86badd32 |
/* |
c858e9b6 |
* minit.c |
dbdc4e5a |
* Copyright (C) 2008 KLab Inc. |
86badd32 |
*/
#include "makuosan.h"
|
e5b6322e |
static void usage()
{
printf("makuosan version %s\n\n", PACKAGE_VERSION);
printf("(Multicasts All-Kinds of Updating Operation for Servers on Administered Network)\n");
printf("usage: makuosan [OPTION]\n");
printf(" -d num # loglevel(0-9)\n");
printf(" -u uid # user\n");
printf(" -g gid # group\n");
printf(" -G gid,..# groups\n");
printf(" -b dir # base dir\n");
printf(" -p port # port number (default: 5000)\n");
printf(" -m addr # multicast address (default: 224.0.0.108)\n");
printf(" -l addr # listen address (default: 127.0.0.1)\n");
printf(" -U path # unix domain socket\n");
printf(" -k file # key file (encrypt password)\n");
printf(" -K file # key file (console password)\n"); |
5cf3fe0f |
printf(" -f num # parallel send count(default: 5) \n"); |
e5b6322e |
printf(" -c # chroot to base dir\n");
printf(" -n # don't fork\n");
printf(" -r # don't recv\n");
printf(" -s # don't send\n");
printf(" -o # don't listen (console off mode)\n");
printf(" -O # owner match limitation mode\n");
printf(" -h # help\n\n");
exit(0);
}
static void signal_handler(int n) |
86badd32 |
{
switch(n){
case SIGINT:
case SIGTERM:
loop_flag = 0;
break;
case SIGPIPE:
break;
case SIGUSR1:
if(moption.loglevel<9){
moption.loglevel++; |
8f9aeac1 |
lprintf(0,"%s: loglevel=%d\n", __func__, moption.loglevel); |
86badd32 |
}
break;
case SIGUSR2:
if(moption.loglevel>0){
moption.loglevel--; |
8f9aeac1 |
lprintf(0,"%s: loglevel=%d\n", __func__, moption.loglevel); |
86badd32 |
}
break;
}
}
static void minit_option_setdefault()
{
int i;
memset(&moption, 0, sizeof(moption));
moption.maddr.sin_family = AF_INET;
moption.maddr.sin_addr.s_addr = inet_addr(MAKUO_MCAST_ADDR);
moption.maddr.sin_port = htons(MAKUO_MCAST_PORT);
moption.laddr.sin_family = AF_INET; |
292bc66c |
moption.laddr.sin_addr.s_addr = inet_addr(MAKUO_LOCAL_ADDR); |
86badd32 |
moption.laddr.sin_port = htons(MAKUO_MCAST_PORT);
moption.uaddr.sun_family = AF_UNIX;
moption.uaddr.sun_path[0] = 0;
moption.loglevel = 0;
moption.dontrecv = 0;
moption.dontsend = 0;
moption.dontfork = 0;
moption.cryptena = 0;
moption.comm_ena = 1;
moption.commpass = 0; |
634a23d7 |
moption.ownmatch = 0; |
5cf3fe0f |
moption.parallel = 5; |
86badd32 |
moption.chroot = 0;
moption.uid = geteuid();
moption.gid = getegid(); |
e5b6322e |
moption.gids = NULL; |
86badd32 |
getcwd(moption.base_dir, PATH_MAX);
for(i=0;i<MAX_COMM;i++){
moption.comm[i].fd[0] = -1;
moption.comm[i].fd[1] = -1;
}
}
static void minit_option_getenv()
{
char *env;
struct passwd *pw;
struct group *gr;
if(env=getenv("MAKUOSAN_PORT")){
moption.maddr.sin_port = htons(atoi(env));
moption.laddr.sin_port = htons(atoi(env));
}
if(env=getenv("MAKUOSAN_USER")){
if(*env >= '0' && *env <='9'){
moption.uid = atoi(env);
}else{
if(pw = getpwnam(env)){
moption.uid = pw->pw_uid;
moption.gid = pw->pw_gid;
}else{ |
8f9aeac1 |
lprintf(0,"%s: getpwnam error %s\n", __func__, env); |
86badd32 |
exit(1);
}
}
}
if(env=getenv("MAKUOSAN_GROUP")){
if(*env >= '0' && *env <='9'){
moption.gid = atoi(env);
}else{
if(gr = getgrnam(env)){
moption.gid = gr->gr_gid;
}else{ |
8f9aeac1 |
lprintf(0,"%s: getgrnam error %s\n", __func__, env); |
86badd32 |
exit(1);
}
}
} |
e5b6322e |
if(env=getenv("MAKUOSAN_GROUPS")){
set_gids(env);
} |
86badd32 |
if(env=getenv("MAKUOSAN_SOCK")){
strcpy(moption.uaddr.sun_path, env);
}
}
static void minit_signal()
{
struct sigaction sig;
memset(&sig, 0, sizeof(sig));
sig.sa_handler = signal_handler;
if(sigaction(SIGINT, &sig, NULL) == -1){ |
8f9aeac1 |
lprintf(0, "%s: sigaction error SIGINT\n", __func__); |
86badd32 |
exit(1);
}
if(sigaction(SIGTERM, &sig, NULL) == -1){ |
8f9aeac1 |
lprintf(0, "%s: sigaction error SIGTERM\n", __func__); |
86badd32 |
exit(1);
}
if(sigaction(SIGPIPE, &sig, NULL) == -1){ |
8f9aeac1 |
lprintf(0, "%s: sigaction error SIGPIPE\n", __func__); |
86badd32 |
exit(1);
}
if(sigaction(SIGUSR1, &sig, NULL) == -1){ |
8f9aeac1 |
lprintf(0, "%s: sigaction error SIGUSR1\n", __func__); |
86badd32 |
exit(1);
}
if(sigaction(SIGUSR2, &sig, NULL) == -1){ |
8f9aeac1 |
lprintf(0, "%s: sigaction error SIGUSR2\n", __func__); |
86badd32 |
exit(1);
}
}
static void minit_password(char *filename, int n)
{
int i;
int f;
char buff[64];
MD5_CTX ctx;
f = open(filename, O_RDONLY);
if(f == -1){ |
8f9aeac1 |
lprintf(0, "%s: file open error %s\n", __func__, optarg); |
86badd32 |
exit(1);
}
memset(buff, 0, sizeof(buff));
i = read(f, buff, sizeof(buff) - 1);
if(i == -1){ |
8f9aeac1 |
lprintf(0, "%s: file read error %s\n", __func__, optarg); |
86badd32 |
exit(1);
}
if(i < 4){ |
8f9aeac1 |
lprintf(0, "%s: password too short %s\n", __func__, optarg); |
86badd32 |
exit(1);
}
while(i--){
if(buff[i] == '\r')
buff[i] = 0;
if(buff[i] == '\n')
buff[i] = 0;
}
MD5_Init(&ctx);
MD5_Update(&ctx, buff, strlen(buff)); |
43a6533f |
MD5_Final((unsigned char *)(moption.password[n]), &ctx); |
86badd32 |
if(read(f, buff, sizeof(buff))){ |
8f9aeac1 |
lprintf(0, "%s: password too long %s\n", __func__, optarg); |
86badd32 |
exit(1);
}
close(f);
}
static void minit_getopt(int argc, char *argv[])
{
int r;
struct passwd *pw;
struct group *gr;
|
e5b6322e |
while((r=getopt(argc, argv, "f:u:g:G:d:b:p:m:l:U:k:K:hnsroOc")) != -1){ |
86badd32 |
switch(r){
case 'h': |
e5b6322e |
usage(); /* and exit */ |
86badd32 |
|
abce546a |
case 'f':
moption.parallel = atoi(optarg);
if(moption.parallel < 1){
moption.parallel = 1;
}
if(moption.parallel >= MAKUO_PARALLEL_MAX){
moption.parallel = MAKUO_PARALLEL_MAX - 1;
}
break;
|
86badd32 |
case 'n':
moption.dontfork = 1;
break;
case 's':
moption.dontsend = 1;
break;
case 'r':
moption.dontrecv = 1;
break;
case 'o':
moption.comm_ena = 0;
break;
case 'c':
moption.chroot = 1;
break;
case 'd':
moption.loglevel = atoi(optarg);
break;
case 'u':
if(*optarg >= '0' && *optarg <='9'){
moption.uid = atoi(optarg);
}else{
if(pw = getpwnam(optarg)){
moption.uid = pw->pw_uid;
moption.gid = pw->pw_gid;
}
}
break;
case 'g':
if(*optarg >= '0' && *optarg <='9'){
moption.gid = atoi(optarg);
}else{
if(gr = getgrnam(optarg)){
moption.gid = gr->gr_gid;
}
}
break;
|
e5b6322e |
case 'G':
if(set_gids(optarg) == -1){
lprintf(0, "%s: set gids error\n", __func__);
exit(1);
}
break;
|
86badd32 |
case 'b':
realpath(optarg, moption.base_dir);
break;
case 'm':
moption.maddr.sin_addr.s_addr = inet_addr(optarg);
break;
case 'l':
moption.laddr.sin_addr.s_addr = inet_addr(optarg);
break;
case 'U':
strcpy(moption.uaddr.sun_path, optarg);
break;
case 'p':
moption.laddr.sin_port = htons(atoi(optarg));
moption.maddr.sin_port = htons(atoi(optarg));
break;
case 'K':
moption.commpass = 1;
minit_password(optarg, 0);
break;
case 'k':
moption.cryptena = 1;
minit_password(optarg, 1);
break;
|
634a23d7 |
case 'O':
moption.ownmatch = 1;
break;
|
86badd32 |
case '?':
exit(1);
}
}
if(pw=getpwuid(moption.uid)){
strcpy(moption.user_name, pw->pw_name);
}
if(gr=getgrgid(moption.gid)){
strcpy(moption.group_name,gr->gr_name);
}
}
static void minit_syslog()
{
openlog("makuosan", LOG_NDELAY, LOG_DAEMON);
}
static void minit_socket()
{
int s;
int reuse = 1;
char lpen = 0;
char mttl = 1;
struct ip_mreq mg;
struct sockaddr_in addr;
mg.imr_multiaddr.s_addr = moption.maddr.sin_addr.s_addr;
mg.imr_interface.s_addr = INADDR_ANY;
addr.sin_family = AF_INET;
addr.sin_port = moption.maddr.sin_port;
addr.sin_addr.s_addr = INADDR_ANY;
s=socket(AF_INET, SOCK_DGRAM, 0);
if(s == -1){ |
8f9aeac1 |
lprintf(0, "%s: can't create multicast socket\n", __func__); |
86badd32 |
exit(1);
} |
810b92ac |
if(fcntl(s, F_SETFL , O_NONBLOCK)){
lprintf(0, "%s: fcntl error\n", __func__);
exit(1);
} |
86badd32 |
if(bind(s, (struct sockaddr*)&addr, sizeof(addr)) == -1){ |
8f9aeac1 |
lprintf(0, "%s: bind error\n", __func__); |
86badd32 |
exit(1);
}
if(setsockopt(s, IPPROTO_IP, IP_ADD_MEMBERSHIP, (void *)&mg, sizeof(mg)) == -1){ |
8f9aeac1 |
lprintf(0, "%s: IP_ADD_MEMBERSHIP error\n", __func__); |
86badd32 |
exit(1);
}
if(setsockopt(s, IPPROTO_IP, IP_MULTICAST_IF, (void *)&mg.imr_interface.s_addr, sizeof(mg.imr_interface.s_addr)) == -1){ |
8f9aeac1 |
lprintf(0, "%s: IP_MULTICAST_IF error\n", __func__); |
86badd32 |
exit(1);
}
if(setsockopt(s, IPPROTO_IP, IP_MULTICAST_LOOP, (void *)&lpen, sizeof(lpen)) == -1){ |
8f9aeac1 |
lprintf(0, "%s: IP_MULTICAST_LOOP error\n", __func__); |
86badd32 |
exit(1);
}
if(setsockopt(s, IPPROTO_IP, IP_MULTICAST_TTL, (void *)&mttl, sizeof(mttl)) == -1){ |
8f9aeac1 |
lprintf(0, "%s: IP_MULTICAST_TTL error\n", __func__); |
86badd32 |
exit(1);
}
moption.mcsocket = s;
}
static void minit_console()
{
int s;
int reuse = 1;
if(!moption.comm_ena){
moption.lisocket = -1;
return;
}
if(moption.uaddr.sun_path[0]){
s=socket(AF_UNIX,SOCK_STREAM,0);
if(!connect(s, (struct sockaddr*)&moption.uaddr, sizeof(moption.uaddr))){ |
8f9aeac1 |
lprintf(0, "%s: can't create %s\n", __func__, moption.uaddr.sun_path); |
86badd32 |
exit(1);
}
close(s);
unlink(moption.uaddr.sun_path);
s=socket(AF_UNIX,SOCK_STREAM,0);
if(s == -1){ |
8f9aeac1 |
lprintf(0, "%s: can't create listen socket\n", __func__); |
86badd32 |
exit(1);
}
if(bind(s, (struct sockaddr*)&moption.uaddr, sizeof(moption.uaddr)) == -1){ |
8f9aeac1 |
lprintf(0, "%s: bind error\n", __func__); |
86badd32 |
exit(1);
}
chmod(moption.uaddr.sun_path , S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP);
chown(moption.uaddr.sun_path , moption.uid, moption.gid);
}else{
s=socket(AF_INET,SOCK_STREAM,0);
if(s == -1){ |
8f9aeac1 |
lprintf(0, "%s: can't create listen socket\n", __func__); |
86badd32 |
exit(1);
}
if(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (void *)&reuse, sizeof(reuse)) == -1){ |
8f9aeac1 |
lprintf(0, "%s: SO_REUSEADDR error\n", __func__); |
86badd32 |
exit(1);
}
if(bind(s, (struct sockaddr*)&moption.laddr, sizeof(moption.laddr)) == -1){ |
8f9aeac1 |
lprintf(0, "%s: bind error\n", __func__); |
86badd32 |
exit(1);
}
}
if(listen(s,5) == -1){ |
8f9aeac1 |
lprintf(0, "%s: listen error\n", __func__); |
86badd32 |
exit(1);
}
moption.lisocket = s;
}
static void minit_chdir()
{
if(chdir(moption.base_dir) == -1){ |
8f9aeac1 |
lprintf(0, "%s: can't chdir %s\n", __func__, moption.base_dir); |
86badd32 |
exit(1);
}
getcwd(moption.real_dir, PATH_MAX);
}
static void minit_chroot()
{ |
b60b392c |
time_t ttime;
struct tm *t; |
8f9aeac1 |
char tz[256]; |
86badd32 |
if(moption.chroot){ |
b60b392c |
time(&ttime); |
86badd32 |
tzset(); |
b60b392c |
t = localtime(&ttime);
sprintf(tz, "%s%+ld", t->tm_zone, -(t->tm_gmtoff/3600)); |
8f9aeac1 |
setenv("TZ", tz, 0); |
86badd32 |
if(chroot(moption.base_dir) == -1){ |
ace75127 |
fprintf(stderr, "%s: can't chroot %s\n", __func__, moption.base_dir); |
86badd32 |
exit(0);
}
}
getcwd(moption.base_dir, PATH_MAX);
}
static void minit_setguid()
{ |
e5b6322e |
size_t num;
if(set_guid(moption.uid, moption.gid, moption.gids) == -1){
fprintf(stderr, "%s: can't setguid %d:%d", __func__, moption.uid, moption.gid);
if(moption.gids){
for(num=0;moption.gids[num];num++){
fprintf(stderr, ",%d", moption.gids[num]);
}
}
fprintf(stderr, "\n"); |
86badd32 |
exit(0);
}
}
static void minit_daemonize()
{
int pid;
if(moption.dontfork)
return;
pid = fork();
if(pid == -1){ |
ace75127 |
fprintf(stderr, "%s: can't fork()\n", __func__); |
86badd32 |
exit(1);
}
if(pid)
_exit(0);
setsid();
pid=fork();
if(pid == -1){ |
ace75127 |
fprintf(stderr, "%s: can't fork()\n", __func__); |
86badd32 |
exit(1);
}
if(pid)
_exit(0);
/*----- daemon process -----*/
close(2);
close(1);
close(0);
open("/dev/null",O_RDWR); /* new stdin */
dup(0); /* new stdout */
dup(0); /* new stderr */
}
static void minit_bootlog()
{ |
e5b6322e |
int i; |
751c3d2a |
char gid[8];
char gids[512]; |
86badd32 |
char *yesno[2]={"No","Yes"}; |
751c3d2a |
|
c510892b |
lprintf(0, "makuosan version %s\n", PACKAGE_VERSION); |
dbdc4e5a |
lprintf(0, "loglevel : %d\n", moption.loglevel); |
e5b6322e |
if(moption.chroot){
lprintf(0, "chroot : %s\n", moption.real_dir);
}else{
lprintf(0, "base dir : %s\n", moption.base_dir);
} |
dbdc4e5a |
lprintf(0, "multicast : %s\n", inet_ntoa(moption.maddr.sin_addr));
lprintf(0, "port : %d\n", ntohs(moption.maddr.sin_port));
lprintf(0, "uid : %d\n", geteuid()); |
751c3d2a |
sprintf(gids, "gid : %d" , getegid()); |
e5b6322e |
if(moption.gids){
for(i=0;moption.gids[i];i++){ |
751c3d2a |
sprintf(gid, ",%d", moption.gids[i]);
strcat(gids, gid); |
e5b6322e |
}
} |
751c3d2a |
lprintf(0, "%s\n", gids); |
dbdc4e5a |
lprintf(0, "parallel : %d\n", moption.parallel);
lprintf(0, "don't recv: %s\n", yesno[moption.dontrecv]);
lprintf(0, "don't send: %s\n", yesno[moption.dontsend]);
lprintf(0, "don't fork: %s\n", yesno[moption.dontfork]);
lprintf(0, "encrypt : %s\n", yesno[moption.cryptena]);
lprintf(0, "console : %s\n", yesno[moption.comm_ena]);
lprintf(0, "passwoed : %s\n", yesno[moption.commpass]);
lprintf(0, "ownermatch: %s\n", yesno[moption.ownmatch]); |
86badd32 |
if(moption.comm_ena){
if(moption.uaddr.sun_path[0]){
lprintf(0,"listen : %s\n", moption.uaddr.sun_path);
}else{
lprintf(0,"listen : %s\n", inet_ntoa(moption.laddr.sin_addr));
}
}
}
/*
* まくお初期化関数 |
8120e18c |
* mainから呼び出される |
86badd32 |
*/
void minit(int argc, char *argv[])
{ |
ace75127 |
if(argc == 1){ |
e5b6322e |
usage(); /* and exit */
}
minit_option_setdefault(); /* 各オプションのデフォルト値を設定 */
minit_option_getenv(); /* 環境変数からオプションを読み込む */
minit_getopt(argc, argv); /* コマンドラインオプションを読み込む */
minit_syslog(); /* syslogの使用を開始 */
minit_socket(); /* マルチキャストソケットの初期化 */
minit_console(); /* コンソールソケットの初期化 */
minit_signal(); /* シグナルハンドラを設定 */
minit_chdir(); /* カレントディレクトリを変更 */
minit_chroot(); /* */
minit_setguid(); /* */
minit_bootlog(); /* ブートメッセージを出力する */
minit_daemonize(); /* */ |
86badd32 |
} |
dbdc4e5a |
|