X-Git-Url: http://git.madism.org/?a=blobdiff_plain;f=main-postlicyd.c;h=deb90b3614a2b570c881b656c6fb4668427f9c7c;hb=8edd7234e1c30a16d914292dc652046ee581fa5b;hp=1e1ce4d82d5a2b4a8c7ac69e525eed05c1005ad8;hpb=52534a99b8e1644411383e8406519add7984cee9;p=apps%2Fpfixtools.git diff --git a/main-postlicyd.c b/main-postlicyd.c index 1e1ce4d..deb90b3 100644 --- a/main-postlicyd.c +++ b/main-postlicyd.c @@ -31,6 +31,7 @@ /* * Copyright © 2006-2007 Pierre Habouzit + * Copyright © 2008 Florent Bruneau */ #include @@ -39,12 +40,15 @@ #include "common.h" #include "epoll.h" #include "tokens.h" +#include "server.h" #define DAEMON_NAME "postlicyd" #define DEFAULT_PORT 10000 #define RUNAS_USER "nobody" #define RUNAS_GROUP "nogroup" +DECLARE_MAIN + enum smtp_state { SMTP_UNKNOWN, SMTP_CONNECT, @@ -80,7 +84,7 @@ typedef struct query_t { const char *size; const char *ccert_subject; const char *ccert_issuer; - const char *ccsert_fingerprint; + const char *ccert_fingerprint; /* postfix 2.3+ */ const char *encryption_protocol; @@ -88,36 +92,29 @@ typedef struct query_t { const char *encryption_keysize; const char *etrn_domain; + /* postfix 2.5+ */ + const char *stress; + const char *eoq; } query_t; -typedef struct plicyd_t { - unsigned listener : 1; - int fd; - buffer_t ibuf; - buffer_t obuf; - query_t q; -} plicyd_t; - - -static plicyd_t *plicyd_new(void) +static query_t *query_new(void) { - plicyd_t *plicyd = p_new(plicyd_t, 1); - plicyd->fd = -1; - return plicyd; + return p_new(query_t, 1); } -static void plicyd_delete(plicyd_t **plicyd) +static void query_delete(query_t **query) { - if (*plicyd) { - if ((*plicyd)->fd >= 0) - close((*plicyd)->fd); - buffer_wipe(&(*plicyd)->ibuf); - buffer_wipe(&(*plicyd)->obuf); - p_delete(plicyd); + if (*query) { + p_delete(query); } } +static void *query_starter(server_t* server) +{ + return query_new(); +} + static int postfix_parsejob(query_t *query, char *p) { #define PARSE_CHECK(expr, error, ...) \ @@ -165,11 +162,12 @@ static int postfix_parsejob(query_t *query, char *p) CASE(SIZE, size); CASE(CCERT_SUBJECT, ccert_subject); CASE(CCERT_ISSUER, ccert_issuer); - CASE(CCSERT_FINGERPRINT, ccsert_fingerprint); + CASE(CCERT_FINGERPRINT, ccert_fingerprint); CASE(ENCRYPTION_PROTOCOL, encryption_protocol); CASE(ENCRYPTION_CIPHER, encryption_cipher); CASE(ENCRYPTION_KEYSIZE, encryption_keysize); CASE(ETRN_DOMAIN, etrn_domain); + CASE(STRESS, stress); #undef CASE case PTK_REQUEST: @@ -204,7 +202,7 @@ static int postfix_parsejob(query_t *query, char *p) default: syslog(LOG_WARNING, "unexpected key, skipped: %.*s", klen, k); - break; + continue; } } @@ -213,27 +211,39 @@ static int postfix_parsejob(query_t *query, char *p) } __attribute__((format(printf,2,0))) -static void policy_answer(plicyd_t *pcy, const char *fmt, ...) +static void policy_answer(server_t *pcy, const char *fmt, ...) { va_list args; + const query_t* query = pcy->data; + + buffer_addstr(&pcy->obuf, "action="); va_start(args, fmt); buffer_addvf(&pcy->obuf, fmt, args); va_end(args); buffer_addstr(&pcy->obuf, "\n\n"); - buffer_consume(&pcy->ibuf, pcy->q.eoq - pcy->ibuf.data); + buffer_consume(&pcy->ibuf, query->eoq - pcy->ibuf.data); epoll_modify(pcy->fd, EPOLLIN | EPOLLOUT, pcy); } -static void policy_process(plicyd_t *pcy) +static bool policy_run_filter(const query_t* query, void* filter, void* conf) { - policy_answer(pcy, "DUNNO"); + return false; } -static int policy_run(plicyd_t *pcy) +static void policy_process(server_t *pcy) +{ + const query_t* query = pcy->data; + if (!policy_run_filter(query, NULL, NULL)) { + policy_answer(pcy, "DUNNO"); + } +} + +static int policy_run(server_t *pcy, void* config) { ssize_t search_offs = MAX(0, pcy->ibuf.len - 1); int nb = buffer_read(&pcy->ibuf, pcy->fd, -1); const char *eoq; + query_t* query = pcy->data; if (nb < 0) { if (errno == EAGAIN || errno == EINTR) @@ -250,9 +260,9 @@ static int policy_run(plicyd_t *pcy) if (!(eoq = strstr(pcy->ibuf.data + search_offs, "\n\n"))) return 0; - if (postfix_parsejob(&pcy->q, pcy->ibuf.data) < 0) + if (postfix_parsejob(pcy->data, pcy->ibuf.data) < 0) return -1; - pcy->q.eoq = eoq + strlen("\n\n"); + query->eoq = eoq + strlen("\n\n"); epoll_modify(pcy->fd, 0, pcy); policy_process(pcy); return 0; @@ -260,64 +270,11 @@ static int policy_run(plicyd_t *pcy) int start_listener(int port) { - struct sockaddr_in addr = { - .sin_family = AF_INET, - .sin_addr = { htonl(INADDR_LOOPBACK) }, - }; - plicyd_t *tmp; - int sock; - - addr.sin_port = htons(port); - sock = tcp_listen_nonblock((const struct sockaddr *)&addr, sizeof(addr)); - if (sock < 0) { - return -1; - } - - tmp = plicyd_new(); - tmp->fd = sock; - tmp->listener = true; - epoll_register(sock, EPOLLIN, tmp); - return 0; -} - -void start_client(plicyd_t *d) -{ - plicyd_t *tmp; - int sock; - - sock = accept_nonblock(d->fd); - if (sock < 0) { - UNIXERR("accept"); - return; - } - - tmp = plicyd_new(); - tmp->fd = sock; - epoll_register(sock, EPOLLIN, tmp); + return start_server(port, NULL, NULL); } /* administrivia {{{ */ -static int main_initialize(void) -{ - openlog("postlicyd", LOG_PID, LOG_MAIL); - signal(SIGPIPE, SIG_IGN); - signal(SIGINT, &common_sighandler); - signal(SIGTERM, &common_sighandler); - signal(SIGHUP, &common_sighandler); - signal(SIGSEGV, &common_sighandler); - syslog(LOG_INFO, "Starting..."); - return 0; -} - -static void main_shutdown(void) -{ - closelog(); -} - -module_init(main_initialize); -module_exit(main_shutdown); - void usage(void) { fputs("usage: "DAEMON_NAME" [options] config\n" @@ -333,6 +290,7 @@ void usage(void) int main(int argc, char *argv[]) { + bool unsafe = false; const char *pidfile = NULL; bool daemonize = true; int port = DEFAULT_PORT; @@ -342,6 +300,9 @@ int main(int argc, char *argv[]) case 'p': pidfile = optarg; break; + case 'u': + unsafe = true; + break; case 'l': port = atoi(optarg); break; @@ -359,66 +320,11 @@ int main(int argc, char *argv[]) return EXIT_FAILURE; } - if (pidfile_open(pidfile) < 0) { - syslog(LOG_CRIT, "unable to write pidfile %s", pidfile); - return EXIT_FAILURE; - } - - if (drop_privileges(RUNAS_USER, RUNAS_GROUP) < 0) { - syslog(LOG_CRIT, "unable to drop privileges"); - return EXIT_FAILURE; - } - - if (daemonize && daemon_detach() < 0) { - syslog(LOG_CRIT, "unable to fork"); - return EXIT_FAILURE; - } - - pidfile_refresh(); - - if (start_listener(port) < 0) + if (common_setup(pidfile, false, RUNAS_USER, RUNAS_GROUP, + daemonize) != EXIT_SUCCESS + || start_listener(port) < 0) { return EXIT_FAILURE; - - while (!sigint) { - struct epoll_event evts[1024]; - int n; - - n = epoll_select(evts, countof(evts), -1); - if (n < 0) { - if (errno != EAGAIN && errno != EINTR) { - UNIXERR("epoll_wait"); - return EXIT_FAILURE; - } - continue; - } - - while (--n >= 0) { - plicyd_t *d = evts[n].data.ptr; - - if (d->listener) { - start_client(d); - continue; - } - - if (evts[n].events & EPOLLIN) { - if (policy_run(d) < 0) { - plicyd_delete(&d); - continue; - } - } - - if ((evts[n].events & EPOLLOUT) && d->obuf.len) { - if (buffer_write(&d->obuf, d->fd) < 0) { - plicyd_delete(&d); - continue; - } - if (!d->obuf.len) { - epoll_modify(d->fd, EPOLLIN, d); - } - } - } } - - syslog(LOG_INFO, "Stopping..."); - return EXIT_SUCCESS; + return server_loop(query_starter, (delete_client_t)query_delete, + policy_run, NULL); }