X-Git-Url: http://git.madism.org/?a=blobdiff_plain;f=main-postlicyd.c;h=a1444ec154c8af4fc7ab34958536f80161c91e4c;hb=c2a3b7df6de7e023639789864940b0c997869954;hp=97afe21d1daa54e0fc98391ee1a61ff14f66c935;hpb=10b49f7af56977b8c27a26438b3cfb07ca63ae90;p=apps%2Fpfixtools.git diff --git a/main-postlicyd.c b/main-postlicyd.c index 97afe21..a1444ec 100644 --- a/main-postlicyd.c +++ b/main-postlicyd.c @@ -31,6 +31,7 @@ /* * Copyright © 2006-2007 Pierre Habouzit + * Copyright © 2008 Florent Bruneau */ #include @@ -46,6 +47,8 @@ #define RUNAS_USER "nobody" #define RUNAS_GROUP "nogroup" +DECLARE_MAIN + enum smtp_state { SMTP_UNKNOWN, SMTP_CONNECT, @@ -81,7 +84,7 @@ typedef struct query_t { const char *size; const char *ccert_subject; const char *ccert_issuer; - const char *ccsert_fingerprint; + const char *ccert_fingerprint; /* postfix 2.3+ */ const char *encryption_protocol; @@ -89,22 +92,29 @@ typedef struct query_t { const char *encryption_keysize; const char *etrn_domain; + /* postfix 2.5+ */ + const char *stress; + const char *eoq; } query_t; -static void* query_new() +static query_t *query_new(void) { return p_new(query_t, 1); } -static void query_delete(void *arg) +static void query_delete(query_t **query) { - query_t **query = arg; if (*query) { p_delete(query); } } +static void *query_starter(server_t* server) +{ + return query_new(); +} + static int postfix_parsejob(query_t *query, char *p) { #define PARSE_CHECK(expr, error, ...) \ @@ -152,11 +162,12 @@ static int postfix_parsejob(query_t *query, char *p) CASE(SIZE, size); CASE(CCERT_SUBJECT, ccert_subject); CASE(CCERT_ISSUER, ccert_issuer); - CASE(CCSERT_FINGERPRINT, ccsert_fingerprint); + CASE(CCERT_FINGERPRINT, ccert_fingerprint); CASE(ENCRYPTION_PROTOCOL, encryption_protocol); CASE(ENCRYPTION_CIPHER, encryption_cipher); CASE(ENCRYPTION_KEYSIZE, encryption_keysize); CASE(ETRN_DOMAIN, etrn_domain); + CASE(STRESS, stress); #undef CASE case PTK_REQUEST: @@ -204,6 +215,7 @@ static void policy_answer(server_t *pcy, const char *fmt, ...) { va_list args; va_start(args, fmt); + buffer_addstr(&pcy->obuf, "action="); buffer_addvf(&pcy->obuf, fmt, args); va_end(args); buffer_addstr(&pcy->obuf, "\n\n"); @@ -252,26 +264,6 @@ int start_listener(int port) /* administrivia {{{ */ -static int main_initialize(void) -{ - openlog("postlicyd", LOG_PID, LOG_MAIL); - signal(SIGPIPE, SIG_IGN); - signal(SIGINT, &common_sighandler); - signal(SIGTERM, &common_sighandler); - signal(SIGHUP, &common_sighandler); - signal(SIGSEGV, &common_sighandler); - syslog(LOG_INFO, "Starting..."); - return 0; -} - -static void main_shutdown(void) -{ - closelog(); -} - -module_init(main_initialize); -module_exit(main_shutdown); - void usage(void) { fputs("usage: "DAEMON_NAME" [options] config\n" @@ -287,6 +279,7 @@ void usage(void) int main(int argc, char *argv[]) { + bool unsafe = false; const char *pidfile = NULL; bool daemonize = true; int port = DEFAULT_PORT; @@ -296,6 +289,9 @@ int main(int argc, char *argv[]) case 'p': pidfile = optarg; break; + case 'u': + unsafe = true; + break; case 'l': port = atoi(optarg); break; @@ -313,28 +309,11 @@ int main(int argc, char *argv[]) return EXIT_FAILURE; } - if (pidfile_open(pidfile) < 0) { - syslog(LOG_CRIT, "unable to write pidfile %s", pidfile); - return EXIT_FAILURE; - } - - if (drop_privileges(RUNAS_USER, RUNAS_GROUP) < 0) { - syslog(LOG_CRIT, "unable to drop privileges"); - return EXIT_FAILURE; - } - - if (daemonize && daemon_detach() < 0) { - syslog(LOG_CRIT, "unable to fork"); + if (common_setup(pidfile, false, RUNAS_USER, RUNAS_GROUP, + daemonize) != EXIT_SUCCESS + || start_listener(port) < 0) { return EXIT_FAILURE; } - - pidfile_refresh(); - - if (start_listener(port) < 0) - return EXIT_FAILURE; - - (void)server_loop(query_new, query_delete, policy_run, NULL); - - syslog(LOG_INFO, "Stopping..."); - return EXIT_SUCCESS; + return server_loop(query_starter, (delete_client_t)query_delete, + policy_run, NULL); }