OpenSSL
.connect (context
, self
))
213 val (user
, bio
) = requestBio (fn () => ignore (check fname
))
215 val inf
= TextIO.openIn fname
218 case TextIO.inputLine inf
of
219 NONE
=> String.concat (List.rev lines
)
220 | SOME line
=> loop (line
:: lines
)
225 Msg
.send (bio
, MsgConfig code
);
227 NONE
=> print
"Server closed connection unexpectedly.\n"
230 MsgOk
=> print
"Configuration succeeded.\n"
231 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
232 | _
=> print
"Unexpected server reply.\n";
235 handle ErrorMsg
.Error
=> ()
237 fun requestDir dname
=
239 val _
= ErrorMsg
.reset ()
241 val (user
, bio
) = requestBio (fn () => checkDir dname
)
245 val dir
= Posix
.FileSys
.opendir dname
248 case Posix
.FileSys
.readdir dir
of
249 NONE
=> (Posix
.FileSys
.closedir dir
;
253 loop (OS
.Path
.joinDirFile
{dir
= dname
,
260 val (_
, files
) = Order
.order (SOME b
) files
262 val _
= if !ErrorMsg
.anyErrors
then
267 val codes
= map (fn fname
=>
269 val inf
= TextIO.openIn fname
272 case TextIO.inputLine inf
of
273 NONE
=> String.concat (rev lines
)
274 | SOME line
=> loop (line
:: lines
)
277 before TextIO.closeIn inf
280 if !ErrorMsg
.anyErrors
then
283 (Msg
.send (bio
, MsgMultiConfig codes
);
285 NONE
=> print
"Server closed connection unexpectedly.\n"
288 MsgOk
=> print
"Configuration succeeded.\n"
289 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
290 | _
=> print
"Unexpected server reply.\n";
293 handle ErrorMsg
.Error
=> ()
297 val (_
, bio
) = requestBio (fn () => ())
302 handle _
=> OS
.Process
.failure
304 fun requestShutdown () =
306 val (_
, bio
) = requestBio (fn () => ())
308 Msg
.send (bio
, MsgShutdown
);
310 NONE
=> print
"Server closed connection unexpectedly.\n"
313 MsgOk
=> print
"Shutdown begun.\n"
314 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
315 | _
=> print
"Unexpected server reply.\n";
319 fun requestSlavePing () =
321 val (_
, bio
) = requestSlaveBio ()
326 handle _
=> OS
.Process
.failure
328 fun requestSlaveShutdown () =
330 val (_
, bio
) = requestSlaveBio ()
332 Msg
.send (bio
, MsgShutdown
);
334 NONE
=> print
"Server closed connection unexpectedly.\n"
337 MsgOk
=> print
"Shutdown begun.\n"
338 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
339 | _
=> print
"Unexpected server reply.\n";
343 fun requestGrant acl
=
345 val (user
, bio
) = requestBio (fn () => ())
347 Msg
.send (bio
, MsgGrant acl
);
349 NONE
=> print
"Server closed connection unexpectedly.\n"
352 MsgOk
=> print
"Grant succeeded.\n"
353 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
354 | _
=> print
"Unexpected server reply.\n";
358 fun requestRevoke acl
=
360 val (user
, bio
) = requestBio (fn () => ())
362 Msg
.send (bio
, MsgRevoke acl
);
364 NONE
=> print
"Server closed connection unexpectedly.\n"
367 MsgOk
=> print
"Revoke succeeded.\n"
368 | MsgError s
=> print ("Revoke failed: " ^ s ^
"\n")
369 | _
=> print
"Unexpected server reply.\n";
373 fun requestListPerms user
=
375 val (_
, bio
) = requestBio (fn () => ())
377 Msg
.send (bio
, MsgListPerms user
);
378 (case Msg
.recv bio
of
379 NONE
=> (print
"Server closed connection unexpectedly.\n";
383 MsgPerms perms
=> SOME perms
384 | MsgError s
=> (print ("Listing failed: " ^ s ^
"\n");
386 | _
=> (print
"Unexpected server reply.\n";
388 before OpenSSL
.close bio
391 fun requestWhoHas perm
=
393 val (_
, bio
) = requestBio (fn () => ())
395 Msg
.send (bio
, MsgWhoHas perm
);
396 (case Msg
.recv bio
of
397 NONE
=> (print
"Server closed connection unexpectedly.\n";
401 MsgWhoHasResponse users
=> SOME users
402 | MsgError s
=> (print ("whohas failed: " ^ s ^
"\n");
404 | _
=> (print
"Unexpected server reply.\n";
406 before OpenSSL
.close bio
409 fun requestRegen () =
411 val (_
, bio
) = requestBio (fn () => ())
413 Msg
.send (bio
, MsgRegenerate
);
415 NONE
=> print
"Server closed connection unexpectedly.\n"
418 MsgOk
=> print
"Regeneration succeeded.\n"
419 | MsgError s
=> print ("Regeneration failed: " ^ s ^
"\n")
420 | _
=> print
"Unexpected server reply.\n";
424 fun requestRmdom dom
=
426 val (_
, bio
) = requestBio (fn () => ())
428 Msg
.send (bio
, MsgRmdom dom
);
430 NONE
=> print
"Server closed connection unexpectedly.\n"
433 MsgOk
=> print
"Removal succeeded.\n"
434 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
435 | _
=> print
"Unexpected server reply.\n";
439 fun requestRmuser user
=
441 val (_
, bio
) = requestBio (fn () => ())
443 Msg
.send (bio
, MsgRmuser user
);
445 NONE
=> print
"Server closed connection unexpectedly.\n"
448 MsgOk
=> print
"Removal succeeded.\n"
449 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
450 | _
=> print
"Unexpected server reply.\n";
454 fun requestDbUser dbtype
=
456 val (_
, bio
) = requestBio (fn () => ())
458 Msg
.send (bio
, MsgCreateDbUser dbtype
);
460 NONE
=> print
"Server closed connection unexpectedly.\n"
463 MsgOk
=> print
"Your user has been created.\n"
464 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
465 | _
=> print
"Unexpected server reply.\n";
469 fun requestDbPasswd rc
=
471 val (_
, bio
) = requestBio (fn () => ())
473 Msg
.send (bio
, MsgDbPasswd rc
);
475 NONE
=> print
"Server closed connection unexpectedly.\n"
478 MsgOk
=> print
"Your password has been changed.\n"
479 | MsgError s
=> print ("Password set failed: " ^ s ^
"\n")
480 | _
=> print
"Unexpected server reply.\n";
484 fun requestDbTable p
=
486 val (user
, bio
) = requestBio (fn () => ())
488 Msg
.send (bio
, MsgCreateDbTable p
);
490 NONE
=> print
"Server closed connection unexpectedly.\n"
493 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been created.\n")
494 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
495 | _
=> print
"Unexpected server reply.\n";
499 fun requestListMailboxes domain
=
501 val (_
, bio
) = requestBio (fn () => ())
503 Msg
.send (bio
, MsgListMailboxes domain
);
504 (case Msg
.recv bio
of
505 NONE
=> Vmail
.Error
"Server closed connection unexpectedly."
508 MsgMailboxes users
=> (Msg
.send (bio
, MsgOk
);
510 | MsgError s
=> Vmail
.Error ("Creation failed: " ^ s
)
511 | _
=> Vmail
.Error
"Unexpected server reply.")
512 before OpenSSL
.close bio
515 fun requestNewMailbox p
=
517 val (_
, bio
) = requestBio (fn () => ())
519 Msg
.send (bio
, MsgNewMailbox p
);
521 NONE
=> print
"Server closed connection unexpectedly.\n"
524 MsgOk
=> print ("A mapping for " ^ #user p ^
"@" ^ #domain p ^
" has been created.\n")
525 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
526 | _
=> print
"Unexpected server reply.\n";
530 fun requestPasswdMailbox p
=
532 val (_
, bio
) = requestBio (fn () => ())
534 Msg
.send (bio
, MsgPasswdMailbox p
);
536 NONE
=> print
"Server closed connection unexpectedly.\n"
539 MsgOk
=> print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n")
540 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
541 | _
=> print
"Unexpected server reply.\n";
545 fun requestRmMailbox p
=
547 val (_
, bio
) = requestBio (fn () => ())
549 Msg
.send (bio
, MsgRmMailbox p
);
551 NONE
=> print
"Server closed connection unexpectedly.\n"
554 MsgOk
=> print ("The mapping for mailbox " ^ #user p ^
"@" ^ #domain p ^
" has been deleted.\n")
555 | MsgError s
=> print ("Remove failed: " ^ s ^
"\n")
556 | _
=> print
"Unexpected server reply.\n";
560 fun requestSaQuery addr
=
562 val (_
, bio
) = requestBio (fn () => ())
564 Msg
.send (bio
, MsgSaQuery addr
);
565 (case Msg
.recv bio
of
566 NONE
=> print
"Server closed connection unexpectedly.\n"
569 MsgSaStatus b
=> (print ("SpamAssassin filtering for " ^ addr ^
" is "
570 ^
(if b
then "ON" else "OFF") ^
".\n");
571 Msg
.send (bio
, MsgOk
))
572 | MsgError s
=> print ("Query failed: " ^ s ^
"\n")
573 | _
=> print
"Unexpected server reply.\n")
574 before OpenSSL
.close bio
579 val (_
, bio
) = requestBio (fn () => ())
581 Msg
.send (bio
, MsgSaSet p
);
583 NONE
=> print
"Server closed connection unexpectedly.\n"
586 MsgOk
=> print ("SpamAssassin filtering for " ^ #
1 p ^
" is now "
587 ^
(if #
2 p
then "ON" else "OFF") ^
".\n")
588 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
589 | _
=> print
"Unexpected server reply.\n";
593 fun requestSmtpLog domain
=
595 val (_
, bio
) = requestBio (fn () => ())
597 val _
= Msg
.send (bio
, MsgSmtpLogReq domain
)
601 NONE
=> print
"Server closed connection unexpectedly.\n"
605 | MsgSmtpLogRes line
=> (print line
;
607 | MsgError s
=> print ("Log search failed: " ^ s ^
"\n")
608 | _
=> print
"Unexpected server reply.\n"
614 fun requestApt
{node
, pkg
} =
616 val (user
, context
) = requestContext (fn () => ())
617 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
620 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
622 val _
= Msg
.send (bio
, MsgQuery (QApt pkg
))
626 NONE
=> (print
"Server closed connection unexpectedly.\n";
630 MsgYes
=> (print
"Package is installed.\n";
632 | MsgNo
=> (print
"Package is not installed.\n";
634 | MsgError s
=> (print ("APT query failed: " ^ s ^
"\n");
636 | _
=> (print
"Unexpected server reply.\n";
640 before OpenSSL
.close bio
643 fun requestCron
{node
, uname
} =
645 val (user
, context
) = requestContext (fn () => ())
646 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
649 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
651 val _
= Msg
.send (bio
, MsgQuery (QCron uname
))
655 NONE
=> (print
"Server closed connection unexpectedly.\n";
659 MsgYes
=> (print
"User has cron permissions.\n";
661 | MsgNo
=> (print
"User does not have cron permissions.\n";
663 | MsgError s
=> (print ("Cron query failed: " ^ s ^
"\n");
665 | _
=> (print
"Unexpected server reply.\n";
669 before OpenSSL
.close bio
672 fun requestFtp
{node
, uname
} =
674 val (user
, context
) = requestContext (fn () => ())
675 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
678 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
680 val _
= Msg
.send (bio
, MsgQuery (QFtp uname
))
684 NONE
=> (print
"Server closed connection unexpectedly.\n";
688 MsgYes
=> (print
"User has FTP permissions.\n";
690 | MsgNo
=> (print
"User does not have FTP permissions.\n";
692 | MsgError s
=> (print ("FTP query failed: " ^ s ^
"\n");
694 | _
=> (print
"Unexpected server reply.\n";
698 before OpenSSL
.close bio
701 fun requestTrustedPath
{node
, uname
} =
703 val (user
, context
) = requestContext (fn () => ())
704 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
707 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
709 val _
= Msg
.send (bio
, MsgQuery (QTrustedPath uname
))
713 NONE
=> (print
"Server closed connection unexpectedly.\n";
717 MsgYes
=> (print
"User has trusted path restriction.\n";
719 | MsgNo
=> (print
"User does not have trusted path restriction.\n";
721 | MsgError s
=> (print ("Trusted path query failed: " ^ s ^
"\n");
723 | _
=> (print
"Unexpected server reply.\n";
727 before OpenSSL
.close bio
730 fun requestSocketPerm
{node
, uname
} =
732 val (user
, context
) = requestContext (fn () => ())
733 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
736 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
738 val _
= Msg
.send (bio
, MsgQuery (QSocket uname
))
742 NONE
=> (print
"Server closed connection unexpectedly.\n";
746 MsgSocket p
=> (case p
of
748 | Client
=> print
"Client\n"
749 | Server
=> print
"Server\n"
750 | Nada
=> print
"Nada\n";
752 | MsgError s
=> (print ("Socket permission query failed: " ^ s ^
"\n");
754 | _
=> (print
"Unexpected server reply.\n";
758 before OpenSSL
.close bio
761 fun requestFirewall
{node
, uname
} =
763 val (user
, context
) = requestContext (fn () => ())
764 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
767 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
769 val _
= Msg
.send (bio
, MsgQuery (QFirewall uname
))
773 NONE
=> (print
"Server closed connection unexpectedly.\n";
777 MsgFirewall ls
=> (app (fn s
=> (print s
; print
"\n")) ls
;
779 | MsgError s
=> (print ("Firewall query failed: " ^ s ^
"\n");
781 | _
=> (print
"Unexpected server reply.\n";
785 before OpenSSL
.close bio
788 fun regenerate context
=
791 val () = Tycheck
.disallowExterns ()
793 val () = Domain
.resetGlobal ()
795 fun contactNode (node
, ip
) =
796 if node
= Config
.defaultNode
then
799 val bio
= OpenSSL
.connect (context
,
802 ^
Int.toString Config
.slavePort
)
804 Msg
.send (bio
, MsgRegenerate
);
806 NONE
=> print
"Slave closed connection unexpectedly\n"
809 MsgOk
=> print ("Slave " ^ node ^
" pre-regeneration finished\n")
810 | MsgError s
=> print ("Slave " ^ node
811 ^
" returned error: " ^
813 | _
=> print ("Slave " ^ node
814 ^
" returned unexpected command\n");
820 val _
= Domain
.setUser user
821 val _
= ErrorMsg
.reset ()
823 val dname
= Config
.domtoolDir user
825 val dir
= Posix
.FileSys
.opendir dname
828 case Posix
.FileSys
.readdir dir
of
829 NONE
=> (Posix
.FileSys
.closedir dir
;
833 loop (OS
.Path
.joinDirFile
{dir
= dname
,
840 val (_
, files
) = Order
.order (SOME b
) files
842 if !ErrorMsg
.anyErrors
then
843 print ("User " ^ user ^
"'s configuration has errors!\n")
848 | OS
.SysErr (s
, _
) => print ("System error processing user " ^ user ^
": " ^ s ^
"\n")
849 | ErrorMsg
.Error
=> print ("User " ^ user ^
" had a compilation error.\n")
850 | _
=> print
"Unknown exception during regeneration!\n"
852 app contactNode Config
.nodeIps
;
854 app
doUser (Acl
.users ());
860 val doms
= Acl
.class
{user
= user
, class
= "domain"}
861 val doms
= List.filter (fn dom
=>
862 case Acl
.whoHas
{class
= "domain", value
= dom
} of
864 | _
=> false) (StringSet
.listItems doms
)
870 fun now () = Date
.toString (Date
.fromTimeUniv (Time
.now ()))
874 QApt pkg
=> if Apt
.installed pkg
then MsgYes
else MsgNo
875 | QCron user
=> if Cron
.allowed user
then MsgYes
else MsgNo
876 | QFtp user
=> if Ftp
.allowed user
then MsgYes
else MsgNo
877 | QTrustedPath user
=> if TrustedPath
.query user
then MsgYes
else MsgNo
878 | QSocket user
=> MsgSocket (SocketPerm
.query user
)
879 | QFirewall user
=> MsgFirewall (Firewall
.query user
)
881 fun describeQuery q
=
883 QApt pkg
=> "Requested installation status of package " ^ pkg
884 | QCron user
=> "Asked about cron permissions for user " ^ user
885 | QFtp user
=> "Asked about FTP permissions for user " ^ user
886 | QTrustedPath user
=> "Asked about trusted path settings for user " ^ user
887 | QSocket user
=> "Asked about socket permissions for user " ^ user
888 | QFirewall user
=> "Asked about firewall rules for user " ^ user
892 val () = Acl
.read Config
.aclFile
894 val context
= OpenSSL
.context (Config
.serverCert
,
897 val _
= Domain
.set_context context
899 val sock
= OpenSSL
.listen (context
, Config
.dispatcherPort
)
902 case OpenSSL
.accept sock
of
906 val user
= OpenSSL
.peerCN bio
907 val () = print ("\nConnection from " ^ user ^
" at " ^
now () ^
"\n")
908 val () = Domain
.setUser user
912 (msgLocal
, SOME msgRemote
) =>
915 Msg
.send (bio
, MsgError msgRemote
))
916 |
(msgLocal
, NONE
) =>
919 Msg
.send (bio
, MsgOk
)))
920 handle OpenSSL
.OpenSSL _
=>
921 print
"OpenSSL error\n"
922 | OS
.SysErr (s
, _
) =>
923 (print
"System error: ";
926 Msg
.send (bio
, MsgError ("System error: " ^ s
))
927 handle OpenSSL
.OpenSSL _
=> ())
932 Msg
.send (bio
, MsgError ("Failure: " ^ s
))
933 handle OpenSSL
.OpenSSL _
=> ())
935 (print
"Compilation error\n";
936 Msg
.send (bio
, MsgError
"Error during configuration evaluation")
937 handle OpenSSL
.OpenSSL _
=> ());
939 ignore (OpenSSL
.readChar bio
);
941 handle OpenSSL
.OpenSSL _
=> ();
946 val _
= print
"Configuration:\n"
947 val _
= app (fn s
=> (print s
; print
"\n")) codes
950 val outname
= OS
.FileSys
.tmpName ()
954 val outf
= TextIO.openOut outname
956 TextIO.output (outf
, code
);
957 TextIO.closeOut outf
;
961 doIt (fn () => (Env
.pre ();
964 Msg
.send (bio
, MsgOk
);
965 ("Configuration complete.", NONE
)))
966 (fn () => OS
.FileSys
.remove outname
)
970 case String.fields (fn ch
=> ch
= #
"@") s
of
977 if Domain
.validEmailUser user
' andalso Domain
.yourDomain domain
then
985 NONE
=> (OpenSSL
.close bio
986 handle OpenSSL
.OpenSSL _
=> ();
990 MsgConfig code
=> doConfig
[code
]
991 | MsgMultiConfig codes
=> doConfig codes
994 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
995 orelse Acl
.query
{user
= user
, class
= "priv", value
= "shutdown"} then
996 print ("Domtool dispatcher shutting down at " ^
now () ^
"\n\n")
998 (print
"Unauthorized shutdown command!\n";
1000 handle OpenSSL
.OpenSSL _
=> ();
1005 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1007 Acl
.write Config
.aclFile
;
1008 ("Granted permission " ^ #value acl ^
" to " ^ #user acl ^
" in " ^ #class acl ^
".",
1011 ("Unauthorized user asked to grant a permission!",
1012 SOME
"Not authorized to grant privileges"))
1017 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1019 Acl
.write Config
.aclFile
;
1020 ("Revoked permission " ^ #value acl ^
" from " ^ #user acl ^
" in " ^ #class acl ^
".",
1023 ("Unauthorized user asked to revoke a permission!",
1024 SOME
"Not authorized to revoke privileges"))
1027 | MsgListPerms user
=>
1029 (Msg
.send (bio
, MsgPerms (Acl
.queryAll user
));
1030 ("Sent permission list for user " ^ user ^
".",
1036 (Msg
.send (bio
, MsgWhoHasResponse (Acl
.whoHas perm
));
1037 ("Sent whohas response for " ^ #class perm ^
" / " ^ #value perm ^
".",
1043 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1044 orelse List.all (fn dom
=> Acl
.query
{user
= user
, class
= "domain", value
= dom
}) doms
then
1047 Acl
.revokeFromAll
{class
= "domain", value
= dom
}) doms
;
1048 Acl
.write Config
.aclFile
;
1049 ("Removed domains" ^
foldl (fn (d
, s
) => s ^
" " ^ d
) "" doms ^
".",
1052 ("Unauthorized user asked to remove a domain!",
1053 SOME
"Not authorized to remove that domain"))
1058 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1059 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1060 (regenerate context
;
1061 ("Regenerated all configuration.",
1064 ("Unauthorized user asked to regenerate!",
1065 SOME
"Not authorized to regenerate"))
1068 | MsgRmuser user
' =>
1070 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1072 Acl
.write Config
.aclFile
;
1073 ("Removed user " ^ user
' ^
".",
1076 ("Unauthorized user asked to remove a user!",
1077 SOME
"Not authorized to remove users"))
1080 | MsgCreateDbUser
{dbtype
, passwd
} =>
1082 case Dbms
.lookup dbtype
of
1083 NONE
=> ("Database user creation request with unknown datatype type " ^ dbtype
,
1084 SOME ("Unknown database type " ^ dbtype
))
1086 case #adduser handler
{user
= user
, passwd
= passwd
} of
1087 NONE
=> ("Added " ^ dbtype ^
" user " ^ user ^
".",
1090 ("Error adding a " ^ dbtype ^
" user " ^ user ^
": " ^ msg
,
1091 SOME ("Error adding user: " ^ msg
)))
1094 | MsgDbPasswd
{dbtype
, passwd
} =>
1096 case Dbms
.lookup dbtype
of
1097 NONE
=> ("Database passwd request with unknown datatype type " ^ dbtype
,
1098 SOME ("Unknown database type " ^ dbtype
))
1100 case #passwd handler
{user
= user
, passwd
= passwd
} of
1101 NONE
=> ("Changed " ^ dbtype ^
" password of user " ^ user ^
".",
1104 ("Error setting " ^ dbtype ^
" password of user " ^ user ^
": " ^ msg
,
1105 SOME ("Error adding user: " ^ msg
)))
1108 | MsgCreateDbTable
{dbtype
, dbname
} =>
1110 if Dbms
.validDbname dbname
then
1111 case Dbms
.lookup dbtype
of
1112 NONE
=> ("Database creation request with unknown datatype type " ^ dbtype
,
1113 SOME ("Unknown database type " ^ dbtype
))
1115 case #createdb handler
{user
= user
, dbname
= dbname
} of
1116 NONE
=> ("Created database " ^ user ^
"_" ^ dbname ^
".",
1118 | SOME msg
=> ("Error creating database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1119 SOME ("Error creating database: " ^ msg
))
1121 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1122 SOME ("Invalid database name " ^ dbname
)))
1125 | MsgListMailboxes domain
=>
1127 if not (Domain
.yourDomain domain
) then
1128 ("User wasn't authorized to list mailboxes for " ^ domain
,
1129 SOME
"You're not authorized to configure that domain.")
1131 case Vmail
.list domain
of
1132 Vmail
.Listing users
=> (Msg
.send (bio
, MsgMailboxes users
);
1133 ("Sent mailbox list for " ^ domain
,
1135 | Vmail
.Error msg
=> ("Error listing mailboxes for " ^ domain ^
": " ^ msg
,
1139 | MsgNewMailbox
{domain
, user
= emailUser
, passwd
, mailbox
} =>
1141 if not (Domain
.yourDomain domain
) then
1142 ("User wasn't authorized to add a mailbox to " ^ domain
,
1143 SOME
"You're not authorized to configure that domain.")
1144 else if not (Domain
.validEmailUser emailUser
) then
1145 ("Invalid e-mail username " ^ emailUser
,
1146 SOME
"Invalid e-mail username")
1147 else if not (CharVector
.all
Char.isGraph passwd
) then
1148 ("Invalid password",
1149 SOME
"Invalid password; may only contain printable, non-space characters")
1150 else if not (Domain
.yourPath mailbox
) then
1151 ("User wasn't authorized to add a mailbox at " ^ mailbox
,
1152 SOME
"You're not authorized to use that mailbox location.")
1154 case Vmail
.add
{requester
= user
,
1155 domain
= domain
, user
= emailUser
,
1156 passwd
= passwd
, mailbox
= mailbox
} of
1157 NONE
=> ("Added mailbox " ^ emailUser ^
"@" ^ domain ^
" at " ^ mailbox
,
1159 | SOME msg
=> ("Error adding mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1163 | MsgPasswdMailbox
{domain
, user
= emailUser
, passwd
} =>
1165 if not (Domain
.yourDomain domain
) then
1166 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1167 SOME
"You're not authorized to configure that domain.")
1168 else if not (Domain
.validEmailUser emailUser
) then
1169 ("Invalid e-mail username " ^ emailUser
,
1170 SOME
"Invalid e-mail username")
1171 else if not (CharVector
.all
Char.isGraph passwd
) then
1172 ("Invalid password",
1173 SOME
"Invalid password; may only contain printable, non-space characters")
1175 case Vmail
.passwd
{domain
= domain
, user
= emailUser
,
1177 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1179 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1183 | MsgRmMailbox
{domain
, user
= emailUser
} =>
1185 if not (Domain
.yourDomain domain
) then
1186 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1187 SOME
"You're not authorized to configure that domain.")
1188 else if not (Domain
.validEmailUser emailUser
) then
1189 ("Invalid e-mail username " ^ emailUser
,
1190 SOME
"Invalid e-mail username")
1192 case Vmail
.rm
{domain
= domain
, user
= emailUser
} of
1193 NONE
=> ("Deleted mailbox " ^ emailUser ^
"@" ^ domain
,
1195 | SOME msg
=> ("Error deleting mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1199 | MsgSaQuery addr
=>
1201 case checkAddr addr
of
1202 NONE
=> ("User tried to query SA filtering for " ^ addr
,
1203 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1204 | SOME addr
' => (Msg
.send (bio
, MsgSaStatus (SetSA
.query addr
'));
1205 ("Queried SA filtering status for " ^ addr
,
1209 |
MsgSaSet (addr
, b
) =>
1211 case checkAddr addr
of
1212 NONE
=> ("User tried to set SA filtering for " ^ addr
,
1213 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1214 | SOME addr
' => (SetSA
.set (addr
', b
);
1215 Msg
.send (bio
, MsgOk
);
1216 ("Set SA filtering status for " ^ addr ^
" to "
1217 ^
(if b
then "ON" else "OFF"),
1221 | MsgSmtpLogReq domain
=>
1223 if not (Domain
.yourDomain domain
) then
1224 ("Unauthorized user tried to request SMTP logs for " ^ domain
,
1225 SOME
"You aren't authorized to configure that domain.")
1227 (SmtpLog
.search (fn line
=> Msg
.send (bio
, MsgSmtpLogRes line
))
1229 ("Requested SMTP logs for " ^ domain
,
1234 doIt (fn () => (Msg
.send (bio
, answerQuery q
);
1240 doIt (fn () => ("Unexpected command",
1241 SOME
"Unexpected command"))
1246 handle OpenSSL
.OpenSSL s
=>
1247 (print ("OpenSSL error: " ^ s ^
"\n");
1249 handle OpenSSL
.OpenSSL _
=> ();
1251 | OS
.SysErr (s
, _
) =>
1252 (print ("System error: " ^ s ^
"\n");
1254 handle OpenSSL
.OpenSSL _
=> ();
1257 (print
"Unknown exception in main loop!\n";
1259 handle OpenSSL
.OpenSSL _
=> ();
1262 print ("Domtool dispatcher starting up at " ^
now () ^
"\n");
1263 print
"Listening for connections....\n";
1265 OpenSSL
.shutdown sock
1270 val host
= Slave
.hostname ()
1272 val context
= OpenSSL
.context (Config
.certDir ^
"/" ^ host ^
".pem",
1273 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1276 val sock
= OpenSSL
.listen (context
, Config
.slavePort
)
1278 val _
= print ("Slave server starting at " ^
now () ^
"\n")
1281 case OpenSSL
.accept sock
of
1285 val peer
= OpenSSL
.peerCN bio
1286 val () = print ("\nConnection from " ^ peer ^
" at " ^
now () ^
"\n")
1288 if peer
= Config
.dispatcherName
then let
1290 case Msg
.recv bio
of
1291 NONE
=> print
"Dispatcher closed connection unexpectedly\n"
1294 MsgFile file
=> loop
' (file
:: files
)
1295 | MsgDoFiles
=> (Slave
.handleChanges files
;
1296 Msg
.send (bio
, MsgOk
))
1297 | MsgRegenerate
=> (Domain
.resetLocal ();
1298 Msg
.send (bio
, MsgOk
))
1299 | _
=> (print
"Dispatcher sent unexpected command\n";
1300 Msg
.send (bio
, MsgError
"Unexpected command"))
1303 ignore (OpenSSL
.readChar bio
);
1307 else if peer
= "domtool" then
1308 case Msg
.recv bio
of
1309 SOME MsgShutdown
=> (OpenSSL
.close bio
;
1310 print ("Shutting down at " ^
now () ^
"\n\n"))
1311 | _
=> (OpenSSL
.close bio
;
1314 case Msg
.recv bio
of
1315 SOME (MsgQuery q
) => (print (describeQuery q ^
"\n");
1316 Msg
.send (bio
, answerQuery q
);
1317 ignore (OpenSSL
.readChar bio
);
1320 | _
=> (OpenSSL
.close bio
;
1322 end handle OpenSSL
.OpenSSL s
=>
1323 (print ("OpenSSL error: "^ s ^
"\n");
1325 handle OpenSSL
.OpenSSL _
=> ();
1327 | e
as OS
.SysErr (s
, _
) =>
1328 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1329 print ("System error: "^ s ^
"\n");
1331 handle OpenSSL
.OpenSSL _
=> ();
1335 OpenSSL
.shutdown sock
1340 val dir
= Posix
.FileSys
.opendir Config
.libRoot
1343 case Posix
.FileSys
.readdir dir
of
1344 NONE
=> (Posix
.FileSys
.closedir dir
;
1347 if String.isSuffix
".dtl" fname
then
1348 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
1357 fun autodocBasis outdir
=
1358 Autodoc
.autodoc
{outdir
= outdir
, infiles
= listBasis ()}