remove gcc34
[dragonfly.git] / crypto / heimdal-0.6.3 / lib / krb5 / log.c
blobbd7451b4bcb7b74c27c2315535848d6edef38e17
1 /*
2 * Copyright (c) 1997-2002 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #include "krb5_locl.h"
36 RCSID("$Id: log.c,v 1.31 2002/09/05 14:59:14 joda Exp $");
38 struct facility {
39 int min;
40 int max;
41 krb5_log_log_func_t log;
42 krb5_log_close_func_t close;
43 void *data;
46 static struct facility*
47 log_realloc(krb5_log_facility *f)
49 struct facility *fp;
50 f->len++;
51 fp = realloc(f->val, f->len * sizeof(*f->val));
52 if(fp == NULL)
53 return NULL;
54 f->val = fp;
55 fp += f->len - 1;
56 return fp;
59 struct s2i {
60 const char *s;
61 int val;
64 #define L(X) { #X, LOG_ ## X }
66 static struct s2i syslogvals[] = {
67 L(EMERG),
68 L(ALERT),
69 L(CRIT),
70 L(ERR),
71 L(WARNING),
72 L(NOTICE),
73 L(INFO),
74 L(DEBUG),
76 L(AUTH),
77 #ifdef LOG_AUTHPRIV
78 L(AUTHPRIV),
79 #endif
80 #ifdef LOG_CRON
81 L(CRON),
82 #endif
83 L(DAEMON),
84 #ifdef LOG_FTP
85 L(FTP),
86 #endif
87 L(KERN),
88 L(LPR),
89 L(MAIL),
90 #ifdef LOG_NEWS
91 L(NEWS),
92 #endif
93 L(SYSLOG),
94 L(USER),
95 #ifdef LOG_UUCP
96 L(UUCP),
97 #endif
98 L(LOCAL0),
99 L(LOCAL1),
100 L(LOCAL2),
101 L(LOCAL3),
102 L(LOCAL4),
103 L(LOCAL5),
104 L(LOCAL6),
105 L(LOCAL7),
106 { NULL, -1 }
109 static int
110 find_value(const char *s, struct s2i *table)
112 while(table->s && strcasecmp(table->s, s))
113 table++;
114 return table->val;
117 krb5_error_code
118 krb5_initlog(krb5_context context,
119 const char *program,
120 krb5_log_facility **fac)
122 krb5_log_facility *f = calloc(1, sizeof(*f));
123 if(f == NULL) {
124 krb5_set_error_string (context, "malloc: out of memory");
125 return ENOMEM;
127 f->program = strdup(program);
128 if(f->program == NULL){
129 free(f);
130 krb5_set_error_string (context, "malloc: out of memory");
131 return ENOMEM;
133 *fac = f;
134 return 0;
137 krb5_error_code
138 krb5_addlog_func(krb5_context context,
139 krb5_log_facility *fac,
140 int min,
141 int max,
142 krb5_log_log_func_t log,
143 krb5_log_close_func_t close,
144 void *data)
146 struct facility *fp = log_realloc(fac);
147 if(fp == NULL) {
148 krb5_set_error_string (context, "malloc: out of memory");
149 return ENOMEM;
151 fp->min = min;
152 fp->max = max;
153 fp->log = log;
154 fp->close = close;
155 fp->data = data;
156 return 0;
160 struct _heimdal_syslog_data{
161 int priority;
164 static void
165 log_syslog(const char *time,
166 const char *msg,
167 void *data)
170 struct _heimdal_syslog_data *s = data;
171 syslog(s->priority, "%s", msg);
174 static void
175 close_syslog(void *data)
177 free(data);
178 closelog();
181 static krb5_error_code
182 open_syslog(krb5_context context,
183 krb5_log_facility *facility, int min, int max,
184 const char *sev, const char *fac)
186 struct _heimdal_syslog_data *sd = malloc(sizeof(*sd));
187 int i;
189 if(sd == NULL) {
190 krb5_set_error_string (context, "malloc: out of memory");
191 return ENOMEM;
193 i = find_value(sev, syslogvals);
194 if(i == -1)
195 i = LOG_ERR;
196 sd->priority = i;
197 i = find_value(fac, syslogvals);
198 if(i == -1)
199 i = LOG_AUTH;
200 sd->priority |= i;
201 roken_openlog(facility->program, LOG_PID | LOG_NDELAY, i);
202 return krb5_addlog_func(context, facility, min, max,
203 log_syslog, close_syslog, sd);
206 struct file_data{
207 const char *filename;
208 const char *mode;
209 FILE *fd;
210 int keep_open;
213 static void
214 log_file(const char *time,
215 const char *msg,
216 void *data)
218 struct file_data *f = data;
219 if(f->keep_open == 0)
220 f->fd = fopen(f->filename, f->mode);
221 if(f->fd == NULL)
222 return;
223 fprintf(f->fd, "%s %s\n", time, msg);
224 if(f->keep_open == 0)
225 fclose(f->fd);
228 static void
229 close_file(void *data)
231 struct file_data *f = data;
232 if(f->keep_open && f->filename)
233 fclose(f->fd);
234 free(data);
237 static krb5_error_code
238 open_file(krb5_context context, krb5_log_facility *fac, int min, int max,
239 const char *filename, const char *mode, FILE *f, int keep_open)
241 struct file_data *fd = malloc(sizeof(*fd));
242 if(fd == NULL) {
243 krb5_set_error_string (context, "malloc: out of memory");
244 return ENOMEM;
246 fd->filename = filename;
247 fd->mode = mode;
248 fd->fd = f;
249 fd->keep_open = keep_open;
251 return krb5_addlog_func(context, fac, min, max, log_file, close_file, fd);
256 krb5_error_code
257 krb5_addlog_dest(krb5_context context, krb5_log_facility *f, const char *orig)
259 krb5_error_code ret = 0;
260 int min = 0, max = -1, n;
261 char c;
262 const char *p = orig;
264 n = sscanf(p, "%d%c%d/", &min, &c, &max);
265 if(n == 2){
266 if(c == '/') {
267 if(min < 0){
268 max = -min;
269 min = 0;
270 }else{
271 max = min;
275 if(n){
276 p = strchr(p, '/');
277 if(p == NULL) {
278 krb5_set_error_string (context, "failed to parse \"%s\"", orig);
279 return HEIM_ERR_LOG_PARSE;
281 p++;
283 if(strcmp(p, "STDERR") == 0){
284 ret = open_file(context, f, min, max, NULL, NULL, stderr, 1);
285 }else if(strcmp(p, "CONSOLE") == 0){
286 ret = open_file(context, f, min, max, "/dev/console", "w", NULL, 0);
287 }else if(strncmp(p, "FILE:", 4) == 0 && (p[4] == ':' || p[4] == '=')){
288 char *fn;
289 FILE *file = NULL;
290 int keep_open = 0;
291 fn = strdup(p + 5);
292 if(fn == NULL) {
293 krb5_set_error_string (context, "malloc: out of memory");
294 return ENOMEM;
296 if(p[4] == '='){
297 int i = open(fn, O_WRONLY | O_CREAT |
298 O_TRUNC | O_APPEND, 0666);
299 if(i < 0) {
300 ret = errno;
301 krb5_set_error_string (context, "open(%s): %s", fn,
302 strerror(ret));
303 return ret;
305 file = fdopen(i, "a");
306 if(file == NULL){
307 ret = errno;
308 close(i);
309 krb5_set_error_string (context, "fdopen(%s): %s", fn,
310 strerror(ret));
311 return ret;
313 keep_open = 1;
315 ret = open_file(context, f, min, max, fn, "a", file, keep_open);
316 }else if(strncmp(p, "DEVICE=", 6) == 0){
317 ret = open_file(context, f, min, max, strdup(p + 7), "w", NULL, 0);
318 }else if(strncmp(p, "SYSLOG", 6) == 0 && (p[6] == '\0' || p[6] == ':')){
319 char severity[128] = "";
320 char facility[128] = "";
321 p += 6;
322 if(*p != '\0')
323 p++;
324 if(strsep_copy(&p, ":", severity, sizeof(severity)) != -1)
325 strsep_copy(&p, ":", facility, sizeof(facility));
326 if(*severity == '\0')
327 strlcpy(severity, "ERR", sizeof(severity));
328 if(*facility == '\0')
329 strlcpy(facility, "AUTH", sizeof(facility));
330 ret = open_syslog(context, f, min, max, severity, facility);
331 }else{
332 krb5_set_error_string (context, "unknown log type: %s", p);
333 ret = HEIM_ERR_LOG_PARSE; /* XXX */
335 return ret;
339 krb5_error_code
340 krb5_openlog(krb5_context context,
341 const char *program,
342 krb5_log_facility **fac)
344 krb5_error_code ret;
345 char **p, **q;
347 ret = krb5_initlog(context, program, fac);
348 if(ret)
349 return ret;
351 p = krb5_config_get_strings(context, NULL, "logging", program, NULL);
352 if(p == NULL)
353 p = krb5_config_get_strings(context, NULL, "logging", "default", NULL);
354 if(p){
355 for(q = p; *q; q++)
356 ret = krb5_addlog_dest(context, *fac, *q);
357 krb5_config_free_strings(p);
358 }else
359 ret = krb5_addlog_dest(context, *fac, "SYSLOG");
360 return 0;
363 krb5_error_code
364 krb5_closelog(krb5_context context,
365 krb5_log_facility *fac)
367 int i;
368 for(i = 0; i < fac->len; i++)
369 (*fac->val[i].close)(fac->val[i].data);
370 return 0;
373 #undef __attribute__
374 #define __attribute__(X)
376 krb5_error_code
377 krb5_vlog_msg(krb5_context context,
378 krb5_log_facility *fac,
379 char **reply,
380 int level,
381 const char *fmt,
382 va_list ap)
383 __attribute__((format (printf, 5, 0)))
386 char *msg = NULL;
387 const char *actual = NULL;
388 char buf[64];
389 time_t t = 0;
390 int i;
392 for(i = 0; fac && i < fac->len; i++)
393 if(fac->val[i].min <= level &&
394 (fac->val[i].max < 0 || fac->val[i].max >= level)) {
395 if(t == 0) {
396 t = time(NULL);
397 krb5_format_time(context, t, buf, sizeof(buf), TRUE);
399 if(actual == NULL) {
400 vasprintf(&msg, fmt, ap);
401 if(msg == NULL)
402 actual = fmt;
403 else
404 actual = msg;
406 (*fac->val[i].log)(buf, actual, fac->val[i].data);
408 if(reply == NULL)
409 free(msg);
410 else
411 *reply = msg;
412 return 0;
415 krb5_error_code
416 krb5_vlog(krb5_context context,
417 krb5_log_facility *fac,
418 int level,
419 const char *fmt,
420 va_list ap)
421 __attribute__((format (printf, 4, 0)))
423 return krb5_vlog_msg(context, fac, NULL, level, fmt, ap);
426 krb5_error_code
427 krb5_log_msg(krb5_context context,
428 krb5_log_facility *fac,
429 int level,
430 char **reply,
431 const char *fmt,
432 ...)
433 __attribute__((format (printf, 5, 6)))
435 va_list ap;
436 krb5_error_code ret;
438 va_start(ap, fmt);
439 ret = krb5_vlog_msg(context, fac, reply, level, fmt, ap);
440 va_end(ap);
441 return ret;
445 krb5_error_code
446 krb5_log(krb5_context context,
447 krb5_log_facility *fac,
448 int level,
449 const char *fmt,
450 ...)
451 __attribute__((format (printf, 4, 5)))
453 va_list ap;
454 krb5_error_code ret;
456 va_start(ap, fmt);
457 ret = krb5_vlog(context, fac, level, fmt, ap);
458 va_end(ap);
459 return ret;