minit.c
86badd32
 /*
c858e9b6
  * minit.c
dbdc4e5a
  * Copyright (C) 2008 KLab Inc.
86badd32
  */
 #include "makuosan.h"
 
e5b6322e
 static void usage()
 {
   printf("makuosan version %s\n\n", PACKAGE_VERSION);
   printf("(Multicasts All-Kinds of Updating Operation for Servers on Administered Network)\n");
   printf("usage: makuosan [OPTION]\n");
   printf("  -d num   # loglevel(0-9)\n");
   printf("  -u uid   # user\n");
   printf("  -g gid   # group\n");
   printf("  -G gid,..# groups\n");
   printf("  -b dir   # base dir\n");
   printf("  -p port  # port number       (default: 5000)\n");
   printf("  -m addr  # multicast address (default: 224.0.0.108)\n");
   printf("  -l addr  # listen address    (default: 127.0.0.1)\n");
   printf("  -U path  # unix domain socket\n");
   printf("  -k file  # key file (encrypt password)\n");
   printf("  -K file  # key file (console password)\n");
5cf3fe0f
   printf("  -f num   # parallel send count(default: 5) \n");
e5b6322e
   printf("  -c       # chroot to base dir\n");
   printf("  -n       # don't fork\n");
   printf("  -r       # don't recv\n");
   printf("  -s       # don't send\n");
   printf("  -o       # don't listen (console off mode)\n");
   printf("  -O       # owner match limitation mode\n");
   printf("  -h       # help\n\n"); 
   exit(0);
 }
 
 static void signal_handler(int n)
86badd32
 {
   switch(n){
     case SIGINT:
     case SIGTERM:
       loop_flag = 0;
       break;
     case SIGPIPE:
       break;
     case SIGUSR1:
       if(moption.loglevel<9){
         moption.loglevel++;
8f9aeac1
         lprintf(0,"%s: loglevel=%d\n", __func__, moption.loglevel);
86badd32
       }
       break;
     case SIGUSR2:
       if(moption.loglevel>0){
         moption.loglevel--;
8f9aeac1
         lprintf(0,"%s: loglevel=%d\n", __func__, moption.loglevel);
86badd32
       }
       break;
   }
 }
 
 static void minit_option_setdefault()
 {
   int i;
   memset(&moption, 0, sizeof(moption));
   moption.maddr.sin_family      = AF_INET;
   moption.maddr.sin_addr.s_addr = inet_addr(MAKUO_MCAST_ADDR);
   moption.maddr.sin_port        = htons(MAKUO_MCAST_PORT);
   moption.laddr.sin_family      = AF_INET;
292bc66c
   moption.laddr.sin_addr.s_addr = inet_addr(MAKUO_LOCAL_ADDR);
86badd32
   moption.laddr.sin_port        = htons(MAKUO_MCAST_PORT);
   moption.uaddr.sun_family      = AF_UNIX;
   moption.uaddr.sun_path[0]     = 0;
   moption.loglevel              = 0;
   moption.dontrecv              = 0;
   moption.dontsend              = 0;
   moption.dontfork              = 0;
   moption.cryptena              = 0;
   moption.comm_ena              = 1;
   moption.commpass              = 0;
634a23d7
   moption.ownmatch              = 0;
5cf3fe0f
   moption.parallel              = 5;
86badd32
   moption.chroot                = 0;
   moption.uid                   = geteuid();
   moption.gid                   = getegid();
e5b6322e
   moption.gids                  = NULL;
86badd32
   getcwd(moption.base_dir, PATH_MAX);
   for(i=0;i<MAX_COMM;i++){
     moption.comm[i].fd[0] = -1;
     moption.comm[i].fd[1] = -1;
   }
 }
 
 static void minit_option_getenv()
 {
   char *env;
   struct passwd *pw;
   struct group  *gr;
 
   if(env=getenv("MAKUOSAN_PORT")){
     moption.maddr.sin_port = htons(atoi(env));
     moption.laddr.sin_port = htons(atoi(env));
   }
   if(env=getenv("MAKUOSAN_USER")){
     if(*env >= '0' && *env <='9'){
       moption.uid = atoi(env);
     }else{
       if(pw = getpwnam(env)){
         moption.uid = pw->pw_uid;
         moption.gid = pw->pw_gid;
       }else{
8f9aeac1
         lprintf(0,"%s: getpwnam error %s\n", __func__, env);
86badd32
         exit(1);
       }
     }
   }
   if(env=getenv("MAKUOSAN_GROUP")){
     if(*env >= '0' && *env <='9'){
       moption.gid = atoi(env);
     }else{
       if(gr = getgrnam(env)){
         moption.gid = gr->gr_gid;
       }else{
8f9aeac1
         lprintf(0,"%s: getgrnam error %s\n", __func__, env);
86badd32
         exit(1);
       }
     }
   }
e5b6322e
   if(env=getenv("MAKUOSAN_GROUPS")){
     set_gids(env);
   }
86badd32
   if(env=getenv("MAKUOSAN_SOCK")){
     strcpy(moption.uaddr.sun_path, env);
   }
 }
 
 static void minit_signal()
 {
   struct sigaction sig;
   memset(&sig, 0, sizeof(sig));
   sig.sa_handler = signal_handler;
   if(sigaction(SIGINT,  &sig, NULL) == -1){
8f9aeac1
     lprintf(0, "%s: sigaction error SIGINT\n", __func__);
86badd32
     exit(1);
   }
   if(sigaction(SIGTERM, &sig, NULL) == -1){
8f9aeac1
     lprintf(0, "%s: sigaction error SIGTERM\n", __func__);
86badd32
     exit(1);
   }
   if(sigaction(SIGPIPE, &sig, NULL) == -1){
8f9aeac1
     lprintf(0, "%s: sigaction error SIGPIPE\n", __func__);
86badd32
     exit(1);
   }
   if(sigaction(SIGUSR1, &sig, NULL) == -1){
8f9aeac1
     lprintf(0, "%s: sigaction error SIGUSR1\n", __func__);
86badd32
     exit(1);
   }
   if(sigaction(SIGUSR2, &sig, NULL) == -1){
8f9aeac1
     lprintf(0, "%s: sigaction error SIGUSR2\n", __func__);
86badd32
     exit(1);
   }
 }
 
 static void minit_password(char *filename, int n)
 {
   int i;
   int f;
   char buff[64];
   MD5_CTX ctx;
 
   f = open(filename, O_RDONLY);
   if(f == -1){
8f9aeac1
     lprintf(0, "%s: file open error %s\n", __func__, optarg);
86badd32
     exit(1);
   }
   memset(buff, 0, sizeof(buff));
   i = read(f, buff, sizeof(buff) - 1);
   if(i == -1){
8f9aeac1
     lprintf(0, "%s: file read error %s\n", __func__, optarg);
86badd32
     exit(1);
   }
   if(i < 4){
8f9aeac1
     lprintf(0, "%s: password too short %s\n", __func__, optarg);
86badd32
     exit(1);
   }
   while(i--){
     if(buff[i] == '\r')
       buff[i] = 0;
     if(buff[i] == '\n')
       buff[i] = 0;
   }
   MD5_Init(&ctx);
   MD5_Update(&ctx, buff, strlen(buff));
43a6533f
   MD5_Final((unsigned char *)(moption.password[n]), &ctx);
86badd32
   if(read(f, buff, sizeof(buff))){
8f9aeac1
     lprintf(0, "%s: password too long %s\n", __func__, optarg);
86badd32
     exit(1);
   }
   close(f);
 }
 
 static void minit_getopt(int argc, char *argv[])
 {
   int r;
   struct passwd *pw;
   struct group  *gr;
 
e5b6322e
   while((r=getopt(argc, argv, "f:u:g:G:d:b:p:m:l:U:k:K:hnsroOc")) != -1){
86badd32
     switch(r){
       case 'h':
e5b6322e
         usage(); /* and exit */
86badd32
 
abce546a
       case 'f':
         moption.parallel = atoi(optarg);
         if(moption.parallel < 1){
           moption.parallel = 1;
         }
         if(moption.parallel >= MAKUO_PARALLEL_MAX){
           moption.parallel = MAKUO_PARALLEL_MAX - 1;
         }
         break;
 
86badd32
       case 'n':
         moption.dontfork = 1;
         break;
 
       case 's':
         moption.dontsend = 1;
         break;
 
       case 'r':
         moption.dontrecv = 1;
         break;
 
       case 'o':
         moption.comm_ena = 0;
         break;
 
       case 'c':
         moption.chroot = 1;
         break;
 
       case 'd':
         moption.loglevel = atoi(optarg);
         break;
 
       case 'u':
         if(*optarg >= '0' && *optarg <='9'){
           moption.uid = atoi(optarg);
         }else{
           if(pw = getpwnam(optarg)){
             moption.uid = pw->pw_uid;
             moption.gid = pw->pw_gid;
           }
         }
         break;
 
       case 'g':
         if(*optarg >= '0' && *optarg <='9'){
           moption.gid = atoi(optarg);
         }else{
          if(gr = getgrnam(optarg)){
             moption.gid = gr->gr_gid;
           }
         }
         break;
 
e5b6322e
       case 'G':
         if(set_gids(optarg) == -1){
           lprintf(0, "%s: set gids error\n", __func__);
           exit(1);
         }
         break;
 
86badd32
       case 'b':
         realpath(optarg, moption.base_dir);
         break;
 
       case 'm':
         moption.maddr.sin_addr.s_addr = inet_addr(optarg);
         break;
 
       case 'l':
         moption.laddr.sin_addr.s_addr = inet_addr(optarg);
         break;
 
       case 'U':
         strcpy(moption.uaddr.sun_path, optarg);
         break;
 
       case 'p':
         moption.laddr.sin_port = htons(atoi(optarg));
         moption.maddr.sin_port = htons(atoi(optarg));
         break;
 
       case 'K':
         moption.commpass = 1;
         minit_password(optarg, 0);
         break;
 
       case 'k':
         moption.cryptena = 1;
         minit_password(optarg, 1);
         break;
 
634a23d7
       case 'O':
         moption.ownmatch = 1;
         break;
 
86badd32
       case '?':
         exit(1);
     }
   }
   if(pw=getpwuid(moption.uid)){
     strcpy(moption.user_name, pw->pw_name);
   }
   if(gr=getgrgid(moption.gid)){
     strcpy(moption.group_name,gr->gr_name);
   }
 }
 
 static void minit_syslog()
 {
   openlog("makuosan", LOG_NDELAY, LOG_DAEMON);
 }
 
 static void minit_socket()
 {
   int  s;
   int  reuse =  1;
   char lpen  =  0;
   char mttl  =  1;
   struct ip_mreq mg;
   struct sockaddr_in addr;
   mg.imr_multiaddr.s_addr = moption.maddr.sin_addr.s_addr;
   mg.imr_interface.s_addr = INADDR_ANY;
   addr.sin_family         = AF_INET;
   addr.sin_port           = moption.maddr.sin_port; 
   addr.sin_addr.s_addr    = INADDR_ANY;
 
   s=socket(AF_INET, SOCK_DGRAM, 0);
   if(s == -1){
8f9aeac1
     lprintf(0, "%s: can't create multicast socket\n", __func__);
86badd32
     exit(1);
   }
810b92ac
   if(fcntl(s, F_SETFL , O_NONBLOCK)){
     lprintf(0, "%s: fcntl error\n", __func__);
     exit(1);
   }
86badd32
   if(bind(s, (struct sockaddr*)&addr, sizeof(addr)) == -1){
8f9aeac1
     lprintf(0, "%s: bind error\n", __func__);
86badd32
     exit(1);
   }
   if(setsockopt(s, IPPROTO_IP, IP_ADD_MEMBERSHIP, (void *)&mg, sizeof(mg)) == -1){
8f9aeac1
     lprintf(0, "%s: IP_ADD_MEMBERSHIP error\n", __func__);
86badd32
     exit(1);
   }
   if(setsockopt(s, IPPROTO_IP, IP_MULTICAST_IF,   (void *)&mg.imr_interface.s_addr, sizeof(mg.imr_interface.s_addr)) == -1){
8f9aeac1
     lprintf(0, "%s: IP_MULTICAST_IF error\n", __func__);
86badd32
     exit(1);
   }
   if(setsockopt(s, IPPROTO_IP, IP_MULTICAST_LOOP, (void *)&lpen, sizeof(lpen)) == -1){
8f9aeac1
     lprintf(0, "%s: IP_MULTICAST_LOOP error\n", __func__);
86badd32
     exit(1);
   }
   if(setsockopt(s, IPPROTO_IP, IP_MULTICAST_TTL,  (void *)&mttl, sizeof(mttl)) == -1){
8f9aeac1
     lprintf(0, "%s: IP_MULTICAST_TTL error\n", __func__);
86badd32
     exit(1);
   }
   moption.mcsocket = s;
 }
 
 static void minit_console()
 {
   int s;
   int reuse = 1;
 
   if(!moption.comm_ena){
     moption.lisocket = -1;
     return;
   }
 
   if(moption.uaddr.sun_path[0]){
     s=socket(AF_UNIX,SOCK_STREAM,0);
     if(!connect(s, (struct sockaddr*)&moption.uaddr, sizeof(moption.uaddr))){
8f9aeac1
       lprintf(0, "%s: can't create %s\n", __func__, moption.uaddr.sun_path);
86badd32
       exit(1);
     }
     close(s);
     unlink(moption.uaddr.sun_path);
     s=socket(AF_UNIX,SOCK_STREAM,0);
     if(s == -1){
8f9aeac1
       lprintf(0, "%s: can't create listen socket\n", __func__);
86badd32
       exit(1);
     }
     if(bind(s, (struct sockaddr*)&moption.uaddr, sizeof(moption.uaddr)) == -1){
8f9aeac1
       lprintf(0, "%s: bind error\n", __func__);
86badd32
       exit(1);
     }
     chmod(moption.uaddr.sun_path , S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP);
     chown(moption.uaddr.sun_path , moption.uid, moption.gid);
   }else{
     s=socket(AF_INET,SOCK_STREAM,0);
     if(s == -1){
8f9aeac1
       lprintf(0, "%s: can't create listen socket\n", __func__);
86badd32
       exit(1);
     }
     if(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (void *)&reuse, sizeof(reuse)) == -1){
8f9aeac1
       lprintf(0, "%s: SO_REUSEADDR error\n", __func__);
86badd32
       exit(1);
     }
     if(bind(s, (struct sockaddr*)&moption.laddr, sizeof(moption.laddr)) == -1){
8f9aeac1
       lprintf(0, "%s: bind error\n", __func__);
86badd32
       exit(1);
     }
   }
   if(listen(s,5) == -1){
8f9aeac1
     lprintf(0, "%s: listen error\n", __func__);
86badd32
     exit(1);
   }
   moption.lisocket = s;
 }
 
 static void minit_chdir()
 {
   if(chdir(moption.base_dir) == -1){
8f9aeac1
     lprintf(0, "%s: can't chdir %s\n", __func__,  moption.base_dir);
86badd32
     exit(1);
   }
   getcwd(moption.real_dir, PATH_MAX);
 }
 
 static void minit_chroot()
 {
b60b392c
   time_t ttime;
   struct tm *t;
8f9aeac1
   char tz[256];
86badd32
   if(moption.chroot){
b60b392c
     time(&ttime);
86badd32
     tzset();
b60b392c
     t = localtime(&ttime);
     sprintf(tz, "%s%+ld",   t->tm_zone, -(t->tm_gmtoff/3600));
8f9aeac1
     setenv("TZ", tz, 0);
86badd32
     if(chroot(moption.base_dir) == -1){
ace75127
       fprintf(stderr, "%s: can't chroot %s\n", __func__, moption.base_dir);
86badd32
       exit(0);
     }
   }
   getcwd(moption.base_dir, PATH_MAX);
 }
 
 static void minit_setguid()
 {
e5b6322e
   size_t num;
   if(set_guid(moption.uid, moption.gid, moption.gids) == -1){
     fprintf(stderr, "%s: can't setguid %d:%d", __func__, moption.uid, moption.gid);
     if(moption.gids){
       for(num=0;moption.gids[num];num++){
         fprintf(stderr, ",%d", moption.gids[num]);
       }
     }
     fprintf(stderr, "\n");
86badd32
     exit(0);
   }
 }
 
 static void minit_daemonize()
 {
   int pid;
   if(moption.dontfork)
     return;
 
   pid = fork();
   if(pid == -1){
ace75127
     fprintf(stderr, "%s: can't fork()\n", __func__);
86badd32
     exit(1); 
   }
   if(pid)
     _exit(0);
   setsid();
   pid=fork();
   if(pid == -1){
ace75127
     fprintf(stderr, "%s: can't fork()\n", __func__);
86badd32
     exit(1); 
   }
   if(pid)
     _exit(0);
 
   /*----- daemon process -----*/
   close(2);
   close(1);
   close(0);
   open("/dev/null",O_RDWR); /* new stdin  */
   dup(0);                   /* new stdout */
   dup(0);                   /* new stderr */
 }
 
 static void minit_bootlog()
 {
e5b6322e
   int i;
751c3d2a
   char gid[8];
   char gids[512];
86badd32
   char *yesno[2]={"No","Yes"};
751c3d2a
 
c510892b
   lprintf(0, "makuosan version %s\n", PACKAGE_VERSION);
dbdc4e5a
   lprintf(0, "loglevel  : %d\n", moption.loglevel);
e5b6322e
   if(moption.chroot){
     lprintf(0, "chroot    : %s\n", moption.real_dir);
   }else{
     lprintf(0, "base dir  : %s\n", moption.base_dir);
   }
dbdc4e5a
   lprintf(0, "multicast : %s\n", inet_ntoa(moption.maddr.sin_addr));
   lprintf(0, "port      : %d\n", ntohs(moption.maddr.sin_port));
   lprintf(0, "uid       : %d\n", geteuid());
751c3d2a
   sprintf(gids, "gid       : %d"  , getegid());
e5b6322e
   if(moption.gids){
     for(i=0;moption.gids[i];i++){
751c3d2a
       sprintf(gid, ",%d", moption.gids[i]);
       strcat(gids, gid);
e5b6322e
     }
   }
751c3d2a
   lprintf(0, "%s\n", gids);
dbdc4e5a
   lprintf(0, "parallel  : %d\n", moption.parallel);
   lprintf(0, "don't recv: %s\n", yesno[moption.dontrecv]);
   lprintf(0, "don't send: %s\n", yesno[moption.dontsend]);
   lprintf(0, "don't fork: %s\n", yesno[moption.dontfork]);
   lprintf(0, "encrypt   : %s\n", yesno[moption.cryptena]);
   lprintf(0, "console   : %s\n", yesno[moption.comm_ena]);
   lprintf(0, "passwoed  : %s\n", yesno[moption.commpass]);
   lprintf(0, "ownermatch: %s\n", yesno[moption.ownmatch]);
86badd32
   if(moption.comm_ena){
     if(moption.uaddr.sun_path[0]){
       lprintf(0,"listen    : %s\n", moption.uaddr.sun_path);
     }else{
       lprintf(0,"listen    : %s\n", inet_ntoa(moption.laddr.sin_addr));
     }
   }
 }
 
 /*
  *  まくお初期化関数
8120e18c
  *  mainから呼び出される
86badd32
  */
 void minit(int argc, char *argv[])
 {
ace75127
   if(argc == 1){
e5b6322e
     usage(); /* and exit */
   }
   minit_option_setdefault(); /* 各オプションのデフォルト値を設定   */
   minit_option_getenv();     /* 環境変数からオプションを読み込む   */
   minit_getopt(argc, argv);  /* コマンドラインオプションを読み込む */
   minit_syslog();            /* syslogの使用を開始                 */
   minit_socket();            /* マルチキャストソケットの初期化     */
   minit_console();           /* コンソールソケットの初期化         */
   minit_signal();            /* シグナルハンドラを設定             */
   minit_chdir();             /* カレントディレクトリを変更         */
   minit_chroot();            /*                                    */
   minit_setguid();           /*                                    */
   minit_bootlog();           /* ブートメッセージを出力する         */
   minit_daemonize();         /*                                    */
86badd32
 }
dbdc4e5a