cleanup: turn off some unused flex options
[secnet] / secnet.c
CommitLineData
974d0468 1extern char version[];
2fe58dfd 2
8689b3a9 3#include "secnet.h"
2fe58dfd
SE
4#include <stdio.h>
5#include <string.h>
6#include <getopt.h>
2fe58dfd 7#include <errno.h>
8689b3a9 8#include <unistd.h>
2fe58dfd 9#include <sys/socket.h>
2fe58dfd 10#include <arpa/inet.h>
2fe58dfd 11#include <pwd.h>
2fe58dfd 12
2fe58dfd
SE
13#include "util.h"
14#include "conffile.h"
7138d0c5 15#include "process.h"
2fe58dfd 16
b2a56f7c 17/* XXX should be from autoconf */
fe5e9cc4
SE
18static const char *configfile="/etc/secnet/secnet.conf";
19static const char *sites_key="sites";
baa06aeb 20bool_t just_check_config=False;
2fe58dfd
SE
21static char *userid=NULL;
22static uid_t uid=0;
b2a56f7c 23bool_t background=True;
2fe58dfd 24static char *pidfile=NULL;
9d3a4132 25bool_t require_root_privileges=False;
fe5e9cc4 26cstring_t require_root_privileges_explanation=NULL;
2fe58dfd 27
7138d0c5
SE
28static pid_t secnet_pid;
29
2fe58dfd
SE
30/* Structures dealing with poll() call */
31struct poll_interest {
32 beforepoll_fn *before;
33 afterpoll_fn *after;
34 void *state;
35 uint32_t max_nfds;
36 uint32_t nfds;
fe5e9cc4 37 cstring_t desc;
2fe58dfd
SE
38 struct poll_interest *next;
39};
40static struct poll_interest *reg=NULL;
41static uint32_t total_nfds=10;
42
43static bool_t finished=False;
44
45/* Parse the command line options */
46static void parse_options(int argc, char **argv)
47{
48 int c;
49
50 while (True) {
51 int option_index = 0;
52 static struct option long_options[] = {
53 {"verbose", 0, 0, 'v'},
54 {"nowarnings", 0, 0, 'w'},
55 {"help", 0, 0, 2},
56 {"version", 0, 0, 1},
57 {"nodetach", 0, 0, 'n'},
58 {"silent", 0, 0, 'f'},
59 {"quiet", 0, 0, 'f'},
60 {"debug", 1, 0, 'd'},
61 {"config", 1, 0, 'c'},
baa06aeb 62 {"just-check-config", 0, 0, 'j'},
794f2398 63 {"sites-key", 1, 0, 's'},
2fe58dfd
SE
64 {0,0,0,0}
65 };
66
794f2398 67 c=getopt_long(argc, argv, "vwdnjc:ft:s:",
2fe58dfd
SE
68 long_options, &option_index);
69 if (c==-1)
70 break;
71
72 switch(c) {
73 case 2:
74 /* Help */
4f5e39ec
SE
75 printf("Usage: secnet [OPTION]...\n\n"
76 " -f, --silent, --quiet suppress error messages\n"
77 " -w, --nowarnings suppress warnings\n"
78 " -v, --verbose output extra diagnostics\n"
79 " -c, --config=filename specify a configuration file\n"
80 " -j, --just-check-config stop after reading "
81 "configuration file\n"
82 " -s, --sites-key=name configuration key that "
83 "specifies active sites\n"
84 " -n, --nodetach do not run in background\n"
85 " -d, --debug=item,... set debug options\n"
86 " --help display this help and exit\n"
87 " --version output version information "
88 "and exit\n"
2fe58dfd
SE
89 );
90 exit(0);
91 break;
92
93 case 1:
94 /* Version */
4f5e39ec 95 printf("%s\n",version);
2fe58dfd
SE
96 exit(0);
97 break;
98
99 case 'v':
469fd1d9 100 message_level|=M_INFO|M_NOTICE|M_WARNING|M_ERR|M_SECURITY|
b2a56f7c 101 M_FATAL;
2fe58dfd
SE
102 break;
103
b2a56f7c
SE
104 case 'w':
105 message_level&=(~M_WARNING);
2fe58dfd
SE
106 break;
107
108 case 'd':
b2a56f7c 109 message_level|=M_DEBUG_CONFIG|M_DEBUG_PHASE|M_DEBUG;
2fe58dfd
SE
110 break;
111
112 case 'f':
113 message_level=M_FATAL;
114 break;
115
b2a56f7c
SE
116 case 'n':
117 background=False;
118 break;
119
2fe58dfd
SE
120 case 'c':
121 if (optarg)
122 configfile=safe_strdup(optarg,"config_filename");
123 else
124 fatal("secnet: no config filename specified");
125 break;
126
baa06aeb
SE
127 case 'j':
128 just_check_config=True;
129 break;
130
794f2398
SE
131 case 's':
132 if (optarg)
133 sites_key=safe_strdup(optarg,"sites-key");
134 else
135 fatal("secnet: no sites key specified");
136 break;
137
2fe58dfd
SE
138 case '?':
139 break;
140
141 default:
469fd1d9 142 Message(M_ERR,"secnet: Unknown getopt code %c\n",c);
2fe58dfd
SE
143 }
144 }
145
146 if (argc-optind != 0) {
469fd1d9 147 Message(M_ERR,"secnet: You gave extra command line parameters, "
2fe58dfd
SE
148 "which were ignored.\n");
149 }
150}
151
152static void setup(dict_t *config)
153{
154 list_t *l;
155 item_t *site;
156 dict_t *system;
2fe58dfd
SE
157 struct passwd *pw;
158 struct cloc loc;
159 int i;
160
161 l=dict_lookup(config,"system");
162
163 if (!l || list_elem(l,0)->type!=t_dict) {
4f5e39ec 164 fatal("configuration does not include a \"system\" dictionary");
2fe58dfd
SE
165 }
166 system=list_elem(l,0)->data.dict;
167 loc=list_elem(l,0)->loc;
168
169 /* Arrange systemwide log facility */
170 l=dict_lookup(system,"log");
171 if (!l) {
4f5e39ec 172 fatal("configuration does not include a system/log facility");
2fe58dfd 173 }
b2a56f7c 174 system_log=init_log(l);
2fe58dfd
SE
175
176 /* Who are we supposed to run as? */
177 userid=dict_read_string(system,"userid",False,"system",loc);
178 if (userid) {
179 do {
180 pw=getpwent();
181 if (pw && strcmp(pw->pw_name,userid)==0) {
182 uid=pw->pw_uid;
183 break;
184 }
185 } while(pw);
186 endpwent();
187 if (uid==0) {
4f5e39ec 188 fatal("userid \"%s\" not found",userid);
2fe58dfd
SE
189 }
190 }
191
192 /* Pidfile name */
193 pidfile=dict_read_string(system,"pidfile",False,"system",loc);
194
9d3a4132
SE
195 /* Check whether we need root privileges */
196 if (require_root_privileges && uid!=0) {
4f5e39ec
SE
197 fatal("the configured feature \"%s\" requires "
198 "that secnet retain root privileges while running.",
9d3a4132
SE
199 require_root_privileges_explanation);
200 }
201
2fe58dfd 202 /* Go along site list, starting sites */
794f2398 203 l=dict_lookup(config,sites_key);
2fe58dfd 204 if (!l) {
794f2398
SE
205 Message(M_WARNING,"secnet: configuration key \"%s\" is missing; no "
206 "remote sites are defined\n",sites_key);
9d3a4132
SE
207 } else {
208 i=0;
209 while ((site=list_elem(l, i++))) {
210 struct site_if *s;
211 if (site->type!=t_closure) {
212 cfgfatal(site->loc,"system","non-closure in site list");
213 }
214 if (site->data.closure->type!=CL_SITE) {
215 cfgfatal(site->loc,"system","non-site closure in site list");
216 }
217 s=site->data.closure->interface;
218 s->control(s->st,True);
2fe58dfd 219 }
2fe58dfd
SE
220 }
221}
222
223void register_for_poll(void *st, beforepoll_fn *before,
fe5e9cc4 224 afterpoll_fn *after, uint32_t max_nfds, cstring_t desc)
2fe58dfd
SE
225{
226 struct poll_interest *i;
227
228 i=safe_malloc(sizeof(*i),"register_for_poll");
229 i->before=before;
230 i->after=after;
231 i->state=st;
232 i->max_nfds=max_nfds;
233 i->nfds=0;
234 i->desc=desc;
235 total_nfds+=max_nfds;
236 i->next=reg;
237 reg=i;
238 return;
239}
240
241static void system_phase_hook(void *sst, uint32_t newphase)
242{
243 if (newphase==PHASE_SHUTDOWN && pidfile) {
244 /* Try to unlink the pidfile; don't care if it fails */
245 unlink(pidfile);
246 }
247}
248
249static void run(void)
250{
251 struct timeval tv_now;
252 uint64_t now;
253 struct poll_interest *i;
254 int rv, nfds, remain, idx;
255 int timeout;
256 struct pollfd *fds;
257
3b83c932 258 fds=safe_malloc(sizeof(*fds)*total_nfds, "run");
2fe58dfd 259
7138d0c5 260 Message(M_NOTICE,"%s [%d]: starting\n",version,secnet_pid);
b2a56f7c 261
7138d0c5 262 do {
2fe58dfd
SE
263 if (gettimeofday(&tv_now, NULL)!=0) {
264 fatal_perror("main loop: gettimeofday");
265 }
d3fe100d
SE
266 now=((uint64_t)tv_now.tv_sec*(uint64_t)1000)+
267 ((uint64_t)tv_now.tv_usec/(uint64_t)1000);
2fe58dfd
SE
268 idx=0;
269 for (i=reg; i; i=i->next) {
270 i->after(i->state, fds+idx, i->nfds, &tv_now, &now);
271 idx+=i->nfds;
272 }
273 remain=total_nfds;
274 idx=0;
275 timeout=-1;
276 for (i=reg; i; i=i->next) {
277 nfds=remain;
278 rv=i->before(i->state, fds+idx, &nfds, &timeout, &tv_now, &now);
279 if (rv!=0) {
280 /* XXX we need to handle this properly: increase the
281 nfds available */
4f5e39ec 282 fatal("run: beforepoll_fn (%s) returns %d",i->desc,rv);
2fe58dfd
SE
283 }
284 if (timeout<-1) {
4f5e39ec 285 fatal("run: beforepoll_fn (%s) set timeout to %d",timeout);
2fe58dfd
SE
286 }
287 idx+=nfds;
288 remain-=nfds;
289 i->nfds=nfds;
290 }
291 do {
7138d0c5 292 if (finished) break;
2fe58dfd
SE
293 rv=poll(fds, idx, timeout);
294 if (rv<0) {
295 if (errno!=EINTR) {
296 fatal_perror("run: poll");
297 }
298 }
299 } while (rv<0);
7138d0c5 300 } while (!finished);
3b83c932 301 free(fds);
2fe58dfd
SE
302}
303
304static void droppriv(void)
305{
306 FILE *pf=NULL;
307 pid_t p;
fe5e9cc4 308 int errfds[2];
2fe58dfd
SE
309
310 add_hook(PHASE_SHUTDOWN,system_phase_hook,NULL);
311
b2a56f7c
SE
312 /* Open the pidfile for writing now: we may be unable to do so
313 once we drop privileges. */
314 if (pidfile) {
315 pf=fopen(pidfile,"w");
316 if (!pf) {
317 fatal_perror("cannot open pidfile \"%s\"",pidfile);
2fe58dfd 318 }
b2a56f7c
SE
319 }
320 if (!background && pf) {
321 fprintf(pf,"%d\n",getpid());
322 fclose(pf);
323 }
324
325 /* Now drop privileges */
326 if (uid!=0) {
327 if (setuid(uid)!=0) {
328 fatal_perror("can't set uid to \"%s\"",userid);
329 }
330 }
331 if (background) {
2fe58dfd
SE
332 p=fork();
333 if (p>0) {
334 if (pf) {
335 /* Parent process - write pidfile, exit */
336 fprintf(pf,"%d\n",p);
337 fclose(pf);
338 }
339 exit(0);
340 } else if (p==0) {
341 /* Child process - all done, just carry on */
342 if (pf) fclose(pf);
fe5e9cc4
SE
343 /* Close stdin and stdout; we don't need them any more.
344 stderr is redirected to the system/log facility */
345 if (pipe(errfds)!=0) {
346 fatal_perror("can't create pipe for stderr");
347 }
8dea8d37
SE
348 close(0);
349 close(1);
fe5e9cc4
SE
350 close(2);
351 dup2(errfds[1],0);
352 dup2(errfds[1],1);
353 dup2(errfds[1],2);
b2a56f7c 354 secnet_is_daemon=True;
ff05a229 355 setsid();
fe5e9cc4 356 log_from_fd(errfds[0],"stderr",system_log);
2fe58dfd
SE
357 } else {
358 /* Error */
359 fatal_perror("cannot fork");
360 exit(1);
361 }
2fe58dfd 362 }
7138d0c5
SE
363 secnet_pid=getpid();
364}
2fe58dfd 365
7138d0c5
SE
366static signal_notify_fn finish,ignore_hup;
367static void finish(void *st, int signum)
368{
369 finished=True;
370 Message(M_NOTICE,"%s [%d]: received %s\n",version,secnet_pid,(string_t)st);
371}
372static void ignore_hup(void *st, int signum)
373{
374 Message(M_INFO,"%s [%d]: received SIGHUP\n",version,secnet_pid);
375 return;
2fe58dfd
SE
376}
377
378int main(int argc, char **argv)
379{
380 dict_t *config;
381
382 enter_phase(PHASE_GETOPTS);
383 parse_options(argc,argv);
384
385 enter_phase(PHASE_READCONFIG);
386 config=read_conffile(configfile);
387
388 enter_phase(PHASE_SETUP);
389 setup(config);
baa06aeb
SE
390
391 if (just_check_config) {
392 Message(M_INFO,"configuration file check complete\n");
393 exit(0);
394 }
395
396 enter_phase(PHASE_GETRESOURCES);
397 /* Appropriate phase hooks will have been run */
2fe58dfd
SE
398
399 enter_phase(PHASE_DROPPRIV);
400 droppriv();
401
7138d0c5 402 start_signal_handling();
fe5e9cc4
SE
403 request_signal_notification(SIGTERM,finish,safe_strdup("SIGTERM","run"));
404 if (!background) request_signal_notification(SIGINT,finish,
405 safe_strdup("SIGINT","run"));
7138d0c5 406 request_signal_notification(SIGHUP,ignore_hup,NULL);
042a8da9 407 enter_phase(PHASE_RUN);
2fe58dfd
SE
408 run();
409
410 enter_phase(PHASE_SHUTDOWN);
7138d0c5 411 Message(M_NOTICE,"%s [%d]: finished\n",version,secnet_pid);
2fe58dfd
SE
412
413 return 0;
414}