X-Git-Url: https://git.tokkee.org/?p=sysdb.git;a=blobdiff_plain;f=src%2Ftools%2Fsysdb%2Fmain.c;h=1f3975a7949b52491d4b0b2fe37660260e556649;hp=9b575cc825746c47548b87968090c65c0d77b6b2;hb=5cc17919bcf0cc5474811e376bdba8989f0b54d3;hpb=3cc3e3c36239c902263678100180c95c8263f7f8 diff --git a/src/tools/sysdb/main.c b/src/tools/sysdb/main.c index 9b575cc..1f3975a 100644 --- a/src/tools/sysdb/main.c +++ b/src/tools/sysdb/main.c @@ -29,14 +29,19 @@ # include "config.h" #endif /* HAVE_CONFIG_H */ +#include "tools/sysdb/command.h" #include "tools/sysdb/input.h" #include "client/sysdb.h" #include "client/sock.h" #include "utils/error.h" +#include "utils/llist.h" #include "utils/strbuf.h" +#include "utils/os.h" +#include "utils/ssl.h" #include +#include #if HAVE_LIBGEN_H # include @@ -46,11 +51,10 @@ #include #include - +#include #include #include #include - #include #include @@ -78,20 +82,67 @@ # define DEFAULT_SOCKET "unix:"LOCALSTATEDIR"/run/sysdbd.sock" #endif -extern int yylex(void); +static sdb_ssl_options_t ssl_options = { + /* ca_file */ SDB_SSL_CAFILE, + /* key_file */ "~/.config/sysdb/ssl/key.pem", + /* cert_file */ "~/.config/sysdb/ssl/cert.pem", + /* crl_file */ "~/.config/sysdb/ssl/crl.pem", +}; + +static void +canonicalize_ssl_options(void) +{ + char *tmp; + if (ssl_options.ca_file) { + tmp = sdb_realpath(ssl_options.ca_file); + ssl_options.ca_file = tmp ? tmp : strdup(ssl_options.ca_file); + } + if (ssl_options.key_file) { + tmp = sdb_realpath(ssl_options.key_file); + ssl_options.key_file = tmp ? tmp : strdup(ssl_options.key_file); + } + if (ssl_options.cert_file) { + tmp = sdb_realpath(ssl_options.cert_file); + ssl_options.cert_file = tmp ? tmp : strdup(ssl_options.cert_file); + } + if (ssl_options.crl_file) { + tmp = sdb_realpath(ssl_options.crl_file); + ssl_options.crl_file = tmp ? tmp : strdup(ssl_options.crl_file); + } +} /* canonicalize_ssl_options */ static void exit_usage(char *name, int status) { + char *user = sdb_get_current_user(); printf( "Usage: %s \n" -"\nOptions:\n" -" -h display this help and exit\n" -" -V display the version number and copyright\n" +"Connection options:\n" +" -H HOST the host to connect to\n" +" default: "DEFAULT_SOCKET"\n" +" -U USER the username to connect as\n" +" default: %s\n" +" -c CMD execute the specified command and then exit\n" +"\n" +"SSL options:\n" +" -K KEYFILE private key file name\n" +" default: %s\n" +" -C CERTFILE client certificate file name\n" +" default: %s\n" +" -A CAFILE CA certificates file name\n" +" default: %s\n" +"\n" +"General options:\n" +"\n" +" -h display this help and exit\n" +" -V display the version number and copyright\n" "\nSysDB client "SDB_CLIENT_VERSION_STRING SDB_CLIENT_VERSION_EXTRA", " -PACKAGE_URL"\n", basename(name)); +PACKAGE_URL"\n", basename(name), user, + ssl_options.key_file, ssl_options.cert_file, ssl_options.ca_file); + + free(user); exit(status); } /* exit_usage */ @@ -101,7 +152,7 @@ exit_version(void) printf("SysDB version "SDB_CLIENT_VERSION_STRING SDB_CLIENT_VERSION_EXTRA", built "BUILD_DATE"\n" "using libsysdbclient version %s%s\n" - "Copyright (C) 2012-2013 "PACKAGE_MAINTAINER"\n" + "Copyright (C) 2012-2014 "PACKAGE_MAINTAINER"\n" "\nThis is free software under the terms of the BSD license, see " "the source for\ncopying conditions. There is NO WARRANTY; not " @@ -111,72 +162,72 @@ exit_version(void) exit(0); } /* exit_version */ -static const char * -get_current_user(void) +static int +execute_commands(sdb_input_t *input, sdb_llist_t *commands) { - struct passwd pw_entry; - struct passwd *result = NULL; - - uid_t uid; - - /* needs to be static because we return a pointer into this buffer - * to the caller */ - static char buf[1024]; + sdb_llist_iter_t *iter; + int status = 0; - int status; - - uid = geteuid(); - - memset(&pw_entry, 0, sizeof(pw_entry)); - status = getpwuid_r(uid, &pw_entry, buf, sizeof(buf), &result); - - if (status || (! result)) { - char errbuf[1024]; - sdb_log(SDB_LOG_ERR, "Failed to determine current username: %s", - sdb_strerror(errno, errbuf, sizeof(errbuf))); - return NULL; + iter = sdb_llist_get_iter(commands); + if (! iter) { + sdb_log(SDB_LOG_ERR, "Failed to iterate commands"); + return 1; } - return result->pw_name; -} /* get_current_user */ -static const char * -get_homedir(const char *username) -{ - struct passwd pw_entry; - struct passwd *result = NULL; + while (sdb_llist_iter_has_next(iter)) { + sdb_object_t *obj = sdb_llist_iter_get_next(iter); - /* needs to be static because we return a pointer into this buffer - * to the caller */ - static char buf[1024]; + if (sdb_client_send(input->client, SDB_CONNECTION_QUERY, + (uint32_t)strlen(obj->name), obj->name) <= 0) { + sdb_log(SDB_LOG_ERR, "Failed to send command '%s' to server", + obj->name); + status = 1; + break; + } - int status; + /* Wait for server replies. We might get any number of log messages + * but eventually see the reply to the query, which is either DATA or + * ERROR. */ + while (42) { + status = sdb_command_print_reply(input); + if (status < 0) { + sdb_log(SDB_LOG_ERR, "Failed to read reply from server"); + break; + } - memset(&pw_entry, 0, sizeof(pw_entry)); - status = getpwnam_r(username, &pw_entry, buf, sizeof(buf), &result); + if ((status == SDB_CONNECTION_DATA) + || (status == SDB_CONNECTION_ERROR)) + break; + if (status == SDB_CONNECTION_OK) { + /* pre 0.4 versions used OK instead of DATA */ + sdb_log(SDB_LOG_WARNING, "Received unexpected OK status from " + "server in response to a QUERY (expected DATA); " + "assuming we're talking to an old server"); + break; + } + } - if (status || (! result)) { - char errbuf[1024]; - sdb_log(SDB_LOG_WARNING, "Failed to determine home directory " - "for user %s: %s", username, - sdb_strerror(errno, errbuf, sizeof(errbuf))); - return NULL; + if ((status != SDB_CONNECTION_OK) && (status != SDB_CONNECTION_DATA)) + break; /* error */ } - return result->pw_dir; -} /* get_homedir */ + + sdb_llist_iter_destroy(iter); + return status; +} /* execute_commands */ int main(int argc, char **argv) { const char *host = NULL; - const char *user = NULL; - const char *homedir; + char *homedir; char hist_file[1024] = ""; sdb_input_t input = SDB_INPUT_INIT; + sdb_llist_t *commands = NULL; while (42) { - int opt = getopt(argc, argv, "H:U:hV"); + int opt = getopt(argc, argv, "H:U:c:C:K:A:hV"); if (-1 == opt) break; @@ -186,7 +237,41 @@ main(int argc, char **argv) host = optarg; break; case 'U': - user = optarg; + input.user = optarg; + break; + + case 'c': + { + sdb_object_t *obj; + + if (! commands) + commands = sdb_llist_create(); + if (! commands) { + sdb_log(SDB_LOG_ERR, "Failed to create list object"); + exit(1); + } + + if (! (obj = sdb_object_create_T(optarg, sdb_object_t))) { + sdb_log(SDB_LOG_ERR, "Failed to create object"); + exit(1); + } + if (sdb_llist_append(commands, obj)) { + sdb_log(SDB_LOG_ERR, "Failed to append command to list"); + sdb_object_deref(obj); + exit(1); + } + sdb_object_deref(obj); + } + break; + + case 'C': + ssl_options.cert_file = optarg; + break; + case 'K': + ssl_options.key_file = optarg; + break; + case 'A': + ssl_options.ca_file = optarg; break; case 'h': @@ -205,32 +290,64 @@ main(int argc, char **argv) if (! host) host = DEFAULT_SOCKET; - if (! user) { - user = get_current_user(); - if (! user) - exit(1); - } + if (! input.user) + input.user = sdb_get_current_user(); + else + input.user = strdup(input.user); + if (! input.user) + exit(1); + + if (sdb_ssl_init()) + exit(1); input.client = sdb_client_create(host); if (! input.client) { sdb_log(SDB_LOG_ERR, "Failed to create client object"); + sdb_input_reset(&input); exit(1); } - if (sdb_client_connect(input.client, user)) { + input.input = sdb_strbuf_create(2048); + sdb_input_init(&input); + + canonicalize_ssl_options(); + if (sdb_client_set_ssl_options(input.client, &ssl_options)) { + sdb_log(SDB_LOG_ERR, "Failed to apply SSL options"); + sdb_input_reset(&input); + sdb_ssl_free_options(&ssl_options); + exit(1); + } + sdb_ssl_free_options(&ssl_options); + if (sdb_client_connect(input.client, input.user)) { sdb_log(SDB_LOG_ERR, "Failed to connect to SysDBd"); - sdb_client_destroy(input.client); + sdb_input_reset(&input); exit(1); } + if (commands) { + int status; + input.interactive = 0; + status = execute_commands(&input, commands); + sdb_llist_destroy(commands); + sdb_input_reset(&input); + if ((status != SDB_CONNECTION_OK) && (status != SDB_CONNECTION_DATA)) + exit(1); + exit(0); + } + sdb_log(SDB_LOG_INFO, "SysDB client "SDB_CLIENT_VERSION_STRING - SDB_CLIENT_VERSION_EXTRA"\n"); + SDB_CLIENT_VERSION_EXTRA" (libsysdbclient %s%s)", + sdb_client_version_string(), sdb_client_version_extra()); + sdb_command_print_server_version(&input); + printf("\n"); using_history(); - if ((homedir = get_homedir(user))) { + if ((homedir = sdb_get_homedir())) { snprintf(hist_file, sizeof(hist_file) - 1, "%s/.sysdb_history", homedir); hist_file[sizeof(hist_file) - 1] = '\0'; + free(homedir); + homedir = NULL; errno = 0; if (read_history(hist_file) && (errno != ENOENT)) { @@ -240,9 +357,16 @@ main(int argc, char **argv) } } - input.input = sdb_strbuf_create(2048); - sdb_input_init(&input); - yylex(); + signal(SIGPIPE, SIG_IGN); + signal(SIGCHLD, SIG_IGN); + + sdb_input_mainloop(); + + sdb_client_shutdown(input.client, SHUT_WR); + while (! sdb_client_eof(input.client)) { + /* wait for remaining data to arrive */ + sdb_command_print_reply(&input); + } if (hist_file[0] != '\0') { errno = 0; @@ -253,8 +377,8 @@ main(int argc, char **argv) } } - sdb_client_destroy(input.client); - sdb_strbuf_destroy(input.input); + sdb_input_reset(&input); + sdb_ssl_shutdown(); return 0; } /* main */