2 * This module handles shared rooms, inter-Citadel mail, and outbound
3 * mailing list processing.
5 * Copyright (c) 2000-2011 by the citadel.org team
7 * This program is open source software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 * ** NOTE ** A word on the S_NETCONFIGS semaphore:
22 * This is a fairly high-level type of critical section. It ensures that no
23 * two threads work on the netconfigs files at the same time. Since we do
24 * so many things inside these, here are the rules:
25 * 1. begin_critical_section(S_NETCONFIGS) *before* begin_ any others.
26 * 2. Do *not* perform any I/O with the client during these sections.
31 * Duration of time (in seconds) after which pending list subscribe/unsubscribe
32 * requests that have not been confirmed will be deleted.
34 #define EXP 259200 /* three days */
46 #include <sys/types.h>
48 #if TIME_WITH_SYS_TIME
49 # include <sys/time.h>
53 # include <sys/time.h>
61 # if HAVE_SYS_SYSCALL_H
62 # include <sys/syscall.h>
69 #include <libcitadel.h>
72 #include "citserver.h"
78 #include "internet_addressing.h"
79 #include "serv_network.h"
80 #include "clientsocket.h"
82 #include "citadel_dirs.h"
90 #include "netconfig.h"
91 #include "ctdl_module.h"
95 * We build a map of network nodes during processing.
97 NetMap *the_netmap = NULL;
98 int netmap_changed = 0;
99 char *working_ignetcfg = NULL;
102 * Load or refresh the Citadel network (IGnet) configuration for this node.
104 void load_working_ignetcfg(void) {
108 cfg = CtdlGetSysConfig(IGNETCFG);
113 oldcfg = working_ignetcfg;
114 working_ignetcfg = cfg;
115 if (oldcfg != NULL) {
121 * Read the network map from its configuration file into memory.
123 void read_network_map(void) {
124 char *serialized_map = NULL;
129 serialized_map = CtdlGetSysConfig(IGNETMAP);
130 if (serialized_map == NULL) return; /* if null, no entries */
132 /* Use the string tokenizer to grab one line at a time */
133 for (i=0; i<num_tokens(serialized_map, '\n'); ++i) {
134 extract_token(buf, serialized_map, i, '\n', sizeof buf);
135 nmptr = (NetMap *) malloc(sizeof(NetMap));
136 extract_token(nmptr->nodename, buf, 0, '|', sizeof nmptr->nodename);
137 nmptr->lastcontact = extract_long(buf, 1);
138 extract_token(nmptr->nexthop, buf, 2, '|', sizeof nmptr->nexthop);
139 nmptr->next = the_netmap;
143 free(serialized_map);
149 * Write the network map from memory back to the configuration file.
151 void write_network_map(void) {
152 char *serialized_map = NULL;
156 if (netmap_changed) {
157 serialized_map = strdup("");
159 if (the_netmap != NULL) {
160 for (nmptr = the_netmap; nmptr != NULL; nmptr = nmptr->next) {
161 serialized_map = realloc(serialized_map,
162 (strlen(serialized_map)+SIZ) );
163 if (!IsEmptyStr(nmptr->nodename)) {
164 snprintf(&serialized_map[strlen(serialized_map)],
168 (long)nmptr->lastcontact,
174 CtdlPutSysConfig(IGNETMAP, serialized_map);
175 free(serialized_map);
178 /* Now free the list */
179 while (the_netmap != NULL) {
180 nmptr = the_netmap->next;
190 * Keep track of what messages to reject
192 FilterList *load_filter_list(void) {
193 char *serialized_list = NULL;
196 FilterList *newlist = NULL;
199 serialized_list = CtdlGetSysConfig(FILTERLIST);
200 if (serialized_list == NULL) return(NULL); /* if null, no entries */
202 /* Use the string tokenizer to grab one line at a time */
203 for (i=0; i<num_tokens(serialized_list, '\n'); ++i) {
204 extract_token(buf, serialized_list, i, '\n', sizeof buf);
205 nptr = (FilterList *) malloc(sizeof(FilterList));
206 extract_token(nptr->fl_user, buf, 0, '|', sizeof nptr->fl_user);
207 striplt(nptr->fl_user);
208 extract_token(nptr->fl_room, buf, 1, '|', sizeof nptr->fl_room);
209 striplt(nptr->fl_room);
210 extract_token(nptr->fl_node, buf, 2, '|', sizeof nptr->fl_node);
211 striplt(nptr->fl_node);
213 /* Cowardly refuse to add an any/any/any entry that would
214 * end up filtering every single message.
216 if (IsEmptyStr(nptr->fl_user) &&
217 IsEmptyStr(nptr->fl_room) &&
218 IsEmptyStr(nptr->fl_node)) {
222 nptr->next = newlist;
227 free(serialized_list);
232 void free_filter_list(FilterList *fl) {
233 if (fl == NULL) return;
234 free_filter_list(fl->next);
239 * Check the network map and determine whether the supplied node name is
240 * valid. If it is not a neighbor node, supply the name of a neighbor node
241 * which is the next hop. If it *is* a neighbor node, we also fill in the
244 int is_valid_node(char *nexthop, char *secret, char *node) {
256 * First try the neighbor nodes
258 if (working_ignetcfg == NULL) {
259 syslog(LOG_ERR, "working_ignetcfg is NULL!\n");
260 if (nexthop != NULL) {
267 if (nexthop != NULL) {
271 /* Use the string tokenizer to grab one line at a time */
272 for (i=0; i<num_tokens(working_ignetcfg, '\n'); ++i) {
273 extract_token(linebuf, working_ignetcfg, i, '\n', sizeof linebuf);
274 extract_token(buf, linebuf, 0, '|', sizeof buf);
275 if (!strcasecmp(buf, node)) {
276 if (nexthop != NULL) {
279 if (secret != NULL) {
280 extract_token(secret, linebuf, 1, '|', 256);
287 return(retval); /* yup, it's a direct neighbor */
291 * If we get to this point we have to see if we know the next hop
293 if (the_netmap != NULL) {
294 for (nmptr = the_netmap; nmptr != NULL; nmptr = nmptr->next) {
295 if (!strcasecmp(nmptr->nodename, node)) {
296 if (nexthop != NULL) {
297 strcpy(nexthop, nmptr->nexthop);
305 * If we get to this point, the supplied node name is bogus.
307 syslog(LOG_ERR, "Invalid node name <%s>\n", node);
313 void cmd_gnet(char *argbuf) {
314 char filename[PATH_MAX];
318 if ( (CC->room.QRflags & QR_MAILBOX) && (CC->user.usernum == atol(CC->room.QRname)) ) {
319 /* users can edit the netconfigs for their own mailbox rooms */
321 else if (CtdlAccessCheck(ac_room_aide)) return;
323 assoc_file_name(filename, sizeof filename, &CC->room, ctdl_netcfg_dir);
324 cprintf("%d Network settings for room #%ld <%s>\n",
326 CC->room.QRnumber, CC->room.QRname);
328 fp = fopen(filename, "r");
330 while (fgets(buf, sizeof buf, fp) != NULL) {
331 buf[strlen(buf)-1] = 0;
332 cprintf("%s\n", buf);
341 void cmd_snet(char *argbuf) {
342 char tempfilename[PATH_MAX];
343 char filename[PATH_MAX];
352 if ( (CC->room.QRflags & QR_MAILBOX) && (CC->user.usernum == atol(CC->room.QRname)) ) {
353 /* users can edit the netconfigs for their own mailbox rooms */
355 else if (CtdlAccessCheck(ac_room_aide)) return;
357 len = assoc_file_name(filename, sizeof filename, &CC->room, ctdl_netcfg_dir);
358 memcpy(tempfilename, filename, len + 1);
360 memset(&StatBuf, 0, sizeof(struct stat));
361 if ((stat(filename, &StatBuf) == -1) || (StatBuf.st_size == 0))
362 StatBuf.st_size = 80; /* Not there or empty? guess 80 chars line. */
364 sprintf(tempfilename + len, ".%d", CC->cs_pid);
366 TmpFD = open(tempfilename, O_CREAT|O_EXCL|O_RDWR, S_IRUSR|S_IWUSR);
368 if ((TmpFD > 0) && (errno == 0))
370 char *tmp = malloc(StatBuf.st_size * 2);
371 memset(tmp, ' ', StatBuf.st_size * 2);
372 rc = write(TmpFD, tmp, StatBuf.st_size * 2);
374 if ((rc <= 0) || (rc != StatBuf.st_size * 2))
377 cprintf("%d Unable to allocate the space required for %s: %s\n",
378 ERROR + INTERNAL_ERROR,
381 unlink(tempfilename);
384 lseek(TmpFD, SEEK_SET, 0);
387 cprintf("%d Unable to allocate the space required for %s: %s\n",
388 ERROR + INTERNAL_ERROR,
391 unlink(tempfilename);
396 cprintf("%d %s\n", SEND_LISTING, tempfilename);
399 while (rc = CtdlClientGetLine(Line),
402 if ((rc == 3) && (strcmp(ChrPtr(Line), "000") == 0))
404 StrBufAppendBufPlain(Line, HKEY("\n"), 0);
405 write(TmpFD, ChrPtr(Line), StrLength(Line));
406 len += StrLength(Line);
409 ftruncate(TmpFD, len);
412 /* Now copy the temp file to its permanent location.
413 * (We copy instead of link because they may be on different filesystems)
415 begin_critical_section(S_NETCONFIGS);
416 rename(tempfilename, filename);
417 end_critical_section(S_NETCONFIGS);
421 * cmd_netp() - authenticate to the server as another Citadel node polling
422 * for network traffic
424 void cmd_netp(char *cmdbuf)
435 extract_token(node, cmdbuf, 0, '|', sizeof node);
436 extract_token(pass, cmdbuf, 1, '|', sizeof pass);
438 /* load the IGnet Configuration to check node validity */
439 load_working_ignetcfg();
440 v = is_valid_node(nexthop, secret, node);
443 snprintf(err_buf, sizeof err_buf,
444 "An unknown Citadel server called \"%s\" attempted to connect from %s [%s].\n",
445 node, CC->cs_host, CC->cs_addr
447 syslog(LOG_WARNING, "%s", err_buf);
448 cprintf("%d authentication failed\n", ERROR + PASSWORD_REQUIRED);
449 CtdlAideMessage(err_buf, "IGNet Networking.");
453 if (strcasecmp(pass, secret)) {
454 snprintf(err_buf, sizeof err_buf,
455 "A Citadel server at %s [%s] failed to authenticate as network node \"%s\".\n",
456 CC->cs_host, CC->cs_addr, node
458 syslog(LOG_WARNING, "%s", err_buf);
459 cprintf("%d authentication failed\n", ERROR + PASSWORD_REQUIRED);
460 CtdlAideMessage(err_buf, "IGNet Networking.");
464 if (network_talking_to(node, NTT_CHECK)) {
465 syslog(LOG_WARNING, "Duplicate session for network node <%s>", node);
466 cprintf("%d Already talking to %s right now\n", ERROR + RESOURCE_BUSY, node);
470 safestrncpy(CC->net_node, node, sizeof CC->net_node);
471 network_talking_to(node, NTT_ADD);
472 syslog(LOG_NOTICE, "Network node <%s> logged in from %s [%s]\n",
473 CC->net_node, CC->cs_host, CC->cs_addr
475 cprintf("%d authenticated as network node '%s'\n", CIT_OK, CC->net_node);
481 CTDL_MODULE_INIT(netconfig)
485 CtdlRegisterProtoHook(cmd_gnet, "GNET", "Get network config");
486 CtdlRegisterProtoHook(cmd_snet, "SNET", "Set network config");
487 CtdlRegisterProtoHook(cmd_netp, "NETP", "Identify as network poller");