Page Menu
Home
Phorge
Search
Configure Global Search
Log In
Files
F117885364
fud.c
No One
Temporary
Actions
Download File
Edit File
Delete File
View Transforms
Subscribe
Flag For Later
Award Token
Authored By
Unknown
Size
13 KB
Referenced Files
None
Subscribers
None
fud.c
View Options
/* fud.c -- long-lived finger information provider
*
* Copyright (c) 1994-2008 Carnegie Mellon University. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. The name "Carnegie Mellon University" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For permission or any legal
* details, please contact
* Carnegie Mellon University
* Center for Technology Transfer and Enterprise Creation
* 4615 Forbes Avenue
* Suite 302
* Pittsburgh, PA 15213
* (412) 268-7393, fax: (412) 268-7395
* innovation@andrew.cmu.edu
*
* 4. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by Computing Services
* at Carnegie Mellon University (http://www.cmu.edu/computing/)."
*
* CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
* THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
* AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
* FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
* AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
* OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include
<config.h>
#ifdef HAVE_UNISTD_H
#include
<unistd.h>
#endif
#include
<stdlib.h>
#include
<stdio.h>
#include
<string.h>
#include
<syslog.h>
#include
<signal.h>
#include
<sys/types.h>
#include
<sys/param.h>
#include
<sys/stat.h>
#include
<netinet/in.h>
#include
<sys/socket.h>
#include
<arpa/inet.h>
#include
<netdb.h>
#include
<errno.h>
#include
<pwd.h>
#include
"acl.h"
#include
"mboxlist.h"
#include
"global.h"
#include
"exitcodes.h"
#include
"mailbox.h"
#include
"map.h"
#include
"mboxname.h"
#include
"proc.h"
#include
"seen.h"
#include
"xmalloc.h"
/* generated headers are not necessarily in current directory */
#include
"imap/imap_err.h"
#define REQ_OK 0
#define REQ_DENY 1
#define REQ_UNK 2
extern
int
optind
;
/* current namespace */
static
struct
namespace
fud_namespace
;
/* config.c info. note that technically we may need partition data, but
* only if we're not on a frontend, so we won't flat-out require it here */
const
int
config_need_data
=
0
;
static
int
handle_request
(
const
char
*
who
,
const
char
*
name
,
struct
sockaddr
*
sfrom
,
socklen_t
sfromsiz
);
static
void
send_reply
(
struct
sockaddr
*
sfrom
,
socklen_t
sfromsiz
,
int
status
,
const
char
*
user
,
const
char
*
mbox
,
int
numrecent
,
time_t
lastread
,
time_t
lastarrived
);
static
int
soc
=
0
;
/* inetd (master) has handed us the port as stdin */
#define MAXLOGNAME 16
/* should find out for real */
#define MAXDOMNAME 20
/* should find out for real */
static
int
begin_handling
(
void
)
{
struct
sockaddr_storage
sfrom_storage
;
struct
sockaddr
*
sfrom
=
(
struct
sockaddr
*
)
&
sfrom_storage
;
socklen_t
sfromsiz
;
char
buf
[
MAXLOGNAME
+
MAXDOMNAME
+
MAX_MAILBOX_BUFFER
];
char
*
mbox
;
int
r
;
while
(
1
)
{
if
(
signals_poll
()
==
SIGHUP
)
{
/* caught a SIGHUP, return */
return
0
;
}
memset
(
buf
,
0
,
sizeof
(
buf
));
sfromsiz
=
sizeof
(
struct
sockaddr_storage
);
r
=
recvfrom
(
soc
,
buf
,
511
,
0
,
sfrom
,
&
sfromsiz
);
if
(
r
<
0
)
return
errno
;
mbox
=
strchr
(
buf
,
'|'
);
if
(
mbox
)
{
*
mbox
++
=
0
;
}
else
{
continue
;
}
handle_request
(
buf
,
mbox
,
sfrom
,
sfromsiz
);
}
/* never reached */
}
void
shut_down
(
int
code
)
__attribute__
((
noreturn
));
void
shut_down
(
int
code
)
{
in_shutdown
=
1
;
seen_done
();
mboxlist_close
();
mboxlist_done
();
closelog
();
cyrus_done
();
exit
(
code
);
}
/*
* run once when process is forked;
* MUST NOT exit directly; must return with non-zero error code
*/
int
service_init
(
int
argc
,
char
**
argv
,
char
**
envp
)
{
if
(
geteuid
()
==
0
)
fatal
(
"must run as the Cyrus user"
,
EC_USAGE
);
setproctitle_init
(
argc
,
argv
,
envp
);
signals_set_shutdown
(
&
shut_down
);
mboxlist_init
(
0
);
mboxlist_open
(
NULL
);
return
0
;
}
/* Called by service API to shut down the service */
void
service_abort
(
int
error
)
{
shut_down
(
error
);
}
int
service_main
(
int
argc
__attribute__
((
unused
)),
char
**
argv
__attribute__
((
unused
)),
char
**
envp
__attribute__
((
unused
)))
{
int
r
=
0
;
/* Set namespace */
if
((
r
=
mboxname_init_namespace
(
&
fud_namespace
,
1
))
!=
0
)
{
syslog
(
LOG_ERR
,
"%s"
,
error_message
(
r
));
fatal
(
error_message
(
r
),
EC_CONFIG
);
}
r
=
begin_handling
();
shut_down
(
r
);
return
0
;
}
static
void
cyrus_timeout
(
int
signo
__attribute__
((
unused
)))
{
return
;
}
static
int
setsigalrm
(
int
enable
)
{
struct
sigaction
action
;
sigemptyset
(
&
action
.
sa_mask
);
action
.
sa_flags
=
0
;
if
(
enable
)
{
action
.
sa_handler
=
cyrus_timeout
;
}
else
{
action
.
sa_handler
=
SIG_IGN
;
}
if
(
sigaction
(
SIGALRM
,
&
action
,
NULL
)
<
0
)
{
syslog
(
LOG_ERR
,
"installing SIGALRM handler: sigaction: %m"
);
return
-1
;
}
return
0
;
}
/* Send a proxy request to the backend, send their reply to sfrom */
static
int
do_proxy_request
(
const
char
*
who
,
const
char
*
name
,
const
char
*
backend_host
,
struct
sockaddr
*
sfrom
,
socklen_t
sfromsiz
)
{
char
tmpbuf
[
1024
];
int
replysize
;
int
r
=
0
;
int
csoc
=
-1
;
int
error
=
0
;
socklen_t
cinsiz
,
coutsiz
;
struct
sockaddr_storage
cin_storage
,
cout_storage
;
struct
sockaddr
*
cin
=
(
struct
sockaddr
*
)
&
cin_storage
;
struct
sockaddr
*
cout
=
(
struct
sockaddr
*
)
&
cout_storage
;
static
const
char
*
backend_port
=
NULL
;
/* fud port */
struct
addrinfo
hints
;
struct
addrinfo
*
res
,
*
res0
;
/* Open a UDP socket to the Cyrus mail server */
memset
(
&
hints
,
0
,
sizeof
(
hints
));
hints
.
ai_family
=
PF_UNSPEC
;
hints
.
ai_socktype
=
SOCK_DGRAM
;
if
(
backend_port
)
{
error
=
getaddrinfo
(
backend_host
,
backend_port
,
&
hints
,
&
res0
);
}
else
{
backend_port
=
"fud"
;
error
=
getaddrinfo
(
backend_host
,
backend_port
,
&
hints
,
&
res0
);
if
(
error
==
EAI_SERVICE
)
{
backend_port
=
"4201"
;
/* default fud port */
error
=
getaddrinfo
(
backend_host
,
backend_port
,
&
hints
,
&
res0
);
}
}
if
(
error
)
{
send_reply
(
sfrom
,
sfromsiz
,
REQ_UNK
,
who
,
name
,
0
,
0
,
0
);
r
=
IMAP_SERVER_UNAVAILABLE
;
goto
done
;
}
/*
* XXX: Since UDP is used, we cannot use an IPv6->IPv4 fallback
* strategy, here. So, when we can use same address family with
* incoming packet, just try it. When same address family is not
* found in DNS, we try another one.
*/
csoc
=
-1
;
for
(
res
=
res0
;
res
;
res
=
res
->
ai_next
)
{
if
(
res
->
ai_family
==
sfrom
->
sa_family
)
{
csoc
=
socket
(
res
->
ai_family
,
res
->
ai_socktype
,
res
->
ai_protocol
);
break
;
}
}
if
(
csoc
<
0
)
{
for
(
res
=
res0
;
res
;
res
=
res
->
ai_next
)
{
if
(
res
->
ai_family
!=
sfrom
->
sa_family
&&
(
res
->
ai_family
==
AF_INET
||
res
->
ai_family
==
AF_INET6
))
{
csoc
=
socket
(
res
->
ai_family
,
res
->
ai_socktype
,
res
->
ai_protocol
);
break
;
}
}
}
if
(
csoc
<
0
)
{
send_reply
(
sfrom
,
sfromsiz
,
REQ_UNK
,
who
,
name
,
0
,
0
,
0
);
r
=
IMAP_SERVER_UNAVAILABLE
;
freeaddrinfo
(
res0
);
goto
done
;
}
cinsiz
=
res
->
ai_addrlen
;
memcpy
(
cin
,
res
->
ai_addr
,
cinsiz
);
freeaddrinfo
(
res0
);
/* Write a Cyrus query into *tmpbuf */
memset
(
tmpbuf
,
'\0'
,
sizeof
(
tmpbuf
));
snprintf
(
tmpbuf
,
sizeof
(
tmpbuf
),
"%s|%s"
,
who
,
name
);
/* Send the query and wait for a reply */
sendto
(
csoc
,
tmpbuf
,
strlen
(
tmpbuf
),
0
,
cin
,
cinsiz
);
if
(
setsigalrm
(
1
)
<
0
)
{
r
=
IMAP_SERVER_UNAVAILABLE
;
send_reply
(
sfrom
,
sfromsiz
,
REQ_UNK
,
who
,
name
,
0
,
0
,
0
);
goto
done
;
}
r
=
0
;
alarm
(
1
);
memset
(
tmpbuf
,
'\0'
,
strlen
(
tmpbuf
));
coutsiz
=
sizeof
(
struct
sockaddr_storage
);
replysize
=
recvfrom
(
csoc
,
tmpbuf
,
sizeof
(
tmpbuf
),
0
,
cout
,
&
coutsiz
);
alarm
(
0
);
setsigalrm
(
0
);
/* Failure isn't really terrible here */
if
(
replysize
<
1
)
{
r
=
IMAP_SERVER_UNAVAILABLE
;
send_reply
(
sfrom
,
sfromsiz
,
REQ_UNK
,
who
,
name
,
0
,
0
,
0
);
goto
done
;
}
/* Send reply back */
/* r is size */
sendto
(
soc
,
tmpbuf
,
replysize
,
0
,
sfrom
,
sfromsiz
);
r
=
0
;
done
:
if
(
csoc
!=
-1
)
close
(
csoc
);
return
r
;
}
static
int
handle_request
(
const
char
*
who
,
const
char
*
name
,
struct
sockaddr
*
sfrom
,
socklen_t
sfromsiz
)
{
int
r
;
struct
mailbox
*
mailbox
=
NULL
;
time_t
lastread
;
time_t
lastarrived
;
unsigned
recentuid
;
unsigned
numrecent
;
mbentry_t
*
mbentry
=
NULL
;
struct
auth_state
*
mystate
;
int
internalseen
;
numrecent
=
0
;
lastread
=
0
;
lastarrived
=
0
;
char
*
intname
=
mboxname_from_external
(
name
,
&
fud_namespace
,
who
);
r
=
mboxlist_lookup
(
intname
,
&
mbentry
,
NULL
);
if
(
r
||
mbentry
->
mbtype
&
MBTYPE_RESERVE
)
{
send_reply
(
sfrom
,
sfromsiz
,
REQ_UNK
,
who
,
name
,
0
,
0
,
0
);
mboxlist_entry_free
(
&
mbentry
);
free
(
intname
);
return
r
;
}
mystate
=
auth_newstate
(
"anonymous"
);
if
(
mbentry
->
mbtype
&
MBTYPE_REMOTE
)
{
/* Check the ACL */
if
(
cyrus_acl_myrights
(
mystate
,
mbentry
->
acl
)
&
ACL_USER0
)
{
/* We want to proxy this one */
auth_freestate
(
mystate
);
r
=
do_proxy_request
(
who
,
name
,
mbentry
->
server
,
sfrom
,
sfromsiz
);
mboxlist_entry_free
(
&
mbentry
);
free
(
intname
);
return
r
;
}
else
{
/* Permission Denied */
auth_freestate
(
mystate
);
mboxlist_entry_free
(
&
mbentry
);
free
(
intname
);
send_reply
(
sfrom
,
sfromsiz
,
REQ_DENY
,
who
,
name
,
0
,
0
,
0
);
return
0
;
}
}
mboxlist_entry_free
(
&
mbentry
);
/*
* Open/lock header
*/
r
=
mailbox_open_irl
(
intname
,
&
mailbox
);
if
(
r
)
{
send_reply
(
sfrom
,
sfromsiz
,
REQ_UNK
,
who
,
name
,
0
,
0
,
0
);
return
r
;
}
if
(
mboxname_isusermailbox
(
intname
,
0
))
{
int
myrights
=
cyrus_acl_myrights
(
mystate
,
mailbox
->
acl
);
if
(
!
(
myrights
&
ACL_USER0
))
{
auth_freestate
(
mystate
);
mailbox_close
(
&
mailbox
);
free
(
intname
);
send_reply
(
sfrom
,
sfromsiz
,
REQ_DENY
,
who
,
name
,
0
,
0
,
0
);
return
0
;
}
}
auth_freestate
(
mystate
);
internalseen
=
mailbox_internal_seen
(
mailbox
,
who
);
if
(
internalseen
)
{
lastread
=
mailbox
->
i
.
recenttime
;
recentuid
=
mailbox
->
i
.
recentuid
;
}
else
{
struct
seen
*
seendb
=
NULL
;
struct
seendata
sd
=
SEENDATA_INITIALIZER
;
r
=
seen_open
(
who
,
0
,
&
seendb
);
if
(
!
r
)
r
=
seen_read
(
seendb
,
mailbox
->
uniqueid
,
&
sd
);
seen_close
(
&
seendb
);
if
(
r
)
{
/* Fake Data -- couldn't open seen database */
lastread
=
0
;
recentuid
=
0
;
}
else
{
lastread
=
sd
.
lastread
;
recentuid
=
sd
.
lastuid
;
seen_freedata
(
&
sd
);
}
}
lastarrived
=
mailbox
->
i
.
last_appenddate
;
{
const
struct
index_record
*
record
;
struct
mailbox_iter
*
iter
=
mailbox_iter_init
(
mailbox
,
0
,
ITER_SKIP_EXPUNGED
);
while
((
record
=
mailbox_iter_step
(
iter
)))
{
if
(
record
->
uid
>
recentuid
)
numrecent
++
;
}
mailbox_iter_done
(
&
iter
);
}
mailbox_close
(
&
mailbox
);
free
(
intname
);
send_reply
(
sfrom
,
sfromsiz
,
REQ_OK
,
who
,
name
,
numrecent
,
lastread
,
lastarrived
);
return
0
;
}
static
void
send_reply
(
struct
sockaddr
*
sfrom
,
socklen_t
sfromsiz
,
int
status
,
const
char
*
user
,
const
char
*
mbox
,
int
numrecent
,
time_t
lastread
,
time_t
lastarrived
)
{
char
buf
[
MAX_MAILBOX_PATH
+
16
+
9
];
int
siz
;
switch
(
status
)
{
case
REQ_DENY
:
sendto
(
soc
,
"PERMDENY"
,
9
,
0
,
sfrom
,
sfromsiz
);
break
;
case
REQ_OK
:
siz
=
snprintf
(
buf
,
sizeof
(
buf
),
"%s|%s|%d|%u|%u"
,
user
,
mbox
,
numrecent
,
(
uint32_t
)
lastread
,
(
uint32_t
)
lastarrived
);
sendto
(
soc
,
buf
,
siz
,
0
,
sfrom
,
sfromsiz
);
break
;
case
REQ_UNK
:
sendto
(
soc
,
"UNKNOWN"
,
8
,
0
,
sfrom
,
sfromsiz
);
break
;
}
}
EXPORTED
void
fatal
(
const
char
*
s
,
int
code
)
{
static
int
recurse_code
=
0
;
if
(
recurse_code
)
{
/* We were called recursively. Just give up */
exit
(
code
);
}
recurse_code
=
code
;
syslog
(
LOG_ERR
,
"Fatal error: %s"
,
s
);
shut_down
(
code
);
}
File Metadata
Details
Attached
Mime Type
text/x-c
Expires
Mon, Apr 6, 1:59 AM (1 w, 8 h ago)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
18831906
Default Alt Text
fud.c (13 KB)
Attached To
Mode
R111 cyrus-imapd
Attached
Detach File
Event Timeline