1 (* HCoop
Domtool (http
://hcoop
.sourceforge
.net
/)
2 * Copyright (c
) 2006-2009, Adam Chlipala
3 * Copyright (c
) 2012,2013,2014 Clinton Ebadi
<clinton@unknownlamer
.org
>
5 * This program is free software
; you can redistribute it
and/or
6 * modify it under the terms
of the GNU General Public License
7 * as published by the Free Software Foundation
; either version
2
8 * of the License
, or (at your option
) any later version
.
10 * This program is distributed
in the hope that it will be useful
,
11 * but WITHOUT ANY WARRANTY
; without even the implied warranty
of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE
. See the
13 * GNU General Public License for more details
.
15 * You should have received a copy
of the GNU General Public License
16 * along
with this program
; if not
, write to the Free Software
17 * Foundation
, Inc
., 51 Franklin Street
, Fifth Floor
, Boston
, MA
02110-1301, USA
.
22 structure Main
:> MAIN
= struct
24 open Ast MsgTypes Print
26 structure SM
= StringMap
28 fun init () = Acl
.read Config
.aclFile
30 fun isLib fname
= OS
.Path
.file fname
= "lib.dtl"
32 fun wrapFile (fname
, file
) =
33 case (isLib fname
, file
) of
34 (true, (comment
, ds
, SOME e
)) =>
38 (comment
, ds
, SOME (ELocal (e
, (ESkip
, loc
)), loc
))
44 val prog
= Parse
.parse fname
45 val prog
= wrapFile (fname
, prog
)
47 if !ErrorMsg
.anyErrors
then
53 Option
.app (Unused
.check G
) (#
3 prog
);
54 Tycheck
.checkFile G prog
)
59 val _
= ErrorMsg
.reset ()
60 val dir
= Posix
.FileSys
.opendir Config
.libRoot
63 case Posix
.FileSys
.readdir dir
of
64 NONE
=> (Posix
.FileSys
.closedir dir
;
67 if String.isSuffix
".dtl" fname
then
68 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
75 val (_
, files
) = Order
.order NONE files
77 if !ErrorMsg
.anyErrors
then
80 (Tycheck
.allowExterns ();
81 foldl (fn (fname
, G
) => check
' G fname
) Env
.empty files
82 before Tycheck
.disallowExterns ())
85 (* val b
= basis () *)
89 val _
= ErrorMsg
.reset ()
90 val _
= Env
.preTycheck ()
92 if !ErrorMsg
.anyErrors
then
96 val _
= Tycheck
.disallowExterns ()
97 val _
= ErrorMsg
.reset ()
98 val prog
= Parse
.parse fname
99 val prog
= wrapFile (fname
, prog
)
101 if !ErrorMsg
.anyErrors
then
105 val G
' = Tycheck
.checkFile G prog
107 if !ErrorMsg
.anyErrors
then
113 Option
.app (Unused
.check G
) (#
3 prog
);
120 String.sub (s
, 0) <> #
"."
121 andalso CharVector
.all (fn ch
=> Char.isAlphaNum ch
orelse ch
= #
"." orelse ch
= #
"_" orelse ch
= #
"-") s
126 case Posix
.ProcEnv
.getenv
"DOMTOOL_USER" of
129 val uid
= Posix
.ProcEnv
.getuid ()
131 Posix
.SysDB
.Passwd
.name (Posix
.SysDB
.getpwuid uid
)
135 Acl
.read Config
.aclFile
;
140 fun checkDir
' dname
=
144 val dir
= Posix
.FileSys
.opendir dname
147 case Posix
.FileSys
.readdir dir
of
148 NONE
=> (Posix
.FileSys
.closedir dir
;
152 loop (OS
.Path
.joinDirFile
{dir
= dname
,
159 val (_
, files
) = Order
.order (SOME b
) files
161 if !ErrorMsg
.anyErrors
then
164 (foldl (fn (fname
, G
) => check
' G fname
) b files
;
165 if !ErrorMsg
.anyErrors
then
177 val (G
, body
) = check G fname
179 if !ErrorMsg
.anyErrors
then
185 val body
' = Reduce
.reduceExp G body
187 (*printd (PD
.hovBox (PD
.PPS
.Rel
0,
188 [PD
.string "Result:",
196 (*(Defaults
.eInit ())*)
198 val toplevel
= Env
.initialDynEnvVals Reduce
.reduceExp
200 fun eval G evs fname
=
201 case reduce G fname
of
203 if !ErrorMsg
.anyErrors
then
207 val evs
' = Eval
.exec
' (toplevel G
, evs
) body
'
211 |
(G
, NONE
) => (G
, evs
)
214 Domain
.nodeIp Config
.dispatcherName ^
":" ^
Int.toString Config
.dispatcherPort
217 "localhost:" ^
Int.toString Config
.slavePort
220 (OpenSSL
.context
false x
)
221 handle e
as OpenSSL
.OpenSSL s
=>
222 (print
"Couldn't find your certificate.\nYou probably haven't been given any Domtool privileges.\n";
223 print ("I looked in: " ^ #
1 x ^
"\n");
224 print ("Additional information: " ^ s ^
"\n");
227 fun requestContext f
=
229 val user
= setupUser ()
233 val context
= context (Config
.certDir ^
"/" ^ user ^
".pem",
234 Config
.keyDir ^
"/" ^ user ^
"/key.pem",
240 fun requestBio
' printErr f
=
242 val (user
, context
) = requestContext f
244 (user
, OpenSSL
.connect
printErr (context
, dispatcher
))
247 val requestBio
= requestBio
' true
249 fun requestSlaveBio
' printErr
=
251 val (user
, context
) = requestContext (fn () => ())
253 (user
, OpenSSL
.connect
printErr (context
, self
))
256 fun requestSlaveBio () = requestSlaveBio
' true
258 fun request (fname
, libOpt
) =
260 val (user
, bio
) = requestBio (fn () =>
263 val env
= case libOpt
of
265 | SOME lib
=> #
1 (check env lib
)
267 ignore (check env fname
)
272 val inf
= TextIO.openIn fname
275 case TextIO.inputLine inf
of
276 NONE
=> String.concat (rev lines
)
277 | SOME line
=> loop (line
:: lines
)
280 before TextIO.closeIn inf
283 val code
= readFile fname
284 val msg
= case libOpt
of
285 NONE
=> MsgConfig code
286 | SOME fname
' => MsgMultiConfig
[readFile fname
', code
]
290 NONE
=> print
"Server closed connection unexpectedly.\n"
293 MsgOk
=> print
"Configuration succeeded.\n"
294 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
295 | _
=> print
"Unexpected server reply.\n";
298 handle ErrorMsg
.Error
=> ()
300 fun requestDir dname
=
302 val _
= if Posix
.FileSys
.access (dname
, []) then
305 (print ("Can't access " ^ dname ^
".\n");
306 print
"Did you mean to run domtool on a specific file, instead of asking for all\n";
307 print
"files in your ~/.domtool directory?\n";
308 OS
.Process
.exit OS
.Process
.failure
)
310 val _
= ErrorMsg
.reset ()
312 val (user
, bio
) = requestBio (fn () => checkDir
' dname
)
316 val dir
= Posix
.FileSys
.opendir dname
319 case Posix
.FileSys
.readdir dir
of
320 NONE
=> (Posix
.FileSys
.closedir dir
;
324 loop (OS
.Path
.joinDirFile
{dir
= dname
,
331 val (_
, files
) = Order
.order (SOME b
) files
333 val _
= if !ErrorMsg
.anyErrors
then
338 val codes
= map (fn fname
=>
340 val inf
= TextIO.openIn fname
343 case TextIO.inputLine inf
of
344 NONE
=> String.concat (rev lines
)
345 | SOME line
=> loop (line
:: lines
)
348 before TextIO.closeIn inf
351 if !ErrorMsg
.anyErrors
then
354 (Msg
.send (bio
, MsgMultiConfig codes
);
356 NONE
=> print
"Server closed connection unexpectedly.\n"
359 MsgOk
=> print
"Configuration succeeded.\n"
360 | MsgError s
=> print ("Configuration failed: " ^ s ^
"\n")
361 | _
=> print
"Unexpected server reply.\n";
364 handle ErrorMsg
.Error
=> ()
368 val (_
, bio
) = requestBio
' false (fn () => ())
373 handle _
=> OS
.Process
.failure
375 fun requestShutdown () =
377 val (_
, bio
) = requestBio (fn () => ())
379 Msg
.send (bio
, MsgShutdown
);
384 MsgOk
=> print
"Shutdown begun.\n"
385 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
386 | _
=> print
"Unexpected server reply.\n";
390 fun requestSlavePing () =
392 val (_
, bio
) = requestSlaveBio
' false
397 handle _
=> OS
.Process
.failure
399 fun requestSlaveShutdown () =
401 val (_
, bio
) = requestSlaveBio ()
403 Msg
.send (bio
, MsgShutdown
);
408 MsgOk
=> print
"Shutdown begun.\n"
409 | MsgError s
=> print ("Shutdown failed: " ^ s ^
"\n")
410 | _
=> print
"Unexpected server reply.\n";
414 fun requestGrant acl
=
416 val (user
, bio
) = requestBio (fn () => ())
418 Msg
.send (bio
, MsgGrant acl
);
420 NONE
=> print
"Server closed connection unexpectedly.\n"
423 MsgOk
=> print
"Grant succeeded.\n"
424 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
425 | _
=> print
"Unexpected server reply.\n";
429 fun requestRevoke acl
=
431 val (user
, bio
) = requestBio (fn () => ())
433 Msg
.send (bio
, MsgRevoke acl
);
435 NONE
=> print
"Server closed connection unexpectedly.\n"
438 MsgOk
=> print
"Revoke succeeded.\n"
439 | MsgError s
=> print ("Revoke failed: " ^ s ^
"\n")
440 | _
=> print
"Unexpected server reply.\n";
444 fun requestListPerms user
=
446 val (_
, bio
) = requestBio (fn () => ())
448 Msg
.send (bio
, MsgListPerms user
);
449 (case Msg
.recv bio
of
450 NONE
=> (print
"Server closed connection unexpectedly.\n";
454 MsgPerms perms
=> SOME perms
455 | MsgError s
=> (print ("Listing failed: " ^ s ^
"\n");
457 | _
=> (print
"Unexpected server reply.\n";
459 before OpenSSL
.close bio
462 fun requestWhoHas perm
=
464 val (_
, bio
) = requestBio (fn () => ())
466 Msg
.send (bio
, MsgWhoHas perm
);
467 (case Msg
.recv bio
of
468 NONE
=> (print
"Server closed connection unexpectedly.\n";
472 MsgWhoHasResponse users
=> SOME users
473 | MsgError s
=> (print ("whohas failed: " ^ s ^
"\n");
475 | _
=> (print
"Unexpected server reply.\n";
477 before OpenSSL
.close bio
480 fun requestRegen () =
482 val (_
, bio
) = requestBio (fn () => ())
484 Msg
.send (bio
, MsgRegenerate
);
486 NONE
=> print
"Server closed connection unexpectedly.\n"
489 MsgOk
=> print
"Regeneration succeeded.\n"
490 | MsgError s
=> print ("Regeneration failed: " ^ s ^
"\n")
491 | _
=> print
"Unexpected server reply.\n";
495 fun requestRegenTc () =
497 val (_
, bio
) = requestBio (fn () => ())
499 Msg
.send (bio
, MsgRegenerateTc
);
501 NONE
=> print
"Server closed connection unexpectedly.\n"
504 MsgOk
=> print
"All configuration validated.\n"
505 | MsgError s
=> print ("Configuration validation failed: " ^ s ^
"\n")
506 | _
=> print
"Unexpected server reply.\n";
510 fun requestRmdom dom
=
512 val (_
, bio
) = requestBio (fn () => ())
514 Msg
.send (bio
, MsgRmdom dom
);
516 NONE
=> print
"Server closed connection unexpectedly.\n"
519 MsgOk
=> print
"Removal succeeded.\n"
520 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
521 | _
=> print
"Unexpected server reply.\n";
525 fun requestRmuser user
=
527 val (_
, bio
) = requestBio (fn () => ())
529 Msg
.send (bio
, MsgRmuser user
);
531 NONE
=> print
"Server closed connection unexpectedly.\n"
534 MsgOk
=> print
"Removal succeeded.\n"
535 | MsgError s
=> print ("Removal failed: " ^ s ^
"\n")
536 | _
=> print
"Unexpected server reply.\n";
540 fun requestDbUser dbtype
=
542 val (_
, context
) = requestContext (fn () => ())
543 val bio
= OpenSSL
.connect
true (context
,
544 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
546 Msg
.send (bio
, MsgCreateDbUser dbtype
);
548 NONE
=> print
"Server closed connection unexpectedly.\n"
551 MsgOk
=> print
"Your user has been created.\n"
552 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
553 | _
=> print
"Unexpected server reply.\n";
557 fun requestDbPasswd rc
=
559 val (_
, context
) = requestContext (fn () => ())
560 val bio
= OpenSSL
.connect
true (context
,
561 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
563 Msg
.send (bio
, MsgDbPasswd rc
);
565 NONE
=> print
"Server closed connection unexpectedly.\n"
568 MsgOk
=> print
"Your password has been changed.\n"
569 | MsgError s
=> print ("Password set failed: " ^ s ^
"\n")
570 | _
=> print
"Unexpected server reply.\n";
574 fun requestDbTable p
=
576 val (user
, context
) = requestContext (fn () => ())
577 val bio
= OpenSSL
.connect
true (context
,
578 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
580 Msg
.send (bio
, MsgCreateDb p
);
582 NONE
=> print
"Server closed connection unexpectedly.\n"
585 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been created.\n")
586 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
587 | _
=> print
"Unexpected server reply.\n";
591 fun requestDbDrop p
=
593 val (user
, context
) = requestContext (fn () => ())
594 val bio
= OpenSSL
.connect
true (context
,
595 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
597 Msg
.send (bio
, MsgDropDb p
);
599 NONE
=> print
"Server closed connection unexpectedly.\n"
602 MsgOk
=> print ("Your database " ^ user ^
"_" ^ #dbname p ^
" has been dropped.\n")
603 | MsgError s
=> print ("Drop failed: " ^ s ^
"\n")
604 | _
=> print
"Unexpected server reply.\n";
608 fun requestDbGrant p
=
610 val (user
, context
) = requestContext (fn () => ())
611 val bio
= OpenSSL
.connect
true (context
,
612 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
614 Msg
.send (bio
, MsgGrantDb p
);
616 NONE
=> print
"Server closed connection unexpectedly.\n"
619 MsgOk
=> print ("You've been granted all allowed privileges to database " ^ user ^
"_" ^ #dbname p ^
".\n")
620 | MsgError s
=> print ("Grant failed: " ^ s ^
"\n")
621 | _
=> print
"Unexpected server reply.\n";
625 fun requestListMailboxes domain
=
627 val (_
, bio
) = requestBio (fn () => ())
629 Msg
.send (bio
, MsgListMailboxes domain
);
630 (case Msg
.recv bio
of
631 NONE
=> Vmail
.Error
"Server closed connection unexpectedly."
634 MsgMailboxes users
=> (Msg
.send (bio
, MsgOk
);
636 | MsgError s
=> Vmail
.Error ("Listing failed: " ^ s
)
637 | _
=> Vmail
.Error
"Unexpected server reply.")
638 before OpenSSL
.close bio
641 fun requestNewMailbox p
=
643 val (_
, bio
) = requestBio (fn () => ())
645 Msg
.send (bio
, MsgNewMailbox p
);
647 NONE
=> print
"Server closed connection unexpectedly.\n"
650 MsgOk
=> print ("A mapping for " ^ #user p ^
"@" ^ #domain p ^
" has been created.\n")
651 | MsgError s
=> print ("Creation failed: " ^ s ^
"\n")
652 | _
=> print
"Unexpected server reply.\n";
656 fun requestPasswdMailbox p
=
658 val (_
, bio
) = requestBio (fn () => ())
660 Msg
.send (bio
, MsgPasswdMailbox p
);
662 NONE
=> print
"Server closed connection unexpectedly.\n"
665 MsgOk
=> print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n")
666 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
667 | _
=> print
"Unexpected server reply.\n";
671 fun requestPortalPasswdMailbox p
=
673 val (_
, bio
) = requestBio (fn () => ())
675 (Msg
.send (bio
, MsgPortalPasswdMailbox p
);
677 NONE
=> (print
"Server closed connection unexpectedly.\n"; OS
.Process
.failure
)
680 MsgOk
=> (print ("The password for " ^ #user p ^
"@" ^ #domain p ^
" has been changed.\n");
682 | MsgError s
=> (print ("Set failed: " ^ s ^
"\n"); OS
.Process
.failure
)
683 | _
=> (print
"Unexpected server reply.\n"; OS
.Process
.failure
))
684 before OpenSSL
.close bio
687 fun requestRmMailbox p
=
689 val (_
, bio
) = requestBio (fn () => ())
691 Msg
.send (bio
, MsgRmMailbox p
);
693 NONE
=> print
"Server closed connection unexpectedly.\n"
696 MsgOk
=> print ("The mapping for mailbox " ^ #user p ^
"@" ^ #domain p ^
" has been deleted.\n")
697 | MsgError s
=> print ("Remove failed: " ^ s ^
"\n")
698 | _
=> print
"Unexpected server reply.\n";
702 fun requestSaQuery addr
=
704 val (_
, bio
) = requestBio (fn () => ())
706 Msg
.send (bio
, MsgSaQuery addr
);
707 (case Msg
.recv bio
of
708 NONE
=> print
"Server closed connection unexpectedly.\n"
711 MsgSaStatus b
=> (print ("SpamAssassin filtering for " ^ addr ^
" is "
712 ^
(if b
then "ON" else "OFF") ^
".\n");
713 Msg
.send (bio
, MsgOk
))
714 | MsgError s
=> print ("Query failed: " ^ s ^
"\n")
715 | _
=> print
"Unexpected server reply.\n")
716 before OpenSSL
.close bio
721 val (_
, bio
) = requestBio (fn () => ())
723 Msg
.send (bio
, MsgSaSet p
);
725 NONE
=> print
"Server closed connection unexpectedly.\n"
728 MsgOk
=> print ("SpamAssassin filtering for " ^ #
1 p ^
" is now "
729 ^
(if #
2 p
then "ON" else "OFF") ^
".\n")
730 | MsgError s
=> print ("Set failed: " ^ s ^
"\n")
731 | _
=> print
"Unexpected server reply.\n";
735 fun requestSmtpLog domain
=
737 val (_
, bio
) = requestBio (fn () => ())
739 val _
= Msg
.send (bio
, MsgSmtpLogReq domain
)
743 NONE
=> print
"Server closed connection unexpectedly.\n"
747 | MsgSmtpLogRes line
=> (print line
;
749 | MsgError s
=> print ("Log search failed: " ^ s ^
"\n")
750 | _
=> print
"Unexpected server reply.\n"
756 fun requestMysqlFixperms () =
758 val (_
, context
) = requestContext (fn () => ())
759 val bio
= OpenSSL
.connect
true (context
,
760 Config
.Dbms
.dbmsNode ^
":" ^
Int.toString Config
.slavePort
)
762 Msg
.send (bio
, MsgMysqlFixperms
);
764 NONE
=> print
"Server closed connection unexpectedly.\n"
767 MsgOk
=> print
"Permissions granted.\n"
768 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
769 | _
=> print
"Unexpected server reply.\n";
773 fun requestApt
{node
, pkg
} =
775 val (user
, context
) = requestContext (fn () => ())
776 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
779 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
781 val _
= Msg
.send (bio
, MsgQuery (QApt pkg
))
785 NONE
=> (print
"Server closed connection unexpectedly.\n";
789 MsgYes
=> (print
"Package is installed.\n";
791 | MsgNo
=> (print
"Package is not installed.\n";
793 | MsgError s
=> (print ("APT query failed: " ^ s ^
"\n");
795 | _
=> (print
"Unexpected server reply.\n";
799 before OpenSSL
.close bio
802 fun requestAptExists
{node
, pkg
} =
804 val (user
, context
) = requestContext (fn () => ())
805 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
808 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
810 val _
= Msg
.send (bio
, MsgQuery (QAptExists pkg
))
814 NONE
=> (print
"Server closed connection unexpectedly.\n";
818 MsgAptQuery
{section
,description
} => (print
"Package exists.\n";
819 print ("Section: " ^ section ^
"\n");
820 print ("Description: " ^ description ^
"\n");
822 | MsgNo
=> (print
"Package does not exist.\n";
824 (* It might be the Wrong
Thing (tm
) to use MsgNo like this
*))
825 | MsgError s
=> (print ("APT existence query failed: " ^ s ^
"\n");
827 | _
=> (print
"Unexpected server reply.\n";
831 before OpenSSL
.close bio
834 fun requestCron
{node
, uname
} =
836 val (user
, context
) = requestContext (fn () => ())
837 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
840 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
842 val _
= Msg
.send (bio
, MsgQuery (QCron uname
))
846 NONE
=> (print
"Server closed connection unexpectedly.\n";
850 MsgYes
=> (print
"User has cron permissions.\n";
852 | MsgNo
=> (print
"User does not have cron permissions.\n";
854 | MsgError s
=> (print ("Cron query failed: " ^ s ^
"\n");
856 | _
=> (print
"Unexpected server reply.\n";
860 before OpenSSL
.close bio
863 fun requestFtp
{node
, uname
} =
865 val (user
, context
) = requestContext (fn () => ())
866 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
869 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
871 val _
= Msg
.send (bio
, MsgQuery (QFtp uname
))
875 NONE
=> (print
"Server closed connection unexpectedly.\n";
879 MsgYes
=> (print
"User has FTP permissions.\n";
881 | MsgNo
=> (print
"User does not have FTP permissions.\n";
883 | MsgError s
=> (print ("FTP query failed: " ^ s ^
"\n");
885 | _
=> (print
"Unexpected server reply.\n";
889 before OpenSSL
.close bio
892 fun requestTrustedPath
{node
, uname
} =
894 val (user
, context
) = requestContext (fn () => ())
895 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
898 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
900 val _
= Msg
.send (bio
, MsgQuery (QTrustedPath uname
))
904 NONE
=> (print
"Server closed connection unexpectedly.\n";
908 MsgYes
=> (print
"User has trusted path restriction.\n";
910 | MsgNo
=> (print
"User does not have trusted path restriction.\n";
912 | MsgError s
=> (print ("Trusted path query failed: " ^ s ^
"\n");
914 | _
=> (print
"Unexpected server reply.\n";
918 before OpenSSL
.close bio
921 fun requestSocketPerm
{node
, uname
} =
923 val (user
, context
) = requestContext (fn () => ())
924 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
927 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
929 val _
= Msg
.send (bio
, MsgQuery (QSocket uname
))
933 NONE
=> (print
"Server closed connection unexpectedly.\n";
937 MsgSocket p
=> (case p
of
939 | Client
=> print
"Client\n"
940 | Server
=> print
"Server\n"
941 | Nada
=> print
"Nada\n";
943 | MsgError s
=> (print ("Socket permission query failed: " ^ s ^
"\n");
945 | _
=> (print
"Unexpected server reply.\n";
949 before OpenSSL
.close bio
952 fun requestFirewall
{node
, uname
} =
954 val (user
, context
) = requestContext (fn () => ())
955 val bio
= OpenSSL
.connect
true (context
, if node
= Config
.dispatcherName
then
958 Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
960 val _
= Msg
.send (bio
, MsgQuery (QFirewall
{node
= node
, user
= uname
}))
964 NONE
=> (print
"Server closed connection unexpectedly.\n";
968 MsgFirewall ls
=> (app (fn s
=> (print s
; print
"\n")) ls
;
970 | MsgError s
=> (print ("Firewall query failed: " ^ s ^
"\n");
972 | _
=> (print
"Unexpected server reply.\n";
976 before OpenSSL
.close bio
979 fun requestDescribe dom
=
981 val (_
, bio
) = requestBio (fn () => ())
983 Msg
.send (bio
, MsgDescribe dom
);
985 NONE
=> print
"Server closed connection unexpectedly.\n"
988 MsgDescription s
=> print s
989 | MsgError s
=> print ("Description failed: " ^ s ^
"\n")
990 | _
=> print
"Unexpected server reply.\n";
994 fun requestReUsers () =
996 val (_
, bio
) = requestBio (fn () => ())
998 Msg
.send (bio
, MsgReUsers
);
1000 NONE
=> print
"Server closed connection unexpectedly.\n"
1003 MsgOk
=> print
"Callbacks run.\n"
1004 | MsgError s
=> print ("Failed: " ^ s ^
"\n")
1005 | _
=> print
"Unexpected server reply.\n";
1009 fun requestFirewallRegen node
=
1011 val (user
, context
) = requestContext (fn () => ())
1012 val bio
= OpenSSL
.connect
true (context
, Domain
.nodeIp node ^
":" ^
Int.toString Config
.slavePort
)
1013 (* Only supporting on slave nodes
*)
1015 val _
= Msg
.send (bio
, MsgFirewallRegen
)
1017 fun handleResult () =
1018 case Msg
.recv bio
of
1019 NONE
=> (print
"Server closed connection unexpectedly.\n";
1023 MsgOk
=> (print
"Firewall regenerated.\n";
1025 | MsgError s
=> (print ("Firewall regeneration failed: " ^ s ^
"\n");
1027 | _
=> (print
"Unexpected server reply.\n";
1031 before OpenSSL
.close bio
1034 structure SS
= StringSet
1036 fun domainList dname
=
1038 val dir
= Posix
.FileSys
.opendir dname
1040 fun visitNode dset
=
1041 case Posix
.FileSys
.readdir dir
of
1045 val path
= OS
.Path
.joinDirFile
{dir
= dname
,
1048 fun visitDomains (path
, bfor
, dset
) =
1050 val dir
= Posix
.FileSys
.opendir path
1053 case Posix
.FileSys
.readdir dir
of
1057 val path
= OS
.Path
.joinDirFile
{dir
= path
,
1060 if Posix
.FileSys
.ST
.isDir (Posix
.FileSys
.stat path
) then
1062 val bfor
= dname
:: bfor
1064 loop (visitDomains (path
, bfor
,
1066 String.concatWith
"." bfor
)))
1073 before Posix
.FileSys
.closedir dir
1076 visitNode (visitDomains (path
, [], dset
))
1080 before Posix
.FileSys
.closedir dir
1083 fun regenerateEither tc checker context
=
1085 val () = print
"Starting regeneration....\n"
1091 domainList Config
.resultRoot
1099 val _
= ErrorMsg
.reset ()
1102 val () = Tycheck
.disallowExterns ()
1104 val () = ifReal (fn () =>
1105 (ignore (OS
.Process
.system ("rm -rf " ^ Config
.oldResultRoot ^
"/*"));
1106 ignore (OS
.Process
.system ("cp -r " ^ Config
.resultRoot
1107 ^
"/* " ^ Config
.oldResultRoot ^
"/"));
1108 Domain
.resetGlobal ()))
1112 fun contactNode (node
, ip
) =
1113 if node
= Config
.dispatcherName
then
1114 Domain
.resetLocal ()
1116 val bio
= OpenSSL
.connect
true (context
,
1119 ^
Int.toString Config
.slavePort
)
1121 Msg
.send (bio
, MsgRegenerate
);
1122 case Msg
.recv bio
of
1123 NONE
=> print
"Slave closed connection unexpectedly\n"
1126 MsgOk
=> print ("Slave " ^ node ^
" pre-regeneration finished\n")
1127 | MsgError s
=> print ("Slave " ^ node
1128 ^
" returned error: " ^
1130 | _
=> print ("Slave " ^ node
1131 ^
" returned unexpected command\n");
1134 handle OpenSSL
.OpenSSL s
=> print ("OpenSSL error: " ^ s ^
"\n")
1138 val _
= Domain
.setUser user
1139 val _
= ErrorMsg
.reset ()
1141 val dname
= Config
.domtoolDir user
1143 if Posix
.FileSys
.access (dname
, []) then
1145 val dir
= Posix
.FileSys
.opendir dname
1148 case Posix
.FileSys
.readdir dir
of
1149 NONE
=> (Posix
.FileSys
.closedir dir
;
1152 if notTmp fname
then
1153 loop (OS
.Path
.joinDirFile
{dir
= dname
,
1160 val (_
, files
) = Order
.order (SOME b
) files
1162 fun checker
' (file
, (G
, evs
)) =
1165 if !ErrorMsg
.anyErrors
then
1167 print ("User " ^ user ^
"'s configuration has errors!\n");
1171 let val basis
' = basis () in
1172 ignore (foldl checker
' (basis
', SM
.empty
) files
)
1175 else if (String.isSuffix
"_admin" user
) orelse (String.isSuffix
".daemon" user
) then
1178 (print ("Couldn't access " ^ user ^
"'s ~/.domtool directory.\n");
1181 handle IO
.Io
{name
, function
, ...} =>
1182 (print ("IO error processing user " ^ user ^
": " ^ function ^
": " ^ name ^
"\n");
1184 | exn
as OS
.SysErr (s
, _
) => (print ("System error processing user " ^ user ^
": " ^ s ^
"\n");
1186 | ErrorMsg
.Error
=> (ErrorMsg
.reset ();
1187 print ("User " ^ user ^
" had a compilation error.\n");
1189 | _
=> (print
"Unknown exception during regeneration!\n";
1192 ifReal (fn () => (app contactNode Config
.nodeIps
;
1194 app
doUser (Acl
.users ());
1197 val domainsAfter
= domainList Config
.resultRoot
1198 val domainsGone
= SS
.difference (domainsBefore
, domainsAfter
)
1200 if SS
.isEmpty domainsGone
then
1203 (print
"Domains to kill:";
1204 SS
.app (fn s
=> (print
" "; print s
)) domainsGone
;
1207 Domain
.rmdom
' Config
.oldResultRoot (SS
.listItems domainsGone
));
1214 val regenerate
= regenerateEither
false eval
1215 val regenerateTc
= regenerateEither
true
1216 (fn G
=> fn evs
=> fn file
=>
1217 (#
1 (check G file
), evs
))
1219 fun usersChanged () =
1220 (Domain
.onUsersChange ();
1221 ignore (OS
.Process
.system Config
.publish_reusers
))
1225 val doms
= Acl
.class
{user
= user
, class
= "domain"}
1226 val doms
= List.filter (fn dom
=>
1227 case Acl
.whoHas
{class
= "domain", value
= dom
} of
1229 | _
=> false) (StringSet
.listItems doms
)
1236 fun now () = Date
.toString (Date
.fromTimeUniv (Time
.now ()))
1240 QApt pkg
=> if Apt
.installed pkg
then MsgYes
else MsgNo
1241 | QAptExists pkg
=> (case Apt
.info pkg
of
1242 SOME
{section
, description
} => MsgAptQuery
{section
= section
, description
= description
}
1244 | QCron user
=> if Cron
.allowed user
then MsgYes
else MsgNo
1245 | QFtp user
=> if Ftp
.allowed user
then MsgYes
else MsgNo
1246 | QTrustedPath user
=> if TrustedPath
.query user
then MsgYes
else MsgNo
1247 | QSocket user
=> MsgSocket (SocketPerm
.query user
)
1248 | QFirewall
{node
, user
} => MsgFirewall (Firewall
.query (node
, user
))
1250 fun describeQuery q
=
1252 QApt pkg
=> "Requested installation status of package " ^ pkg
1253 | QAptExists pkg
=> "Requested if package " ^ pkg ^
" exists"
1254 | QCron user
=> "Asked about cron permissions for user " ^ user
1255 | QFtp user
=> "Asked about FTP permissions for user " ^ user
1256 | QTrustedPath user
=> "Asked about trusted path settings for user " ^ user
1257 | QSocket user
=> "Asked about socket permissions for user " ^ user
1258 | QFirewall
{node
, user
} => "Asked about firewall rules on " ^ node ^
" for user " ^ user
1260 fun doIt
' loop bio f cleanup
=
1262 (msgLocal
, SOME msgRemote
) =>
1265 Msg
.send (bio
, MsgError msgRemote
))
1266 |
(msgLocal
, NONE
) =>
1269 Msg
.send (bio
, MsgOk
)))
1270 handle e
as (OpenSSL
.OpenSSL s
) =>
1271 (print ("OpenSSL error: " ^ s ^
"\n");
1272 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1273 Msg
.send (bio
, MsgError ("OpenSSL error: " ^ s
))
1274 handle OpenSSL
.OpenSSL _
=> ())
1275 | OS
.SysErr (s
, _
) =>
1276 (print
"System error: ";
1279 Msg
.send (bio
, MsgError ("System error: " ^ s
))
1280 handle OpenSSL
.OpenSSL _
=> ())
1285 Msg
.send (bio
, MsgError ("Failure: " ^ s
))
1286 handle OpenSSL
.OpenSSL _
=> ())
1288 (print
"Compilation error\n";
1289 Msg
.send (bio
, MsgError
"Error during configuration evaluation")
1290 handle OpenSSL
.OpenSSL _
=> ());
1292 ignore (OpenSSL
.readChar bio
);
1294 handle OpenSSL
.OpenSSL _
=> ();
1299 val host
= Slave
.hostname ()
1301 val () = Acl
.read Config
.aclFile
1303 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1304 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1306 val _
= Domain
.set_context context
1308 val sock
= OpenSSL
.listen (context
, Config
.dispatcherPort
)
1311 (case OpenSSL
.accept sock
of
1315 val user
= OpenSSL
.peerCN bio
1316 val () = print ("\nConnection from " ^ user ^
" at " ^
now () ^
"\n")
1317 val () = Domain
.setUser user
1318 val doIt
= doIt
' loop bio
1320 fun doConfig codes
=
1322 val _
= print
"Configuration:\n"
1323 val _
= app (fn s
=> (print s
; print
"\n")) codes
1326 val outname
= OS
.FileSys
.tmpName ()
1328 fun doOne (code
, (G
, evs
)) =
1330 val outf
= TextIO.openOut outname
1332 TextIO.output (outf
, code
);
1333 TextIO.closeOut outf
;
1337 doIt (fn () => (Env
.pre ();
1338 let val basis
' = basis () in
1339 ignore (foldl
doOne (basis
', SM
.empty
) codes
)
1342 Msg
.send (bio
, MsgOk
);
1343 ("Configuration complete.", NONE
)))
1344 (fn () => OS
.FileSys
.remove outname
)
1348 case String.fields (fn ch
=> ch
= #
"@") s
of
1350 if user
= user
' then
1354 |
[user
', domain
] =>
1355 if Domain
.validEmailUser user
' andalso Domain
.yourDomain domain
then
1356 SOME (SetSA
.Email s
)
1362 case Msg
.recv bio
of
1363 NONE
=> (OpenSSL
.close bio
1364 handle OpenSSL
.OpenSSL _
=> ();
1368 MsgConfig code
=> doConfig
[code
]
1369 | MsgMultiConfig codes
=> doConfig codes
1372 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1373 orelse Acl
.query
{user
= user
, class
= "priv", value
= "shutdown"} then
1374 print ("Domtool dispatcher shutting down at " ^
now () ^
"\n\n")
1376 (print
"Unauthorized shutdown command!\n";
1378 handle OpenSSL
.OpenSSL _
=> ();
1383 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1385 Acl
.write Config
.aclFile
;
1386 if #class acl
= "user" then
1390 ("Granted permission " ^ #value acl ^
" to " ^ #user acl ^
" in " ^ #class acl ^
".",
1393 ("Unauthorized user asked to grant a permission!",
1394 SOME
"Not authorized to grant privileges"))
1399 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1401 Acl
.write Config
.aclFile
;
1402 ("Revoked permission " ^ #value acl ^
" from " ^ #user acl ^
" in " ^ #class acl ^
".",
1405 ("Unauthorized user asked to revoke a permission!",
1406 SOME
"Not authorized to revoke privileges"))
1409 | MsgListPerms user
=>
1411 (Msg
.send (bio
, MsgPerms (Acl
.queryAll user
));
1412 ("Sent permission list for user " ^ user ^
".",
1418 (Msg
.send (bio
, MsgWhoHasResponse (Acl
.whoHas perm
));
1419 ("Sent whohas response for " ^ #class perm ^
" / " ^ #value perm ^
".",
1425 if Acl
.query
{user
= user
, class
= "priv", value
= "all"}
1426 orelse List.all (fn dom
=> Domain
.validDomain dom
1427 andalso Acl
.queryDomain
{user
= user
, domain
= dom
}) doms
then
1430 Acl
.revokeFromAll
{class
= "domain", value
= dom
}) doms
;
1431 Acl
.write Config
.aclFile
;*)
1432 ("Removed domains" ^
foldl (fn (d
, s
) => s ^
" " ^ d
) "" doms ^
".",
1435 ("Unauthorized user asked to remove a domain!",
1436 SOME
"Not authorized to remove that domain"))
1441 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1442 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1443 (if regenerate context
then
1444 ("Regenerated all configuration.",
1447 ("Error regenerating configuration!",
1448 SOME
"Error regenerating configuration! Consult /var/log/domtool.log."))
1450 ("Unauthorized user asked to regenerate!",
1451 SOME
"Not authorized to regenerate"))
1454 | MsgRegenerateTc
=>
1456 if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1457 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1458 (if regenerateTc context
then
1459 ("Checked all configuration.",
1462 ("Found a compilation error!",
1463 SOME
"Found a compilation error! Consult /var/log/domtool.log."))
1465 ("Unauthorized user asked to regenerate -tc!",
1466 SOME
"Not authorized to regenerate -tc"))
1469 | MsgRmuser user
' =>
1471 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1473 Acl
.write Config
.aclFile
;
1474 ("Removed user " ^ user
' ^
".",
1477 ("Unauthorized user asked to remove a user!",
1478 SOME
"Not authorized to remove users"))
1481 | MsgListMailboxes domain
=>
1483 if not (Domain
.yourDomain domain
) then
1484 ("User wasn't authorized to list mailboxes for " ^ domain
,
1485 SOME
"You're not authorized to configure that domain.")
1487 case Vmail
.list domain
of
1488 Vmail
.Listing users
=> (Msg
.send (bio
, MsgMailboxes users
);
1489 ("Sent mailbox list for " ^ domain
,
1491 | Vmail
.Error msg
=> ("Error listing mailboxes for " ^ domain ^
": " ^ msg
,
1495 | MsgNewMailbox
{domain
, user
= emailUser
, passwd
, mailbox
} =>
1497 if not (Domain
.yourDomain domain
) then
1498 ("User wasn't authorized to add a mailbox to " ^ domain
,
1499 SOME
"You're not authorized to configure that domain.")
1500 else if not (Domain
.validEmailUser emailUser
) then
1501 ("Invalid e-mail username " ^ emailUser
,
1502 SOME
"Invalid e-mail username")
1503 else if not (CharVector
.all
Char.isGraph passwd
) then
1504 ("Invalid password",
1505 SOME
"Invalid password; may only contain printable, non-space characters")
1506 else if not (Domain
.yourPath mailbox
) then
1507 ("User wasn't authorized to add a mailbox at " ^ mailbox
,
1508 SOME ("You're not authorized to use that mailbox location. ("
1511 case Vmail
.add
{requester
= user
,
1512 domain
= domain
, user
= emailUser
,
1513 passwd
= passwd
, mailbox
= mailbox
} of
1514 NONE
=> ("Added mailbox " ^ emailUser ^
"@" ^ domain ^
" at " ^ mailbox
,
1516 | SOME msg
=> ("Error adding mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1520 | MsgPasswdMailbox
{domain
, user
= emailUser
, passwd
} =>
1522 if not (Domain
.yourDomain domain
) then
1523 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1524 SOME
"You're not authorized to configure that domain.")
1525 else if not (Domain
.validEmailUser emailUser
) then
1526 ("Invalid e-mail username " ^ emailUser
,
1527 SOME
"Invalid e-mail username")
1528 else if not (CharVector
.all
Char.isGraph passwd
) then
1529 ("Invalid password",
1530 SOME
"Invalid password; may only contain printable, non-space characters")
1532 case Vmail
.passwd
{domain
= domain
, user
= emailUser
,
1534 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1536 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1540 | MsgPortalPasswdMailbox
{domain
, user
= emailUser
, oldpasswd
, newpasswd
} =>
1542 if not (Acl
.query
{user
= user
, class
= "priv", value
= "vmail"}) then
1543 ("User is not authorized to run portal vmail password",
1544 SOME
"You're not authorized to use the portal password command")
1545 else if not (Domain
.validEmailUser emailUser
) then
1546 ("Invalid e-mail username " ^ emailUser
,
1547 SOME
"Invalid e-mail username")
1548 else if not (CharVector
.all
Char.isGraph oldpasswd
1549 andalso CharVector
.all
Char.isGraph newpasswd
) then
1550 ("Invalid password",
1551 SOME
"Invalid password; may only contain printable, non-space characters")
1553 case Vmail
.portalpasswd
{domain
= domain
, user
= emailUser
,
1554 oldpasswd
= oldpasswd
, newpasswd
= newpasswd
} of
1555 NONE
=> ("Changed password of mailbox " ^ emailUser ^
"@" ^ domain
,
1557 | SOME msg
=> ("Error changing mailbox password for " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1561 | MsgRmMailbox
{domain
, user
= emailUser
} =>
1563 if not (Domain
.yourDomain domain
) then
1564 ("User wasn't authorized to change password of a mailbox for " ^ domain
,
1565 SOME
"You're not authorized to configure that domain.")
1566 else if not (Domain
.validEmailUser emailUser
) then
1567 ("Invalid e-mail username " ^ emailUser
,
1568 SOME
"Invalid e-mail username")
1570 case Vmail
.rm
{domain
= domain
, user
= emailUser
} of
1571 NONE
=> ("Deleted mailbox " ^ emailUser ^
"@" ^ domain
,
1573 | SOME msg
=> ("Error deleting mailbox " ^ emailUser ^
"@" ^ domain ^
": " ^ msg
,
1577 | MsgSaQuery addr
=>
1579 case checkAddr addr
of
1580 NONE
=> ("User tried to query SA filtering for " ^ addr
,
1581 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1582 | SOME addr
' => (Msg
.send (bio
, MsgSaStatus (SetSA
.query addr
'));
1583 ("Queried SA filtering status for " ^ addr
,
1587 |
MsgSaSet (addr
, b
) =>
1589 case checkAddr addr
of
1590 NONE
=> ("User tried to set SA filtering for " ^ addr
,
1591 SOME
"You aren't allowed to configure SA filtering for that recipient.")
1592 | SOME addr
' => (SetSA
.set (addr
', b
);
1594 Msg
.send (bio
, MsgOk
);
1595 ("Set SA filtering status for " ^ addr ^
" to "
1596 ^
(if b
then "ON" else "OFF"),
1600 | MsgSmtpLogReq domain
=>
1602 if not (Domain
.yourDomain domain
) then
1603 ("Unauthorized user tried to request SMTP logs for " ^ domain
,
1604 SOME
"You aren't authorized to configure that domain.")
1606 (SmtpLog
.search (fn line
=> Msg
.send (bio
, MsgSmtpLogRes line
))
1608 ("Requested SMTP logs for " ^ domain
,
1613 doIt (fn () => (Msg
.send (bio
, answerQuery q
);
1617 | MsgDescribe dom
=>
1618 doIt (fn () => if not (Domain
.validDomain dom
) then
1619 ("Requested description of invalid domain " ^ dom
,
1620 SOME
"Invalid domain name")
1621 else if not (Domain
.yourDomain dom
1622 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"}) then
1623 ("Requested description of " ^ dom ^
", but not allowed access",
1624 SOME
"Access denied")
1626 (Msg
.send (bio
, MsgDescription (Domain
.describe dom
));
1627 ("Sent description of domain " ^ dom
,
1632 doIt (fn () => if Acl
.query
{user
= user
, class
= "priv", value
= "regen"}
1633 orelse Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1635 ("Users change callbacks run", NONE
))
1637 ("Unauthorized user asked to reusers!",
1638 SOME
"You aren't authorized to regenerate files."))
1642 doIt (fn () => ("Unexpected command",
1643 SOME
"Unexpected command"))
1648 handle e
as (OpenSSL
.OpenSSL s
) =>
1649 (print ("OpenSSL error: " ^ s ^
"\n");
1650 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1652 handle OpenSSL
.OpenSSL _
=> ();
1654 | OS
.SysErr (s
, _
) =>
1655 (print ("System error: " ^ s ^
"\n");
1657 handle OpenSSL
.OpenSSL _
=> ();
1659 | IO
.Io
{name
, function
, cause
} =>
1660 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1661 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1663 handle OpenSSL
.OpenSSL _
=> ();
1665 | OS
.Path
.InvalidArc
=>
1666 (print
"Invalid arc\n";
1668 handle OpenSSL
.OpenSSL _
=> ();
1671 (print
"Unknown exception in main loop!\n";
1672 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1674 handle OpenSSL
.OpenSSL _
=> ();
1676 handle e
as (OpenSSL
.OpenSSL s
) =>
1677 (print ("OpenSSL error: " ^ s ^
"\n");
1678 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1680 | OS
.SysErr (s
, _
) =>
1681 (print ("System error: " ^ s ^
"\n");
1683 | IO
.Io
{name
, function
, cause
} =>
1684 (print ("IO error: " ^ function ^
" for " ^ name ^
"\n");
1685 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory cause
);
1688 (print
"Unknown exception in main loop!\n";
1689 app (fn x
=> print (x ^
"\n")) (SMLofNJ
.exnHistory e
);
1692 print ("Domtool dispatcher starting up at " ^
now () ^
"\n");
1693 print
"Listening for connections....\n";
1695 OpenSSL
.shutdown sock
1700 val host
= Slave
.hostname ()
1702 val context
= context (Config
.certDir ^
"/" ^ host ^
".pem",
1703 Config
.keyDir ^
"/" ^ host ^
"/key.pem",
1706 val sock
= OpenSSL
.listen (context
, Config
.slavePort
)
1708 val _
= print ("Slave server starting at " ^
now () ^
"\n")
1711 (case OpenSSL
.accept sock
of
1715 val peer
= OpenSSL
.peerCN bio
1716 val () = print ("\nConnection from " ^ peer ^
" at " ^
now () ^
"\n")
1718 if peer
= Config
.dispatcherName
then let
1720 case Msg
.recv bio
of
1721 NONE
=> print
"Dispatcher closed connection unexpectedly\n"
1724 MsgFile file
=> loop
' (file
:: files
)
1725 | MsgDoFiles
=> (Slave
.handleChanges files
;
1726 Msg
.send (bio
, MsgOk
))
1727 | MsgRegenerate
=> (Domain
.resetLocal ();
1728 Msg
.send (bio
, MsgOk
))
1729 | MsgVmailChanged
=> (if Vmail
.doChanged () then
1730 Msg
.send (bio
, MsgOk
)
1732 Msg
.send (bio
, MsgError
"userdb update failed"))
1733 | MsgSaChanged
=> (if Slave
.shell
[Config
.SpamAssassin
.postReload
] then
1734 Msg
.send (bio
, MsgOk
)
1736 Msg
.send (bio
, MsgError
"Error reloading SpamAssassin addresses"))
1737 | _
=> (print
"Dispatcher sent unexpected command\n";
1738 Msg
.send (bio
, MsgError
"Unexpected command"))
1741 ignore (OpenSSL
.readChar bio
);
1745 else if peer
= "domtool" then
1746 case Msg
.recv bio
of
1747 SOME MsgShutdown
=> (OpenSSL
.close bio
;
1748 print ("Shutting down at " ^
now () ^
"\n\n"))
1749 | _
=> (OpenSSL
.close bio
;
1753 val doIt
= doIt
' loop bio
1756 case Msg
.recv bio
of
1757 NONE
=> (OpenSSL
.close bio
1758 handle OpenSSL
.OpenSSL _
=> ();
1762 (MsgQuery q
) => (print (describeQuery q ^
"\n");
1763 Msg
.send (bio
, answerQuery q
);
1764 ignore (OpenSSL
.readChar bio
);
1767 | MsgCreateDbUser
{dbtype
, passwd
} =>
1769 case Dbms
.lookup dbtype
of
1770 NONE
=> ("Database user creation request with unknown datatype type " ^ dbtype
,
1771 SOME ("Unknown database type " ^ dbtype
))
1773 case #adduser handler
{user
= user
, passwd
= passwd
} of
1774 NONE
=> ("Added " ^ dbtype ^
" user " ^ user ^
".",
1777 ("Error adding a " ^ dbtype ^
" user " ^ user ^
": " ^ msg
,
1778 SOME ("Error adding user: " ^ msg
)))
1781 | MsgDbPasswd
{dbtype
, passwd
} =>
1783 case Dbms
.lookup dbtype
of
1784 NONE
=> ("Database passwd request with unknown datatype type " ^ dbtype
,
1785 SOME ("Unknown database type " ^ dbtype
))
1787 case #passwd handler
{user
= user
, passwd
= passwd
} of
1788 NONE
=> ("Changed " ^ dbtype ^
" password of user " ^ user ^
".",
1791 ("Error setting " ^ dbtype ^
" password of user " ^ user ^
": " ^ msg
,
1792 SOME ("Error adding user: " ^ msg
)))
1795 | MsgCreateDb
{dbtype
, dbname
, encoding
} =>
1797 if Dbms
.validDbname dbname
then
1798 case Dbms
.lookup dbtype
of
1799 NONE
=> ("Database creation request with unknown datatype type " ^ dbtype
,
1800 SOME ("Unknown database type " ^ dbtype
))
1802 if not (Dbms
.validEncoding encoding
) then
1803 ("Invalid encoding " ^ valOf encoding ^
" requested for database creation.",
1804 SOME
"Invalid encoding")
1806 case #createdb handler
{user
= user
, dbname
= dbname
, encoding
= encoding
} of
1807 NONE
=> ("Created database " ^ user ^
"_" ^ dbname ^
".",
1809 | SOME msg
=> ("Error creating database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1810 SOME ("Error creating database: " ^ msg
))
1812 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1813 SOME ("Invalid database name " ^ dbname
)))
1816 | MsgDropDb
{dbtype
, dbname
} =>
1818 if Dbms
.validDbname dbname
then
1819 case Dbms
.lookup dbtype
of
1820 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1821 SOME ("Unknown database type " ^ dbtype
))
1823 case #dropdb handler
{user
= user
, dbname
= dbname
} of
1824 NONE
=> ("Drop database " ^ user ^
"_" ^ dbname ^
".",
1826 | SOME msg
=> ("Error dropping database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1827 SOME ("Error dropping database: " ^ msg
))
1829 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1830 SOME ("Invalid database name " ^ dbname
)))
1833 | MsgGrantDb
{dbtype
, dbname
} =>
1835 if Dbms
.validDbname dbname
then
1836 case Dbms
.lookup dbtype
of
1837 NONE
=> ("Database drop request with unknown datatype type " ^ dbtype
,
1838 SOME ("Unknown database type " ^ dbtype
))
1840 case #grant handler
{user
= user
, dbname
= dbname
} of
1841 NONE
=> ("Grant permissions to database " ^ user ^
"_" ^ dbname ^
".",
1843 | SOME msg
=> ("Error granting permissions to database " ^ user ^
"_" ^ dbname ^
": " ^ msg
,
1844 SOME ("Error granting permissions to database: " ^ msg
))
1846 ("Invalid database name " ^ user ^
"_" ^ dbname
,
1847 SOME ("Invalid database name " ^ dbname
)))
1849 | MsgMysqlFixperms
=>
1850 (print
"Starting mysql-fixperms\n";
1851 doIt (fn () => if OS
.Process
.isSuccess
1852 (OS
.Process
.system
"/usr/bin/sudo -H /afs/hcoop.net/common/etc/scripts/mysql-grant-table-drop") then
1853 ("Requested mysql-fixperms",
1856 ("Requested mysql-fixperms, but execution failed!",
1857 SOME
"Script execution failed."))
1859 | MsgFirewallRegen
=>
1860 doIt (fn () => (Acl
.read Config
.aclFile
;
1861 if Acl
.query
{user
= user
, class
= "priv", value
= "all"} then
1862 if List.exists (fn x
=> x
= host
) Config
.Firewall
.firewallNodes
then
1863 if (Firewall
.generateFirewallConfig (Firewall
.parseRules ()) andalso Firewall
.publishConfig ())
1865 ("Firewall rules regenerated.", NONE
)
1867 ("Rules regeneration failed!", SOME
"Script execution failed.")
1868 else ("Node not controlled by domtool firewall.", SOME (host
))
1870 ("Not authorized to regenerate firewall.", SOME ("Unauthorized user " ^ user ^
" attempted to regenerated firewall"))))
1873 | _
=> (OpenSSL
.close bio
;
1876 end handle OpenSSL
.OpenSSL s
=>
1877 (print ("OpenSSL error: " ^ s ^
"\n");
1879 handle OpenSSL
.OpenSSL _
=> ();
1881 | e
as OS
.SysErr (s
, _
) =>
1882 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1883 print ("System error: "^ s ^
"\n");
1885 handle OpenSSL
.OpenSSL _
=> ();
1887 | IO
.Io
{function
, name
, ...} =>
1888 (print ("IO error: " ^ function ^
": " ^ name ^
"\n");
1890 handle OpenSSL
.OpenSSL _
=> ();
1893 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1894 print
"Uncaught exception!\n";
1896 handle OpenSSL
.OpenSSL _
=> ();
1898 handle OpenSSL
.OpenSSL s
=>
1899 (print ("OpenSSL error: " ^ s ^
"\n");
1902 (app (fn s
=> print (s ^
"\n")) (SMLofNJ
.exnHistory e
);
1903 print
"Uncaught exception!\n";
1907 OpenSSL
.shutdown sock
1912 val dir
= Posix
.FileSys
.opendir Config
.libRoot
1915 case Posix
.FileSys
.readdir dir
of
1916 NONE
=> (Posix
.FileSys
.closedir dir
;
1919 if String.isSuffix
".dtl" fname
then
1920 loop (OS
.Path
.joinDirFile
{dir
= Config
.libRoot
,
1929 fun autodocBasis outdir
=
1930 Autodoc
.autodoc
{outdir
= outdir
, infiles
= listBasis ()}