#include <afs/procmgmt.h>
#include <roken.h>
+#include <ctype.h>
#ifdef IGNORE_SOME_GCC_WARNINGS
-# pragma GCC diagnostic warning "-Wdeprecated-declarations"
+# ifdef __clang__
+# pragma GCC diagnostic ignored "-Wdeprecated-declarations"
+# else
+# pragma GCC diagnostic warning "-Wdeprecated-declarations"
+# endif
#endif
#ifdef HAVE_SYS_RESOURCE_H
#endif
#ifdef AFS_NT40_ENV
+#define PATH_DELIM '\\'
#include <direct.h>
#include <WINNT/afsevent.h>
#endif /* AFS_NT40_ENV */
+#define PATH_DELIM '/'
#include <rx/rx.h>
#include <rx/xdr.h>
#include <rx/rx_globals.h>
#include "bosint.h"
#include "bnode.h"
+#include "bnode_internal.h"
#include "bosprototypes.h"
#define BOZO_LWP_STACKSIZE 16000
#endif /* AFS_NT40_ENV */
}
+/*!
+ * Make directory with parents.
+ *
+ * \param[in] adir directory path to create
+ * \param[in] areqPerm permissions to set on the last component of adir
+ * \return 0 on success
+ */
+static int
+MakeDirParents(const char *adir, int areqPerm)
+{
+ struct stat stats;
+ int error = 0;
+ char *tdir;
+ char *p;
+ int parent_perm = 0777; /* use umask for parent perms */
+ size_t len;
+
+ tdir = strdup(adir);
+ if (!tdir) {
+ return ENOMEM;
+ }
+
+ /* strip trailing slashes */
+ len = strlen(tdir);
+ if (!len) {
+ return 0;
+ }
+ p = tdir + len - 1;
+ while (p != tdir && *p == PATH_DELIM) {
+ *p-- = '\0';
+ }
+
+ p = tdir;
+#ifdef AFS_NT40_ENV
+ /* skip drive letter */
+ if (isalpha(p[0]) && p[1] == ':') {
+ p += 2;
+ }
+#endif
+ /* skip leading slashes */
+ while (*p == PATH_DELIM) {
+ p++;
+ }
+
+ /* create parent directories with default perms */
+ p = strchr(p, PATH_DELIM);
+ while (p) {
+ *p = '\0';
+ if (stat(tdir, &stats) != 0 || !S_ISDIR(stats.st_mode)) {
+ if (mkdir(tdir, parent_perm) != 0) {
+ error = errno;
+ goto done;
+ }
+ }
+ *p++ = PATH_DELIM;
+
+ /* skip back to back slashes */
+ while (*p == PATH_DELIM) {
+ p++;
+ }
+ p = strchr(p, PATH_DELIM);
+ }
+
+ /* set required perms on the last path component */
+ if (stat(tdir, &stats) != 0 || !S_ISDIR(stats.st_mode)) {
+ if (mkdir(tdir, areqPerm) != 0) {
+ error = errno;
+ }
+ }
+
+ done:
+ free(tdir);
+ return error;
+}
+
/* make sure a dir exists */
static int
MakeDir(const char *adir)
reqPerm = GetRequiredDirPerm(adir);
if (reqPerm == -1)
reqPerm = 0777;
-#ifdef AFS_NT40_ENV
- /* underlying filesystem may not support directory protection */
- code = mkdir(adir);
-#else
- code = mkdir(adir, reqPerm);
-#endif
+ code = MakeDirParents(adir, reqPerm);
return code;
}
return 0;
for (code = 0; code < MAXPARMS; code++)
parms[code] = NULL;
- tfile = (FILE *) 0;
if (!aname)
aname = (char *)bozo_fileName;
tfile = fopen(aname, "r");
return 0; /* -1 */
instp = malloc(BOZO_BSSIZE);
typep = malloc(BOZO_BSSIZE);
- notifier = notp = malloc(BOZO_BSSIZE);
+ notp = malloc(BOZO_BSSIZE);
while (1) {
/* ok, read lines giving parms and such from the file */
tp = fgets(tbuffer, sizeof(tbuffer), tfile);
}
#endif
-#if 0
-/*
- * This routine causes the calling process to go into the background and
- * to lose its controlling tty.
- *
- * It does not close or otherwise alter the standard file descriptors.
- *
- * It writes warning messages to the standard error output if certain
- * fundamental errors occur.
- *
- * This routine has been tested on:
- *
- * AIX 4.2
- * Digital Unix 4.0D
- * HP-UX 11.0
- * IRIX 6.5
- * Linux 2.1.125
- * Solaris 2.5
- * Solaris 2.6
- */
-
-#ifndef AFS_NT40_ENV
-static void
-background(void)
-{
- /*
- * A process is a process group leader if its process ID
- * (getpid()) and its process group ID (getpgrp()) are the same.
- */
-
- /*
- * To create a new session (and thereby lose our controlling
- * terminal) we cannot be a process group leader.
- *
- * To guarantee we are not a process group leader, we fork and
- * let the parent process exit.
- */
-
- if (getpid() == getpgrp()) {
- pid_t pid;
- pid = fork();
- switch (pid) {
- case -1:
- abort(); /* leave footprints */
- break;
- case 0: /* child */
- break;
- default: /* parent */
- exit(0);
- break;
- }
- }
-
- /*
- * By here, we are not a process group leader, so we can make a
- * new session and become the session leader.
- */
-
- {
- pid_t sid = setsid();
-
- if (sid == -1) {
- static char err[] = "bosserver: WARNING: setsid() failed\n";
- write(STDERR_FILENO, err, sizeof err - 1);
- }
- }
-
- /*
- * Once we create a new session, the current process is a
- * session leader without a controlling tty.
- *
- * On some systems, the first tty device the session leader
- * opens automatically becomes the controlling tty for the
- * session.
- *
- * So, to guarantee we do not acquire a controlling tty, we fork
- * and let the parent process exit. The child process is not a
- * session leader, and so it will not acquire a controlling tty
- * even if it should happen to open a tty device.
- */
-
- if (getpid() == getpgrp()) {
- pid_t pid;
- pid = fork();
- switch (pid) {
- case -1:
- abort(); /* leave footprints */
- break;
- case 0: /* child */
- break;
- default: /* parent */
- exit(0);
- break;
- }
- }
-
- /*
- * check that we no longer have a controlling tty
- */
-
- {
- int fd;
-
- fd = open("/dev/tty", O_RDONLY);
-
- if (fd >= 0) {
- static char err[] =
- "bosserver: WARNING: /dev/tty still attached\n";
- close(fd);
- write(STDERR_FILENO, err, sizeof err - 1);
- }
- }
-}
-#endif /* ! AFS_NT40_ENV */
-#endif
-
static char *
make_pid_filename(char *ainst, char *aname)
{
char buffer[16];
FILE *fp;
- if (host == htonl(INADDR_ANY)) {
- host = htonl(0x7f000001);
- }
-
afs_inet_ntoa_r(host, buffer);
bozo_Log("Listening on %s:%d\n", buffer, AFSCONF_NANNYPORT);
if ((fp = fopen(AFSDIR_SERVER_BOZRXBIND_FILEPATH, "w")) == NULL) {
bozo_Log("Unable to open rxbind address file: %s, code=%d\n",
AFSDIR_SERVER_BOZRXBIND_FILEPATH, errno);
} else {
+ /* If listening on any interface, write the loopback interface
+ to the rxbind file to give local scripts a usable addresss. */
+ if (host == htonl(INADDR_ANY)) {
+ afs_inet_ntoa_r(htonl(0x7f000001), buffer);
+ }
fprintf(fp, "%s\n", buffer);
fclose(fp);
}
#ifndef AFS_NT40_ENV
printf("Usage: bosserver [-noauth] [-log] "
"[-auditlog <log path>] "
- "[-audit-interafce <file|sysvmq> (default is file)] "
+ "[-audit-interface <file|sysvmq> (default is file)] "
"[-rxmaxmtu <bytes>] [-rxbind] [-allow-dotted-principals]"
"[-syslog[=FACILITY]] "
"[-restricted] "
#else
printf("Usage: bosserver [-noauth] [-log] "
"[-auditlog <log path>] "
- "[-audit-interafce <file|sysvmq> (default is file)] "
+ "[-audit-interface <file|sysvmq> (default is file)] "
"[-rxmaxmtu <bytes>] [-rxbind] [-allow-dotted-principals]"
"[-restricted] "
"[-enable_peer_stats] [-enable_process_stats] "
else
chdir(AFSDIR_SERVER_LOGS_DIRPATH);
-#if 0
- fputs(AFS_GOVERNMENT_MESSAGE, stdout);
- fflush(stdout);
-#endif
-
/* go into the background and remove our controlling tty, close open
file desriptors
*/
if (AFSDIR_SERVER_NETRESTRICT_FILEPATH ||
AFSDIR_SERVER_NETINFO_FILEPATH) {
char reason[1024];
- ccode = parseNetFiles(SHostAddrs, NULL, NULL,
- ADDRSPERSITE, reason,
- AFSDIR_SERVER_NETINFO_FILEPATH,
- AFSDIR_SERVER_NETRESTRICT_FILEPATH);
+ ccode = afsconf_ParseNetFiles(SHostAddrs, NULL, NULL,
+ ADDRSPERSITE, reason,
+ AFSDIR_SERVER_NETINFO_FILEPATH,
+ AFSDIR_SERVER_NETRESTRICT_FILEPATH);
} else {
ccode = rx_getAllAddr(SHostAddrs, ADDRSPERSITE);
}
}
code = LWP_CreateProcess(BozoDaemon, BOZO_LWP_STACKSIZE, /* priority */ 1,
- /* param */ NULL , "bozo-the-clown",
- &bozo_pid);
+ /* param */ NULL , "bozo-the-clown", &bozo_pid);
+ if (code) {
+ bozo_Log("Failed to create daemon thread\n");
+ exit(1);
+ }
/* try to read the key from the config file */
tdir = afsconf_Open(AFSDIR_SERVER_ETC_DIRPATH);