xref: /freebsd/crypto/heimdal/lib/krb5/log.c (revision 1e413cf93298b5b97441a21d9a50fdcd0ee9945e)
1 /*
2  * Copyright (c) 1997-2002 Kungliga Tekniska H�gskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  *
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  *
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * 3. Neither the name of the Institute nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #include "krb5_locl.h"
35 
36 RCSID("$Id: log.c,v 1.31 2002/09/05 14:59:14 joda Exp $");
37 
38 struct facility {
39     int min;
40     int max;
41     krb5_log_log_func_t log;
42     krb5_log_close_func_t close;
43     void *data;
44 };
45 
46 static struct facility*
47 log_realloc(krb5_log_facility *f)
48 {
49     struct facility *fp;
50     f->len++;
51     fp = realloc(f->val, f->len * sizeof(*f->val));
52     if(fp == NULL)
53 	return NULL;
54     f->val = fp;
55     fp += f->len - 1;
56     return fp;
57 }
58 
59 struct s2i {
60     const char *s;
61     int val;
62 };
63 
64 #define L(X) { #X, LOG_ ## X }
65 
66 static struct s2i syslogvals[] = {
67     L(EMERG),
68     L(ALERT),
69     L(CRIT),
70     L(ERR),
71     L(WARNING),
72     L(NOTICE),
73     L(INFO),
74     L(DEBUG),
75 
76     L(AUTH),
77 #ifdef LOG_AUTHPRIV
78     L(AUTHPRIV),
79 #endif
80 #ifdef LOG_CRON
81     L(CRON),
82 #endif
83     L(DAEMON),
84 #ifdef LOG_FTP
85     L(FTP),
86 #endif
87     L(KERN),
88     L(LPR),
89     L(MAIL),
90 #ifdef LOG_NEWS
91     L(NEWS),
92 #endif
93     L(SYSLOG),
94     L(USER),
95 #ifdef LOG_UUCP
96     L(UUCP),
97 #endif
98     L(LOCAL0),
99     L(LOCAL1),
100     L(LOCAL2),
101     L(LOCAL3),
102     L(LOCAL4),
103     L(LOCAL5),
104     L(LOCAL6),
105     L(LOCAL7),
106     { NULL, -1 }
107 };
108 
109 static int
110 find_value(const char *s, struct s2i *table)
111 {
112     while(table->s && strcasecmp(table->s, s))
113 	table++;
114     return table->val;
115 }
116 
117 krb5_error_code
118 krb5_initlog(krb5_context context,
119 	     const char *program,
120 	     krb5_log_facility **fac)
121 {
122     krb5_log_facility *f = calloc(1, sizeof(*f));
123     if(f == NULL) {
124 	krb5_set_error_string (context, "malloc: out of memory");
125 	return ENOMEM;
126     }
127     f->program = strdup(program);
128     if(f->program == NULL){
129 	free(f);
130 	krb5_set_error_string (context, "malloc: out of memory");
131 	return ENOMEM;
132     }
133     *fac = f;
134     return 0;
135 }
136 
137 krb5_error_code
138 krb5_addlog_func(krb5_context context,
139 		 krb5_log_facility *fac,
140 		 int min,
141 		 int max,
142 		 krb5_log_log_func_t log,
143 		 krb5_log_close_func_t close,
144 		 void *data)
145 {
146     struct facility *fp = log_realloc(fac);
147     if(fp == NULL) {
148 	krb5_set_error_string (context, "malloc: out of memory");
149 	return ENOMEM;
150     }
151     fp->min = min;
152     fp->max = max;
153     fp->log = log;
154     fp->close = close;
155     fp->data = data;
156     return 0;
157 }
158 
159 
160 struct _heimdal_syslog_data{
161     int priority;
162 };
163 
164 static void
165 log_syslog(const char *time,
166 	   const char *msg,
167 	   void *data)
168 
169 {
170     struct _heimdal_syslog_data *s = data;
171     syslog(s->priority, "%s", msg);
172 }
173 
174 static void
175 close_syslog(void *data)
176 {
177     free(data);
178     closelog();
179 }
180 
181 static krb5_error_code
182 open_syslog(krb5_context context,
183 	    krb5_log_facility *facility, int min, int max,
184 	    const char *sev, const char *fac)
185 {
186     struct _heimdal_syslog_data *sd = malloc(sizeof(*sd));
187     int i;
188 
189     if(sd == NULL) {
190 	krb5_set_error_string (context, "malloc: out of memory");
191 	return ENOMEM;
192     }
193     i = find_value(sev, syslogvals);
194     if(i == -1)
195 	i = LOG_ERR;
196     sd->priority = i;
197     i = find_value(fac, syslogvals);
198     if(i == -1)
199 	i = LOG_AUTH;
200     sd->priority |= i;
201     roken_openlog(facility->program, LOG_PID | LOG_NDELAY, i);
202     return krb5_addlog_func(context, facility, min, max,
203 			    log_syslog, close_syslog, sd);
204 }
205 
206 struct file_data{
207     const char *filename;
208     const char *mode;
209     FILE *fd;
210     int keep_open;
211 };
212 
213 static void
214 log_file(const char *time,
215 	 const char *msg,
216 	 void *data)
217 {
218     struct file_data *f = data;
219     if(f->keep_open == 0)
220 	f->fd = fopen(f->filename, f->mode);
221     if(f->fd == NULL)
222 	return;
223     fprintf(f->fd, "%s %s\n", time, msg);
224     if(f->keep_open == 0)
225 	fclose(f->fd);
226 }
227 
228 static void
229 close_file(void *data)
230 {
231     struct file_data *f = data;
232     if(f->keep_open && f->filename)
233 	fclose(f->fd);
234     free(data);
235 }
236 
237 static krb5_error_code
238 open_file(krb5_context context, krb5_log_facility *fac, int min, int max,
239 	  const char *filename, const char *mode, FILE *f, int keep_open)
240 {
241     struct file_data *fd = malloc(sizeof(*fd));
242     if(fd == NULL) {
243 	krb5_set_error_string (context, "malloc: out of memory");
244 	return ENOMEM;
245     }
246     fd->filename = filename;
247     fd->mode = mode;
248     fd->fd = f;
249     fd->keep_open = keep_open;
250 
251     return krb5_addlog_func(context, fac, min, max, log_file, close_file, fd);
252 }
253 
254 
255 
256 krb5_error_code
257 krb5_addlog_dest(krb5_context context, krb5_log_facility *f, const char *orig)
258 {
259     krb5_error_code ret = 0;
260     int min = 0, max = -1, n;
261     char c;
262     const char *p = orig;
263 
264     n = sscanf(p, "%d%c%d/", &min, &c, &max);
265     if(n == 2){
266 	if(c == '/') {
267 	    if(min < 0){
268 		max = -min;
269 		min = 0;
270 	    }else{
271 		max = min;
272 	    }
273 	}
274     }
275     if(n){
276 	p = strchr(p, '/');
277 	if(p == NULL) {
278 	    krb5_set_error_string (context, "failed to parse \"%s\"", orig);
279 	    return HEIM_ERR_LOG_PARSE;
280 	}
281 	p++;
282     }
283     if(strcmp(p, "STDERR") == 0){
284 	ret = open_file(context, f, min, max, NULL, NULL, stderr, 1);
285     }else if(strcmp(p, "CONSOLE") == 0){
286 	ret = open_file(context, f, min, max, "/dev/console", "w", NULL, 0);
287     }else if(strncmp(p, "FILE:", 4) == 0 && (p[4] == ':' || p[4] == '=')){
288 	char *fn;
289 	FILE *file = NULL;
290 	int keep_open = 0;
291 	fn = strdup(p + 5);
292 	if(fn == NULL) {
293 	    krb5_set_error_string (context, "malloc: out of memory");
294 	    return ENOMEM;
295 	}
296 	if(p[4] == '='){
297 	    int i = open(fn, O_WRONLY | O_CREAT |
298 			 O_TRUNC | O_APPEND, 0666);
299 	    if(i < 0) {
300 		ret = errno;
301 		krb5_set_error_string (context, "open(%s): %s", fn,
302 				       strerror(ret));
303 		return ret;
304 	    }
305 	    file = fdopen(i, "a");
306 	    if(file == NULL){
307 		ret = errno;
308 		close(i);
309 		krb5_set_error_string (context, "fdopen(%s): %s", fn,
310 				       strerror(ret));
311 		return ret;
312 	    }
313 	    keep_open = 1;
314 	}
315 	ret = open_file(context, f, min, max, fn, "a", file, keep_open);
316     }else if(strncmp(p, "DEVICE=", 6) == 0){
317 	ret = open_file(context, f, min, max, strdup(p + 7), "w", NULL, 0);
318     }else if(strncmp(p, "SYSLOG", 6) == 0 && (p[6] == '\0' || p[6] == ':')){
319 	char severity[128] = "";
320 	char facility[128] = "";
321 	p += 6;
322 	if(*p != '\0')
323 	    p++;
324 	if(strsep_copy(&p, ":", severity, sizeof(severity)) != -1)
325 	    strsep_copy(&p, ":", facility, sizeof(facility));
326 	if(*severity == '\0')
327 	    strlcpy(severity, "ERR", sizeof(severity));
328  	if(*facility == '\0')
329 	    strlcpy(facility, "AUTH", sizeof(facility));
330 	ret = open_syslog(context, f, min, max, severity, facility);
331     }else{
332 	krb5_set_error_string (context, "unknown log type: %s", p);
333 	ret = HEIM_ERR_LOG_PARSE; /* XXX */
334     }
335     return ret;
336 }
337 
338 
339 krb5_error_code
340 krb5_openlog(krb5_context context,
341 	     const char *program,
342 	     krb5_log_facility **fac)
343 {
344     krb5_error_code ret;
345     char **p, **q;
346 
347     ret = krb5_initlog(context, program, fac);
348     if(ret)
349 	return ret;
350 
351     p = krb5_config_get_strings(context, NULL, "logging", program, NULL);
352     if(p == NULL)
353 	p = krb5_config_get_strings(context, NULL, "logging", "default", NULL);
354     if(p){
355 	for(q = p; *q; q++)
356 	    ret = krb5_addlog_dest(context, *fac, *q);
357 	krb5_config_free_strings(p);
358     }else
359 	ret = krb5_addlog_dest(context, *fac, "SYSLOG");
360     return 0;
361 }
362 
363 krb5_error_code
364 krb5_closelog(krb5_context context,
365 	      krb5_log_facility *fac)
366 {
367     int i;
368     for(i = 0; i < fac->len; i++)
369 	(*fac->val[i].close)(fac->val[i].data);
370     return 0;
371 }
372 
373 #undef __attribute__
374 #define __attribute__(X)
375 
376 krb5_error_code
377 krb5_vlog_msg(krb5_context context,
378 	      krb5_log_facility *fac,
379 	      char **reply,
380 	      int level,
381 	      const char *fmt,
382 	      va_list ap)
383      __attribute__((format (printf, 5, 0)))
384 {
385 
386     char *msg = NULL;
387     const char *actual = NULL;
388     char buf[64];
389     time_t t = 0;
390     int i;
391 
392     for(i = 0; fac && i < fac->len; i++)
393 	if(fac->val[i].min <= level &&
394 	   (fac->val[i].max < 0 || fac->val[i].max >= level)) {
395 	    if(t == 0) {
396 		t = time(NULL);
397 		krb5_format_time(context, t, buf, sizeof(buf), TRUE);
398 	    }
399 	    if(actual == NULL) {
400 		vasprintf(&msg, fmt, ap);
401 		if(msg == NULL)
402 		    actual = fmt;
403 		else
404 		    actual = msg;
405 	    }
406 	    (*fac->val[i].log)(buf, actual, fac->val[i].data);
407 	}
408     if(reply == NULL)
409 	free(msg);
410     else
411 	*reply = msg;
412     return 0;
413 }
414 
415 krb5_error_code
416 krb5_vlog(krb5_context context,
417 	  krb5_log_facility *fac,
418 	  int level,
419 	  const char *fmt,
420 	  va_list ap)
421      __attribute__((format (printf, 4, 0)))
422 {
423     return krb5_vlog_msg(context, fac, NULL, level, fmt, ap);
424 }
425 
426 krb5_error_code
427 krb5_log_msg(krb5_context context,
428 	     krb5_log_facility *fac,
429 	     int level,
430 	     char **reply,
431 	     const char *fmt,
432 	     ...)
433      __attribute__((format (printf, 5, 6)))
434 {
435     va_list ap;
436     krb5_error_code ret;
437 
438     va_start(ap, fmt);
439     ret = krb5_vlog_msg(context, fac, reply, level, fmt, ap);
440     va_end(ap);
441     return ret;
442 }
443 
444 
445 krb5_error_code
446 krb5_log(krb5_context context,
447 	 krb5_log_facility *fac,
448 	 int level,
449 	 const char *fmt,
450 	 ...)
451      __attribute__((format (printf, 4, 5)))
452 {
453     va_list ap;
454     krb5_error_code ret;
455 
456     va_start(ap, fmt);
457     ret = krb5_vlog(context, fac, level, fmt, ap);
458     va_end(ap);
459     return ret;
460 }
461 
462