1 (* HCoop
Domtool (http
://hcoop
.sourceforge
.net
/)
2 * Copyright (c
) 2006-2009, Adam Chlipala
3 * Copyright (c
) 2012,2013,2014 Clinton Ebadi
<clinton@unknownlamer
.org
>
5 * This program is free software
; you can redistribute it
and/or
6 * modify it under the terms
of the GNU General Public License
7 * as published by the Free Software Foundation
; either version
2
8 * of the License
, or (at your option
) any later version
.
10 * This program is distributed
in the hope that it will be useful
,
11 * but WITHOUT ANY WARRANTY
; without even the implied warranty
of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE
. See the
13 * GNU General Public License for more details
.
15 * You should have received a copy
of the GNU General Public License
16 * along
with this program
; if not
, write to the Free Software
17 * Foundation
, Inc
., 51 Franklin Street
, Fifth Floor
, Boston
, MA
02110-1301, USA
.
22 structure Main
:> MAIN
= struct
24 open Ast MsgTypes Print
26 structure SM
= StringMap
28 fun init () = Acl
.read Config
.aclFile
30 fun isLib fname
= OS
.Path
.file fname
= "lib.dtl"
32 fun wrapFile (fname
, file
) =
33 case (isLib fname
, file
) of
34 (true, (comment
, ds
, SOME e
)) =>
38 (comment
, ds
, SOME (ELocal (e
, (ESkip
, loc
)), loc
))
44 val prog
= Parse
.parse fname
45 val prog
= wrapFile (fname
, prog
)
47 if !ErrorMsg
.anyErrors
then
53 Option
.app (Unused
.check G
) (#
3 prog
);
54 Tycheck
.checkFile G prog
)
59 val dir
= Posix
.FileSys
.opendir Config
.libRoot
62 case Posix
.FileSys
.readdir dir
of
63 NONE
=> (Posix
.FileSys
.closedir dir
;
66 if String.isSuffix
".dtl" fname
then
67 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
74 val (_
, files
) = Order
.order NONE files
76 if !ErrorMsg
.anyErrors
then
79 (Tycheck
.allowExterns ();
80 foldl (fn (fname
, G
) => check
' G fname
) Env
.empty files
81 before Tycheck
.disallowExterns ())
84 (* val b
= basis () *)
88 val _
= ErrorMsg
.reset ()
89 val _
= Env
.preTycheck ()
91 if !ErrorMsg
.anyErrors
then
95 val _
= Tycheck
.disallowExterns ()
96 val _
= ErrorMsg
.reset ()
97 val prog
= Parse
.parse fname
98 val prog
= wrapFile (fname
, prog
)
100 if !ErrorMsg
.anyErrors
then
104 val G
' = Tycheck
.checkFile G prog
106 if !ErrorMsg
.anyErrors
then
112 Option
.app (Unused
.check G
) (#
3 prog
);
119 String.sub (s
, 0) <> #
"."
120 andalso CharVector
.all (fn ch
=> Char.isAlphaNum ch
orelse ch
= #
"." orelse ch
= #
"_" orelse ch
= #
"-") s
125 case Posix
.ProcEnv
.getenv
"DOMTOOL_USER" of
128 val uid
= Posix
.ProcEnv
.getuid ()
130 Posix
.SysDB
.Passwd
.name (Posix
.SysDB
.getpwuid uid
)
134 Acl
.read Config
.aclFile
;
139 fun checkDir
' dname
=
143 val dir
= Posix
.FileSys
.opendir dname
146 case Posix
.FileSys
.readdir dir
of
147 NONE
=> (Posix
.FileSys
.closedir dir
;
151 loop (OS
.Path
.joinDirFile
{dir
= dname
,
158 val (_
, files
) = Order
.order (SOME b
) files
160 if !ErrorMsg
.anyErrors
then
163 (foldl (fn (fname
, G
) => check
' G fname
) b files
;
164 if !ErrorMsg
.anyErrors
then
176 val (G
, body
) = check G fname
178 if !ErrorMsg
.anyErrors
then
184 val body
' = Reduce
.reduceExp G body
186 (*printd (PD
.hovBox (PD
.PPS
.Rel
0,
187 [PD
.string "Result:",
195 (*(Defaults
.eInit ())*)
197 fun eval G evs fname
=
198 case reduce G fname
of
200 if !ErrorMsg
.anyErrors
then
204 val evs
' = Eval
.exec
' evs body
'
208 |
(G
, NONE
) => (G
, evs
)
211 Config
.dispatcher ^
":" ^
Int.toString Config
.dispatcherPort
214 "localhost:" ^
Int.toString Config
.slavePort
217 (OpenSSL
.context
false x
)
218 handle e
as OpenSSL
.OpenSSL s
=>
219 (print
"Couldn't find your certificate.\nYou probably haven't been given any Domtool privileges.\n";
220 print ("I looked in: " ^ #
1 x ^
"\n");
221 print ("Additional information: " ^ s ^
"\n");
224 fun requestContext f
=
226 val user
= setupUser ()
230 val context
= context (Config
.certDir ^
"/" ^ user ^
".pem",
231 Config
.keyDir ^
"/" ^ user ^
"/key.pem",
237 fun requestBio
' printErr f
=
239 val (user
, context
) = requestContext f
241 (user
, OpenSSL
.connect
printErr (context
, dispatcher
))
244 val requestBio
= requestBio
' true
246 fun requestSlaveBio
' printErr
=
248 val (user
, context
) = requestContext (fn () => ())
250 (user
, OpenSSL
.connect
printErr (context
, self
))
253 fun requestSlaveBio () = requestSlaveBio
' true
255 fun request (fname
, libOpt
) =
257 val (user
, bio
) = requestBio (fn () =>
260 val env
= case libOpt
of
262 | SOME lib
=> #
1 (check env lib
)
264 ignore (check env fname
)
269 val inf
= TextIO.openIn fname
272 case TextIO.inputLine inf
of
273 NONE
=> String.concat (rev lines
)
274 | SOME line
=> loop (line
:: lines
)
277 before TextIO.closeIn inf
280 val code
= readFile fname
281 val msg
= case libOpt
of
282 NONE
=> MsgConfig code
283 | SOME fname
' => MsgMultiConfig
[readFile fname
', code
]
287 NONE
=> print
"Server closed connection unexpectedly.\n"
290 MsgOk
=> print
"Configuration succeeded.\n"
291 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
292 | _
=> print
"Unexpected server reply.\n";
295 handle ErrorMsg
.Error
=> ()
297 fun requestDir dname
=
299 val _
= if Posix
.FileSys
.access (dname
, []) then
302 (print ("Can't access " ^ dname ^
".\n");
303 print
"Did you mean to run domtool on a specific file, instead of asking for all\n";
304 print
"files in your ~/.domtool directory?\n";
305 OS
.Process
.exit OS
.Process
.failure
)
307 val _
= ErrorMsg
.reset ()
309 val (user
, bio
) = requestBio (fn () => checkDir
' dname
)
313 val dir
= Posix
.FileSys
.opendir dname
316 case Posix
.FileSys
.readdir dir
of
317 NONE
=> (Posix
.FileSys
.closedir dir
;
321 loop (OS
.Path
.joinDirFile
{dir
= dname
,
328 val (_
, files
) = Order
.order (SOME b
) files
330 val _
= if !ErrorMsg
.anyErrors
then
335 val codes
= map (fn fname
=>
337 val inf
= TextIO.openIn fname
340 case TextIO.inputLine inf
of
341 NONE
=> String.concat (rev lines
)
342 | SOME line
=> loop (line
:: lines
)
345 before TextIO.closeIn inf
348 if !ErrorMsg
.anyErrors
then
351 (Msg
.send (bio
, MsgMultiConfig codes
);
353 NONE
=> print
"Server closed connection unexpectedly.\n"
356 MsgOk
=> print
"Configuration succeeded.\n"
357 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
358 | _
=> print
"Unexpected server reply.\n";
361 handle ErrorMsg
.Error
=> ()
365 val (_
, bio
) = requestBio
' false (fn () => ())
370 handle _
=> OS
.Process
.failure
372 fun requestShutdown () =
374 val (_
, bio
) = requestBio (fn () => ())
376 Msg
.send (bio
, MsgShutdown
);
381 MsgOk
=> print
"Shutdown begun.\n"
382 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
383 | _
=> print
"Unexpected server reply.\n";
387 fun requestSlavePing () =
389 val (_
, bio
) = requestSlaveBio
' false
394 handle _
=> OS
.Process
.failure
396 fun requestSlaveShutdown () =
398 val (_
, bio
) = requestSlaveBio ()
400 Msg
.send (bio
, MsgShutdown
);
405 MsgOk
=> print
"Shutdown begun.\n"
406 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
407 | _
=> print
"Unexpected server reply.\n";
411 fun requestGrant acl
=
413 val (user
, bio
) = requestBio (fn () => ())
415 Msg
.send (bio
, MsgGrant acl
);
417 NONE
=> print
"Server closed connection unexpectedly.\n"
420 MsgOk
=> print
"Grant succeeded.\n"
421 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
422 | _
=> print
"Unexpected server reply.\n";
426 fun requestRevoke acl
=
428 val (user
, bio
) = requestBio (fn () => ())
430 Msg
.send (bio
, MsgRevoke acl
);
432 NONE
=> print
"Server closed connection unexpectedly.\n"
435 MsgOk
=> print
"Revoke succeeded.\n"
436 | MsgError s
=> print ("Revoke failed: " ^ s ^
"\n")
437 | _
=> print
"Unexpected server reply.\n";
441 fun requestListPerms user
=
443 val (_
, bio
) = requestBio (fn () => ())
445 Msg
.send (bio
, MsgListPerms user
);
446 (case Msg
.recv bio
of
447 NONE
=> (print
"Server closed connection unexpectedly.\n";
451 MsgPerms perms
=> SOME perms
452 | MsgError s
=> (print ("Listing failed: " ^ s ^
"\n");
454 | _
=> (print
"Unexpected server reply.\n";
456 before OpenSSL
.close bio
459 fun requestWhoHas perm
=
461 val (_
, bio
) = requestBio (fn () => ())
463 Msg
.send (bio
, MsgWhoHas perm
);
464 (case Msg
.recv bio
of
465 NONE
=> (print
"Server closed connection unexpectedly.\n";
469 MsgWhoHasResponse users
=> SOME users
470 | MsgError s
=> (print ("whohas failed: " ^ s ^
"\n");
472 | _
=> (print
"Unexpected server reply.\n";
474 before OpenSSL
.close bio
477 fun requestRegen () =
479 val (_
, bio
) = requestBio (fn () => ())
481 Msg
.send (bio
, MsgRegenerate
);
483 NONE
=> print
"Server closed connection unexpectedly.\n"
486 MsgOk
=> print
"Regeneration succeeded.\n"
487 | MsgError s
=> print ("Regeneration failed: " ^ s ^
"\n")
488 | _
=> print
"Unexpected server reply.\n";
492 fun requestRegenTc () =
494 val (_
, bio
) = requestBio (fn () => ())
496 Msg
.send (bio
, MsgRegenerateTc
);
498 NONE
=> print
"Server closed connection unexpectedly.\n"
501 MsgOk
=> print
"All configuration validated.\n"
502 | MsgError s
=> print ("Configuration validation failed: " ^ s ^
"\n")
503 | _
=> print
"Unexpected server reply.\n";
507 fun requestRmdom dom
=
509 val (_
, bio
) = requestBio (fn () => ())
511 Msg
.send (bio
, MsgRmdom dom
);
513 NONE
=> print
"Server closed connection unexpectedly.\n"
516 MsgOk
=> print
"Removal succeeded.\n"
517 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
518 | _
=> print
"Unexpected server reply.\n";
522 fun requestRmuser user
=
524 val (_
, bio
) = requestBio (fn () => ())
526 Msg
.send (bio
, MsgRmuser user
);
528 NONE
=> print
"Server closed connection unexpectedly.\n"
531 MsgOk
=> print
"Removal succeeded.\n"
532 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
533 | _
=> print
"Unexpected server reply.\n";
537 fun requestDbUser dbtype
=
539 val (_
, context
) = requestContext (fn () => ())
540 val bio
= OpenSSL
.connect
true (context
,
541 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
543 Msg
.send (bio
, MsgCreateDbUser dbtype
);
545 NONE
=> print
"Server closed connection unexpectedly.\n"
548 MsgOk
=> print
"Your user has been created.\n"
549 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
550 | _
=> print
"Unexpected server reply.\n";
554 fun requestDbPasswd rc
=
556 val (_
, context
) = requestContext (fn () => ())
557 val bio
= OpenSSL
.connect
true (context
,
558 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
560 Msg
.send (bio
, MsgDbPasswd rc
);
562 NONE
=> print
"Server closed connection unexpectedly.\n"
565 MsgOk
=> print
"Your password has been changed.\n"
566 | MsgError s
=> print ("Password set failed: " ^ s ^
"\n")
567 | _
=> print
"Unexpected server reply.\n";
571 fun requestDbTable p
=
573 val (user
, context
) = requestContext (fn () => ())
574 val bio
= OpenSSL
.connect
true (context
,
575 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
577 Msg
.send (bio
, MsgCreateDb p
);
579 NONE
=> print
"Server closed connection unexpectedly.\n"
582 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been created.\n")
583 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
584 | _
=> print
"Unexpected server reply.\n";
588 fun requestDbDrop p
=
590 val (user
, context
) = requestContext (fn () => ())
591 val bio
= OpenSSL
.connect
true (context
,
592 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
594 Msg
.send (bio
, MsgDropDb p
);
596 NONE
=> print
"Server closed connection unexpectedly.\n"
599 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been dropped.\n")
600 | MsgError s
=> print ("Drop failed: " ^ s ^
"\n")
601 | _
=> print
"Unexpected server reply.\n";
605 fun requestDbGrant p
=
607 val (user
, context
) = requestContext (fn () => ())
608 val bio
= OpenSSL
.connect
true (context
,
609 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
611 Msg
.send (bio
, MsgGrantDb p
);
613 NONE
=> print
"Server closed connection unexpectedly.\n"
616 MsgOk
=> print ("You've been granted all allowed privileges to database " ^ user ^
"_" ^ #dbname p ^
".\n")
617 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
618 | _
=> print
"Unexpected server reply.\n";
622 fun requestListMailboxes domain
=
624 val (_
, bio
) = requestBio (fn () => ())
626 Msg
.send (bio
, MsgListMailboxes domain
);
627 (case Msg
.recv bio
of
628 NONE
=> Vmail
.Error
"Server closed connection unexpectedly."
631 MsgMailboxes users
=> (Msg
.send (bio
, MsgOk
);
633 | MsgError s
=> Vmail
.Error ("Listing failed: " ^ s
)
634 | _
=> Vmail
.Error
"Unexpected server reply.")
635 before OpenSSL
.close bio
638 fun requestNewMailbox p
=
640 val (_
, bio
) = requestBio (fn () => ())
642 Msg
.send (bio
, MsgNewMailbox p
);
644 NONE
=> print
"Server closed connection unexpectedly.\n"
647 MsgOk
=> print ("A mapping for " ^ #user p ^
"@" ^ #domain p ^
" has been created.\n")
648 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
649 | _
=> print
"Unexpected server reply.\n";
653 fun requestPasswdMailbox p
=
655 val (_
, bio
) = requestBio (fn () => ())
657 Msg
.send (bio
, MsgPasswdMailbox p
);
659 NONE
=> print
"Server closed connection unexpectedly.\n"
662 MsgOk
=> print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n")
663 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
664 | _
=> print
"Unexpected server reply.\n";
668 fun requestRmMailbox p
=
670 val (_
, bio
) = requestBio (fn () => ())
672 Msg
.send (bio
, MsgRmMailbox p
);
674 NONE
=> print
"Server closed connection unexpectedly.\n"
677 MsgOk
=> print ("The mapping for mailbox " ^ #user p ^
"@" ^ #domain p ^
" has been deleted.\n")
678 | MsgError s
=> print ("Remove failed: " ^ s ^
"\n")
679 | _
=> print
"Unexpected server reply.\n";
683 fun requestSaQuery addr
=
685 val (_
, bio
) = requestBio (fn () => ())
687 Msg
.send (bio
, MsgSaQuery addr
);
688 (case Msg
.recv bio
of
689 NONE
=> print
"Server closed connection unexpectedly.\n"
692 MsgSaStatus b
=> (print ("SpamAssassin filtering for " ^ addr ^
" is "
693 ^
(if b
then "ON" else "OFF") ^
".\n");
694 Msg
.send (bio
, MsgOk
))
695 | MsgError s
=> print ("Query failed: " ^ s ^
"\n")
696 | _
=> print
"Unexpected server reply.\n")
697 before OpenSSL
.close bio
702 val (_
, bio
) = requestBio (fn () => ())
704 Msg
.send (bio
, MsgSaSet p
);
706 NONE
=> print
"Server closed connection unexpectedly.\n"
709 MsgOk
=> print ("SpamAssassin filtering for " ^ #
1 p ^
" is now "
710 ^
(if #
2 p
then "ON" else "OFF") ^
".\n")
711 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
712 | _
=> print
"Unexpected server reply.\n";
716 fun requestSmtpLog domain
=
718 val (_
, bio
) = requestBio (fn () => ())
720 val _
= Msg
.send (bio
, MsgSmtpLogReq domain
)
724 NONE
=> print
"Server closed connection unexpectedly.\n"
728 | MsgSmtpLogRes line
=> (print line
;
730 | MsgError s
=> print ("Log search failed: " ^ s ^
"\n")
731 | _
=> print
"Unexpected server reply.\n"
737 fun requestMysqlFixperms () =
739 val (_
, context
) = requestContext (fn () => ())
740 val bio
= OpenSSL
.connect
true (context
,
741 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
743 Msg
.send (bio
, MsgMysqlFixperms
);
745 NONE
=> print
"Server closed connection unexpectedly.\n"
748 MsgOk
=> print
"Permissions granted.\n"
749 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
750 | _
=> print
"Unexpected server reply.\n";
754 fun requestApt
{node
, pkg
} =
756 val (user
, context
) = requestContext (fn () => ())
757 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
760 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
762 val _
= Msg
.send (bio
, MsgQuery (QApt pkg
))
766 NONE
=> (print
"Server closed connection unexpectedly.\n";
770 MsgYes
=> (print
"Package is installed.\n";
772 | MsgNo
=> (print
"Package is not installed.\n";
774 | MsgError s
=> (print ("APT query failed: " ^ s ^
"\n");
776 | _
=> (print
"Unexpected server reply.\n";
780 before OpenSSL
.close bio
783 fun requestAptExists
{node
, pkg
} =
785 val (user
, context
) = requestContext (fn () => ())
786 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
789 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
791 val _
= Msg
.send (bio
, MsgQuery (QAptExists pkg
))
795 NONE
=> (print
"Server closed connection unexpectedly.\n";
799 MsgAptQuery
{section
,description
} => (print
"Package exists.\n";
800 print ("Section: " ^ section ^
"\n");
801 print ("Description: " ^ description ^
"\n");
803 | MsgNo
=> (print
"Package does not exist.\n";
805 (* It might be the Wrong
Thing (tm
) to use MsgNo like this
*))
806 | MsgError s
=> (print ("APT existence query failed: " ^ s ^
"\n");
808 | _
=> (print
"Unexpected server reply.\n";
812 before OpenSSL
.close bio
815 fun requestCron
{node
, uname
} =
817 val (user
, context
) = requestContext (fn () => ())
818 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
821 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
823 val _
= Msg
.send (bio
, MsgQuery (QCron uname
))
827 NONE
=> (print
"Server closed connection unexpectedly.\n";
831 MsgYes
=> (print
"User has cron permissions.\n";
833 | MsgNo
=> (print
"User does not have cron permissions.\n";
835 | MsgError s
=> (print ("Cron query failed: " ^ s ^
"\n");
837 | _
=> (print
"Unexpected server reply.\n";
841 before OpenSSL
.close bio
844 fun requestFtp
{node
, uname
} =
846 val (user
, context
) = requestContext (fn () => ())
847 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
850 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
852 val _
= Msg
.send (bio
, MsgQuery (QFtp uname
))
856 NONE
=> (print
"Server closed connection unexpectedly.\n";
860 MsgYes
=> (print
"User has FTP permissions.\n";
862 | MsgNo
=> (print
"User does not have FTP permissions.\n";
864 | MsgError s
=> (print ("FTP query failed: " ^ s ^
"\n");
866 | _
=> (print
"Unexpected server reply.\n";
870 before OpenSSL
.close bio
873 fun requestTrustedPath
{node
, uname
} =
875 val (user
, context
) = requestContext (fn () => ())
876 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
879 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
881 val _
= Msg
.send (bio
, MsgQuery (QTrustedPath uname
))
885 NONE
=> (print
"Server closed connection unexpectedly.\n";
889 MsgYes
=> (print
"User has trusted path restriction.\n";
891 | MsgNo
=> (print
"User does not have trusted path restriction.\n";
893 | MsgError s
=> (print ("Trusted path query failed: " ^ s ^
"\n");
895 | _
=> (print
"Unexpected server reply.\n";
899 before OpenSSL
.close bio
902 fun requestSocketPerm
{node
, uname
} =
904 val (user
, context
) = requestContext (fn () => ())
905 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
908 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
910 val _
= Msg
.send (bio
, MsgQuery (QSocket uname
))
914 NONE
=> (print
"Server closed connection unexpectedly.\n";
918 MsgSocket p
=> (case p
of
920 | Client
=> print
"Client\n"
921 | Server
=> print
"Server\n"
922 | Nada
=> print
"Nada\n";
924 | MsgError s
=> (print ("Socket permission query failed: " ^ s ^
"\n");
926 | _
=> (print
"Unexpected server reply.\n";
930 before OpenSSL
.close bio
933 fun requestFirewall
{node
, uname
} =
935 val (user
, context
) = requestContext (fn () => ())
936 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
939 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
941 val _
= Msg
.send (bio
, MsgQuery (QFirewall
{node
= node
, user
= uname
}))
945 NONE
=> (print
"Server closed connection unexpectedly.\n";
949 MsgFirewall ls
=> (app (fn s
=> (print s
; print
"\n")) ls
;
951 | MsgError s
=> (print ("Firewall query failed: " ^ s ^
"\n");
953 | _
=> (print
"Unexpected server reply.\n";
957 before OpenSSL
.close bio
960 fun requestDescribe dom
=
962 val (_
, bio
) = requestBio (fn () => ())
964 Msg
.send (bio
, MsgDescribe dom
);
966 NONE
=> print
"Server closed connection unexpectedly.\n"
969 MsgDescription s
=> print s
970 | MsgError s
=> print ("Description failed: " ^ s ^
"\n")
971 | _
=> print
"Unexpected server reply.\n";
975 fun requestReUsers () =
977 val (_
, bio
) = requestBio (fn () => ())
979 Msg
.send (bio
, MsgReUsers
);
981 NONE
=> print
"Server closed connection unexpectedly.\n"
984 MsgOk
=> print
"Callbacks run.\n"
985 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
986 | _
=> print
"Unexpected server reply.\n";
990 fun requestFirewallRegen node
=
992 val (user
, context
) = requestContext (fn () => ())
993 val bio
= OpenSSL
.connect
true (context
, Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
994 (* Only supporting on slave nodes
*)
996 val _
= Msg
.send (bio
, MsgFirewallRegen
)
998 fun handleResult () =
1000 NONE
=> (print
"Server closed connection unexpectedly.\n";
1004 MsgOk
=> (print
"Firewall regenerated.\n";
1006 | MsgError s
=> (print ("Firewall regeneration failed: " ^ s ^
"\n");
1008 | _
=> (print
"Unexpected server reply.\n";
1012 before OpenSSL
.close bio
1015 structure SS
= StringSet
1017 fun domainList dname
=
1019 val dir
= Posix
.FileSys
.opendir dname
1021 fun visitNode dset
=
1022 case Posix
.FileSys
.readdir dir
of
1026 val path
= OS
.Path
.joinDirFile
{dir
= dname
,
1029 fun visitDomains (path
, bfor
, dset
) =
1031 val dir
= Posix
.FileSys
.opendir path
1034 case Posix
.FileSys
.readdir dir
of
1038 val path
= OS
.Path
.joinDirFile
{dir
= path
,
1041 if Posix
.FileSys
.ST
.isDir (Posix
.FileSys
.stat path
) then
1043 val bfor
= dname
:: bfor
1045 loop (visitDomains (path
, bfor
,
1047 String.concatWith
"." bfor
)))
1054 before Posix
.FileSys
.closedir dir
1057 visitNode (visitDomains (path
, [], dset
))
1061 before Posix
.FileSys
.closedir dir
1064 fun regenerateEither tc checker context
=
1066 val () = print
"Starting regeneration....\n"
1072 domainList Config
.resultRoot
1080 val _
= ErrorMsg
.reset ()
1083 val () = Tycheck
.disallowExterns ()
1085 val () = ifReal (fn () =>
1086 (ignore (OS
.Process
.system ("rm -rf " ^ Config
.oldResultRoot ^
"/*"));
1087 ignore (OS
.Process
.system ("cp -r " ^ Config
.resultRoot
1088 ^
"/* " ^ Config
.oldResultRoot ^
"/"));
1089 Domain
.resetGlobal ()))
1093 fun contactNode (node
, ip
) =
1094 if node
= Config
.defaultNode
then
1095 Domain
.resetLocal ()
1097 val bio
= OpenSSL
.connect
true (context
,
1100 ^
Int.toString Config
.slavePort
)
1102 Msg
.send (bio
, MsgRegenerate
);
1103 case Msg
.recv bio
of
1104 NONE
=> print
"Slave closed connection unexpectedly\n"
1107 MsgOk
=> print ("Slave " ^ node ^
" pre-regeneration finished\n")
1108 | MsgError s
=> print ("Slave " ^ node
1109 ^
" returned error: " ^
1111 | _
=> print ("Slave " ^ node
1112 ^
" returned unexpected command\n");
1115 handle OpenSSL
.OpenSSL s
=> print ("OpenSSL error: " ^ s ^
"\n")
1119 val _
= Domain
.setUser user
1120 val _
= ErrorMsg
.reset ()
1122 val dname
= Config
.domtoolDir user
1124 if Posix
.FileSys
.access (dname
, []) then
1126 val dir
= Posix
.FileSys
.opendir dname
1129 case Posix
.FileSys
.readdir dir
of
1130 NONE
=> (Posix
.FileSys
.closedir dir
;
1133 if notTmp fname
then
1134 loop (OS
.Path
.joinDirFile
{dir
= dname
,
1141 val (_
, files
) = Order
.order (SOME b
) files
1143 fun checker
' (file
, (G
, evs
)) =
1146 if !ErrorMsg
.anyErrors
then
1148 print ("User " ^ user ^
"'s configuration has errors!\n");
1152 let val basis
' = basis () in
1153 ignore (foldl checker
' (basis
', Env
.initialDynEnvVals basis
') files
)
1156 else if String.isSuffix
"_admin" user
then
1159 (print ("Couldn't access " ^ user ^
"'s ~/.domtool directory.\n");
1162 handle IO
.Io
{name
, function
, ...} =>
1163 (print ("IO error processing user " ^ user ^
": " ^ function ^
": " ^ name ^
"\n");
1165 | exn
as OS
.SysErr (s
, _
) => (print ("System error processing user " ^ user ^
": " ^ s ^
"\n");
1167 | ErrorMsg
.Error
=> (ErrorMsg
.reset ();
1168 print ("User " ^ user ^
" had a compilation error.\n");
1170 | _
=> (print
"Unknown exception during regeneration!\n";
1173 ifReal (fn () => (app contactNode Config
.nodeIps
;
1175 app
doUser (Acl
.users ());
1178 val domainsAfter
= domainList Config
.resultRoot
1179 val domainsGone
= SS
.difference (domainsBefore
, domainsAfter
)
1181 if SS
.isEmpty domainsGone
then
1184 (print
"Domains to kill:";
1185 SS
.app (fn s
=> (print
" "; print s
)) domainsGone
;
1188 Domain
.rmdom
' Config
.oldResultRoot (SS
.listItems domainsGone
));
1195 val regenerate
= regenerateEither
false eval
1196 val regenerateTc
= regenerateEither
true
1197 (fn G
=> fn evs
=> fn file
=>
1198 (#
1 (check G file
), evs
))
1200 fun usersChanged () =
1201 (Domain
.onUsersChange ();
1202 ignore (OS
.Process
.system Config
.publish_reusers
))
1206 val doms
= Acl
.class
{user
= user
, class
= "domain"}
1207 val doms
= List.filter (fn dom
=>
1208 case Acl
.whoHas
{class
= "domain", value
= dom
} of
1210 | _
=> false) (StringSet
.listItems doms
)
1217 fun now () = Date
.toString (Date
.fromTimeUniv (Time
.now ()))
1221 QApt pkg
=> if Apt
.installed pkg
then MsgYes
else MsgNo
1222 | QAptExists pkg
=> (case Apt
.info pkg
of
1223 SOME
{section
, description
} => MsgAptQuery
{section
= section
, description
= description
}
1225 | QCron user
=> if Cron
.allowed user
then MsgYes
else MsgNo
1226 | QFtp user
=> if Ftp
.allowed user
then MsgYes
else MsgNo
1227 | QTrustedPath user
=> if TrustedPath
.query user
then MsgYes
else MsgNo
1228 | QSocket user
=> MsgSocket (SocketPerm
.query user
)
1229 | QFirewall
{node
, user
} => MsgFirewall (Firewall
.query (node
, user
))
1231 fun describeQuery q
=
1233 QApt pkg
=> "Requested installation status of package " ^ pkg
1234 | QAptExists pkg
=> "Requested if package " ^ pkg ^
" exists"
1235 | QCron user
=> "Asked about cron permissions for user " ^ user
1236 | QFtp user
=> "Asked about FTP permissions for user " ^ user
1237 | QTrustedPath user
=> "Asked about trusted path settings for user " ^ user
1238 | QSocket user
=> "Asked about socket permissions for user " ^ user
1239 | QFirewall
{node
, user
} => "Asked about firewall rules on " ^ node ^
" for user " ^ user
1241 fun doIt
' loop bio f cleanup
=
1243 (msgLocal
, SOME msgRemote
) =>
1246 Msg
.send (bio
, MsgError msgRemote
))
1247 |
(msgLocal
, NONE
) =>
1250 Msg
.send (bio
, MsgOk
)))
1251 handle e
as (OpenSSL
.OpenSSL s
) =>
1252 (print ("OpenSSL error: " ^ s ^
"\n");
1253 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1254 Msg
.send (bio
, MsgError ("OpenSSL error: " ^ s
))
1255 handle OpenSSL
.OpenSSL _
=> ())
1256 | OS
.SysErr (s
, _
) =>
1257 (print
"System error: ";
1260 Msg
.send (bio
, MsgError ("System error: " ^ s
))
1261 handle OpenSSL
.OpenSSL _
=> ())
1266 Msg
.send (bio
, MsgError ("Failure: " ^ s
))
1267 handle OpenSSL
.OpenSSL _
=> ())
1269 (print
"Compilation error\n";
1270 Msg
.send (bio
, MsgError
"Error during configuration evaluation")
1271 handle OpenSSL
.OpenSSL _
=> ());
1273 ignore (OpenSSL
.readChar bio
);
1275 handle OpenSSL
.OpenSSL _
=> ();
1280 val host
= Slave
.hostname ()
1282 val () = Acl
.read Config
.aclFile
1284 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1285 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1287 val _
= Domain
.set_context context
1289 val sock
= OpenSSL
.listen (context
, Config
.dispatcherPort
)
1292 (case OpenSSL
.accept sock
of
1296 val user
= OpenSSL
.peerCN bio
1297 val () = print ("\nConnection from " ^ user ^
" at " ^
now () ^
"\n")
1298 val () = Domain
.setUser user
1299 val doIt
= doIt
' loop bio
1301 fun doConfig codes
=
1303 val _
= print
"Configuration:\n"
1304 val _
= app (fn s
=> (print s
; print
"\n")) codes
1307 val outname
= OS
.FileSys
.tmpName ()
1309 fun doOne (code
, (G
, evs
)) =
1311 val outf
= TextIO.openOut outname
1313 TextIO.output (outf
, code
);
1314 TextIO.closeOut outf
;
1318 doIt (fn () => (Env
.pre ();
1319 let val basis
' = basis () in
1320 ignore (foldl
doOne (basis
', Env
.initialDynEnvVals basis
') codes
)
1323 Msg
.send (bio
, MsgOk
);
1324 ("Configuration complete.", NONE
)))
1325 (fn () => OS
.FileSys
.remove outname
)
1329 case String.fields (fn ch
=> ch
= #
"@") s
of
1331 if user
= user
' then
1335 |
[user
', domain
] =>
1336 if Domain
.validEmailUser user
' andalso Domain
.yourDomain domain
then
1337 SOME (SetSA
.Email s
)
1343 case Msg
.recv bio
of
1344 NONE
=> (OpenSSL
.close bio
1345 handle OpenSSL
.OpenSSL _
=> ();
1349 MsgConfig code
=> doConfig
[code
]
1350 | MsgMultiConfig codes
=> doConfig codes
1353 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1354 orelse Acl
.query
{user
= user
, class
= "priv", value
= "shutdown"} then
1355 print ("Domtool dispatcher shutting down at " ^
now () ^
"\n\n")
1357 (print
"Unauthorized shutdown command!\n";
1359 handle OpenSSL
.OpenSSL _
=> ();
1364 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1366 Acl
.write Config
.aclFile
;
1367 if #class acl
= "user" then
1371 ("Granted permission " ^ #value acl ^
" to " ^ #user acl ^
" in " ^ #class acl ^
".",
1374 ("Unauthorized user asked to grant a permission!",
1375 SOME
"Not authorized to grant privileges"))
1380 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1382 Acl
.write Config
.aclFile
;
1383 ("Revoked permission " ^ #value acl ^
" from " ^ #user acl ^
" in " ^ #class acl ^
".",
1386 ("Unauthorized user asked to revoke a permission!",
1387 SOME
"Not authorized to revoke privileges"))
1390 | MsgListPerms user
=>
1392 (Msg
.send (bio
, MsgPerms (Acl
.queryAll user
));
1393 ("Sent permission list for user " ^ user ^
".",
1399 (Msg
.send (bio
, MsgWhoHasResponse (Acl
.whoHas perm
));
1400 ("Sent whohas response for " ^ #class perm ^
" / " ^ #value perm ^
".",
1406 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1407 orelse List.all (fn dom
=> Domain
.validDomain dom
1408 andalso Acl
.queryDomain
{user
= user
, domain
= dom
}) doms
then
1411 Acl
.revokeFromAll
{class
= "domain", value
= dom
}) doms
;
1412 Acl
.write Config
.aclFile
;*)
1413 ("Removed domains" ^
foldl (fn (d
, s
) => s ^
" " ^ d
) "" doms ^
".",
1416 ("Unauthorized user asked to remove a domain!",
1417 SOME
"Not authorized to remove that domain"))
1422 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1423 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1424 (if regenerate context
then
1425 ("Regenerated all configuration.",
1428 ("Error regenerating configuration!",
1429 SOME
"Error regenerating configuration! Consult /var/log/domtool.log."))
1431 ("Unauthorized user asked to regenerate!",
1432 SOME
"Not authorized to regenerate"))
1435 | MsgRegenerateTc
=>
1437 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1438 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1439 (if regenerateTc context
then
1440 ("Checked all configuration.",
1443 ("Found a compilation error!",
1444 SOME
"Found a compilation error! Consult /var/log/domtool.log."))
1446 ("Unauthorized user asked to regenerate -tc!",
1447 SOME
"Not authorized to regenerate -tc"))
1450 | MsgRmuser user
' =>
1452 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1454 Acl
.write Config
.aclFile
;
1455 ("Removed user " ^ user
' ^
".",
1458 ("Unauthorized user asked to remove a user!",
1459 SOME
"Not authorized to remove users"))
1462 | MsgListMailboxes domain
=>
1464 if not (Domain
.yourDomain domain
) then
1465 ("User wasn't authorized to list mailboxes for " ^ domain
,
1466 SOME
"You're not authorized to configure that domain.")
1468 case Vmail
.list domain
of
1469 Vmail
.Listing users
=> (Msg
.send (bio
, MsgMailboxes users
);
1470 ("Sent mailbox list for " ^ domain
,
1472 | Vmail
.Error msg
=> ("Error listing mailboxes for " ^ domain ^
": " ^ msg
,
1476 | MsgNewMailbox
{domain
, user
= emailUser
, passwd
, mailbox
} =>
1478 if not (Domain
.yourDomain domain
) then
1479 ("User wasn't authorized to add a mailbox to " ^ domain
,
1480 SOME
"You're not authorized to configure that domain.")
1481 else if not (Domain
.validEmailUser emailUser
) then
1482 ("Invalid e-mail username " ^ emailUser
,
1483 SOME
"Invalid e-mail username")
1484 else if not (CharVector
.all
Char.isGraph passwd
) then
1485 ("Invalid password",
1486 SOME
"Invalid password; may only contain printable, non-space characters")
1487 else if not (Domain
.yourPath mailbox
) then
1488 ("User wasn't authorized to add a mailbox at " ^ mailbox
,
1489 SOME ("You're not authorized to use that mailbox location. ("
1492 case Vmail
.add
{requester
= user
,
1493 domain
= domain
, user
= emailUser
,
1494 passwd
= passwd
, mailbox
= mailbox
} of
1495 NONE
=> ("Added mailbox " ^ emailUser ^
"@" ^ domain ^
" at " ^ mailbox
,
1497 | SOME msg
=> ("Error adding mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1501 | MsgPasswdMailbox
{domain
, user
= emailUser
, passwd
} =>
1503 if not (Domain
.yourDomain domain
) then
1504 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1505 SOME
"You're not authorized to configure that domain.")
1506 else if not (Domain
.validEmailUser emailUser
) then
1507 ("Invalid e-mail username " ^ emailUser
,
1508 SOME
"Invalid e-mail username")
1509 else if not (CharVector
.all
Char.isGraph passwd
) then
1510 ("Invalid password",
1511 SOME
"Invalid password; may only contain printable, non-space characters")
1513 case Vmail
.passwd
{domain
= domain
, user
= emailUser
,
1515 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1517 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1521 | MsgRmMailbox
{domain
, user
= emailUser
} =>
1523 if not (Domain
.yourDomain domain
) then
1524 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1525 SOME
"You're not authorized to configure that domain.")
1526 else if not (Domain
.validEmailUser emailUser
) then
1527 ("Invalid e-mail username " ^ emailUser
,
1528 SOME
"Invalid e-mail username")
1530 case Vmail
.rm
{domain
= domain
, user
= emailUser
} of
1531 NONE
=> ("Deleted mailbox " ^ emailUser ^
"@" ^ domain
,
1533 | SOME msg
=> ("Error deleting mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1537 | MsgSaQuery addr
=>
1539 case checkAddr addr
of
1540 NONE
=> ("User tried to query SA filtering for " ^ addr
,
1541 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1542 | SOME addr
' => (Msg
.send (bio
, MsgSaStatus (SetSA
.query addr
'));
1543 ("Queried SA filtering status for " ^ addr
,
1547 |
MsgSaSet (addr
, b
) =>
1549 case checkAddr addr
of
1550 NONE
=> ("User tried to set SA filtering for " ^ addr
,
1551 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1552 | SOME addr
' => (SetSA
.set (addr
', b
);
1553 Msg
.send (bio
, MsgOk
);
1554 ("Set SA filtering status for " ^ addr ^
" to "
1555 ^
(if b
then "ON" else "OFF"),
1559 | MsgSmtpLogReq domain
=>
1561 if not (Domain
.yourDomain domain
) then
1562 ("Unauthorized user tried to request SMTP logs for " ^ domain
,
1563 SOME
"You aren't authorized to configure that domain.")
1565 (SmtpLog
.search (fn line
=> Msg
.send (bio
, MsgSmtpLogRes line
))
1567 ("Requested SMTP logs for " ^ domain
,
1572 doIt (fn () => (Msg
.send (bio
, answerQuery q
);
1576 | MsgDescribe dom
=>
1577 doIt (fn () => if not (Domain
.validDomain dom
) then
1578 ("Requested description of invalid domain " ^ dom
,
1579 SOME
"Invalid domain name")
1580 else if not (Domain
.yourDomain dom
1581 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"}) then
1582 ("Requested description of " ^ dom ^
", but not allowed access",
1583 SOME
"Access denied")
1585 (Msg
.send (bio
, MsgDescription (Domain
.describe dom
));
1586 ("Sent description of domain " ^ dom
,
1591 doIt (fn () => if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1592 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1594 ("Users change callbacks run", NONE
))
1596 ("Unauthorized user asked to reusers!",
1597 SOME
"You aren't authorized to regenerate files."))
1601 doIt (fn () => ("Unexpected command",
1602 SOME
"Unexpected command"))
1607 handle e
as (OpenSSL
.OpenSSL s
) =>
1608 (print ("OpenSSL error: " ^ s ^
"\n");
1609 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1611 handle OpenSSL
.OpenSSL _
=> ();
1613 | OS
.SysErr (s
, _
) =>
1614 (print ("System error: " ^ s ^
"\n");
1616 handle OpenSSL
.OpenSSL _
=> ();
1618 | IO
.Io
{name
, function
, cause
} =>
1619 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1620 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1622 handle OpenSSL
.OpenSSL _
=> ();
1624 | OS
.Path
.InvalidArc
=>
1625 (print
"Invalid arc\n";
1627 handle OpenSSL
.OpenSSL _
=> ();
1630 (print
"Unknown exception in main loop!\n";
1631 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1633 handle OpenSSL
.OpenSSL _
=> ();
1635 handle e
as (OpenSSL
.OpenSSL s
) =>
1636 (print ("OpenSSL error: " ^ s ^
"\n");
1637 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1639 | OS
.SysErr (s
, _
) =>
1640 (print ("System error: " ^ s ^
"\n");
1642 | IO
.Io
{name
, function
, cause
} =>
1643 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1644 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1647 (print
"Unknown exception in main loop!\n";
1648 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1651 print ("Domtool dispatcher starting up at " ^
now () ^
"\n");
1652 print
"Listening for connections....\n";
1654 OpenSSL
.shutdown sock
1659 val host
= Slave
.hostname ()
1661 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1662 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1665 val sock
= OpenSSL
.listen (context
, Config
.slavePort
)
1667 val _
= print ("Slave server starting at " ^
now () ^
"\n")
1670 (case OpenSSL
.accept sock
of
1674 val peer
= OpenSSL
.peerCN bio
1675 val () = print ("\nConnection from " ^ peer ^
" at " ^
now () ^
"\n")
1677 if peer
= Config
.dispatcherName
then let
1679 case Msg
.recv bio
of
1680 NONE
=> print
"Dispatcher closed connection unexpectedly\n"
1683 MsgFile file
=> loop
' (file
:: files
)
1684 | MsgDoFiles
=> (Slave
.handleChanges files
;
1685 Msg
.send (bio
, MsgOk
))
1686 | MsgRegenerate
=> (Domain
.resetLocal ();
1687 Msg
.send (bio
, MsgOk
))
1688 | MsgVmailChanged
=> (if Vmail
.doChanged () then
1689 Msg
.send (bio
, MsgOk
)
1691 Msg
.send (bio
, MsgError
"userdb update failed"))
1692 | _
=> (print
"Dispatcher sent unexpected command\n";
1693 Msg
.send (bio
, MsgError
"Unexpected command"))
1696 ignore (OpenSSL
.readChar bio
);
1700 else if peer
= "domtool" then
1701 case Msg
.recv bio
of
1702 SOME MsgShutdown
=> (OpenSSL
.close bio
;
1703 print ("Shutting down at " ^
now () ^
"\n\n"))
1704 | _
=> (OpenSSL
.close bio
;
1708 val doIt
= doIt
' loop bio
1711 case Msg
.recv bio
of
1712 NONE
=> (OpenSSL
.close bio
1713 handle OpenSSL
.OpenSSL _
=> ();
1717 (MsgQuery q
) => (print (describeQuery q ^
"\n");
1718 Msg
.send (bio
, answerQuery q
);
1719 ignore (OpenSSL
.readChar bio
);
1722 | MsgCreateDbUser
{dbtype
, passwd
} =>
1724 case Dbms
.lookup dbtype
of
1725 NONE
=> ("Database user creation request with unknown datatype type " ^ dbtype
,
1726 SOME ("Unknown database type " ^ dbtype
))
1728 case #adduser handler
{user
= user
, passwd
= passwd
} of
1729 NONE
=> ("Added " ^ dbtype ^
" user " ^ user ^
".",
1732 ("Error adding a " ^ dbtype ^
" user " ^ user ^
": " ^ msg
,
1733 SOME ("Error adding user: " ^ msg
)))
1736 | MsgDbPasswd
{dbtype
, passwd
} =>
1738 case Dbms
.lookup dbtype
of
1739 NONE
=> ("Database passwd request with unknown datatype type " ^ dbtype
,
1740 SOME ("Unknown database type " ^ dbtype
))
1742 case #passwd handler
{user
= user
, passwd
= passwd
} of
1743 NONE
=> ("Changed " ^ dbtype ^
" password of user " ^ user ^
".",
1746 ("Error setting " ^ dbtype ^
" password of user " ^ user ^
": " ^ msg
,
1747 SOME ("Error adding user: " ^ msg
)))
1750 | MsgCreateDb
{dbtype
, dbname
, encoding
} =>
1752 if Dbms
.validDbname dbname
then
1753 case Dbms
.lookup dbtype
of
1754 NONE
=> ("Database creation request with unknown datatype type " ^ dbtype
,
1755 SOME ("Unknown database type " ^ dbtype
))
1757 if not (Dbms
.validEncoding encoding
) then
1758 ("Invalid encoding " ^ valOf encoding ^
" requested for database creation.",
1759 SOME
"Invalid encoding")
1761 case #createdb handler
{user
= user
, dbname
= dbname
, encoding
= encoding
} of
1762 NONE
=> ("Created database " ^ user ^
"_" ^ dbname ^
".",
1764 | SOME msg
=> ("Error creating database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1765 SOME ("Error creating database: " ^ msg
))
1767 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1768 SOME ("Invalid database name " ^ dbname
)))
1771 | MsgDropDb
{dbtype
, dbname
} =>
1773 if Dbms
.validDbname dbname
then
1774 case Dbms
.lookup dbtype
of
1775 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1776 SOME ("Unknown database type " ^ dbtype
))
1778 case #dropdb handler
{user
= user
, dbname
= dbname
} of
1779 NONE
=> ("Drop database " ^ user ^
"_" ^ dbname ^
".",
1781 | SOME msg
=> ("Error dropping database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1782 SOME ("Error dropping database: " ^ msg
))
1784 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1785 SOME ("Invalid database name " ^ dbname
)))
1788 | MsgGrantDb
{dbtype
, dbname
} =>
1790 if Dbms
.validDbname dbname
then
1791 case Dbms
.lookup dbtype
of
1792 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1793 SOME ("Unknown database type " ^ dbtype
))
1795 case #grant handler
{user
= user
, dbname
= dbname
} of
1796 NONE
=> ("Grant permissions to database " ^ user ^
"_" ^ dbname ^
".",
1798 | SOME msg
=> ("Error granting permissions to database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1799 SOME ("Error granting permissions to database: " ^ msg
))
1801 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1802 SOME ("Invalid database name " ^ dbname
)))
1804 | MsgMysqlFixperms
=>
1805 (print
"Starting mysql-fixperms\n";
1806 doIt (fn () => if OS
.Process
.isSuccess
1807 (OS
.Process
.system
"/usr/bin/sudo -H /afs/hcoop.net/common/etc/scripts/mysql-grant-table-drop") then
1808 ("Requested mysql-fixperms",
1811 ("Requested mysql-fixperms, but execution failed!",
1812 SOME
"Script execution failed."))
1814 | MsgFirewallRegen
=>
1815 doIt (fn () => (Acl
.read Config
.aclFile
;
1816 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1817 if List.exists (fn x
=> x
= host
) Config
.Firewall
.firewallNodes
then
1818 if (Firewall
.generateFirewallConfig (Firewall
.parseRules ()) andalso Firewall
.publishConfig ())
1820 ("Firewall rules regenerated.", NONE
)
1822 ("Rules regeneration failed!", SOME
"Script execution failed.")
1823 else ("Node not controlled by domtool firewall.", SOME (host
))
1825 ("Not authorized to regenerate firewall.", SOME ("Unauthorized user " ^ user ^
" attempted to regenerated firewall"))))
1828 | _
=> (OpenSSL
.close bio
;
1831 end handle OpenSSL
.OpenSSL s
=>
1832 (print ("OpenSSL error: " ^ s ^
"\n");
1834 handle OpenSSL
.OpenSSL _
=> ();
1836 | e
as OS
.SysErr (s
, _
) =>
1837 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1838 print ("System error: "^ s ^
"\n");
1840 handle OpenSSL
.OpenSSL _
=> ();
1842 | IO
.Io
{function
, name
, ...} =>
1843 (print ("IO error: " ^ function ^
": " ^ name ^
"\n");
1845 handle OpenSSL
.OpenSSL _
=> ();
1848 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1849 print
"Uncaught exception!\n";
1851 handle OpenSSL
.OpenSSL _
=> ();
1853 handle OpenSSL
.OpenSSL s
=>
1854 (print ("OpenSSL error: " ^ s ^
"\n");
1857 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1858 print
"Uncaught exception!\n";
1862 OpenSSL
.shutdown sock
1867 val dir
= Posix
.FileSys
.opendir Config
.libRoot
1870 case Posix
.FileSys
.readdir dir
of
1871 NONE
=> (Posix
.FileSys
.closedir dir
;
1874 if String.isSuffix
".dtl" fname
then
1875 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
1884 fun autodocBasis outdir
=
1885 Autodoc
.autodoc
{outdir
= outdir
, infiles
= listBasis ()}