]> jfr.im git - solanum.git/blob - authd/authd.c
authd: misc provider fixes
[solanum.git] / authd / authd.c
1 /* authd/authd.c - main code for authd
2 * Copyright (c) 2016 William Pitcock <nenolod@dereferenced.org>
3 *
4 * Permission to use, copy, modify, and/or distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice is present in all copies.
7 *
8 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
9 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
10 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
11 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
12 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
13 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
14 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
15 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
16 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
17 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
18 * POSSIBILITY OF SUCH DAMAGE.
19 */
20
21 #include "authd.h"
22 #include "dns.h"
23 #include "provider.h"
24 #include "notice.h"
25
26 #define MAXPARA 10
27
28 static void handle_reload(int parc, char *parv[]);
29 static void handle_stat(int parc, char *parv[]);
30 static void handle_options(int parc, char *parv[]);
31
32 rb_helper *authd_helper = NULL;
33 authd_cmd_handler authd_cmd_handlers[256] = {
34 ['C'] = handle_new_connection,
35 ['D'] = resolve_dns,
36 ['O'] = handle_options,
37 ['R'] = handle_reload,
38 ['S'] = handle_stat,
39 };
40
41 authd_stat_handler authd_stat_handlers[256] = {
42 ['D'] = enumerate_nameservers,
43 };
44
45 authd_reload_handler authd_reload_handlers[256] = {
46 ['D'] = reload_nameservers,
47 };
48
49 rb_dictionary *authd_option_handlers;
50
51 static void
52 handle_stat(int parc, char *parv[])
53 {
54 authd_stat_handler handler;
55
56 if(parc < 3)
57 {
58 warn_opers(L_CRIT, "BUG: handle_stat received too few parameters (at least 3 expected, got %d)", parc);
59 return;
60 }
61
62 if (!(handler = authd_stat_handlers[(unsigned char)parv[2][0]]))
63 return;
64
65 handler(parv[1], parv[2][0]);
66 }
67
68 static void
69 handle_options(int parc, char *parv[])
70 {
71 struct auth_opts_handler *handler;
72
73 if(parc < 4)
74 {
75 warn_opers(L_CRIT, "BUG: handle_options received too few parameters (at least 4 expected, got %d)", parc);
76 return;
77 }
78
79 if((handler = rb_dictionary_retrieve(authd_option_handlers, parv[1])) == NULL)
80 {
81 warn_opers(L_CRIT, "BUG: handle_options got a bad option type %s", parv[1]);
82 return;
83 }
84
85 if((parc - 2) < handler->min_parc)
86 {
87 warn_opers(L_CRIT, "BUG: handle_options received too few parameters (at least %d expected, got %d)", handler->min_parc, parc);
88 return;
89 }
90
91 handler->handler(parv[1], parc - 2, (const char **)&parv[2]);
92 }
93
94 static void
95 handle_reload(int parc, char *parv[])
96 {
97 authd_reload_handler handler;
98
99 if(parc < 2)
100 {
101 /* Reload all handlers */
102 for(size_t i = 0; i < 256; i++)
103 {
104 if ((handler = authd_reload_handlers[(unsigned char) i]) != NULL)
105 handler(parv[1][0]);
106 }
107
108 return;
109 }
110
111 if (!(handler = authd_reload_handlers[(unsigned char)parv[1][0]]))
112 return;
113
114 handler(parv[1][0]);
115 }
116
117 static void
118 parse_request(rb_helper *helper)
119 {
120 static char *parv[MAXPARA + 1];
121 static char readbuf[READBUF_SIZE];
122 int parc;
123 int len;
124 authd_cmd_handler handler;
125
126 while((len = rb_helper_read(helper, readbuf, sizeof(readbuf))) > 0)
127 {
128 parc = rb_string_to_array(readbuf, parv, MAXPARA);
129
130 if(parc < 1)
131 continue;
132
133 handler = authd_cmd_handlers[(unsigned char)parv[0][0]];
134 if (handler != NULL)
135 handler(parc, parv);
136 }
137 }
138
139 static void
140 error_cb(rb_helper *helper)
141 {
142 exit(1);
143 }
144
145 #ifndef _WIN32
146 static void
147 dummy_handler(int sig)
148 {
149 return;
150 }
151 #endif
152
153 static void
154 setup_signals(void)
155 {
156 #ifndef _WIN32
157 struct sigaction act;
158
159 act.sa_flags = 0;
160 act.sa_handler = SIG_IGN;
161 sigemptyset(&act.sa_mask);
162 sigaddset(&act.sa_mask, SIGPIPE);
163 sigaddset(&act.sa_mask, SIGALRM);
164 #ifdef SIGTRAP
165 sigaddset(&act.sa_mask, SIGTRAP);
166 #endif
167
168 #ifdef SIGWINCH
169 sigaddset(&act.sa_mask, SIGWINCH);
170 sigaction(SIGWINCH, &act, 0);
171 #endif
172 sigaction(SIGPIPE, &act, 0);
173 #ifdef SIGTRAP
174 sigaction(SIGTRAP, &act, 0);
175 #endif
176
177 act.sa_handler = dummy_handler;
178 sigaction(SIGALRM, &act, 0);
179 #endif
180 }
181
182 int
183 main(int argc, char *argv[])
184 {
185 setup_signals();
186
187 authd_helper = rb_helper_child(parse_request, error_cb, NULL, NULL, NULL, 256, 256, 256); /* XXX fix me */
188 if(authd_helper == NULL)
189 {
190 fprintf(stderr, "authd is not meant to be invoked by end users\n");
191 exit(1);
192 }
193
194 rb_set_time();
195 setup_signals();
196
197 authd_option_handlers = rb_dictionary_create("authd options handlers", strcasecmp);
198
199 init_resolver();
200 init_providers();
201 rb_init_prng(NULL, RB_PRNG_DEFAULT);
202
203 rb_helper_loop(authd_helper, 0);
204
205 return 0;
206 }