Unleashed v1.4
[unleashed.git] / usr / src / cmd / ypcmd / ypupdated.c
blobf9b68e70857fb6e911c3f77241f7ddc52d4a22ae
1 /*
2 * CDDL HEADER START
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License, Version 1.0 only
6 * (the "License"). You may not use this file except in compliance
7 * with the License.
9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10 * or http://www.opensolaris.org/os/licensing.
11 * See the License for the specific language governing permissions
12 * and limitations under the License.
14 * When distributing Covered Code, include this CDDL HEADER in each
15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16 * If applicable, add the following below this CDDL HEADER, with the
17 * fields enclosed by brackets "[]" replaced with your own identifying
18 * information: Portions Copyright [yyyy] [name of copyright owner]
20 * CDDL HEADER END
23 * Copyright 2017 Joyent Inc
24 * Copyright 2000 Sun Microsystems, Inc. All rights reserved.
25 * Use is subject to license terms.
28 /* Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T */
29 /* All Rights Reserved */
32 * Portions of this source code were derived from Berkeley 4.3 BSD
33 * under license from the Regents of the University of California.
37 * YP update service
39 #include <stdio.h>
40 #include <stdlib.h>
41 #include <sys/types.h>
42 #include <sys/file.h>
43 #include <sys/signal.h>
44 #include <sys/wait.h>
45 #include <rpc/rpc.h>
46 #include <rpc/nettype.h>
47 #include <rpcsvc/ypupd.h>
48 #include <rpcsvc/ypclnt.h>
49 #include <sys/debug.h>
50 #include <netdir.h>
51 #include <stropts.h>
52 #ifdef SYSLOG
53 #include <syslog.h>
54 #else
55 #define LOG_ERR 1
56 #define openlog(a, b, c)
57 #endif
59 #ifdef DEBUG
60 #define RPC_SVC_FG
61 #define debug(msg) fprintf(stderr, "%s\n", msg);
62 #else
63 #define debug(msg) /* turn off debugging */
64 #endif
66 static char YPDIR[] = "/var/yp";
67 static char UPDATEFILE[] = "/var/yp/updaters";
68 #define _RPCSVC_CLOSEDOWN 120
70 static int addr2netname();
71 static void closedown();
72 static void ypupdate_prog();
73 static void msgout();
74 static int update();
75 static int insecure;
76 static int _rpcpmstart; /* Started by a port monitor ? */
77 static int _rpcsvcdirty; /* Still serving ? */
79 extern unsigned int alarm();
80 extern void exit();
81 extern int close();
82 extern long fork();
83 extern int free();
84 extern struct netconfig *getnetconfigent();
85 extern int strcmp();
86 extern int strcpy();
87 extern int syslog();
88 extern void *signal();
89 extern int setsid();
90 extern int t_getinfo();
91 extern int user2netname();
92 extern int _openchild();
94 main(argc, argv)
95 int argc;
96 char *argv[];
98 pid_t pid;
99 char *cmd;
100 char mname[FMNAMESZ + 1];
102 if (geteuid() != 0) {
103 (void) fprintf(stderr, "must be root to run %s\n", argv[0]);
104 exit(1);
107 cmd = argv[0];
108 switch (argc) {
109 case 0:
110 cmd = "ypupdated";
111 break;
112 case 1:
113 break;
114 case 2:
115 if (strcmp(argv[1], "-i") == 0) {
116 insecure++;
117 break;
119 default:
120 fprintf(stderr, "%s: warning -- options ignored\n", cmd);
121 break;
124 if (chdir(YPDIR) < 0) {
125 fprintf(stderr, "%s: can't chdir to ", cmd);
126 perror(YPDIR);
127 exit(1);
130 if (!ioctl(0, I_LOOK, mname) &&
131 (strcmp(mname, "sockmod") == 0 ||
132 strcmp(mname, "timod") == 0)) {
134 * Started from port monitor: use 0 as fd
136 char *netid;
137 struct netconfig *nconf = NULL;
138 SVCXPRT *transp;
139 int pmclose;
140 extern char *getenv();
142 _rpcpmstart = 1;
143 if ((netid = getenv("NLSPROVIDER")) == NULL) {
144 msgout("cannot get transport name");
146 if ((nconf = getnetconfigent(netid)) == NULL) {
147 msgout("cannot get transport info");
149 if (strcmp(mname, "sockmod") == 0) {
150 if (ioctl(0, I_POP, 0) || ioctl(0, I_PUSH, "timod")) {
151 msgout("could not get the right module");
152 exit(1);
155 pmclose = (t_getstate(0) != T_DATAXFER);
156 if ((transp = svc_tli_create(0, nconf, NULL, 0, 0)) == NULL) {
157 msgout("cannot create update server handle");
158 exit(1);
160 if (!svc_reg(transp, YPU_PROG, YPU_VERS, ypupdate_prog, 0)) {
161 msgout("unable to register (YPBINDPROG, YPBINDVERS).");
162 exit(1);
164 if (nconf)
165 freenetconfigent(nconf);
167 if (pmclose) {
168 (void) signal(SIGALRM, closedown);
169 (void) alarm(_RPCSVC_CLOSEDOWN);
171 svc_run();
172 exit(1);
174 #ifndef RPC_SVC_FG
176 * Started from shell; background thyself and run
178 pid = fork();
180 if (pid < 0) {
181 perror("cannot fork");
182 exit(1);
184 if (pid)
185 exit(0);
186 closefrom(0);
187 (void) setsid();
188 openlog("ypupdated", LOG_PID, LOG_DAEMON);
189 #endif
190 if (!svc_create(ypupdate_prog, YPU_PROG, YPU_VERS, "netpath")) {
191 msgout("unable to create (YPU_PROG, YPU_VERS) for netpath.");
192 exit(1);
195 svc_run();
196 msgout("svc_run returned");
197 exit(1);
198 /* NOTREACHED */
201 static void
202 ypupdate_prog(rqstp, transp)
203 struct svc_req *rqstp;
204 SVCXPRT *transp;
206 struct ypupdate_args args;
207 uint_t rslt;
208 uint_t op;
209 char *netname;
210 char namebuf[MAXNETNAMELEN+1];
211 struct authunix_parms *aup;
213 switch (rqstp->rq_proc) {
214 case NULLPROC:
215 svc_sendreply(transp, xdr_void, NULL);
216 return;
217 case YPU_CHANGE:
218 op = YPOP_CHANGE;
219 break;
220 case YPU_DELETE:
221 op = YPOP_DELETE;
222 break;
223 case YPU_INSERT:
224 op = YPOP_INSERT;
225 break;
226 case YPU_STORE:
227 op = YPOP_STORE;
228 break;
229 default:
230 svcerr_noproc(transp);
231 return;
233 #ifdef DEBUG
234 fprintf(stderr, "ypupdated: request received\n");
235 #endif
236 switch (rqstp->rq_cred.oa_flavor) {
237 case AUTH_DES:
238 CTASSERT(sizeof (struct authdes_cred) <= RQCRED_SIZE);
239 netname = ((struct authdes_cred *)
240 rqstp->rq_clntcred)->adc_fullname.name;
241 break;
242 case AUTH_UNIX:
243 if (insecure) {
244 CTASSERT(sizeof (struct authunix_parms) <= RQCRED_SIZE);
245 aup = (struct authunix_parms *)rqstp->rq_clntcred;
246 if (aup->aup_uid == 0) {
247 if (addr2netname(namebuf, transp) != 0) {
248 fprintf(stderr,
249 "addr2netname failing for %d\n",
250 aup->aup_uid);
251 svcerr_systemerr(transp);
252 return;
254 } else {
255 if (user2netname(namebuf, aup->aup_uid, NULL)
256 != 0) {
257 fprintf(stderr,
258 "user2netname failing for %d\n",
259 aup->aup_uid);
260 svcerr_systemerr(transp);
261 return;
264 netname = namebuf;
265 break;
267 default:
268 svcerr_weakauth(transp);
269 return;
271 memset(&args, 0, sizeof (args));
272 if (!svc_getargs(transp, xdr_ypupdate_args, (char *)&args)) {
273 svcerr_decode(transp);
274 return;
276 #ifdef DEBUG
277 fprintf(stderr, "netname = %s\n, map=%s\n key=%s\n",
278 netname, args.mapname, args.key.yp_buf_val);
279 #endif
280 rslt = update(netname, args.mapname, op,
281 args.key.yp_buf_len, args.key.yp_buf_val,
282 args.datum.yp_buf_len, args.datum.yp_buf_val);
283 if (!svc_sendreply(transp, xdr_u_int, (char *)&rslt)) {
284 debug("svc_sendreply failed");
286 if (!svc_freeargs(transp, xdr_ypupdate_args, (char *)&args)) {
287 debug("svc_freeargs failed");
292 * Determine if requester is allowed to update the given map,
293 * and update it if so. Returns the yp status, which is zero
294 * if there is no access violation.
296 static
297 update(requester, mapname, op, keylen, key, datalen, data)
298 char *requester;
299 char *mapname;
300 uint_t op;
301 uint_t keylen;
302 char *key;
303 uint_t datalen;
304 char *data;
306 char updater[MAXMAPNAMELEN + 40];
307 FILE *childargs;
308 FILE *childrslt;
309 int status;
310 int yperrno = 0;
311 int pid;
313 sprintf(updater, "/usr/bin/make -s -f %s %s", UPDATEFILE, mapname);
314 #ifdef DEBUG
315 fprintf(stderr, "updater: %s\n", updater);
316 fprintf(stderr, "requestor = %s, op = %d, key = %s\n",
317 requester, op, key);
318 fprintf(stderr, "data = %s\n", data);
319 #endif
320 pid = _openchild(updater, &childargs, &childrslt);
321 if (pid < 0) {
322 debug("openpipes failed");
323 return (YPERR_YPERR);
327 * Write to child
329 fprintf(childargs, "%s\n", requester);
330 fprintf(childargs, "%u\n", op);
331 fprintf(childargs, "%u\n", keylen);
332 fwrite(key, keylen, 1, childargs);
333 fprintf(childargs, "\n");
334 fprintf(childargs, "%u\n", datalen);
335 fwrite(data, datalen, 1, childargs);
336 fprintf(childargs, "\n");
337 fclose(childargs);
340 * Read from child
342 fscanf(childrslt, "%d", &yperrno);
343 fclose(childrslt);
345 wait(&status);
346 if (!WIFEXITED(status)) {
347 return (YPERR_YPERR);
349 return (yperrno);
352 static void
353 msgout(msg)
354 char *msg;
356 if (_rpcpmstart)
357 syslog(LOG_ERR, msg);
358 else
359 (void) fprintf(stderr, "%s\n", msg);
362 void
363 closedown()
365 if (_rpcsvcdirty == 0) {
366 int i, openfd;
367 struct t_info tinfo;
369 if (t_getinfo(0, tinfo) || (tinfo.servtype == T_CLTS))
370 exit(0);
372 for (i = 0, openfd = 0; i < svc_max_pollfd && openfd < 2; i++)
373 if (svc_pollfd[i].fd >= 0)
374 openfd++;
376 if (openfd <= 1)
377 exit(0);
379 (void) alarm(_RPCSVC_CLOSEDOWN);
382 static int
383 addr2netname(namebuf, transp)
384 char *namebuf;
385 SVCXPRT *transp;
387 struct nd_hostservlist *hostservs = NULL;
388 struct netconfig *nconf;
389 struct netbuf *who;
391 who = svc_getrpccaller(transp);
392 if ((who == NULL) || (who->len == 0))
393 return (-1);
394 if ((nconf = getnetconfigent(transp->xp_netid))
395 == NULL)
396 return (-1);
397 if (netdir_getbyaddr(nconf, &hostservs, who) != 0) {
398 (void) freenetconfigent(nconf);
399 return (-1);
401 if (hostservs == NULL) {
402 msgout("ypupdated: netdir_getbyaddr failed\n");
403 } else {
404 strcpy(namebuf, hostservs->h_hostservs->h_host);
406 (void) freenetconfigent(nconf);
407 netdir_free((char *)hostservs, ND_HOSTSERVLIST);
408 return (0);