File: | src/usr.sbin/ypldap/ypldap.c |
Warning: | line 225, column 8 Although the value stored to 'cp' is used in the enclosing expression, the value is never actually read from 'cp' |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* $OpenBSD: ypldap.c,v 1.22 2021/01/27 07:21:55 deraadt Exp $ */ |
2 | |
3 | /* |
4 | * Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org> |
5 | * |
6 | * Permission to use, copy, modify, and distribute this software for any |
7 | * purpose with or without fee is hereby granted, provided that the above |
8 | * copyright notice and this permission notice appear in all copies. |
9 | * |
10 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
11 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
12 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR |
13 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
14 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
15 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
16 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
17 | */ |
18 | |
19 | #include <sys/types.h> |
20 | #include <sys/queue.h> |
21 | #include <sys/socket.h> |
22 | #include <sys/signal.h> |
23 | #include <sys/tree.h> |
24 | #include <sys/wait.h> |
25 | |
26 | #include <netinet/in.h> |
27 | #include <arpa/inet.h> |
28 | |
29 | #include <err.h> |
30 | #include <errno(*__errno()).h> |
31 | #include <event.h> |
32 | #include <unistd.h> |
33 | #include <pwd.h> |
34 | #include <stdio.h> |
35 | #include <stdlib.h> |
36 | #include <string.h> |
37 | #include <limits.h> |
38 | |
39 | #include "ypldap.h" |
40 | #include "log.h" |
41 | |
42 | __dead__attribute__((__noreturn__)) void usage(void); |
43 | int check_child(pid_t, const char *); |
44 | void main_sig_handler(int, short, void *); |
45 | void main_shutdown(void); |
46 | void main_dispatch_client(int, short, void *); |
47 | void main_configure_client(struct env *); |
48 | void main_init_timer(int, short, void *); |
49 | void main_start_update(struct env *); |
50 | void main_trash_update(struct env *); |
51 | void main_end_update(struct env *); |
52 | int main_create_user_groups(struct env *); |
53 | void purge_config(struct env *); |
54 | void reconfigure(struct env *); |
55 | |
56 | int pipe_main2client[2]; |
57 | |
58 | pid_t client_pid = 0; |
59 | char *conffile = YPLDAP_CONF_FILE"/etc/ypldap.conf"; |
60 | int opts = 0; |
61 | |
62 | enum privsep_procid ypldap_process; |
63 | |
64 | void |
65 | usage(void) |
66 | { |
67 | extern const char *__progname; |
68 | |
69 | fprintf(stderr(&__sF[2]), "usage: %s [-dnv] [-D macro=value] [-f file]\n", |
70 | __progname); |
71 | exit(1); |
72 | } |
73 | |
74 | int |
75 | check_child(pid_t pid, const char *pname) |
76 | { |
77 | int status; |
78 | |
79 | if (waitpid(pid, &status, WNOHANG1) > 0) { |
80 | if (WIFEXITED(status)(((status) & 0177) == 0)) { |
81 | log_warnx("check_child: lost child %s exited", pname); |
82 | return (1); |
83 | } |
84 | if (WIFSIGNALED(status)(((status) & 0177) != 0177 && ((status) & 0177 ) != 0)) { |
85 | log_warnx("check_child: lost child %s terminated; " |
86 | "signal %d", pname, WTERMSIG(status)(((status) & 0177))); |
87 | return (1); |
88 | } |
89 | } |
90 | return (0); |
91 | } |
92 | |
93 | /* ARGUSED */ |
94 | void |
95 | main_sig_handler(int sig, short event, void *p) |
96 | { |
97 | int die = 0; |
98 | |
99 | switch (sig) { |
100 | case SIGTERM15: |
101 | case SIGINT2: |
102 | die = 1; |
103 | /* FALLTHROUGH */ |
104 | case SIGCHLD20: |
105 | if (check_child(client_pid, "ldap client")) { |
106 | client_pid = 0; |
107 | die = 1; |
108 | } |
109 | if (die) |
110 | main_shutdown(); |
111 | break; |
112 | case SIGHUP1: |
113 | /* reconfigure */ |
114 | break; |
115 | default: |
116 | fatalx("unexpected signal"); |
117 | } |
118 | } |
119 | |
120 | void |
121 | main_shutdown(void) |
122 | { |
123 | _exit(0); |
124 | } |
125 | |
126 | void |
127 | main_start_update(struct env *env) |
128 | { |
129 | env->update_trashed = 0; |
130 | |
131 | log_debug("starting directory update"); |
132 | env->sc_user_line_len = 0; |
133 | env->sc_group_line_len = 0; |
134 | if ((env->sc_user_names_t = calloc(1, |
135 | sizeof(*env->sc_user_names_t))) == NULL((void*)0) || |
136 | (env->sc_group_names_t = calloc(1, |
137 | sizeof(*env->sc_group_names_t))) == NULL((void*)0)) |
138 | fatal(NULL((void*)0)); |
139 | RB_INIT(env->sc_user_names_t)do { (env->sc_user_names_t)->rbh_root = ((void*)0); } while (0); |
140 | RB_INIT(env->sc_group_names_t)do { (env->sc_group_names_t)->rbh_root = ((void*)0); } while (0); |
141 | } |
142 | |
143 | /* |
144 | * XXX: Currently this function should only be called when updating is |
145 | * finished. A notification should be send to ldapclient that it should stop |
146 | * sending new pwd/grp entries before it can be called from different places. |
147 | */ |
148 | void |
149 | main_trash_update(struct env *env) |
150 | { |
151 | struct userent *ue; |
152 | struct groupent *ge; |
153 | |
154 | env->update_trashed = 1; |
155 | |
156 | while ((ue = RB_ROOT(env->sc_user_names_t)(env->sc_user_names_t)->rbh_root) != NULL((void*)0)) { |
157 | RB_REMOVE(user_name_tree,user_name_tree_RB_REMOVE(env->sc_user_names_t, ue) |
158 | env->sc_user_names_t, ue)user_name_tree_RB_REMOVE(env->sc_user_names_t, ue); |
159 | free(ue->ue_line); |
160 | free(ue->ue_netid_line); |
161 | free(ue); |
162 | } |
163 | free(env->sc_user_names_t); |
164 | env->sc_user_names_t = NULL((void*)0); |
165 | while ((ge = RB_ROOT(env->sc_group_names_t)(env->sc_group_names_t)->rbh_root) |
166 | != NULL((void*)0)) { |
167 | RB_REMOVE(group_name_tree,group_name_tree_RB_REMOVE(env->sc_group_names_t, ge) |
168 | env->sc_group_names_t, ge)group_name_tree_RB_REMOVE(env->sc_group_names_t, ge); |
169 | free(ge->ge_line); |
170 | free(ge); |
171 | } |
172 | free(env->sc_group_names_t); |
173 | env->sc_group_names_t = NULL((void*)0); |
174 | } |
175 | |
176 | int |
177 | main_create_user_groups(struct env *env) |
178 | { |
179 | struct userent *ue; |
180 | struct userent ukey; |
181 | struct groupent *ge; |
182 | gid_t pw_gid; |
183 | char *bp, *cp; |
184 | char *p; |
185 | const char *errstr = NULL((void*)0); |
186 | size_t len; |
187 | |
188 | RB_FOREACH(ue, user_name_tree, env->sc_user_names_t)for ((ue) = user_name_tree_RB_MINMAX(env->sc_user_names_t, -1); (ue) != ((void*)0); (ue) = user_name_tree_RB_NEXT(ue)) { |
189 | bp = cp = ue->ue_line; |
190 | |
191 | /* name */ |
192 | bp += strlen(bp) + 1; |
193 | |
194 | /* password */ |
195 | bp += strcspn(bp, ":") + 1; |
196 | |
197 | /* uid */ |
198 | bp += strcspn(bp, ":") + 1; |
199 | |
200 | /* gid */ |
201 | bp[strcspn(bp, ":")] = '\0'; |
202 | |
203 | pw_gid = (gid_t)strtonum(bp, 0, GID_MAX(2147483647 *2U +1U), &errstr); |
204 | if (errstr) { |
205 | log_warnx("main: failed to parse gid for uid: %d\n", ue->ue_uid); |
206 | return (-1); |
207 | } |
208 | |
209 | /* bring gid column back to its proper state */ |
210 | bp[strlen(bp)] = ':'; |
211 | |
212 | if ((ue->ue_netid_line = calloc(1, LINE_WIDTH1024)) == NULL((void*)0)) { |
213 | return (-1); |
214 | } |
215 | |
216 | if (snprintf(ue->ue_netid_line, LINE_WIDTH1024-1, "%d:%d", ue->ue_uid, pw_gid) >= LINE_WIDTH1024) { |
217 | |
218 | return (-1); |
219 | } |
220 | |
221 | ue->ue_gid = pw_gid; |
222 | } |
223 | |
224 | RB_FOREACH(ge, group_name_tree, env->sc_group_names_t)for ((ge) = group_name_tree_RB_MINMAX(env->sc_group_names_t , -1); (ge) != ((void*)0); (ge) = group_name_tree_RB_NEXT(ge) ) { |
225 | bp = cp = ge->ge_line; |
Although the value stored to 'cp' is used in the enclosing expression, the value is never actually read from 'cp' | |
226 | |
227 | /* name */ |
228 | bp += strlen(bp) + 1; |
229 | |
230 | /* password */ |
231 | bp += strcspn(bp, ":") + 1; |
232 | |
233 | /* gid */ |
234 | bp += strcspn(bp, ":") + 1; |
235 | |
236 | cp = bp; |
237 | if (*bp == '\0') |
238 | continue; |
239 | bp = cp; |
240 | for (;;) { |
241 | if (!(cp = strsep(&bp, ","))) |
242 | break; |
243 | ukey.ue_line = cp; |
244 | if ((ue = RB_FIND(user_name_tree, env->sc_user_names_t,user_name_tree_RB_FIND(env->sc_user_names_t, &ukey) |
245 | &ukey)user_name_tree_RB_FIND(env->sc_user_names_t, &ukey)) == NULL((void*)0)) { |
246 | /* User not found */ |
247 | log_warnx("main: unknown user %s in group %s\n", |
248 | ukey.ue_line, ge->ge_line); |
249 | if (bp != NULL((void*)0)) |
250 | *(bp-1) = ','; |
251 | continue; |
252 | } |
253 | if (bp != NULL((void*)0)) |
254 | *(bp-1) = ','; |
255 | |
256 | /* Make sure the new group doesn't equal to the main gid */ |
257 | if (ge->ge_gid == ue->ue_gid) |
258 | continue; |
259 | |
260 | len = strlen(ue->ue_netid_line); |
261 | p = ue->ue_netid_line + len; |
262 | |
263 | if ((snprintf(p, LINE_WIDTH1024-len-1, ",%d", |
264 | ge->ge_gid)) >= (int)(LINE_WIDTH1024-len)) { |
265 | return (-1); |
266 | } |
267 | } |
268 | } |
269 | |
270 | return (0); |
271 | } |
272 | |
273 | void |
274 | main_end_update(struct env *env) |
275 | { |
276 | struct userent *ue; |
277 | struct groupent *ge; |
278 | |
279 | if (env->update_trashed) |
280 | return; |
281 | |
282 | log_debug("updates are over, cleaning up trees now"); |
283 | |
284 | if (main_create_user_groups(env) == -1) { |
285 | main_trash_update(env); |
286 | return; |
287 | } |
288 | |
289 | if (env->sc_user_names == NULL((void*)0)) { |
290 | env->sc_user_names = env->sc_user_names_t; |
291 | env->sc_user_lines = NULL((void*)0); |
292 | env->sc_user_names_t = NULL((void*)0); |
293 | |
294 | env->sc_group_names = env->sc_group_names_t; |
295 | env->sc_group_lines = NULL((void*)0); |
296 | env->sc_group_names_t = NULL((void*)0); |
297 | |
298 | flatten_entries(env); |
299 | goto make_uids; |
300 | } |
301 | |
302 | /* |
303 | * clean previous tree. |
304 | */ |
305 | while ((ue = RB_ROOT(env->sc_user_names)(env->sc_user_names)->rbh_root) != NULL((void*)0)) { |
306 | RB_REMOVE(user_name_tree, env->sc_user_names,user_name_tree_RB_REMOVE(env->sc_user_names, ue) |
307 | ue)user_name_tree_RB_REMOVE(env->sc_user_names, ue); |
308 | free(ue->ue_netid_line); |
309 | free(ue); |
310 | } |
311 | free(env->sc_user_names); |
312 | free(env->sc_user_lines); |
313 | |
314 | env->sc_user_names = env->sc_user_names_t; |
315 | env->sc_user_lines = NULL((void*)0); |
316 | env->sc_user_names_t = NULL((void*)0); |
317 | |
318 | while ((ge = RB_ROOT(env->sc_group_names)(env->sc_group_names)->rbh_root) != NULL((void*)0)) { |
319 | RB_REMOVE(group_name_tree,group_name_tree_RB_REMOVE(env->sc_group_names, ge) |
320 | env->sc_group_names, ge)group_name_tree_RB_REMOVE(env->sc_group_names, ge); |
321 | free(ge); |
322 | } |
323 | free(env->sc_group_names); |
324 | free(env->sc_group_lines); |
325 | |
326 | env->sc_group_names = env->sc_group_names_t; |
327 | env->sc_group_lines = NULL((void*)0); |
328 | env->sc_group_names_t = NULL((void*)0); |
329 | |
330 | |
331 | flatten_entries(env); |
332 | |
333 | /* |
334 | * trees are flat now. build up uid, gid and netid trees. |
335 | */ |
336 | |
337 | make_uids: |
338 | RB_INIT(&env->sc_user_uids)do { (&env->sc_user_uids)->rbh_root = ((void*)0); } while (0); |
339 | RB_INIT(&env->sc_group_gids)do { (&env->sc_group_gids)->rbh_root = ((void*)0); } while (0); |
340 | RB_FOREACH(ue, user_name_tree, env->sc_user_names)for ((ue) = user_name_tree_RB_MINMAX(env->sc_user_names, - 1); (ue) != ((void*)0); (ue) = user_name_tree_RB_NEXT(ue)) |
341 | RB_INSERT(user_uid_tree,user_uid_tree_RB_INSERT(&env->sc_user_uids, ue) |
342 | &env->sc_user_uids, ue)user_uid_tree_RB_INSERT(&env->sc_user_uids, ue); |
343 | RB_FOREACH(ge, group_name_tree, env->sc_group_names)for ((ge) = group_name_tree_RB_MINMAX(env->sc_group_names, -1); (ge) != ((void*)0); (ge) = group_name_tree_RB_NEXT(ge)) |
344 | RB_INSERT(group_gid_tree,group_gid_tree_RB_INSERT(&env->sc_group_gids, ge) |
345 | &env->sc_group_gids, ge)group_gid_tree_RB_INSERT(&env->sc_group_gids, ge); |
346 | |
347 | } |
348 | |
349 | void |
350 | main_dispatch_client(int fd, short events, void *p) |
351 | { |
352 | int n; |
353 | int shut = 0; |
354 | struct env *env = p; |
355 | struct imsgev *iev = env->sc_iev; |
356 | struct imsgbuf *ibuf = &iev->ibuf; |
357 | struct idm_req ir; |
358 | struct imsg imsg; |
359 | |
360 | if ((events & (EV_READ0x02 | EV_WRITE0x04)) == 0) |
361 | fatalx("unknown event"); |
362 | |
363 | if (events & EV_READ0x02) { |
364 | if ((n = imsg_read(ibuf)) == -1 && errno(*__errno()) != EAGAIN35) |
365 | fatal("imsg_read error"); |
366 | if (n == 0) |
367 | shut = 1; |
368 | } |
369 | if (events & EV_WRITE0x04) { |
370 | if ((n = msgbuf_write(&ibuf->w)) == -1 && errno(*__errno()) != EAGAIN35) |
371 | fatal("msgbuf_write"); |
372 | if (n == 0) |
373 | shut = 1; |
374 | goto done; |
375 | } |
376 | |
377 | for (;;) { |
378 | if ((n = imsg_get(ibuf, &imsg)) == -1) |
379 | fatal("main_dispatch_client: imsg_get error"); |
380 | if (n == 0) |
381 | break; |
382 | |
383 | switch (imsg.hdr.type) { |
384 | case IMSG_START_UPDATE: |
385 | main_start_update(env); |
386 | break; |
387 | case IMSG_PW_ENTRY: { |
388 | struct userent *ue; |
389 | size_t len; |
390 | |
391 | if (env->update_trashed) |
392 | break; |
393 | |
394 | (void)memcpy(&ir, imsg.data, sizeof(ir)); |
395 | if ((ue = calloc(1, sizeof(*ue))) == NULL((void*)0) || |
396 | (ue->ue_line = strdup(ir.ir_line)) == NULL((void*)0)) { |
397 | /* |
398 | * should cancel tree update instead. |
399 | */ |
400 | fatal("out of memory"); |
401 | } |
402 | ue->ue_uid = ir.ir_key.ik_uid; |
403 | len = strlen(ue->ue_line) + 1; |
404 | ue->ue_line[strcspn(ue->ue_line, ":")] = '\0'; |
405 | if (RB_INSERT(user_name_tree, env->sc_user_names_t,user_name_tree_RB_INSERT(env->sc_user_names_t, ue) |
406 | ue)user_name_tree_RB_INSERT(env->sc_user_names_t, ue) != NULL((void*)0)) { /* dup */ |
407 | free(ue->ue_line); |
408 | free(ue); |
409 | } else |
410 | env->sc_user_line_len += len; |
411 | break; |
412 | } |
413 | case IMSG_GRP_ENTRY: { |
414 | struct groupent *ge; |
415 | size_t len; |
416 | |
417 | if (env->update_trashed) |
418 | break; |
419 | |
420 | (void)memcpy(&ir, imsg.data, sizeof(ir)); |
421 | if ((ge = calloc(1, sizeof(*ge))) == NULL((void*)0) || |
422 | (ge->ge_line = strdup(ir.ir_line)) == NULL((void*)0)) { |
423 | /* |
424 | * should cancel tree update instead. |
425 | */ |
426 | fatal("out of memory"); |
427 | } |
428 | ge->ge_gid = ir.ir_key.ik_gid; |
429 | len = strlen(ge->ge_line) + 1; |
430 | ge->ge_line[strcspn(ge->ge_line, ":")] = '\0'; |
431 | if (RB_INSERT(group_name_tree, env->sc_group_names_t,group_name_tree_RB_INSERT(env->sc_group_names_t, ge) |
432 | ge)group_name_tree_RB_INSERT(env->sc_group_names_t, ge) != NULL((void*)0)) { /* dup */ |
433 | free(ge->ge_line); |
434 | free(ge); |
435 | } else |
436 | env->sc_group_line_len += len; |
437 | break; |
438 | } |
439 | case IMSG_TRASH_UPDATE: |
440 | main_trash_update(env); |
441 | break; |
442 | case IMSG_END_UPDATE: { |
443 | main_end_update(env); |
444 | break; |
445 | } |
446 | default: |
447 | log_debug("main_dispatch_client: unexpected imsg %d", |
448 | imsg.hdr.type); |
449 | break; |
450 | } |
451 | imsg_free(&imsg); |
452 | } |
453 | |
454 | done: |
455 | if (!shut) |
456 | imsg_event_add(iev); |
457 | else { |
458 | log_debug("king bula sez: ran into dead pipe"); |
459 | event_del(&iev->ev); |
460 | event_loopexit(NULL((void*)0)); |
461 | } |
462 | } |
463 | |
464 | void |
465 | main_configure_client(struct env *env) |
466 | { |
467 | struct idm *idm; |
468 | struct imsgev *iev = env->sc_iev; |
469 | |
470 | imsg_compose_event(iev, IMSG_CONF_START, 0, 0, -1, env, sizeof(*env)); |
471 | TAILQ_FOREACH(idm, &env->sc_idms, idm_entry)for((idm) = ((&env->sc_idms)->tqh_first); (idm) != ( (void*)0); (idm) = ((idm)->idm_entry.tqe_next)) { |
472 | imsg_compose_event(iev, IMSG_CONF_IDM, 0, 0, -1, |
473 | idm, sizeof(*idm)); |
474 | } |
475 | imsg_compose_event(iev, IMSG_CONF_END, 0, 0, -1, NULL((void*)0), 0); |
476 | } |
477 | |
478 | void |
479 | main_init_timer(int fd, short event, void *p) |
480 | { |
481 | struct env *env = p; |
482 | |
483 | main_configure_client(env); |
484 | } |
485 | |
486 | void |
487 | purge_config(struct env *env) |
488 | { |
489 | struct idm *idm; |
490 | |
491 | while ((idm = TAILQ_FIRST(&env->sc_idms)((&env->sc_idms)->tqh_first)) != NULL((void*)0)) { |
492 | TAILQ_REMOVE(&env->sc_idms, idm, idm_entry)do { if (((idm)->idm_entry.tqe_next) != ((void*)0)) (idm)-> idm_entry.tqe_next->idm_entry.tqe_prev = (idm)->idm_entry .tqe_prev; else (&env->sc_idms)->tqh_last = (idm)-> idm_entry.tqe_prev; *(idm)->idm_entry.tqe_prev = (idm)-> idm_entry.tqe_next; ; ; } while (0); |
493 | free(idm); |
494 | } |
495 | } |
496 | |
497 | int |
498 | main(int argc, char *argv[]) |
499 | { |
500 | int c; |
501 | int debug; |
502 | struct passwd *pw; |
503 | struct env env; |
504 | struct event ev_sigint; |
505 | struct event ev_sigterm; |
506 | struct event ev_sigchld; |
507 | struct event ev_sighup; |
508 | struct event ev_timer; |
509 | struct timeval tv; |
510 | |
511 | debug = 0; |
512 | ypldap_process = PROC_MAIN; |
513 | log_procname = log_procnames[ypldap_process]; |
514 | |
515 | log_init(1); |
516 | |
517 | while ((c = getopt(argc, argv, "dD:nf:v")) != -1) { |
518 | switch (c) { |
519 | case 'd': |
520 | debug = 2; |
521 | log_verbose(debug); |
522 | break; |
523 | case 'D': |
524 | if (cmdline_symset(optarg) < 0) |
525 | log_warnx("could not parse macro definition %s", |
526 | optarg); |
527 | break; |
528 | case 'n': |
529 | debug = 2; |
530 | opts |= YPLDAP_OPT_NOACTION0x02; |
531 | break; |
532 | case 'f': |
533 | conffile = optarg; |
534 | break; |
535 | case 'v': |
536 | opts |= YPLDAP_OPT_VERBOSE0x01; |
537 | break; |
538 | default: |
539 | usage(); |
540 | } |
541 | } |
542 | |
543 | argc -= optind; |
544 | argv += optind; |
545 | |
546 | if (argc) |
547 | usage(); |
548 | |
549 | RB_INIT(&env.sc_user_uids)do { (&env.sc_user_uids)->rbh_root = ((void*)0); } while (0); |
550 | RB_INIT(&env.sc_group_gids)do { (&env.sc_group_gids)->rbh_root = ((void*)0); } while (0); |
551 | |
552 | if (parse_config(&env, conffile, opts)) |
553 | exit(1); |
554 | if (opts & YPLDAP_OPT_NOACTION0x02) { |
555 | fprintf(stderr(&__sF[2]), "configuration OK\n"); |
556 | exit(0); |
557 | } |
558 | |
559 | if (geteuid()) |
560 | errx(1, "need root privileges"); |
561 | |
562 | log_init(debug); |
563 | |
564 | if (!debug) { |
565 | if (daemon(1, 0) == -1) |
566 | err(1, "failed to daemonize"); |
567 | } |
568 | |
569 | log_info("startup%s", (debug > 1)?" [debug mode]":""); |
570 | |
571 | if (socketpair(AF_UNIX1, SOCK_STREAM1 | SOCK_NONBLOCK0x4000, PF_UNSPEC0, |
572 | pipe_main2client) == -1) |
573 | fatal("socketpair"); |
574 | |
575 | client_pid = ldapclient(pipe_main2client); |
576 | |
577 | setproctitle("parent"); |
578 | event_init(); |
579 | |
580 | signal_set(&ev_sigint, SIGINT, main_sig_handler, &env)event_set(&ev_sigint, 2, 0x08|0x10, main_sig_handler, & env); |
581 | signal_set(&ev_sigterm, SIGTERM, main_sig_handler, &env)event_set(&ev_sigterm, 15, 0x08|0x10, main_sig_handler, & env); |
582 | signal_set(&ev_sighup, SIGHUP, main_sig_handler, &env)event_set(&ev_sighup, 1, 0x08|0x10, main_sig_handler, & env); |
583 | signal_set(&ev_sigchld, SIGCHLD, main_sig_handler, &env)event_set(&ev_sigchld, 20, 0x08|0x10, main_sig_handler, & env); |
584 | signal_add(&ev_sigint, NULL)event_add(&ev_sigint, ((void*)0)); |
585 | signal_add(&ev_sigterm, NULL)event_add(&ev_sigterm, ((void*)0)); |
586 | signal_add(&ev_sighup, NULL)event_add(&ev_sighup, ((void*)0)); |
587 | signal_add(&ev_sigchld, NULL)event_add(&ev_sigchld, ((void*)0)); |
588 | |
589 | close(pipe_main2client[1]); |
590 | if ((env.sc_iev = calloc(1, sizeof(*env.sc_iev))) == NULL((void*)0)) |
591 | fatal(NULL((void*)0)); |
592 | imsg_init(&env.sc_iev->ibuf, pipe_main2client[0]); |
593 | env.sc_iev->handler = main_dispatch_client; |
594 | |
595 | env.sc_iev->events = EV_READ0x02; |
596 | env.sc_iev->data = &env; |
597 | event_set(&env.sc_iev->ev, env.sc_iev->ibuf.fd, env.sc_iev->events, |
598 | env.sc_iev->handler, &env); |
599 | event_add(&env.sc_iev->ev, NULL((void*)0)); |
600 | |
601 | yp_init(&env); |
602 | |
603 | if ((pw = getpwnam(YPLDAP_USER"_ypldap")) == NULL((void*)0)) |
604 | fatal("getpwnam"); |
605 | |
606 | #ifndef DEBUG |
607 | if (setgroups(1, &pw->pw_gid) || |
608 | setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) || |
609 | setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid)) |
610 | fatal("cannot drop privileges"); |
611 | #else |
612 | #warning disabling privilege revocation in debug mode |
613 | #endif |
614 | |
615 | if (pledge("stdio inet", NULL((void*)0)) == -1) |
616 | fatal("pledge"); |
617 | |
618 | memset(&tv, 0, sizeof(tv)); |
619 | evtimer_set(&ev_timer, main_init_timer, &env)event_set(&ev_timer, -1, 0, main_init_timer, &env); |
620 | evtimer_add(&ev_timer, &tv)event_add(&ev_timer, &tv); |
621 | |
622 | yp_enable_events(); |
623 | event_dispatch(); |
624 | main_shutdown(); |
625 | |
626 | return (0); |
627 | } |
628 | |
629 | void |
630 | imsg_event_add(struct imsgev *iev) |
631 | { |
632 | if (iev->handler == NULL((void*)0)) { |
633 | imsg_flush(&iev->ibuf); |
634 | return; |
635 | } |
636 | |
637 | iev->events = EV_READ0x02; |
638 | if (iev->ibuf.w.queued) |
639 | iev->events |= EV_WRITE0x04; |
640 | |
641 | event_del(&iev->ev); |
642 | event_set(&iev->ev, iev->ibuf.fd, iev->events, iev->handler, iev->data); |
643 | event_add(&iev->ev, NULL((void*)0)); |
644 | } |
645 | |
646 | int |
647 | imsg_compose_event(struct imsgev *iev, u_int16_t type, u_int32_t peerid, |
648 | pid_t pid, int fd, void *data, u_int16_t datalen) |
649 | { |
650 | int ret; |
651 | |
652 | if ((ret = imsg_compose(&iev->ibuf, type, peerid, |
653 | pid, fd, data, datalen)) != -1) |
654 | imsg_event_add(iev); |
655 | return (ret); |
656 | } |