1 (* HCoop
Domtool (http
://hcoop
.sourceforge
.net
/)
2 * Copyright (c
) 2006-2007, Adam Chlipala
4 * This program is free software
; you can redistribute it
and/or
5 * modify it under the terms
of the GNU General Public License
6 * as published by the Free Software Foundation
; either version
2
7 * of the License
, or (at your option
) any later version
.
9 * This program is distributed
in the hope that it will be useful
,
10 * but WITHOUT ANY WARRANTY
; without even the implied warranty
of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE
. See the
12 * GNU General Public License for more details
.
14 * You should have received a copy
of the GNU General Public License
15 * along
with this program
; if not
, write to the Free Software
16 * Foundation
, Inc
., 51 Franklin Street
, Fifth Floor
, Boston
, MA
02110-1301, USA
.
21 structure Main
:> MAIN
= struct
23 open Ast MsgTypes Print
25 structure SM
= StringMap
27 fun init () = Acl
.read Config
.aclFile
29 fun isLib fname
= OS
.Path
.file fname
= "lib.dtl"
31 fun wrapFile (fname
, file
) =
32 case (isLib fname
, file
) of
33 (true, (comment
, ds
, SOME e
)) =>
37 (comment
, ds
, SOME (ELocal (e
, (ESkip
, loc
)), loc
))
43 val prog
= Parse
.parse fname
44 val prog
= wrapFile (fname
, prog
)
46 if !ErrorMsg
.anyErrors
then
52 Option
.app (Unused
.check G
) (#
3 prog
);
53 Tycheck
.checkFile
G (Defaults
.tInit prog
) prog
)
58 val dir
= Posix
.FileSys
.opendir Config
.libRoot
61 case Posix
.FileSys
.readdir dir
of
62 NONE
=> (Posix
.FileSys
.closedir dir
;
65 if String.isSuffix
".dtl" fname
then
66 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
73 val (_
, files
) = Order
.order NONE files
75 if !ErrorMsg
.anyErrors
then
78 (Tycheck
.allowExterns ();
79 foldl (fn (fname
, G
) => check
' G fname
) Env
.empty files
80 before Tycheck
.disallowExterns ())
83 (* val b
= basis () *)
87 val _
= ErrorMsg
.reset ()
88 val _
= Env
.preTycheck ()
90 if !ErrorMsg
.anyErrors
then
94 val _
= Tycheck
.disallowExterns ()
95 val _
= ErrorMsg
.reset ()
96 val prog
= Parse
.parse fname
97 val prog
= wrapFile (fname
, prog
)
99 if !ErrorMsg
.anyErrors
then
103 val G
' = Tycheck
.checkFile
G (Defaults
.tInit prog
) prog
105 if !ErrorMsg
.anyErrors
then
111 Option
.app (Unused
.check G
) (#
3 prog
);
118 String.sub (s
, 0) <> #
"."
119 andalso CharVector
.all (fn ch
=> Char.isAlphaNum ch
orelse ch
= #
"." orelse ch
= #
"_" orelse ch
= #
"-") s
124 case Posix
.ProcEnv
.getenv
"DOMTOOL_USER" of
127 val uid
= Posix
.ProcEnv
.getuid ()
129 Posix
.SysDB
.Passwd
.name (Posix
.SysDB
.getpwuid uid
)
133 Acl
.read Config
.aclFile
;
138 fun checkDir
' dname
=
142 val dir
= Posix
.FileSys
.opendir dname
145 case Posix
.FileSys
.readdir dir
of
146 NONE
=> (Posix
.FileSys
.closedir dir
;
150 loop (OS
.Path
.joinDirFile
{dir
= dname
,
157 val (_
, files
) = Order
.order (SOME b
) files
159 if !ErrorMsg
.anyErrors
then
162 (foldl (fn (fname
, G
) => check
' G fname
) b files
;
163 if !ErrorMsg
.anyErrors
then
175 val (G
, body
) = check G fname
177 if !ErrorMsg
.anyErrors
then
183 val body
' = Reduce
.reduceExp G body
185 (*printd (PD
.hovBox (PD
.PPS
.Rel
0,
186 [PD
.string "Result:",
194 (*(Defaults
.eInit ())*)
196 fun eval G evs fname
=
197 case reduce G fname
of
199 if !ErrorMsg
.anyErrors
then
203 val evs
' = Eval
.exec
' evs body
'
210 Config
.dispatcher ^
":" ^
Int.toString Config
.dispatcherPort
213 "localhost:" ^
Int.toString Config
.slavePort
216 (OpenSSL
.context
false x
)
217 handle e
as OpenSSL
.OpenSSL s
=>
218 (print
"Couldn't find your certificate.\nYou probably haven't been given any Domtool privileges.\n";
219 print ("I looked in: " ^ #
1 x ^
"\n");
220 print ("Additional information: " ^ s ^
"\n");
223 fun requestContext f
=
225 val user
= setupUser ()
229 val context
= context (Config
.certDir ^
"/" ^ user ^
".pem",
230 Config
.keyDir ^
"/" ^ user ^
"/key.pem",
238 val (user
, context
) = requestContext f
240 (user
, OpenSSL
.connect (context
, dispatcher
))
243 fun requestSlaveBio () =
245 val (user
, context
) = requestContext (fn () => ())
247 (user
, OpenSSL
.connect (context
, self
))
252 val (user
, bio
) = requestBio (fn () => ignore (check (basis ()) fname
))
254 val inf
= TextIO.openIn fname
257 case TextIO.inputLine inf
of
258 NONE
=> String.concat (List.rev lines
)
259 | SOME line
=> loop (line
:: lines
)
264 Msg
.send (bio
, MsgConfig code
);
266 NONE
=> print
"Server closed connection unexpectedly.\n"
269 MsgOk
=> print
"Configuration succeeded.\n"
270 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
271 | _
=> print
"Unexpected server reply.\n";
274 handle ErrorMsg
.Error
=> ()
276 fun requestDir dname
=
278 val _
= if Posix
.FileSys
.access (dname
, []) then
281 (print ("Can't access " ^ dname ^
".\n");
282 print
"Did you mean to run domtool on a specific file, instead of asking for all\n";
283 print
"files in your ~/.domtool directory?\n";
284 OS
.Process
.exit OS
.Process
.failure
)
286 val _
= ErrorMsg
.reset ()
288 val (user
, bio
) = requestBio (fn () => checkDir
' dname
)
292 val dir
= Posix
.FileSys
.opendir dname
295 case Posix
.FileSys
.readdir dir
of
296 NONE
=> (Posix
.FileSys
.closedir dir
;
300 loop (OS
.Path
.joinDirFile
{dir
= dname
,
307 val (_
, files
) = Order
.order (SOME b
) files
309 val _
= if !ErrorMsg
.anyErrors
then
310 (print
"J\n";raise ErrorMsg
.Error
)
314 val codes
= map (fn fname
=>
316 val inf
= TextIO.openIn fname
319 case TextIO.inputLine inf
of
320 NONE
=> String.concat (rev lines
)
321 | SOME line
=> loop (line
:: lines
)
324 before TextIO.closeIn inf
327 if !ErrorMsg
.anyErrors
then
330 (Msg
.send (bio
, MsgMultiConfig codes
);
332 NONE
=> print
"Server closed connection unexpectedly.\n"
335 MsgOk
=> print
"Configuration succeeded.\n"
336 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
337 | _
=> print
"Unexpected server reply.\n";
340 handle ErrorMsg
.Error
=> ()
344 val (_
, bio
) = requestBio (fn () => ())
349 handle _
=> OS
.Process
.failure
351 fun requestShutdown () =
353 val (_
, bio
) = requestBio (fn () => ())
355 Msg
.send (bio
, MsgShutdown
);
357 NONE
=> print
"Server closed connection unexpectedly.\n"
360 MsgOk
=> print
"Shutdown begun.\n"
361 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
362 | _
=> print
"Unexpected server reply.\n";
366 fun requestSlavePing () =
368 val (_
, bio
) = requestSlaveBio ()
373 handle _
=> OS
.Process
.failure
375 fun requestSlaveShutdown () =
377 val (_
, bio
) = requestSlaveBio ()
379 Msg
.send (bio
, MsgShutdown
);
381 NONE
=> print
"Server closed connection unexpectedly.\n"
384 MsgOk
=> print
"Shutdown begun.\n"
385 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
386 | _
=> print
"Unexpected server reply.\n";
390 fun requestGrant acl
=
392 val (user
, bio
) = requestBio (fn () => ())
394 Msg
.send (bio
, MsgGrant acl
);
396 NONE
=> print
"Server closed connection unexpectedly.\n"
399 MsgOk
=> print
"Grant succeeded.\n"
400 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
401 | _
=> print
"Unexpected server reply.\n";
405 fun requestRevoke acl
=
407 val (user
, bio
) = requestBio (fn () => ())
409 Msg
.send (bio
, MsgRevoke acl
);
411 NONE
=> print
"Server closed connection unexpectedly.\n"
414 MsgOk
=> print
"Revoke succeeded.\n"
415 | MsgError s
=> print ("Revoke failed: " ^ s ^
"\n")
416 | _
=> print
"Unexpected server reply.\n";
420 fun requestListPerms user
=
422 val (_
, bio
) = requestBio (fn () => ())
424 Msg
.send (bio
, MsgListPerms user
);
425 (case Msg
.recv bio
of
426 NONE
=> (print
"Server closed connection unexpectedly.\n";
430 MsgPerms perms
=> SOME perms
431 | MsgError s
=> (print ("Listing failed: " ^ s ^
"\n");
433 | _
=> (print
"Unexpected server reply.\n";
435 before OpenSSL
.close bio
438 fun requestWhoHas perm
=
440 val (_
, bio
) = requestBio (fn () => ())
442 Msg
.send (bio
, MsgWhoHas perm
);
443 (case Msg
.recv bio
of
444 NONE
=> (print
"Server closed connection unexpectedly.\n";
448 MsgWhoHasResponse users
=> SOME users
449 | MsgError s
=> (print ("whohas failed: " ^ s ^
"\n");
451 | _
=> (print
"Unexpected server reply.\n";
453 before OpenSSL
.close bio
456 fun requestRegen () =
458 val (_
, bio
) = requestBio (fn () => ())
460 Msg
.send (bio
, MsgRegenerate
);
462 NONE
=> print
"Server closed connection unexpectedly.\n"
465 MsgOk
=> print
"Regeneration succeeded.\n"
466 | MsgError s
=> print ("Regeneration failed: " ^ s ^
"\n")
467 | _
=> print
"Unexpected server reply.\n";
471 fun requestRegenTc () =
473 val (_
, bio
) = requestBio (fn () => ())
475 Msg
.send (bio
, MsgRegenerateTc
);
477 NONE
=> print
"Server closed connection unexpectedly.\n"
480 MsgOk
=> print
"All configuration validated.\n"
481 | MsgError s
=> print ("Configuration validation failed: " ^ s ^
"\n")
482 | _
=> print
"Unexpected server reply.\n";
486 fun requestRmdom dom
=
488 val (_
, bio
) = requestBio (fn () => ())
490 Msg
.send (bio
, MsgRmdom dom
);
492 NONE
=> print
"Server closed connection unexpectedly.\n"
495 MsgOk
=> print
"Removal succeeded.\n"
496 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
497 | _
=> print
"Unexpected server reply.\n";
501 fun requestRmuser user
=
503 val (_
, bio
) = requestBio (fn () => ())
505 Msg
.send (bio
, MsgRmuser user
);
507 NONE
=> print
"Server closed connection unexpectedly.\n"
510 MsgOk
=> print
"Removal succeeded.\n"
511 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
512 | _
=> print
"Unexpected server reply.\n";
516 fun requestDbUser dbtype
=
518 val (_
, bio
) = requestBio (fn () => ())
520 Msg
.send (bio
, MsgCreateDbUser dbtype
);
522 NONE
=> print
"Server closed connection unexpectedly.\n"
525 MsgOk
=> print
"Your user has been created.\n"
526 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
527 | _
=> print
"Unexpected server reply.\n";
531 fun requestDbPasswd rc
=
533 val (_
, bio
) = requestBio (fn () => ())
535 Msg
.send (bio
, MsgDbPasswd rc
);
537 NONE
=> print
"Server closed connection unexpectedly.\n"
540 MsgOk
=> print
"Your password has been changed.\n"
541 | MsgError s
=> print ("Password set failed: " ^ s ^
"\n")
542 | _
=> print
"Unexpected server reply.\n";
546 fun requestDbTable p
=
548 val (user
, bio
) = requestBio (fn () => ())
550 Msg
.send (bio
, MsgCreateDb p
);
552 NONE
=> print
"Server closed connection unexpectedly.\n"
555 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been created.\n")
556 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
557 | _
=> print
"Unexpected server reply.\n";
561 fun requestDbDrop p
=
563 val (user
, bio
) = requestBio (fn () => ())
565 Msg
.send (bio
, MsgDropDb p
);
567 NONE
=> print
"Server closed connection unexpectedly.\n"
570 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been dropped.\n")
571 | MsgError s
=> print ("Drop failed: " ^ s ^
"\n")
572 | _
=> print
"Unexpected server reply.\n";
576 fun requestDbGrant p
=
578 val (user
, bio
) = requestBio (fn () => ())
580 Msg
.send (bio
, MsgGrantDb p
);
582 NONE
=> print
"Server closed connection unexpectedly.\n"
585 MsgOk
=> print ("You've been granted all allowed privileges to database " ^ user ^
"_" ^ #dbname p ^
".\n")
586 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
587 | _
=> print
"Unexpected server reply.\n";
591 fun requestListMailboxes domain
=
593 val (_
, bio
) = requestBio (fn () => ())
595 Msg
.send (bio
, MsgListMailboxes domain
);
596 (case Msg
.recv bio
of
597 NONE
=> Vmail
.Error
"Server closed connection unexpectedly."
600 MsgMailboxes users
=> (Msg
.send (bio
, MsgOk
);
602 | MsgError s
=> Vmail
.Error ("Listing failed: " ^ s
)
603 | _
=> Vmail
.Error
"Unexpected server reply.")
604 before OpenSSL
.close bio
607 fun requestNewMailbox p
=
609 val (_
, bio
) = requestBio (fn () => ())
611 Msg
.send (bio
, MsgNewMailbox p
);
613 NONE
=> print
"Server closed connection unexpectedly.\n"
616 MsgOk
=> print ("A mapping for " ^ #user p ^
"@" ^ #domain p ^
" has been created.\n")
617 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
618 | _
=> print
"Unexpected server reply.\n";
622 fun requestPasswdMailbox p
=
624 val (_
, bio
) = requestBio (fn () => ())
626 Msg
.send (bio
, MsgPasswdMailbox p
);
628 NONE
=> print
"Server closed connection unexpectedly.\n"
631 MsgOk
=> print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n")
632 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
633 | _
=> print
"Unexpected server reply.\n";
637 fun requestRmMailbox p
=
639 val (_
, bio
) = requestBio (fn () => ())
641 Msg
.send (bio
, MsgRmMailbox p
);
643 NONE
=> print
"Server closed connection unexpectedly.\n"
646 MsgOk
=> print ("The mapping for mailbox " ^ #user p ^
"@" ^ #domain p ^
" has been deleted.\n")
647 | MsgError s
=> print ("Remove failed: " ^ s ^
"\n")
648 | _
=> print
"Unexpected server reply.\n";
652 fun requestSaQuery addr
=
654 val (_
, bio
) = requestBio (fn () => ())
656 Msg
.send (bio
, MsgSaQuery addr
);
657 (case Msg
.recv bio
of
658 NONE
=> print
"Server closed connection unexpectedly.\n"
661 MsgSaStatus b
=> (print ("SpamAssassin filtering for " ^ addr ^
" is "
662 ^
(if b
then "ON" else "OFF") ^
".\n");
663 Msg
.send (bio
, MsgOk
))
664 | MsgError s
=> print ("Query failed: " ^ s ^
"\n")
665 | _
=> print
"Unexpected server reply.\n")
666 before OpenSSL
.close bio
671 val (_
, bio
) = requestBio (fn () => ())
673 Msg
.send (bio
, MsgSaSet p
);
675 NONE
=> print
"Server closed connection unexpectedly.\n"
678 MsgOk
=> print ("SpamAssassin filtering for " ^ #
1 p ^
" is now "
679 ^
(if #
2 p
then "ON" else "OFF") ^
".\n")
680 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
681 | _
=> print
"Unexpected server reply.\n";
685 fun requestSmtpLog domain
=
687 val (_
, bio
) = requestBio (fn () => ())
689 val _
= Msg
.send (bio
, MsgSmtpLogReq domain
)
693 NONE
=> print
"Server closed connection unexpectedly.\n"
697 | MsgSmtpLogRes line
=> (print line
;
699 | MsgError s
=> print ("Log search failed: " ^ s ^
"\n")
700 | _
=> print
"Unexpected server reply.\n"
706 fun requestMysqlFixperms () =
708 val (_
, bio
) = requestBio (fn () => ())
710 Msg
.send (bio
, MsgMysqlFixperms
);
712 NONE
=> print
"Server closed connection unexpectedly.\n"
715 MsgOk
=> print
"Permissions granted.\n"
716 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
717 | _
=> print
"Unexpected server reply.\n";
721 fun requestApt
{node
, pkg
} =
723 val (user
, context
) = requestContext (fn () => ())
724 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
727 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
729 val _
= Msg
.send (bio
, MsgQuery (QApt pkg
))
733 NONE
=> (print
"Server closed connection unexpectedly.\n";
737 MsgYes
=> (print
"Package is installed.\n";
739 | MsgNo
=> (print
"Package is not installed.\n";
741 | MsgError s
=> (print ("APT query failed: " ^ s ^
"\n");
743 | _
=> (print
"Unexpected server reply.\n";
747 before OpenSSL
.close bio
750 fun requestCron
{node
, uname
} =
752 val (user
, context
) = requestContext (fn () => ())
753 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
756 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
758 val _
= Msg
.send (bio
, MsgQuery (QCron uname
))
762 NONE
=> (print
"Server closed connection unexpectedly.\n";
766 MsgYes
=> (print
"User has cron permissions.\n";
768 | MsgNo
=> (print
"User does not have cron permissions.\n";
770 | MsgError s
=> (print ("Cron query failed: " ^ s ^
"\n");
772 | _
=> (print
"Unexpected server reply.\n";
776 before OpenSSL
.close bio
779 fun requestFtp
{node
, uname
} =
781 val (user
, context
) = requestContext (fn () => ())
782 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
785 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
787 val _
= Msg
.send (bio
, MsgQuery (QFtp uname
))
791 NONE
=> (print
"Server closed connection unexpectedly.\n";
795 MsgYes
=> (print
"User has FTP permissions.\n";
797 | MsgNo
=> (print
"User does not have FTP permissions.\n";
799 | MsgError s
=> (print ("FTP query failed: " ^ s ^
"\n");
801 | _
=> (print
"Unexpected server reply.\n";
805 before OpenSSL
.close bio
808 fun requestTrustedPath
{node
, uname
} =
810 val (user
, context
) = requestContext (fn () => ())
811 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
814 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
816 val _
= Msg
.send (bio
, MsgQuery (QTrustedPath uname
))
820 NONE
=> (print
"Server closed connection unexpectedly.\n";
824 MsgYes
=> (print
"User has trusted path restriction.\n";
826 | MsgNo
=> (print
"User does not have trusted path restriction.\n";
828 | MsgError s
=> (print ("Trusted path query failed: " ^ s ^
"\n");
830 | _
=> (print
"Unexpected server reply.\n";
834 before OpenSSL
.close bio
837 fun requestSocketPerm
{node
, uname
} =
839 val (user
, context
) = requestContext (fn () => ())
840 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
843 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
845 val _
= Msg
.send (bio
, MsgQuery (QSocket uname
))
849 NONE
=> (print
"Server closed connection unexpectedly.\n";
853 MsgSocket p
=> (case p
of
855 | Client
=> print
"Client\n"
856 | Server
=> print
"Server\n"
857 | Nada
=> print
"Nada\n";
859 | MsgError s
=> (print ("Socket permission query failed: " ^ s ^
"\n");
861 | _
=> (print
"Unexpected server reply.\n";
865 before OpenSSL
.close bio
868 fun requestFirewall
{node
, uname
} =
870 val (user
, context
) = requestContext (fn () => ())
871 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
874 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
876 val _
= Msg
.send (bio
, MsgQuery (QFirewall uname
))
880 NONE
=> (print
"Server closed connection unexpectedly.\n";
884 MsgFirewall ls
=> (app (fn s
=> (print s
; print
"\n")) ls
;
886 | MsgError s
=> (print ("Firewall query failed: " ^ s ^
"\n");
888 | _
=> (print
"Unexpected server reply.\n";
892 before OpenSSL
.close bio
895 fun requestDescribe dom
=
897 val (_
, bio
) = requestBio (fn () => ())
899 Msg
.send (bio
, MsgDescribe dom
);
901 NONE
=> print
"Server closed connection unexpectedly.\n"
904 MsgDescription s
=> print s
905 | MsgError s
=> print ("Description failed: " ^ s ^
"\n")
906 | _
=> print
"Unexpected server reply.\n";
910 structure SS
= StringSet
912 fun domainList dname
=
914 val dir
= Posix
.FileSys
.opendir dname
917 case Posix
.FileSys
.readdir dir
of
921 val path
= OS
.Path
.joinDirFile
{dir
= dname
,
924 fun visitDomains (path
, bfor
, dset
) =
926 val dir
= Posix
.FileSys
.opendir path
929 case Posix
.FileSys
.readdir dir
of
933 val path
= OS
.Path
.joinDirFile
{dir
= path
,
936 if Posix
.FileSys
.ST
.isDir (Posix
.FileSys
.stat path
) then
938 val bfor
= dname
:: bfor
940 loop (visitDomains (path
, bfor
,
942 String.concatWith
"." bfor
)))
949 before Posix
.FileSys
.closedir dir
952 visitNode (visitDomains (path
, [], dset
))
956 before Posix
.FileSys
.closedir dir
959 fun regenerateEither tc checker context
=
961 val () = print
"Starting regeneration....\n"
967 domainList Config
.resultRoot
975 val _
= ErrorMsg
.reset ()
978 val () = Tycheck
.disallowExterns ()
980 val () = ifReal (fn () =>
981 (ignore (OS
.Process
.system ("rm -rf " ^ Config
.oldResultRoot ^
"/*"));
982 ignore (OS
.Process
.system ("cp -r " ^ Config
.resultRoot
983 ^
"/* " ^ Config
.oldResultRoot ^
"/"));
984 Domain
.resetGlobal ()))
988 fun contactNode (node
, ip
) =
989 if node
= Config
.defaultNode
then
992 val bio
= OpenSSL
.connect (context
,
995 ^
Int.toString Config
.slavePort
)
997 Msg
.send (bio
, MsgRegenerate
);
999 NONE
=> print
"Slave closed connection unexpectedly\n"
1002 MsgOk
=> print ("Slave " ^ node ^
" pre-regeneration finished\n")
1003 | MsgError s
=> print ("Slave " ^ node
1004 ^
" returned error: " ^
1006 | _
=> print ("Slave " ^ node
1007 ^
" returned unexpected command\n");
1010 handle OpenSSL
.OpenSSL s
=> print ("OpenSSL error: " ^ s ^
"\n")
1014 val _
= Domain
.setUser user
1015 val _
= ErrorMsg
.reset ()
1017 val dname
= Config
.domtoolDir user
1019 if Posix
.FileSys
.access (dname
, []) then
1021 val dir
= Posix
.FileSys
.opendir dname
1024 case Posix
.FileSys
.readdir dir
of
1025 NONE
=> (Posix
.FileSys
.closedir dir
;
1028 if notTmp fname
then
1029 loop (OS
.Path
.joinDirFile
{dir
= dname
,
1036 val (_
, files
) = Order
.order (SOME b
) files
1038 fun checker
' (file
, (G
, evs
)) =
1041 if !ErrorMsg
.anyErrors
then
1043 print ("User " ^ user ^
"'s configuration has errors!\n");
1047 ignore (foldl checker
' (basis (), Defaults
.eInit ()) files
)
1049 else if String.isSuffix
"_admin" user
then
1052 (print ("Couldn't access " ^ user ^
"'s ~/.domtool directory.\n");
1055 handle IO
.Io
{name
, function
, ...} =>
1056 (print ("IO error processing user " ^ user ^
": " ^ function ^
": " ^ name ^
"\n");
1058 | exn
as OS
.SysErr (s
, _
) => (print ("System error processing user " ^ user ^
": " ^ s ^
"\n");
1060 | ErrorMsg
.Error
=> (ErrorMsg
.reset ();
1061 print ("User " ^ user ^
" had a compilation error.\n");
1063 | _
=> (print
"Unknown exception during regeneration!\n";
1066 ifReal (fn () => (app contactNode Config
.nodeIps
;
1068 app
doUser (Acl
.users ());
1071 val domainsAfter
= domainList Config
.resultRoot
1072 val domainsGone
= SS
.difference (domainsBefore
, domainsAfter
)
1074 if SS
.isEmpty domainsGone
then
1077 (print
"Domains to kill:";
1078 SS
.app (fn s
=> (print
" "; print s
)) domainsGone
;
1081 Domain
.rmdom
' Config
.oldResultRoot (SS
.listItems domainsGone
));
1088 val regenerate
= regenerateEither
false eval
1089 val regenerateTc
= regenerateEither
true
1090 (fn G
=> fn evs
=> fn file
=>
1091 (#
1 (check G file
), evs
))
1095 val doms
= Acl
.class
{user
= user
, class
= "domain"}
1096 val doms
= List.filter (fn dom
=>
1097 case Acl
.whoHas
{class
= "domain", value
= dom
} of
1099 | _
=> false) (StringSet
.listItems doms
)
1105 fun now () = Date
.toString (Date
.fromTimeUniv (Time
.now ()))
1109 QApt pkg
=> if Apt
.installed pkg
then MsgYes
else MsgNo
1110 | QCron user
=> if Cron
.allowed user
then MsgYes
else MsgNo
1111 | QFtp user
=> if Ftp
.allowed user
then MsgYes
else MsgNo
1112 | QTrustedPath user
=> if TrustedPath
.query user
then MsgYes
else MsgNo
1113 | QSocket user
=> MsgSocket (SocketPerm
.query user
)
1114 | QFirewall user
=> MsgFirewall (Firewall
.query user
)
1116 fun describeQuery q
=
1118 QApt pkg
=> "Requested installation status of package " ^ pkg
1119 | QCron user
=> "Asked about cron permissions for user " ^ user
1120 | QFtp user
=> "Asked about FTP permissions for user " ^ user
1121 | QTrustedPath user
=> "Asked about trusted path settings for user " ^ user
1122 | QSocket user
=> "Asked about socket permissions for user " ^ user
1123 | QFirewall user
=> "Asked about firewall rules for user " ^ user
1127 val () = Acl
.read Config
.aclFile
1129 val context
= context (Config
.serverCert
,
1132 val _
= Domain
.set_context context
1134 val sock
= OpenSSL
.listen (context
, Config
.dispatcherPort
)
1137 (case OpenSSL
.accept sock
of
1141 val user
= OpenSSL
.peerCN bio
1142 val () = print ("\nConnection from " ^ user ^
" at " ^
now () ^
"\n")
1143 val () = Domain
.setUser user
1145 fun doIt f cleanup
=
1147 (msgLocal
, SOME msgRemote
) =>
1150 Msg
.send (bio
, MsgError msgRemote
))
1151 |
(msgLocal
, NONE
) =>
1154 Msg
.send (bio
, MsgOk
)))
1155 handle e
as (OpenSSL
.OpenSSL s
) =>
1156 (print ("OpenSSL error: " ^ s ^
"\n");
1157 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1158 Msg
.send (bio
, MsgError ("OpenSSL error: " ^ s
))
1159 handle OpenSSL
.OpenSSL _
=> ())
1160 | OS
.SysErr (s
, _
) =>
1161 (print
"System error: ";
1164 Msg
.send (bio
, MsgError ("System error: " ^ s
))
1165 handle OpenSSL
.OpenSSL _
=> ())
1170 Msg
.send (bio
, MsgError ("Failure: " ^ s
))
1171 handle OpenSSL
.OpenSSL _
=> ())
1173 (print
"Compilation error\n";
1174 Msg
.send (bio
, MsgError
"Error during configuration evaluation")
1175 handle OpenSSL
.OpenSSL _
=> ());
1177 ignore (OpenSSL
.readChar bio
);
1179 handle OpenSSL
.OpenSSL _
=> ();
1182 fun doConfig codes
=
1184 val _
= print
"Configuration:\n"
1185 val _
= app (fn s
=> (print s
; print
"\n")) codes
1188 val outname
= OS
.FileSys
.tmpName ()
1190 fun doOne (code
, (G
, evs
)) =
1192 val outf
= TextIO.openOut outname
1194 TextIO.output (outf
, code
);
1195 TextIO.closeOut outf
;
1199 doIt (fn () => (Env
.pre ();
1200 ignore (foldl
doOne (basis (), Defaults
.eInit ()) codes
);
1202 Msg
.send (bio
, MsgOk
);
1203 ("Configuration complete.", NONE
)))
1204 (fn () => OS
.FileSys
.remove outname
)
1208 case String.fields (fn ch
=> ch
= #
"@") s
of
1210 if user
= user
' then
1214 |
[user
', domain
] =>
1215 if Domain
.validEmailUser user
' andalso Domain
.yourDomain domain
then
1216 SOME (SetSA
.Email s
)
1222 case Msg
.recv bio
of
1223 NONE
=> (OpenSSL
.close bio
1224 handle OpenSSL
.OpenSSL _
=> ();
1228 MsgConfig code
=> doConfig
[code
]
1229 | MsgMultiConfig codes
=> doConfig codes
1232 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1233 orelse Acl
.query
{user
= user
, class
= "priv", value
= "shutdown"} then
1234 print ("Domtool dispatcher shutting down at " ^
now () ^
"\n\n")
1236 (print
"Unauthorized shutdown command!\n";
1238 handle OpenSSL
.OpenSSL _
=> ();
1243 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1245 Acl
.write Config
.aclFile
;
1246 ("Granted permission " ^ #value acl ^
" to " ^ #user acl ^
" in " ^ #class acl ^
".",
1249 ("Unauthorized user asked to grant a permission!",
1250 SOME
"Not authorized to grant privileges"))
1255 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1257 Acl
.write Config
.aclFile
;
1258 ("Revoked permission " ^ #value acl ^
" from " ^ #user acl ^
" in " ^ #class acl ^
".",
1261 ("Unauthorized user asked to revoke a permission!",
1262 SOME
"Not authorized to revoke privileges"))
1265 | MsgListPerms user
=>
1267 (Msg
.send (bio
, MsgPerms (Acl
.queryAll user
));
1268 ("Sent permission list for user " ^ user ^
".",
1274 (Msg
.send (bio
, MsgWhoHasResponse (Acl
.whoHas perm
));
1275 ("Sent whohas response for " ^ #class perm ^
" / " ^ #value perm ^
".",
1281 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1282 orelse List.all (fn dom
=> Acl
.query
{user
= user
, class
= "domain", value
= dom
}) doms
then
1285 Acl
.revokeFromAll
{class
= "domain", value
= dom
}) doms
;
1286 Acl
.write Config
.aclFile
;
1287 ("Removed domains" ^
foldl (fn (d
, s
) => s ^
" " ^ d
) "" doms ^
".",
1290 ("Unauthorized user asked to remove a domain!",
1291 SOME
"Not authorized to remove that domain"))
1296 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1297 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1298 (if regenerate context
then
1299 ("Regenerated all configuration.",
1302 ("Error regenerating configuration!",
1303 SOME
"Error regenerating configuration! Consult /var/log/domtool.log."))
1305 ("Unauthorized user asked to regenerate!",
1306 SOME
"Not authorized to regenerate"))
1309 | MsgRegenerateTc
=>
1311 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1312 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1313 (if regenerateTc context
then
1314 ("Checked all configuration.",
1317 ("Found a compilation error!",
1318 SOME
"Found a compilation error! Consult /var/log/domtool.log."))
1320 ("Unauthorized user asked to regenerate -tc!",
1321 SOME
"Not authorized to regenerate -tc"))
1324 | MsgRmuser user
' =>
1326 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1328 Acl
.write Config
.aclFile
;
1329 ("Removed user " ^ user
' ^
".",
1332 ("Unauthorized user asked to remove a user!",
1333 SOME
"Not authorized to remove users"))
1336 | MsgCreateDbUser
{dbtype
, passwd
} =>
1338 case Dbms
.lookup dbtype
of
1339 NONE
=> ("Database user creation request with unknown datatype type " ^ dbtype
,
1340 SOME ("Unknown database type " ^ dbtype
))
1342 case #adduser handler
{user
= user
, passwd
= passwd
} of
1343 NONE
=> ("Added " ^ dbtype ^
" user " ^ user ^
".",
1346 ("Error adding a " ^ dbtype ^
" user " ^ user ^
": " ^ msg
,
1347 SOME ("Error adding user: " ^ msg
)))
1350 | MsgDbPasswd
{dbtype
, passwd
} =>
1352 case Dbms
.lookup dbtype
of
1353 NONE
=> ("Database passwd request with unknown datatype type " ^ dbtype
,
1354 SOME ("Unknown database type " ^ dbtype
))
1356 case #passwd handler
{user
= user
, passwd
= passwd
} of
1357 NONE
=> ("Changed " ^ dbtype ^
" password of user " ^ user ^
".",
1360 ("Error setting " ^ dbtype ^
" password of user " ^ user ^
": " ^ msg
,
1361 SOME ("Error adding user: " ^ msg
)))
1364 | MsgCreateDb
{dbtype
, dbname
} =>
1366 if Dbms
.validDbname dbname
then
1367 case Dbms
.lookup dbtype
of
1368 NONE
=> ("Database creation request with unknown datatype type " ^ dbtype
,
1369 SOME ("Unknown database type " ^ dbtype
))
1371 case #createdb handler
{user
= user
, dbname
= dbname
} of
1372 NONE
=> ("Created database " ^ user ^
"_" ^ dbname ^
".",
1374 | SOME msg
=> ("Error creating database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1375 SOME ("Error creating database: " ^ msg
))
1377 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1378 SOME ("Invalid database name " ^ dbname
)))
1381 | MsgDropDb
{dbtype
, dbname
} =>
1383 if Dbms
.validDbname dbname
then
1384 case Dbms
.lookup dbtype
of
1385 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1386 SOME ("Unknown database type " ^ dbtype
))
1388 case #dropdb handler
{user
= user
, dbname
= dbname
} of
1389 NONE
=> ("Drop database " ^ user ^
"_" ^ dbname ^
".",
1391 | SOME msg
=> ("Error dropping database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1392 SOME ("Error dropping database: " ^ msg
))
1394 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1395 SOME ("Invalid database name " ^ dbname
)))
1398 | MsgGrantDb
{dbtype
, dbname
} =>
1400 if Dbms
.validDbname dbname
then
1401 case Dbms
.lookup dbtype
of
1402 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1403 SOME ("Unknown database type " ^ dbtype
))
1405 case #grant handler
{user
= user
, dbname
= dbname
} of
1406 NONE
=> ("Grant permissions to database " ^ user ^
"_" ^ dbname ^
".",
1408 | SOME msg
=> ("Error granting permissions to database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1409 SOME ("Error granting permissions to database: " ^ msg
))
1411 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1412 SOME ("Invalid database name " ^ dbname
)))
1415 | MsgListMailboxes domain
=>
1417 if not (Domain
.yourDomain domain
) then
1418 ("User wasn't authorized to list mailboxes for " ^ domain
,
1419 SOME
"You're not authorized to configure that domain.")
1421 case Vmail
.list domain
of
1422 Vmail
.Listing users
=> (Msg
.send (bio
, MsgMailboxes users
);
1423 ("Sent mailbox list for " ^ domain
,
1425 | Vmail
.Error msg
=> ("Error listing mailboxes for " ^ domain ^
": " ^ msg
,
1429 | MsgNewMailbox
{domain
, user
= emailUser
, passwd
, mailbox
} =>
1431 if not (Domain
.yourDomain domain
) then
1432 ("User wasn't authorized to add a mailbox to " ^ domain
,
1433 SOME
"You're not authorized to configure that domain.")
1434 else if not (Domain
.validEmailUser emailUser
) then
1435 ("Invalid e-mail username " ^ emailUser
,
1436 SOME
"Invalid e-mail username")
1437 else if not (CharVector
.all
Char.isGraph passwd
) then
1438 ("Invalid password",
1439 SOME
"Invalid password; may only contain printable, non-space characters")
1440 else if not (Domain
.yourPath mailbox
) then
1441 ("User wasn't authorized to add a mailbox at " ^ mailbox
,
1442 SOME ("You're not authorized to use that mailbox location. ("
1445 case Vmail
.add
{requester
= user
,
1446 domain
= domain
, user
= emailUser
,
1447 passwd
= passwd
, mailbox
= mailbox
} of
1448 NONE
=> ("Added mailbox " ^ emailUser ^
"@" ^ domain ^
" at " ^ mailbox
,
1450 | SOME msg
=> ("Error adding mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1454 | MsgPasswdMailbox
{domain
, user
= emailUser
, passwd
} =>
1456 if not (Domain
.yourDomain domain
) then
1457 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1458 SOME
"You're not authorized to configure that domain.")
1459 else if not (Domain
.validEmailUser emailUser
) then
1460 ("Invalid e-mail username " ^ emailUser
,
1461 SOME
"Invalid e-mail username")
1462 else if not (CharVector
.all
Char.isGraph passwd
) then
1463 ("Invalid password",
1464 SOME
"Invalid password; may only contain printable, non-space characters")
1466 case Vmail
.passwd
{domain
= domain
, user
= emailUser
,
1468 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1470 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1474 | MsgRmMailbox
{domain
, user
= emailUser
} =>
1476 if not (Domain
.yourDomain domain
) then
1477 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1478 SOME
"You're not authorized to configure that domain.")
1479 else if not (Domain
.validEmailUser emailUser
) then
1480 ("Invalid e-mail username " ^ emailUser
,
1481 SOME
"Invalid e-mail username")
1483 case Vmail
.rm
{domain
= domain
, user
= emailUser
} of
1484 NONE
=> ("Deleted mailbox " ^ emailUser ^
"@" ^ domain
,
1486 | SOME msg
=> ("Error deleting mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1490 | MsgSaQuery addr
=>
1492 case checkAddr addr
of
1493 NONE
=> ("User tried to query SA filtering for " ^ addr
,
1494 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1495 | SOME addr
' => (Msg
.send (bio
, MsgSaStatus (SetSA
.query addr
'));
1496 ("Queried SA filtering status for " ^ addr
,
1500 |
MsgSaSet (addr
, b
) =>
1502 case checkAddr addr
of
1503 NONE
=> ("User tried to set SA filtering for " ^ addr
,
1504 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1505 | SOME addr
' => (SetSA
.set (addr
', b
);
1506 Msg
.send (bio
, MsgOk
);
1507 ("Set SA filtering status for " ^ addr ^
" to "
1508 ^
(if b
then "ON" else "OFF"),
1512 | MsgSmtpLogReq domain
=>
1514 if not (Domain
.yourDomain domain
) then
1515 ("Unauthorized user tried to request SMTP logs for " ^ domain
,
1516 SOME
"You aren't authorized to configure that domain.")
1518 (SmtpLog
.search (fn line
=> Msg
.send (bio
, MsgSmtpLogRes line
))
1520 ("Requested SMTP logs for " ^ domain
,
1525 doIt (fn () => (Msg
.send (bio
, answerQuery q
);
1530 | MsgMysqlFixperms
=>
1531 doIt (fn () => if OS
.Process
.isSuccess
1532 (OS
.Process
.system
"/usr/bin/sudo -H /afs/hcoop.net/common/etc/scripts/mysql-grant-table-drop") then
1533 ("Requested mysql-fixperms",
1536 ("Requested mysql-fixperms, but execution failed!",
1537 SOME
"Script execution failed."))
1540 | MsgDescribe dom
=>
1541 doIt (fn () => if not (Domain
.validDomain dom
) then
1542 ("Requested description of invalid domain " ^ dom
,
1543 SOME
"Invalid domain name")
1544 else if not (Domain
.yourDomain dom
1545 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"}) then
1546 ("Requested description of " ^ dom ^
", but not allowed access",
1547 SOME
"Access denied")
1549 (Msg
.send (bio
, MsgDescription (Domain
.describe dom
));
1550 ("Sent description of domain " ^ dom
,
1555 doIt (fn () => ("Unexpected command",
1556 SOME
"Unexpected command"))
1561 handle e
as (OpenSSL
.OpenSSL s
) =>
1562 (print ("OpenSSL error: " ^ s ^
"\n");
1563 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1565 handle OpenSSL
.OpenSSL _
=> ();
1567 | OS
.SysErr (s
, _
) =>
1568 (print ("System error: " ^ s ^
"\n");
1570 handle OpenSSL
.OpenSSL _
=> ();
1572 | IO
.Io
{name
, function
, cause
} =>
1573 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1574 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1576 handle OpenSSL
.OpenSSL _
=> ();
1578 | OS
.Path
.InvalidArc
=>
1579 (print
"Invalid arc\n";
1581 handle OpenSSL
.OpenSSL _
=> ();
1584 (print
"Unknown exception in main loop!\n";
1585 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1587 handle OpenSSL
.OpenSSL _
=> ();
1589 handle e
as (OpenSSL
.OpenSSL s
) =>
1590 (print ("OpenSSL error: " ^ s ^
"\n");
1591 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1593 | OS
.SysErr (s
, _
) =>
1594 (print ("System error: " ^ s ^
"\n");
1596 | IO
.Io
{name
, function
, cause
} =>
1597 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1598 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1601 (print
"Unknown exception in main loop!\n";
1602 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1605 print ("Domtool dispatcher starting up at " ^
now () ^
"\n");
1606 print
"Listening for connections....\n";
1608 OpenSSL
.shutdown sock
1613 val host
= Slave
.hostname ()
1615 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1616 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1619 val sock
= OpenSSL
.listen (context
, Config
.slavePort
)
1621 val _
= print ("Slave server starting at " ^
now () ^
"\n")
1624 case OpenSSL
.accept sock
of
1628 val peer
= OpenSSL
.peerCN bio
1629 val () = print ("\nConnection from " ^ peer ^
" at " ^
now () ^
"\n")
1631 if peer
= Config
.dispatcherName
then let
1633 case Msg
.recv bio
of
1634 NONE
=> print
"Dispatcher closed connection unexpectedly\n"
1637 MsgFile file
=> loop
' (file
:: files
)
1638 | MsgDoFiles
=> (Slave
.handleChanges files
;
1639 Msg
.send (bio
, MsgOk
))
1640 | MsgRegenerate
=> (Domain
.resetLocal ();
1641 Msg
.send (bio
, MsgOk
))
1642 | _
=> (print
"Dispatcher sent unexpected command\n";
1643 Msg
.send (bio
, MsgError
"Unexpected command"))
1646 ignore (OpenSSL
.readChar bio
);
1650 else if peer
= "domtool" then
1651 case Msg
.recv bio
of
1652 SOME MsgShutdown
=> (OpenSSL
.close bio
;
1653 print ("Shutting down at " ^
now () ^
"\n\n"))
1654 | _
=> (OpenSSL
.close bio
;
1657 case Msg
.recv bio
of
1658 SOME (MsgQuery q
) => (print (describeQuery q ^
"\n");
1659 Msg
.send (bio
, answerQuery q
);
1660 ignore (OpenSSL
.readChar bio
);
1663 | _
=> (OpenSSL
.close bio
;
1665 end handle OpenSSL
.OpenSSL s
=>
1666 (print ("OpenSSL error: " ^ s ^
"\n");
1668 handle OpenSSL
.OpenSSL _
=> ();
1670 | e
as OS
.SysErr (s
, _
) =>
1671 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1672 print ("System error: "^ s ^
"\n");
1674 handle OpenSSL
.OpenSSL _
=> ();
1676 | IO
.Io
{function
, name
, ...} =>
1677 (print ("IO error: " ^ function ^
": " ^ name ^
"\n");
1679 handle OpenSSL
.OpenSSL _
=> ();
1682 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1683 print
"Uncaught exception!\n";
1685 handle OpenSSL
.OpenSSL _
=> ();
1689 OpenSSL
.shutdown sock
1694 val dir
= Posix
.FileSys
.opendir Config
.libRoot
1697 case Posix
.FileSys
.readdir dir
of
1698 NONE
=> (Posix
.FileSys
.closedir dir
;
1701 if String.isSuffix
".dtl" fname
then
1702 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
1711 fun autodocBasis outdir
=
1712 Autodoc
.autodoc
{outdir
= outdir
, infiles
= listBasis ()}