]> jfr.im git - solanum.git/blobdiff - authd/authd.c
ERROR instead of NOTICE for failed WEBIRC
[solanum.git] / authd / authd.c
index f9f81edfe08833e564a9b6a9a7cc7bec78891e45..23ac2a4bb5c99f4be00386e5c7c7050dd3030fd7 100644 (file)
@@ -1,5 +1,5 @@
 /* authd/authd.c - main code for authd
- * Copyright (c) 2016 William Pitcock <nenolod@dereferenced.org>
+ * Copyright (c) 2016 Ariadne Conill <ariadne@dereferenced.org>
  *
  * Permission to use, copy, modify, and/or distribute this software for any
  * purpose with or without fee is hereby granted, provided that the above
  * POSSIBILITY OF SUCH DAMAGE.
  */
 
-#include <ratbox_lib.h>
-#include <stdio.h>
-
-#include "setup.h"
-#include "common.h"
+#include "authd.h"
+#include "dns.h"
+#include "provider.h"
+#include "notice.h"
 
 #define MAXPARA 10
 
-static rb_helper *authd_helper = NULL;
+static void error_cb(rb_helper *helper) __attribute__((noreturn));
+static void handle_reload(int parc, char *parv[]);
+static void handle_stat(int parc, char *parv[]);
+static void handle_options(int parc, char *parv[]);
+
+rb_helper *authd_helper = NULL;
+authd_cmd_handler authd_cmd_handlers[256] = {
+       ['C'] = handle_new_connection,
+       ['D'] = handle_resolve_dns,
+       ['E'] = handle_cancel_connection,
+       ['O'] = handle_options,
+       ['R'] = handle_reload,
+       ['S'] = handle_stat,
+};
+
+authd_stat_handler authd_stat_handlers[256] = {
+       ['D'] = enumerate_nameservers,
+};
+
+authd_reload_handler authd_reload_handlers[256] = {
+       ['D'] = reload_nameservers,
+};
+
+rb_dictionary *authd_option_handlers;
+
+static void
+handle_stat(int parc, char *parv[])
+{
+       authd_stat_handler handler;
+       unsigned long long rid;
+
+       if(parc < 3)
+       {
+               warn_opers(L_CRIT, "BUG: handle_stat received too few parameters (at least 3 expected, got %d)", parc);
+               return;
+       }
+
+       if((rid = strtoull(parv[1], NULL, 16)) > UINT32_MAX)
+       {
+               warn_opers(L_CRIT, "BUG: handle_stat got a rid that was too large: %s", parv[1]);
+               return;
+       }
+
+       if (!(handler = authd_stat_handlers[(unsigned char)parv[2][0]]))
+               return;
+
+       handler((uint32_t)rid, parv[2][0]);
+}
+
+static void
+handle_options(int parc, char *parv[])
+{
+       struct auth_opts_handler *handler;
+
+       if(parc < 2)
+       {
+               warn_opers(L_CRIT, "BUG: handle_options received too few parameters (at least 2 expected, got %d)", parc);
+               return;
+       }
+
+       if((handler = rb_dictionary_retrieve(authd_option_handlers, parv[1])) == NULL)
+       {
+               warn_opers(L_CRIT, "BUG: handle_options got a bad option type %s", parv[1]);
+               return;
+       }
+
+       if((parc - 2) < handler->min_parc)
+       {
+               warn_opers(L_CRIT, "BUG: handle_options received too few parameters (at least %d expected, got %d)", handler->min_parc, parc);
+               return;
+       }
+
+       handler->handler(parv[1], parc - 2, (const char **)&parv[2]);
+}
+
+static void
+handle_reload(int parc, char *parv[])
+{
+       authd_reload_handler handler;
+
+       if(parc <= 2)
+       {
+               /* Reload all handlers */
+               for(size_t i = 0; i < 256; i++)
+               {
+                       if ((handler = authd_reload_handlers[(unsigned char) i]) != NULL)
+                               handler('\0');
+               }
+
+               return;
+       }
+
+       if (!(handler = authd_reload_handlers[(unsigned char)parv[1][0]]))
+               return;
+
+       handler(parv[1][0]);
+}
 
 static void
 parse_request(rb_helper *helper)
@@ -35,6 +130,7 @@ parse_request(rb_helper *helper)
        static char readbuf[READBUF_SIZE];
        int parc;
        int len;
+       authd_cmd_handler handler;
 
        while((len = rb_helper_read(helper, readbuf, sizeof(readbuf))) > 0)
        {
@@ -43,32 +139,27 @@ parse_request(rb_helper *helper)
                if(parc < 1)
                        continue;
 
-               switch (parv[0][0])
-               {
-               default:
-                       break;
-               }
+               handler = authd_cmd_handlers[(unsigned char)parv[0][0]];
+               if (handler != NULL)
+                       handler(parc, parv);
        }
 }
 
 static void
 error_cb(rb_helper *helper)
 {
-       exit(1);
+       exit(EX_ERROR);
 }
 
-#ifndef WINDOWS
 static void
 dummy_handler(int sig)
 {
        return;
 }
-#endif
 
 static void
 setup_signals(void)
 {
-#ifndef WINDOWS
        struct sigaction act;
 
        act.sa_flags = 0;
@@ -91,7 +182,6 @@ setup_signals(void)
 
        act.sa_handler = dummy_handler;
        sigaction(SIGALRM, &act, 0);
-#endif
 }
 
 int
@@ -103,10 +193,24 @@ main(int argc, char *argv[])
        if(authd_helper == NULL)
        {
                fprintf(stderr, "authd is not meant to be invoked by end users\n");
-               exit(1);
+               exit(EX_ERROR);
        }
 
+       rb_set_time();
+       setup_signals();
+
+       authd_option_handlers = rb_dictionary_create("authd options handlers", rb_strcasecmp);
+
+       init_resolver();
+       init_providers();
+       rb_init_prng(NULL, RB_PRNG_DEFAULT);
+
        rb_helper_loop(authd_helper, 0);
 
+       /*
+        * XXX this function will never be called from here -- is it necessary?
+        */
+       destroy_providers();
+
        return 0;
 }