1 (* HCoop
Domtool (http
://hcoop
.sourceforge
.net
/)
2 * Copyright (c
) 2006-2007, Adam Chlipala
4 * This program is free software
; you can redistribute it
and/or
5 * modify it under the terms
of the GNU General Public License
6 * as published by the Free Software Foundation
; either version
2
7 * of the License
, or (at your option
) any later version
.
9 * This program is distributed
in the hope that it will be useful
,
10 * but WITHOUT ANY WARRANTY
; without even the implied warranty
of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE
. See the
12 * GNU General Public License for more details
.
14 * You should have received a copy
of the GNU General Public License
15 * along
with this program
; if not
, write to the Free Software
16 * Foundation
, Inc
., 51 Franklin Street
, Fifth Floor
, Boston
, MA
02110-1301, USA
.
21 structure Main
:> MAIN
= struct
23 open Ast MsgTypes Print
25 structure SM
= StringMap
27 fun init () = Acl
.read Config
.aclFile
31 val prog
= Parse
.parse fname
33 if !ErrorMsg
.anyErrors
then
36 Tycheck
.checkFile
G (Defaults
.tInit ()) prog
41 val dir
= Posix
.FileSys
.opendir Config
.libRoot
44 case Posix
.FileSys
.readdir dir
of
45 NONE
=> (Posix
.FileSys
.closedir dir
;
48 if String.isSuffix
".dtl" fname
then
49 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
56 val (_
, files
) = Order
.order NONE files
58 if !ErrorMsg
.anyErrors
then
61 (Tycheck
.allowExterns ();
62 foldl (fn (fname
, G
) => check
' G fname
) Env
.empty files
63 before Tycheck
.disallowExterns ())
68 val _
= ErrorMsg
.reset ()
69 val _
= Env
.preTycheck ()
73 if !ErrorMsg
.anyErrors
then
77 val _
= Tycheck
.disallowExterns ()
78 val _
= ErrorMsg
.reset ()
79 val prog
= Parse
.parse fname
81 if !ErrorMsg
.anyErrors
then
85 val G
' = Tycheck
.checkFile
b (Defaults
.tInit ()) prog
87 if !ErrorMsg
.anyErrors
then
96 String.sub (s
, 0) <> #
"."
97 andalso CharVector
.all (fn ch
=> Char.isAlphaNum ch
orelse ch
= #
"." orelse ch
= #
"_" orelse ch
= #
"-") s
103 val dir
= Posix
.FileSys
.opendir dname
106 case Posix
.FileSys
.readdir dir
of
107 NONE
=> (Posix
.FileSys
.closedir dir
;
111 loop (OS
.Path
.joinDirFile
{dir
= dname
,
118 val (_
, files
) = Order
.order (SOME b
) files
120 if !ErrorMsg
.anyErrors
then
123 (foldl (fn (fname
, G
) => check
' G fname
) b files
;
124 if !ErrorMsg
.anyErrors
then
132 val (G
, body
) = check fname
134 if !ErrorMsg
.anyErrors
then
140 val body
' = Reduce
.reduceExp G body
142 (*printd (PD
.hovBox (PD
.PPS
.Rel
0,
143 [PD
.string "Result:",
154 if !ErrorMsg
.anyErrors
then
157 Eval
.exec (Defaults
.eInit ()) body
'
158 | NONE
=> raise ErrorMsg
.Error
163 if !ErrorMsg
.anyErrors
then
166 ignore (Eval
.exec
' (Defaults
.eInit ()) body
')
167 | NONE
=> raise ErrorMsg
.Error
170 Config
.dispatcher ^
":" ^
Int.toString Config
.dispatcherPort
173 "localhost:" ^
Int.toString Config
.slavePort
176 (OpenSSL
.context
false x
)
177 handle e
as OpenSSL
.OpenSSL s
=>
178 (print
"Couldn't find your certificate.\nYou probably haven't been given any Domtool privileges.\n";
179 print ("I looked in: " ^ #
1 x ^
"\n");
180 print ("Additional information: " ^ s ^
"\n");
186 case Posix
.ProcEnv
.getenv
"DOMTOOL_USER" of
189 val uid
= Posix
.ProcEnv
.getuid ()
191 Posix
.SysDB
.Passwd
.name (Posix
.SysDB
.getpwuid uid
)
195 Acl
.read Config
.aclFile
;
200 fun requestContext f
=
202 val user
= setupUser ()
206 val context
= context (Config
.certDir ^
"/" ^ user ^
".pem",
207 Config
.keyDir ^
"/" ^ user ^
"/key.pem",
215 val (user
, context
) = requestContext f
217 (user
, OpenSSL
.connect (context
, dispatcher
))
220 fun requestSlaveBio () =
222 val (user
, context
) = requestContext (fn () => ())
224 (user
, OpenSSL
.connect (context
, self
))
229 val (user
, bio
) = requestBio (fn () => ignore (check fname
))
231 val inf
= TextIO.openIn fname
234 case TextIO.inputLine inf
of
235 NONE
=> String.concat (List.rev lines
)
236 | SOME line
=> loop (line
:: lines
)
241 Msg
.send (bio
, MsgConfig code
);
243 NONE
=> print
"Server closed connection unexpectedly.\n"
246 MsgOk
=> print
"Configuration succeeded.\n"
247 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
248 | _
=> print
"Unexpected server reply.\n";
251 handle ErrorMsg
.Error
=> ()
253 fun requestDir dname
=
255 val _
= if Posix
.FileSys
.access (dname
, []) then
258 (print ("Can't access " ^ dname ^
".\n");
259 print
"Did you mean to run domtool on a specific file, instead of asking for all\n";
260 print
"files in your ~/.domtool directory?\n";
261 OS
.Process
.exit OS
.Process
.failure
)
263 val _
= ErrorMsg
.reset ()
265 val (user
, bio
) = requestBio (fn () => checkDir dname
)
269 val dir
= Posix
.FileSys
.opendir dname
272 case Posix
.FileSys
.readdir dir
of
273 NONE
=> (Posix
.FileSys
.closedir dir
;
277 loop (OS
.Path
.joinDirFile
{dir
= dname
,
284 val (_
, files
) = Order
.order (SOME b
) files
286 val _
= if !ErrorMsg
.anyErrors
then
291 val codes
= map (fn fname
=>
293 val inf
= TextIO.openIn fname
296 case TextIO.inputLine inf
of
297 NONE
=> String.concat (rev lines
)
298 | SOME line
=> loop (line
:: lines
)
301 before TextIO.closeIn inf
304 if !ErrorMsg
.anyErrors
then
307 (Msg
.send (bio
, MsgMultiConfig codes
);
309 NONE
=> print
"Server closed connection unexpectedly.\n"
312 MsgOk
=> print
"Configuration succeeded.\n"
313 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
314 | _
=> print
"Unexpected server reply.\n";
317 handle ErrorMsg
.Error
=> ()
321 val (_
, bio
) = requestBio (fn () => ())
326 handle _
=> OS
.Process
.failure
328 fun requestShutdown () =
330 val (_
, bio
) = requestBio (fn () => ())
332 Msg
.send (bio
, MsgShutdown
);
334 NONE
=> print
"Server closed connection unexpectedly.\n"
337 MsgOk
=> print
"Shutdown begun.\n"
338 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
339 | _
=> print
"Unexpected server reply.\n";
343 fun requestSlavePing () =
345 val (_
, bio
) = requestSlaveBio ()
350 handle _
=> OS
.Process
.failure
352 fun requestSlaveShutdown () =
354 val (_
, bio
) = requestSlaveBio ()
356 Msg
.send (bio
, MsgShutdown
);
358 NONE
=> print
"Server closed connection unexpectedly.\n"
361 MsgOk
=> print
"Shutdown begun.\n"
362 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
363 | _
=> print
"Unexpected server reply.\n";
367 fun requestGrant acl
=
369 val (user
, bio
) = requestBio (fn () => ())
371 Msg
.send (bio
, MsgGrant acl
);
373 NONE
=> print
"Server closed connection unexpectedly.\n"
376 MsgOk
=> print
"Grant succeeded.\n"
377 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
378 | _
=> print
"Unexpected server reply.\n";
382 fun requestRevoke acl
=
384 val (user
, bio
) = requestBio (fn () => ())
386 Msg
.send (bio
, MsgRevoke acl
);
388 NONE
=> print
"Server closed connection unexpectedly.\n"
391 MsgOk
=> print
"Revoke succeeded.\n"
392 | MsgError s
=> print ("Revoke failed: " ^ s ^
"\n")
393 | _
=> print
"Unexpected server reply.\n";
397 fun requestListPerms user
=
399 val (_
, bio
) = requestBio (fn () => ())
401 Msg
.send (bio
, MsgListPerms user
);
402 (case Msg
.recv bio
of
403 NONE
=> (print
"Server closed connection unexpectedly.\n";
407 MsgPerms perms
=> SOME perms
408 | MsgError s
=> (print ("Listing failed: " ^ s ^
"\n");
410 | _
=> (print
"Unexpected server reply.\n";
412 before OpenSSL
.close bio
415 fun requestWhoHas perm
=
417 val (_
, bio
) = requestBio (fn () => ())
419 Msg
.send (bio
, MsgWhoHas perm
);
420 (case Msg
.recv bio
of
421 NONE
=> (print
"Server closed connection unexpectedly.\n";
425 MsgWhoHasResponse users
=> SOME users
426 | MsgError s
=> (print ("whohas failed: " ^ s ^
"\n");
428 | _
=> (print
"Unexpected server reply.\n";
430 before OpenSSL
.close bio
433 fun requestRegen () =
435 val (_
, bio
) = requestBio (fn () => ())
437 Msg
.send (bio
, MsgRegenerate
);
439 NONE
=> print
"Server closed connection unexpectedly.\n"
442 MsgOk
=> print
"Regeneration succeeded.\n"
443 | MsgError s
=> print ("Regeneration failed: " ^ s ^
"\n")
444 | _
=> print
"Unexpected server reply.\n";
448 fun requestRegenTc () =
450 val (_
, bio
) = requestBio (fn () => ())
452 Msg
.send (bio
, MsgRegenerateTc
);
454 NONE
=> print
"Server closed connection unexpectedly.\n"
457 MsgOk
=> print
"All configuration validated.\n"
458 | MsgError s
=> print ("Configuration validation failed: " ^ s ^
"\n")
459 | _
=> print
"Unexpected server reply.\n";
463 fun requestRmdom dom
=
465 val (_
, bio
) = requestBio (fn () => ())
467 Msg
.send (bio
, MsgRmdom dom
);
469 NONE
=> print
"Server closed connection unexpectedly.\n"
472 MsgOk
=> print
"Removal succeeded.\n"
473 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
474 | _
=> print
"Unexpected server reply.\n";
478 fun requestRmuser user
=
480 val (_
, bio
) = requestBio (fn () => ())
482 Msg
.send (bio
, MsgRmuser user
);
484 NONE
=> print
"Server closed connection unexpectedly.\n"
487 MsgOk
=> print
"Removal succeeded.\n"
488 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
489 | _
=> print
"Unexpected server reply.\n";
493 fun requestDbUser dbtype
=
495 val (_
, bio
) = requestBio (fn () => ())
497 Msg
.send (bio
, MsgCreateDbUser dbtype
);
499 NONE
=> print
"Server closed connection unexpectedly.\n"
502 MsgOk
=> print
"Your user has been created.\n"
503 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
504 | _
=> print
"Unexpected server reply.\n";
508 fun requestDbPasswd rc
=
510 val (_
, bio
) = requestBio (fn () => ())
512 Msg
.send (bio
, MsgDbPasswd rc
);
514 NONE
=> print
"Server closed connection unexpectedly.\n"
517 MsgOk
=> print
"Your password has been changed.\n"
518 | MsgError s
=> print ("Password set failed: " ^ s ^
"\n")
519 | _
=> print
"Unexpected server reply.\n";
523 fun requestDbTable p
=
525 val (user
, bio
) = requestBio (fn () => ())
527 Msg
.send (bio
, MsgCreateDb p
);
529 NONE
=> print
"Server closed connection unexpectedly.\n"
532 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been created.\n")
533 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
534 | _
=> print
"Unexpected server reply.\n";
538 fun requestDbDrop p
=
540 val (user
, bio
) = requestBio (fn () => ())
542 Msg
.send (bio
, MsgDropDb p
);
544 NONE
=> print
"Server closed connection unexpectedly.\n"
547 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been dropped.\n")
548 | MsgError s
=> print ("Drop failed: " ^ s ^
"\n")
549 | _
=> print
"Unexpected server reply.\n";
553 fun requestDbGrant p
=
555 val (user
, bio
) = requestBio (fn () => ())
557 Msg
.send (bio
, MsgGrantDb p
);
559 NONE
=> print
"Server closed connection unexpectedly.\n"
562 MsgOk
=> print ("You've been granted all allowed privileges to database " ^ user ^
"_" ^ #dbname p ^
".\n")
563 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
564 | _
=> print
"Unexpected server reply.\n";
568 fun requestListMailboxes domain
=
570 val (_
, bio
) = requestBio (fn () => ())
572 Msg
.send (bio
, MsgListMailboxes domain
);
573 (case Msg
.recv bio
of
574 NONE
=> Vmail
.Error
"Server closed connection unexpectedly."
577 MsgMailboxes users
=> (Msg
.send (bio
, MsgOk
);
579 | MsgError s
=> Vmail
.Error ("Listing failed: " ^ s
)
580 | _
=> Vmail
.Error
"Unexpected server reply.")
581 before OpenSSL
.close bio
584 fun requestNewMailbox p
=
586 val (_
, bio
) = requestBio (fn () => ())
588 Msg
.send (bio
, MsgNewMailbox p
);
590 NONE
=> print
"Server closed connection unexpectedly.\n"
593 MsgOk
=> print ("A mapping for " ^ #user p ^
"@" ^ #domain p ^
" has been created.\n")
594 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
595 | _
=> print
"Unexpected server reply.\n";
599 fun requestPasswdMailbox p
=
601 val (_
, bio
) = requestBio (fn () => ())
603 Msg
.send (bio
, MsgPasswdMailbox p
);
605 NONE
=> print
"Server closed connection unexpectedly.\n"
608 MsgOk
=> print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n")
609 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
610 | _
=> print
"Unexpected server reply.\n";
614 fun requestRmMailbox p
=
616 val (_
, bio
) = requestBio (fn () => ())
618 Msg
.send (bio
, MsgRmMailbox p
);
620 NONE
=> print
"Server closed connection unexpectedly.\n"
623 MsgOk
=> print ("The mapping for mailbox " ^ #user p ^
"@" ^ #domain p ^
" has been deleted.\n")
624 | MsgError s
=> print ("Remove failed: " ^ s ^
"\n")
625 | _
=> print
"Unexpected server reply.\n";
629 fun requestSaQuery addr
=
631 val (_
, bio
) = requestBio (fn () => ())
633 Msg
.send (bio
, MsgSaQuery addr
);
634 (case Msg
.recv bio
of
635 NONE
=> print
"Server closed connection unexpectedly.\n"
638 MsgSaStatus b
=> (print ("SpamAssassin filtering for " ^ addr ^
" is "
639 ^
(if b
then "ON" else "OFF") ^
".\n");
640 Msg
.send (bio
, MsgOk
))
641 | MsgError s
=> print ("Query failed: " ^ s ^
"\n")
642 | _
=> print
"Unexpected server reply.\n")
643 before OpenSSL
.close bio
648 val (_
, bio
) = requestBio (fn () => ())
650 Msg
.send (bio
, MsgSaSet p
);
652 NONE
=> print
"Server closed connection unexpectedly.\n"
655 MsgOk
=> print ("SpamAssassin filtering for " ^ #
1 p ^
" is now "
656 ^
(if #
2 p
then "ON" else "OFF") ^
".\n")
657 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
658 | _
=> print
"Unexpected server reply.\n";
662 fun requestSmtpLog domain
=
664 val (_
, bio
) = requestBio (fn () => ())
666 val _
= Msg
.send (bio
, MsgSmtpLogReq domain
)
670 NONE
=> print
"Server closed connection unexpectedly.\n"
674 | MsgSmtpLogRes line
=> (print line
;
676 | MsgError s
=> print ("Log search failed: " ^ s ^
"\n")
677 | _
=> print
"Unexpected server reply.\n"
683 fun requestMysqlFixperms () =
685 val (_
, bio
) = requestBio (fn () => ())
687 Msg
.send (bio
, MsgMysqlFixperms
);
689 NONE
=> print
"Server closed connection unexpectedly.\n"
692 MsgOk
=> print
"Permissions granted.\n"
693 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
694 | _
=> print
"Unexpected server reply.\n";
698 fun requestApt
{node
, pkg
} =
700 val (user
, context
) = requestContext (fn () => ())
701 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
704 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
706 val _
= Msg
.send (bio
, MsgQuery (QApt pkg
))
710 NONE
=> (print
"Server closed connection unexpectedly.\n";
714 MsgYes
=> (print
"Package is installed.\n";
716 | MsgNo
=> (print
"Package is not installed.\n";
718 | MsgError s
=> (print ("APT query failed: " ^ s ^
"\n");
720 | _
=> (print
"Unexpected server reply.\n";
724 before OpenSSL
.close bio
727 fun requestCron
{node
, uname
} =
729 val (user
, context
) = requestContext (fn () => ())
730 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
733 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
735 val _
= Msg
.send (bio
, MsgQuery (QCron uname
))
739 NONE
=> (print
"Server closed connection unexpectedly.\n";
743 MsgYes
=> (print
"User has cron permissions.\n";
745 | MsgNo
=> (print
"User does not have cron permissions.\n";
747 | MsgError s
=> (print ("Cron query failed: " ^ s ^
"\n");
749 | _
=> (print
"Unexpected server reply.\n";
753 before OpenSSL
.close bio
756 fun requestFtp
{node
, uname
} =
758 val (user
, context
) = requestContext (fn () => ())
759 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
762 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
764 val _
= Msg
.send (bio
, MsgQuery (QFtp uname
))
768 NONE
=> (print
"Server closed connection unexpectedly.\n";
772 MsgYes
=> (print
"User has FTP permissions.\n";
774 | MsgNo
=> (print
"User does not have FTP permissions.\n";
776 | MsgError s
=> (print ("FTP query failed: " ^ s ^
"\n");
778 | _
=> (print
"Unexpected server reply.\n";
782 before OpenSSL
.close bio
785 fun requestTrustedPath
{node
, uname
} =
787 val (user
, context
) = requestContext (fn () => ())
788 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
791 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
793 val _
= Msg
.send (bio
, MsgQuery (QTrustedPath uname
))
797 NONE
=> (print
"Server closed connection unexpectedly.\n";
801 MsgYes
=> (print
"User has trusted path restriction.\n";
803 | MsgNo
=> (print
"User does not have trusted path restriction.\n";
805 | MsgError s
=> (print ("Trusted path query failed: " ^ s ^
"\n");
807 | _
=> (print
"Unexpected server reply.\n";
811 before OpenSSL
.close bio
814 fun requestSocketPerm
{node
, uname
} =
816 val (user
, context
) = requestContext (fn () => ())
817 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
820 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
822 val _
= Msg
.send (bio
, MsgQuery (QSocket uname
))
826 NONE
=> (print
"Server closed connection unexpectedly.\n";
830 MsgSocket p
=> (case p
of
832 | Client
=> print
"Client\n"
833 | Server
=> print
"Server\n"
834 | Nada
=> print
"Nada\n";
836 | MsgError s
=> (print ("Socket permission query failed: " ^ s ^
"\n");
838 | _
=> (print
"Unexpected server reply.\n";
842 before OpenSSL
.close bio
845 fun requestFirewall
{node
, uname
} =
847 val (user
, context
) = requestContext (fn () => ())
848 val bio
= OpenSSL
.connect (context
, if node
= Config
.masterNode
then
851 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
853 val _
= Msg
.send (bio
, MsgQuery (QFirewall uname
))
857 NONE
=> (print
"Server closed connection unexpectedly.\n";
861 MsgFirewall ls
=> (app (fn s
=> (print s
; print
"\n")) ls
;
863 | MsgError s
=> (print ("Firewall query failed: " ^ s ^
"\n");
865 | _
=> (print
"Unexpected server reply.\n";
869 before OpenSSL
.close bio
872 fun regenerate context
=
874 val _
= ErrorMsg
.reset ()
877 val () = Tycheck
.disallowExterns ()
879 val () = Domain
.resetGlobal ()
883 fun contactNode (node
, ip
) =
884 if node
= Config
.defaultNode
then
887 val bio
= OpenSSL
.connect (context
,
890 ^
Int.toString Config
.slavePort
)
892 Msg
.send (bio
, MsgRegenerate
);
894 NONE
=> print
"Slave closed connection unexpectedly\n"
897 MsgOk
=> print ("Slave " ^ node ^
" pre-regeneration finished\n")
898 | MsgError s
=> print ("Slave " ^ node
899 ^
" returned error: " ^
901 | _
=> print ("Slave " ^ node
902 ^
" returned unexpected command\n");
905 handle OpenSSL
.OpenSSL s
=> print ("OpenSSL error: " ^ s ^
"\n")
909 val _
= Domain
.setUser user
910 val _
= ErrorMsg
.reset ()
912 val dname
= Config
.domtoolDir user
914 if Posix
.FileSys
.access (dname
, []) then
916 val dir
= Posix
.FileSys
.opendir dname
919 case Posix
.FileSys
.readdir dir
of
920 NONE
=> (Posix
.FileSys
.closedir dir
;
924 loop (OS
.Path
.joinDirFile
{dir
= dname
,
931 val (_
, files
) = Order
.order (SOME b
) files
933 if !ErrorMsg
.anyErrors
then
935 print ("User " ^ user ^
"'s configuration has errors!\n"))
942 handle IO
.Io
{name
, function
, ...} =>
943 (print ("IO error processing user " ^ user ^
": " ^ function ^
": " ^ name ^
"\n");
945 | OS
.SysErr (s
, _
) => (print ("System error processing user " ^ user ^
": " ^ s ^
"\n");
947 | ErrorMsg
.Error
=> (ErrorMsg
.reset ();
948 print ("User " ^ user ^
" had a compilation error.\n");
950 | _
=> (print
"Unknown exception during regeneration!\n";
953 app contactNode Config
.nodeIps
;
955 app
doUser (Acl
.users ());
960 fun regenerateTc context
=
962 val _
= ErrorMsg
.reset ()
965 val () = Tycheck
.disallowExterns ()
967 val () = Domain
.resetGlobal ()
973 val _
= Domain
.setUser user
974 val _
= ErrorMsg
.reset ()
976 val dname
= Config
.domtoolDir user
978 if Posix
.FileSys
.access (dname
, []) then
980 val dir
= Posix
.FileSys
.opendir dname
983 case Posix
.FileSys
.readdir dir
of
984 NONE
=> (Posix
.FileSys
.closedir dir
;
988 loop (OS
.Path
.joinDirFile
{dir
= dname
,
995 val (_
, files
) = Order
.order (SOME b
) files
997 if !ErrorMsg
.anyErrors
then
999 print ("User " ^ user ^
"'s configuration has errors!\n");
1002 app (ignore
o check
) files
1007 handle IO
.Io _
=> ()
1008 | OS
.SysErr (s
, _
) => print ("System error processing user " ^ user ^
": " ^ s ^
"\n")
1009 | ErrorMsg
.Error
=> (ErrorMsg
.reset ();
1010 print ("User " ^ user ^
" had a compilation error.\n"))
1011 | _
=> print
"Unknown exception during -tc regeneration!\n"
1013 app
doUser (Acl
.users ());
1019 val doms
= Acl
.class
{user
= user
, class
= "domain"}
1020 val doms
= List.filter (fn dom
=>
1021 case Acl
.whoHas
{class
= "domain", value
= dom
} of
1023 | _
=> false) (StringSet
.listItems doms
)
1029 fun now () = Date
.toString (Date
.fromTimeUniv (Time
.now ()))
1033 QApt pkg
=> if Apt
.installed pkg
then MsgYes
else MsgNo
1034 | QCron user
=> if Cron
.allowed user
then MsgYes
else MsgNo
1035 | QFtp user
=> if Ftp
.allowed user
then MsgYes
else MsgNo
1036 | QTrustedPath user
=> if TrustedPath
.query user
then MsgYes
else MsgNo
1037 | QSocket user
=> MsgSocket (SocketPerm
.query user
)
1038 | QFirewall user
=> MsgFirewall (Firewall
.query user
)
1040 fun describeQuery q
=
1042 QApt pkg
=> "Requested installation status of package " ^ pkg
1043 | QCron user
=> "Asked about cron permissions for user " ^ user
1044 | QFtp user
=> "Asked about FTP permissions for user " ^ user
1045 | QTrustedPath user
=> "Asked about trusted path settings for user " ^ user
1046 | QSocket user
=> "Asked about socket permissions for user " ^ user
1047 | QFirewall user
=> "Asked about firewall rules for user " ^ user
1051 val () = Acl
.read Config
.aclFile
1053 val context
= context (Config
.serverCert
,
1056 val _
= Domain
.set_context context
1058 val sock
= OpenSSL
.listen (context
, Config
.dispatcherPort
)
1061 (case OpenSSL
.accept sock
of
1065 val user
= OpenSSL
.peerCN bio
1066 val () = print ("\nConnection from " ^ user ^
" at " ^
now () ^
"\n")
1067 val () = Domain
.setUser user
1069 fun doIt f cleanup
=
1071 (msgLocal
, SOME msgRemote
) =>
1074 Msg
.send (bio
, MsgError msgRemote
))
1075 |
(msgLocal
, NONE
) =>
1078 Msg
.send (bio
, MsgOk
)))
1079 handle e
as (OpenSSL
.OpenSSL s
) =>
1080 (print ("OpenSSL error: " ^ s ^
"\n");
1081 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1082 Msg
.send (bio
, MsgError ("OpenSSL error: " ^ s
))
1083 handle OpenSSL
.OpenSSL _
=> ())
1084 | OS
.SysErr (s
, _
) =>
1085 (print
"System error: ";
1088 Msg
.send (bio
, MsgError ("System error: " ^ s
))
1089 handle OpenSSL
.OpenSSL _
=> ())
1094 Msg
.send (bio
, MsgError ("Failure: " ^ s
))
1095 handle OpenSSL
.OpenSSL _
=> ())
1097 (print
"Compilation error\n";
1098 Msg
.send (bio
, MsgError
"Error during configuration evaluation")
1099 handle OpenSSL
.OpenSSL _
=> ());
1101 ignore (OpenSSL
.readChar bio
);
1103 handle OpenSSL
.OpenSSL _
=> ();
1106 fun doConfig codes
=
1108 val _
= print
"Configuration:\n"
1109 val _
= app (fn s
=> (print s
; print
"\n")) codes
1112 val outname
= OS
.FileSys
.tmpName ()
1116 val outf
= TextIO.openOut outname
1118 TextIO.output (outf
, code
);
1119 TextIO.closeOut outf
;
1123 doIt (fn () => (Env
.pre ();
1126 Msg
.send (bio
, MsgOk
);
1127 ("Configuration complete.", NONE
)))
1128 (fn () => OS
.FileSys
.remove outname
)
1132 case String.fields (fn ch
=> ch
= #
"@") s
of
1134 if user
= user
' then
1138 |
[user
', domain
] =>
1139 if Domain
.validEmailUser user
' andalso Domain
.yourDomain domain
then
1140 SOME (SetSA
.Email s
)
1146 case Msg
.recv bio
of
1147 NONE
=> (OpenSSL
.close bio
1148 handle OpenSSL
.OpenSSL _
=> ();
1152 MsgConfig code
=> doConfig
[code
]
1153 | MsgMultiConfig codes
=> doConfig codes
1156 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1157 orelse Acl
.query
{user
= user
, class
= "priv", value
= "shutdown"} then
1158 print ("Domtool dispatcher shutting down at " ^
now () ^
"\n\n")
1160 (print
"Unauthorized shutdown command!\n";
1162 handle OpenSSL
.OpenSSL _
=> ();
1167 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1169 Acl
.write Config
.aclFile
;
1170 ("Granted permission " ^ #value acl ^
" to " ^ #user acl ^
" in " ^ #class acl ^
".",
1173 ("Unauthorized user asked to grant a permission!",
1174 SOME
"Not authorized to grant privileges"))
1179 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1181 Acl
.write Config
.aclFile
;
1182 ("Revoked permission " ^ #value acl ^
" from " ^ #user acl ^
" in " ^ #class acl ^
".",
1185 ("Unauthorized user asked to revoke a permission!",
1186 SOME
"Not authorized to revoke privileges"))
1189 | MsgListPerms user
=>
1191 (Msg
.send (bio
, MsgPerms (Acl
.queryAll user
));
1192 ("Sent permission list for user " ^ user ^
".",
1198 (Msg
.send (bio
, MsgWhoHasResponse (Acl
.whoHas perm
));
1199 ("Sent whohas response for " ^ #class perm ^
" / " ^ #value perm ^
".",
1205 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1206 orelse List.all (fn dom
=> Acl
.query
{user
= user
, class
= "domain", value
= dom
}) doms
then
1209 Acl
.revokeFromAll
{class
= "domain", value
= dom
}) doms
;
1210 Acl
.write Config
.aclFile
;
1211 ("Removed domains" ^
foldl (fn (d
, s
) => s ^
" " ^ d
) "" doms ^
".",
1214 ("Unauthorized user asked to remove a domain!",
1215 SOME
"Not authorized to remove that domain"))
1220 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1221 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1222 (if regenerate context
then
1223 ("Regenerated all configuration.",
1226 ("Error regenerating configuration!",
1227 SOME
"Error regenerating configuration! Consult /var/log/domtool.log."))
1229 ("Unauthorized user asked to regenerate!",
1230 SOME
"Not authorized to regenerate"))
1233 | MsgRegenerateTc
=>
1235 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1236 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1237 (if regenerateTc context
then
1238 ("Checked all configuration.",
1241 ("Found a compilation error!",
1242 SOME
"Found a compilation error! Consult /var/log/domtool.log."))
1244 ("Unauthorized user asked to regenerate -tc!",
1245 SOME
"Not authorized to regenerate -tc"))
1248 | MsgRmuser user
' =>
1250 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1252 Acl
.write Config
.aclFile
;
1253 ("Removed user " ^ user
' ^
".",
1256 ("Unauthorized user asked to remove a user!",
1257 SOME
"Not authorized to remove users"))
1260 | MsgCreateDbUser
{dbtype
, passwd
} =>
1262 case Dbms
.lookup dbtype
of
1263 NONE
=> ("Database user creation request with unknown datatype type " ^ dbtype
,
1264 SOME ("Unknown database type " ^ dbtype
))
1266 case #adduser handler
{user
= user
, passwd
= passwd
} of
1267 NONE
=> ("Added " ^ dbtype ^
" user " ^ user ^
".",
1270 ("Error adding a " ^ dbtype ^
" user " ^ user ^
": " ^ msg
,
1271 SOME ("Error adding user: " ^ msg
)))
1274 | MsgDbPasswd
{dbtype
, passwd
} =>
1276 case Dbms
.lookup dbtype
of
1277 NONE
=> ("Database passwd request with unknown datatype type " ^ dbtype
,
1278 SOME ("Unknown database type " ^ dbtype
))
1280 case #passwd handler
{user
= user
, passwd
= passwd
} of
1281 NONE
=> ("Changed " ^ dbtype ^
" password of user " ^ user ^
".",
1284 ("Error setting " ^ dbtype ^
" password of user " ^ user ^
": " ^ msg
,
1285 SOME ("Error adding user: " ^ msg
)))
1288 | MsgCreateDb
{dbtype
, dbname
} =>
1290 if Dbms
.validDbname dbname
then
1291 case Dbms
.lookup dbtype
of
1292 NONE
=> ("Database creation request with unknown datatype type " ^ dbtype
,
1293 SOME ("Unknown database type " ^ dbtype
))
1295 case #createdb handler
{user
= user
, dbname
= dbname
} of
1296 NONE
=> ("Created database " ^ user ^
"_" ^ dbname ^
".",
1298 | SOME msg
=> ("Error creating database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1299 SOME ("Error creating database: " ^ msg
))
1301 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1302 SOME ("Invalid database name " ^ dbname
)))
1305 | MsgDropDb
{dbtype
, dbname
} =>
1307 if Dbms
.validDbname dbname
then
1308 case Dbms
.lookup dbtype
of
1309 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1310 SOME ("Unknown database type " ^ dbtype
))
1312 case #dropdb handler
{user
= user
, dbname
= dbname
} of
1313 NONE
=> ("Drop database " ^ user ^
"_" ^ dbname ^
".",
1315 | SOME msg
=> ("Error dropping database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1316 SOME ("Error dropping database: " ^ msg
))
1318 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1319 SOME ("Invalid database name " ^ dbname
)))
1322 | MsgGrantDb
{dbtype
, dbname
} =>
1324 if Dbms
.validDbname dbname
then
1325 case Dbms
.lookup dbtype
of
1326 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1327 SOME ("Unknown database type " ^ dbtype
))
1329 case #grant handler
{user
= user
, dbname
= dbname
} of
1330 NONE
=> ("Grant permissions to database " ^ user ^
"_" ^ dbname ^
".",
1332 | SOME msg
=> ("Error granting permissions to database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1333 SOME ("Error granting permissions to database: " ^ msg
))
1335 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1336 SOME ("Invalid database name " ^ dbname
)))
1339 | MsgListMailboxes domain
=>
1341 if not (Domain
.yourDomain domain
) then
1342 ("User wasn't authorized to list mailboxes for " ^ domain
,
1343 SOME
"You're not authorized to configure that domain.")
1345 case Vmail
.list domain
of
1346 Vmail
.Listing users
=> (Msg
.send (bio
, MsgMailboxes users
);
1347 ("Sent mailbox list for " ^ domain
,
1349 | Vmail
.Error msg
=> ("Error listing mailboxes for " ^ domain ^
": " ^ msg
,
1353 | MsgNewMailbox
{domain
, user
= emailUser
, passwd
, mailbox
} =>
1355 if not (Domain
.yourDomain domain
) then
1356 ("User wasn't authorized to add a mailbox to " ^ domain
,
1357 SOME
"You're not authorized to configure that domain.")
1358 else if not (Domain
.validEmailUser emailUser
) then
1359 ("Invalid e-mail username " ^ emailUser
,
1360 SOME
"Invalid e-mail username")
1361 else if not (CharVector
.all
Char.isGraph passwd
) then
1362 ("Invalid password",
1363 SOME
"Invalid password; may only contain printable, non-space characters")
1364 else if not (Domain
.yourPath mailbox
) then
1365 ("User wasn't authorized to add a mailbox at " ^ mailbox
,
1366 SOME ("You're not authorized to use that mailbox location. ("
1369 case Vmail
.add
{requester
= user
,
1370 domain
= domain
, user
= emailUser
,
1371 passwd
= passwd
, mailbox
= mailbox
} of
1372 NONE
=> ("Added mailbox " ^ emailUser ^
"@" ^ domain ^
" at " ^ mailbox
,
1374 | SOME msg
=> ("Error adding mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1378 | MsgPasswdMailbox
{domain
, user
= emailUser
, passwd
} =>
1380 if not (Domain
.yourDomain domain
) then
1381 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1382 SOME
"You're not authorized to configure that domain.")
1383 else if not (Domain
.validEmailUser emailUser
) then
1384 ("Invalid e-mail username " ^ emailUser
,
1385 SOME
"Invalid e-mail username")
1386 else if not (CharVector
.all
Char.isGraph passwd
) then
1387 ("Invalid password",
1388 SOME
"Invalid password; may only contain printable, non-space characters")
1390 case Vmail
.passwd
{domain
= domain
, user
= emailUser
,
1392 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1394 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1398 | MsgRmMailbox
{domain
, user
= emailUser
} =>
1400 if not (Domain
.yourDomain domain
) then
1401 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1402 SOME
"You're not authorized to configure that domain.")
1403 else if not (Domain
.validEmailUser emailUser
) then
1404 ("Invalid e-mail username " ^ emailUser
,
1405 SOME
"Invalid e-mail username")
1407 case Vmail
.rm
{domain
= domain
, user
= emailUser
} of
1408 NONE
=> ("Deleted mailbox " ^ emailUser ^
"@" ^ domain
,
1410 | SOME msg
=> ("Error deleting mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1414 | MsgSaQuery addr
=>
1416 case checkAddr addr
of
1417 NONE
=> ("User tried to query SA filtering for " ^ addr
,
1418 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1419 | SOME addr
' => (Msg
.send (bio
, MsgSaStatus (SetSA
.query addr
'));
1420 ("Queried SA filtering status for " ^ addr
,
1424 |
MsgSaSet (addr
, b
) =>
1426 case checkAddr addr
of
1427 NONE
=> ("User tried to set SA filtering for " ^ addr
,
1428 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1429 | SOME addr
' => (SetSA
.set (addr
', b
);
1430 Msg
.send (bio
, MsgOk
);
1431 ("Set SA filtering status for " ^ addr ^
" to "
1432 ^
(if b
then "ON" else "OFF"),
1436 | MsgSmtpLogReq domain
=>
1438 if not (Domain
.yourDomain domain
) then
1439 ("Unauthorized user tried to request SMTP logs for " ^ domain
,
1440 SOME
"You aren't authorized to configure that domain.")
1442 (SmtpLog
.search (fn line
=> Msg
.send (bio
, MsgSmtpLogRes line
))
1444 ("Requested SMTP logs for " ^ domain
,
1449 doIt (fn () => (Msg
.send (bio
, answerQuery q
);
1454 | MsgMysqlFixperms
=>
1455 doIt (fn () => if OS
.Process
.isSuccess
1456 (OS
.Process
.system
"/usr/bin/sudo -H /afs/hcoop.net/common/etc/scripts/mysql-grant-table-drop") then
1457 ("Requested mysql-fixperms",
1460 ("Requested mysql-fixperms, but execution failed!",
1461 SOME
"Script execution failed."))
1465 doIt (fn () => ("Unexpected command",
1466 SOME
"Unexpected command"))
1471 handle e
as (OpenSSL
.OpenSSL s
) =>
1472 (print ("OpenSSL error: " ^ s ^
"\n");
1473 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1475 handle OpenSSL
.OpenSSL _
=> ();
1477 | OS
.SysErr (s
, _
) =>
1478 (print ("System error: " ^ s ^
"\n");
1480 handle OpenSSL
.OpenSSL _
=> ();
1482 | IO
.Io
{name
, function
, cause
} =>
1483 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1484 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1486 handle OpenSSL
.OpenSSL _
=> ();
1489 (print
"Unknown exception in main loop!\n";
1490 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1492 handle OpenSSL
.OpenSSL _
=> ();
1494 handle e
as (OpenSSL
.OpenSSL s
) =>
1495 (print ("OpenSSL error: " ^ s ^
"\n");
1496 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1498 | OS
.SysErr (s
, _
) =>
1499 (print ("System error: " ^ s ^
"\n");
1501 | IO
.Io
{name
, function
, cause
} =>
1502 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1503 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1506 (print
"Unknown exception in main loop!\n";
1507 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1510 print ("Domtool dispatcher starting up at " ^
now () ^
"\n");
1511 print
"Listening for connections....\n";
1513 OpenSSL
.shutdown sock
1518 val host
= Slave
.hostname ()
1520 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1521 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1524 val sock
= OpenSSL
.listen (context
, Config
.slavePort
)
1526 val _
= print ("Slave server starting at " ^
now () ^
"\n")
1529 case OpenSSL
.accept sock
of
1533 val peer
= OpenSSL
.peerCN bio
1534 val () = print ("\nConnection from " ^ peer ^
" at " ^
now () ^
"\n")
1536 if peer
= Config
.dispatcherName
then let
1538 case Msg
.recv bio
of
1539 NONE
=> print
"Dispatcher closed connection unexpectedly\n"
1542 MsgFile file
=> loop
' (file
:: files
)
1543 | MsgDoFiles
=> (Slave
.handleChanges files
;
1544 Msg
.send (bio
, MsgOk
))
1545 | MsgRegenerate
=> (Domain
.resetLocal ();
1546 Msg
.send (bio
, MsgOk
))
1547 | _
=> (print
"Dispatcher sent unexpected command\n";
1548 Msg
.send (bio
, MsgError
"Unexpected command"))
1551 ignore (OpenSSL
.readChar bio
);
1555 else if peer
= "domtool" then
1556 case Msg
.recv bio
of
1557 SOME MsgShutdown
=> (OpenSSL
.close bio
;
1558 print ("Shutting down at " ^
now () ^
"\n\n"))
1559 | _
=> (OpenSSL
.close bio
;
1562 case Msg
.recv bio
of
1563 SOME (MsgQuery q
) => (print (describeQuery q ^
"\n");
1564 Msg
.send (bio
, answerQuery q
);
1565 ignore (OpenSSL
.readChar bio
);
1568 | _
=> (OpenSSL
.close bio
;
1570 end handle OpenSSL
.OpenSSL s
=>
1571 (print ("OpenSSL error: "^ s ^
"\n");
1573 handle OpenSSL
.OpenSSL _
=> ();
1575 | e
as OS
.SysErr (s
, _
) =>
1576 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1577 print ("System error: "^ s ^
"\n");
1579 handle OpenSSL
.OpenSSL _
=> ();
1583 OpenSSL
.shutdown sock
1588 val dir
= Posix
.FileSys
.opendir Config
.libRoot
1591 case Posix
.FileSys
.readdir dir
of
1592 NONE
=> (Posix
.FileSys
.closedir dir
;
1595 if String.isSuffix
".dtl" fname
then
1596 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
1605 fun autodocBasis outdir
=
1606 Autodoc
.autodoc
{outdir
= outdir
, infiles
= listBasis ()}