xref: /freebsd/usr.sbin/ypldap/ypldap.c (revision d287d3282f43b92e59aa74725e72662758e96a75)
1 /*	$OpenBSD: ypldap.c,v 1.16 2015/11/02 10:06:06 jmatthew Exp $ */
2 
3 /*
4  * Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org>
5  *
6  * Permission to use, copy, modify, and distribute this software for any
7  * purpose with or without fee is hereby granted, provided that the above
8  * copyright notice and this permission notice appear in all copies.
9  *
10  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17  */
18 
19 #include <sys/types.h>
20 #include <sys/param.h>
21 #include <sys/queue.h>
22 #include <sys/socket.h>
23 #include <sys/signal.h>
24 #include <sys/tree.h>
25 #include <sys/wait.h>
26 
27 #include <netinet/in.h>
28 #include <arpa/inet.h>
29 
30 #include <err.h>
31 #include <errno.h>
32 #include <event.h>
33 #include <unistd.h>
34 #include <pwd.h>
35 #include <stdio.h>
36 #include <stdlib.h>
37 #include <string.h>
38 #include <limits.h>
39 
40 #include "ypldap.h"
41 
42 enum ypldap_process_type		ypldap_process;
43 
44 __dead2 void	 usage(void);
45 int		 check_child(pid_t, const char *);
46 void		 main_sig_handler(int, short, void *);
47 void		 main_shutdown(void);
48 void		 main_dispatch_client(int, short, void *);
49 void		 main_configure_client(struct env *);
50 void		 main_init_timer(int, short, void *);
51 void		 main_start_update(struct env *);
52 void		 main_trash_update(struct env *);
53 void		 main_end_update(struct env *);
54 int		 main_create_user_groups(struct env *);
55 void		 purge_config(struct env *);
56 void		 reconfigure(struct env *);
57 
58 int		 pipe_main2client[2];
59 
60 pid_t		 client_pid = 0;
61 char		*conffile = YPLDAP_CONF_FILE;
62 int		 opts = 0;
63 
64 void
65 usage(void)
66 {
67 	extern const char	*__progname;
68 
69 	fprintf(stderr, "usage: %s [-dnv] [-D macro=value] [-f file]\n",
70 	    __progname);
71 	exit(1);
72 }
73 
74 int
75 check_child(pid_t pid, const char *pname)
76 {
77 	int	status;
78 
79 	if (waitpid(pid, &status, WNOHANG) > 0) {
80 		if (WIFEXITED(status)) {
81 			log_warnx("check_child: lost child %s exited", pname);
82 			return (1);
83 		}
84 		if (WIFSIGNALED(status)) {
85 			log_warnx("check_child: lost child %s terminated; "
86 			    "signal %d", pname, WTERMSIG(status));
87 			return (1);
88 		}
89 	}
90 	return (0);
91 }
92 
93 /* ARGUSED */
94 void
95 main_sig_handler(int sig, short event, void *p)
96 {
97 	int		 die = 0;
98 
99 	switch (sig) {
100 	case SIGTERM:
101 	case SIGINT:
102 		die = 1;
103 		/* FALLTHROUGH */
104 	case SIGCHLD:
105 		if (check_child(client_pid, "ldap client")) {
106 			client_pid = 0;
107 			die = 1;
108 		}
109 		if (die)
110 			main_shutdown();
111 		break;
112 	case SIGHUP:
113 		/* reconfigure */
114 		break;
115 	default:
116 		fatalx("unexpected signal");
117 	}
118 }
119 
120 void
121 main_shutdown(void)
122 {
123 	_exit(0);
124 }
125 
126 void
127 main_start_update(struct env *env)
128 {
129 	env->update_trashed = 0;
130 
131 	log_debug("starting directory update");
132 	env->sc_user_line_len = 0;
133 	env->sc_group_line_len = 0;
134 	if ((env->sc_user_names_t = calloc(1,
135 	    sizeof(*env->sc_user_names_t))) == NULL ||
136 	    (env->sc_group_names_t = calloc(1,
137 	    sizeof(*env->sc_group_names_t))) == NULL)
138 		fatal(NULL);
139 	RB_INIT(env->sc_user_names_t);
140 	RB_INIT(env->sc_group_names_t);
141 }
142 
143 /*
144  * XXX: Currently this function should only be called when updating is
145  * finished. A notification should be send to ldapclient that it should stop
146  * sending new pwd/grp entries before it can be called from different places.
147  */
148 void
149 main_trash_update(struct env *env)
150 {
151 	struct userent	*ue;
152 	struct groupent	*ge;
153 
154 	env->update_trashed = 1;
155 
156 	while ((ue = RB_ROOT(env->sc_user_names_t)) != NULL) {
157 		RB_REMOVE(user_name_tree,
158 		    env->sc_user_names_t, ue);
159 		free(ue->ue_line);
160 		free(ue->ue_netid_line);
161 		free(ue);
162 	}
163 	free(env->sc_user_names_t);
164 	env->sc_user_names_t = NULL;
165 	while ((ge = RB_ROOT(env->sc_group_names_t))
166 	    != NULL) {
167 		RB_REMOVE(group_name_tree,
168 		    env->sc_group_names_t, ge);
169 		free(ge->ge_line);
170 		free(ge);
171 	}
172 	free(env->sc_group_names_t);
173 	env->sc_group_names_t = NULL;
174 }
175 
176 int
177 main_create_user_groups(struct env *env)
178 {
179 	struct userent		*ue;
180 	struct userent		 ukey;
181 	struct groupent		*ge;
182 	gid_t			 pw_gid;
183 	char			*bp, *cp;
184 	char			*p;
185 	const char		*errstr = NULL;
186 	size_t			 len;
187 
188 	RB_FOREACH(ue, user_name_tree, env->sc_user_names_t) {
189 		bp = cp = ue->ue_line;
190 
191 		/* name */
192 		bp += strlen(bp) + 1;
193 
194 		/* password */
195 		bp += strcspn(bp, ":") + 1;
196 
197 		/* uid */
198 		bp += strcspn(bp, ":") + 1;
199 
200 		/* gid */
201 		bp[strcspn(bp, ":")] = '\0';
202 
203 		pw_gid = (gid_t)strtonum(bp, 0, GID_MAX, &errstr);
204 		if (errstr) {
205 			log_warnx("main: failed to parse gid for uid: %d\n", ue->ue_uid);
206 			return (-1);
207 		}
208 
209 		/* bring gid column back to its proper state */
210 		bp[strlen(bp)] = ':';
211 
212 		if ((ue->ue_netid_line = calloc(1, LINE_WIDTH)) == NULL) {
213 			return (-1);
214 		}
215 
216 		if (snprintf(ue->ue_netid_line, LINE_WIDTH-1, "%d:%d", ue->ue_uid, pw_gid) >= LINE_WIDTH) {
217 
218 			return (-1);
219 		}
220 
221 		ue->ue_gid = pw_gid;
222 	}
223 
224 	RB_FOREACH(ge, group_name_tree, env->sc_group_names_t) {
225 		bp = cp = ge->ge_line;
226 
227 		/* name */
228 		bp += strlen(bp) + 1;
229 
230 		/* password */
231 		bp += strcspn(bp, ":") + 1;
232 
233 		/* gid */
234 		bp += strcspn(bp, ":") + 1;
235 
236 		cp = bp;
237 		if (*bp == '\0')
238 			continue;
239 		bp = cp;
240 		for (;;) {
241 			if (!(cp = strsep(&bp, ",")))
242 				break;
243 			ukey.ue_line = cp;
244 			if ((ue = RB_FIND(user_name_tree, env->sc_user_names_t,
245 			    &ukey)) == NULL) {
246 				/* User not found */
247 				log_warnx("main: unknown user %s in group %s\n",
248 				   ukey.ue_line, ge->ge_line);
249 				if (bp != NULL)
250 					*(bp-1) = ',';
251 				continue;
252 			}
253 			if (bp != NULL)
254 				*(bp-1) = ',';
255 
256 			/* Make sure the new group doesn't equal to the main gid */
257 			if (ge->ge_gid == ue->ue_gid)
258 				continue;
259 
260 			len = strlen(ue->ue_netid_line);
261 			p = ue->ue_netid_line + len;
262 
263 			if ((snprintf(p, LINE_WIDTH-len-1, ",%d",
264 				ge->ge_gid)) >= (int)(LINE_WIDTH-len)) {
265 				return (-1);
266 			}
267 		}
268 	}
269 
270 	return (0);
271 }
272 
273 void
274 main_end_update(struct env *env)
275 {
276 	struct userent		*ue;
277 	struct groupent		*ge;
278 
279 	if (env->update_trashed)
280 		return;
281 
282 	log_debug("updates are over, cleaning up trees now");
283 
284 	if (main_create_user_groups(env) == -1) {
285 		main_trash_update(env);
286 		return;
287 	}
288 
289 	if (env->sc_user_names == NULL) {
290 		env->sc_user_names = env->sc_user_names_t;
291 		env->sc_user_lines = NULL;
292 		env->sc_user_names_t = NULL;
293 
294 		env->sc_group_names = env->sc_group_names_t;
295 		env->sc_group_lines = NULL;
296 		env->sc_group_names_t = NULL;
297 
298 		flatten_entries(env);
299 		goto make_uids;
300 	}
301 
302 	/*
303 	 * clean previous tree.
304 	 */
305 	while ((ue = RB_ROOT(env->sc_user_names)) != NULL) {
306 		RB_REMOVE(user_name_tree, env->sc_user_names,
307 		    ue);
308 		free(ue->ue_netid_line);
309 		free(ue);
310 	}
311 	free(env->sc_user_names);
312 	free(env->sc_user_lines);
313 
314 	env->sc_user_names = env->sc_user_names_t;
315 	env->sc_user_lines = NULL;
316 	env->sc_user_names_t = NULL;
317 
318 	while ((ge = RB_ROOT(env->sc_group_names)) != NULL) {
319 		RB_REMOVE(group_name_tree,
320 		    env->sc_group_names, ge);
321 		free(ge);
322 	}
323 	free(env->sc_group_names);
324 	free(env->sc_group_lines);
325 
326 	env->sc_group_names = env->sc_group_names_t;
327 	env->sc_group_lines = NULL;
328 	env->sc_group_names_t = NULL;
329 
330 
331 	flatten_entries(env);
332 
333 	/*
334 	 * trees are flat now. build up uid, gid and netid trees.
335 	 */
336 
337 make_uids:
338 	RB_INIT(&env->sc_user_uids);
339 	RB_INIT(&env->sc_group_gids);
340 	RB_FOREACH(ue, user_name_tree, env->sc_user_names)
341 		RB_INSERT(user_uid_tree,
342 		    &env->sc_user_uids, ue);
343 	RB_FOREACH(ge, group_name_tree, env->sc_group_names)
344 		RB_INSERT(group_gid_tree,
345 		    &env->sc_group_gids, ge);
346 
347 }
348 
349 void
350 main_dispatch_client(int fd, short events, void *p)
351 {
352 	int		 n;
353 	int		 shut = 0;
354 	struct env	*env = p;
355 	struct imsgev	*iev = env->sc_iev;
356 	struct imsgbuf	*ibuf = &iev->ibuf;
357 	struct idm_req	 ir;
358 	struct imsg	 imsg;
359 
360 	if ((events & (EV_READ | EV_WRITE)) == 0)
361 		fatalx("unknown event");
362 
363 	if (events & EV_READ) {
364 		if ((n = imsg_read(ibuf)) == -1 && errno != EAGAIN)
365 			fatal("imsg_read error");
366 		if (n == 0)
367 			shut = 1;
368 	}
369 	if (events & EV_WRITE) {
370 		if ((n = msgbuf_write(&ibuf->w)) == -1 && errno != EAGAIN)
371 			fatal("msgbuf_write");
372 		if (n == 0)
373 			shut = 1;
374 		goto done;
375 	}
376 
377 	for (;;) {
378 		if ((n = imsg_get(ibuf, &imsg)) == -1)
379 			fatal("main_dispatch_client: imsg_get error");
380 		if (n == 0)
381 			break;
382 
383 		switch (imsg.hdr.type) {
384 		case IMSG_START_UPDATE:
385 			main_start_update(env);
386 			break;
387 		case IMSG_PW_ENTRY: {
388 			struct userent	*ue;
389 			size_t		 len;
390 
391 			if (env->update_trashed)
392 				break;
393 
394 			(void)memcpy(&ir, imsg.data, sizeof(ir));
395 			if ((ue = calloc(1, sizeof(*ue))) == NULL ||
396 			    (ue->ue_line = strdup(ir.ir_line)) == NULL) {
397 				/*
398 				 * should cancel tree update instead.
399 				 */
400 				fatal("out of memory");
401 			}
402 			ue->ue_uid = ir.ir_key.ik_uid;
403 			len = strlen(ue->ue_line) + 1;
404 			ue->ue_line[strcspn(ue->ue_line, ":")] = '\0';
405 			if (RB_INSERT(user_name_tree, env->sc_user_names_t,
406 			    ue) != NULL) { /* dup */
407 				free(ue->ue_line);
408 				free(ue);
409 			} else
410 				env->sc_user_line_len += len;
411 			break;
412 		}
413 		case IMSG_GRP_ENTRY: {
414 			struct groupent	*ge;
415 			size_t		 len;
416 
417 			if (env->update_trashed)
418 				break;
419 
420 			(void)memcpy(&ir, imsg.data, sizeof(ir));
421 			if ((ge = calloc(1, sizeof(*ge))) == NULL ||
422 			    (ge->ge_line = strdup(ir.ir_line)) == NULL) {
423 				/*
424 				 * should cancel tree update instead.
425 				 */
426 				fatal("out of memory");
427 			}
428 			ge->ge_gid = ir.ir_key.ik_gid;
429 			len = strlen(ge->ge_line) + 1;
430 			ge->ge_line[strcspn(ge->ge_line, ":")] = '\0';
431 			if (RB_INSERT(group_name_tree, env->sc_group_names_t,
432 			    ge) != NULL) { /* dup */
433 				free(ge->ge_line);
434 				free(ge);
435 			} else
436 				env->sc_group_line_len += len;
437 			break;
438 		}
439 		case IMSG_TRASH_UPDATE:
440 			main_trash_update(env);
441 			break;
442 		case IMSG_END_UPDATE: {
443 			main_end_update(env);
444 			break;
445 		}
446 		default:
447 			log_debug("main_dispatch_client: unexpected imsg %d",
448 			   imsg.hdr.type);
449 			break;
450 		}
451 		imsg_free(&imsg);
452 	}
453 
454 done:
455 	if (!shut)
456 		imsg_event_add(iev);
457 	else {
458 		log_debug("king bula sez: ran into dead pipe");
459 		event_del(&iev->ev);
460 		event_loopexit(NULL);
461 	}
462 }
463 
464 void
465 main_configure_client(struct env *env)
466 {
467 	struct idm	*idm;
468 	struct imsgev	*iev = env->sc_iev;
469 
470 	imsg_compose_event(iev, IMSG_CONF_START, 0, 0, -1, env, sizeof(*env));
471 	TAILQ_FOREACH(idm, &env->sc_idms, idm_entry) {
472 		imsg_compose_event(iev, IMSG_CONF_IDM, 0, 0, -1,
473 		    idm, sizeof(*idm));
474 	}
475 	imsg_compose_event(iev, IMSG_CONF_END, 0, 0, -1, NULL, 0);
476 }
477 
478 void
479 main_init_timer(int fd, short event, void *p)
480 {
481 	struct env	*env = p;
482 
483 	main_configure_client(env);
484 }
485 
486 void
487 purge_config(struct env *env)
488 {
489 	struct idm	*idm;
490 
491 	while ((idm = TAILQ_FIRST(&env->sc_idms)) != NULL) {
492 		TAILQ_REMOVE(&env->sc_idms, idm, idm_entry);
493 		free(idm);
494 	}
495 }
496 
497 int
498 main(int argc, char *argv[])
499 {
500 	int		 c;
501 	int		 debug;
502 	struct passwd	*pw;
503 	struct env	 env;
504 	struct event	 ev_sigint;
505 	struct event	 ev_sigterm;
506 	struct event	 ev_sigchld;
507 	struct event	 ev_sighup;
508 	struct event	 ev_timer;
509 	struct timeval	 tv;
510 
511 	debug = 0;
512 	ypldap_process = PROC_MAIN;
513 
514 	log_init(1);
515 
516 	while ((c = getopt(argc, argv, "dD:nf:v")) != -1) {
517 		switch (c) {
518 		case 'd':
519 			debug = 2;
520 			break;
521 		case 'D':
522 			if (cmdline_symset(optarg) < 0)
523 				log_warnx("could not parse macro definition %s",
524 				    optarg);
525 			break;
526 		case 'n':
527 			debug = 2;
528 			opts |= YPLDAP_OPT_NOACTION;
529 			break;
530 		case 'f':
531 			conffile = optarg;
532 			break;
533 		case 'v':
534 			opts |= YPLDAP_OPT_VERBOSE;
535 			break;
536 		default:
537 			usage();
538 		}
539 	}
540 
541 	argc -= optind;
542 	argv += optind;
543 
544 	if (argc)
545 		usage();
546 
547 	RB_INIT(&env.sc_user_uids);
548 	RB_INIT(&env.sc_group_gids);
549 
550 	if (parse_config(&env, conffile, opts))
551 		exit(1);
552 	if (opts & YPLDAP_OPT_NOACTION) {
553 		fprintf(stderr, "configuration OK\n");
554 		exit(0);
555 	}
556 
557 	if (geteuid())
558 		errx(1, "need root privileges");
559 
560 	log_init(debug);
561 
562 	if (!debug) {
563 		if (daemon(1, 0) == -1)
564 			err(1, "failed to daemonize");
565 	}
566 
567 	log_info("startup%s", (debug > 1)?" [debug mode]":"");
568 
569 	if (socketpair(AF_UNIX, SOCK_STREAM | SOCK_NONBLOCK, PF_UNSPEC,
570 	    pipe_main2client) == -1)
571 		fatal("socketpair");
572 
573 	client_pid = ldapclient(pipe_main2client);
574 
575 	setproctitle("parent");
576 	event_init();
577 
578 	signal_set(&ev_sigint, SIGINT, main_sig_handler, &env);
579 	signal_set(&ev_sigterm, SIGTERM, main_sig_handler, &env);
580 	signal_set(&ev_sighup, SIGHUP, main_sig_handler, &env);
581 	signal_set(&ev_sigchld, SIGCHLD, main_sig_handler, &env);
582 	signal_add(&ev_sigint, NULL);
583 	signal_add(&ev_sigterm, NULL);
584 	signal_add(&ev_sighup, NULL);
585 	signal_add(&ev_sigchld, NULL);
586 
587 	close(pipe_main2client[1]);
588 	if ((env.sc_iev = calloc(1, sizeof(*env.sc_iev))) == NULL)
589 		fatal(NULL);
590 	imsg_init(&env.sc_iev->ibuf, pipe_main2client[0]);
591 	env.sc_iev->handler = main_dispatch_client;
592 
593 	env.sc_iev->events = EV_READ;
594 	env.sc_iev->data = &env;
595 	event_set(&env.sc_iev->ev, env.sc_iev->ibuf.fd, env.sc_iev->events,
596 	     env.sc_iev->handler, &env);
597 	event_add(&env.sc_iev->ev, NULL);
598 
599 	yp_init(&env);
600 
601 	if ((pw = getpwnam(YPLDAP_USER)) == NULL)
602 		fatal("getpwnam");
603 
604 #ifndef DEBUG
605 	if (setgroups(1, &pw->pw_gid) ||
606 	    setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) ||
607 	    setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid))
608 		fatal("cannot drop privileges");
609 #else
610 #warning disabling privilege revocation in debug mode
611 #endif
612 
613 	memset(&tv, 0, sizeof(tv));
614 	evtimer_set(&ev_timer, main_init_timer, &env);
615 	evtimer_add(&ev_timer, &tv);
616 
617 	yp_enable_events();
618 	event_dispatch();
619 	main_shutdown();
620 
621 	return (0);
622 }
623 
624 void
625 imsg_event_add(struct imsgev *iev)
626 {
627 	if (iev->handler == NULL) {
628 		imsg_flush(&iev->ibuf);
629 		return;
630 	}
631 
632 	iev->events = EV_READ;
633 	if (iev->ibuf.w.queued)
634 		iev->events |= EV_WRITE;
635 
636 	event_del(&iev->ev);
637 	event_set(&iev->ev, iev->ibuf.fd, iev->events, iev->handler, iev->data);
638 	event_add(&iev->ev, NULL);
639 }
640 
641 int
642 imsg_compose_event(struct imsgev *iev, u_int16_t type, u_int32_t peerid,
643     pid_t pid, int fd, void *data, u_int16_t datalen)
644 {
645 	int	ret;
646 
647 	if ((ret = imsg_compose(&iev->ibuf, type, peerid,
648 	    pid, fd, data, datalen)) != -1)
649 		imsg_event_add(iev);
650 	return (ret);
651 }
652