properly abort if we fail to create debug files instead of crashing.
[citadel.git] / citadel / citserver.c
index d8eab8d2a56f676e3b2ae39487cfb3aa7791b788..d0902e266985afbaf7e8cb1658507e3955ceef84 100644 (file)
@@ -1,7 +1,7 @@
 /* 
  * Main source module for the Citadel server
  *
- * Copyright (c) 1987-2011 by the citadel.org team
+ * Copyright (c) 1987-2014 by the citadel.org team
  *
  * This program is open source software; you can redistribute it and/or modify
  * it under the terms of the GNU General Public License, version 3.
  * GNU General Public License for more details.
  */
 
-#include "sysdep.h"
-#include <stdlib.h>
-#include <unistd.h>
 #include <stdio.h>
-#include <fcntl.h>
-#include <signal.h>
-#include <sys/types.h>
-#include <sys/stat.h>
-
-#if TIME_WITH_SYS_TIME
-# include <sys/time.h>
-# include <time.h>
-#else
-# if HAVE_SYS_TIME_H
-#  include <sys/time.h>
-# else
-#  include <time.h>
-# endif
-#endif
-
+#include "sysdep.h"
+#include <time.h>
 #if HAVE_BACKTRACE
 #include <execinfo.h>
 #endif
-
-#include <ctype.h>
-#include <string.h>
-#include <errno.h>
-#include <limits.h>
-#include <netdb.h>
-#include <sys/types.h>
-#include <sys/socket.h>
-#include <netinet/in.h>
-#include <arpa/inet.h>
 #include <libcitadel.h>
-#include "citadel.h"
-#include "server.h"
-#include "sysdep_decls.h"
-#include "threads.h"
-#include "citserver.h"
-#include "config.h"
-#include "database.h"
+
+#include "ctdl_module.h"
 #include "housekeeping.h"
-#include "user_ops.h"
-#include "msgbase.h"
-#include "support.h"
 #include "locate_host.h"
-#include "room_ops.h"
+#include "citserver.h"
+#include "user_ops.h"
 #include "control.h"
-#include "euidindex.h"
-#include "context.h"
-#include "svn_revision.h"
-#include "ctdl_module.h"
+#include "config.h"
 
 char *unique_session_numbers;
 int ScheduledShutdown = 0;
@@ -81,14 +44,15 @@ void cit_backtrace(void)
        size_t size, i;
        char **strings;
 
-
+       const char *p = IOSTR;
+       if (p == NULL) p = "";
        size = backtrace(stack_frames, sizeof(stack_frames) / sizeof(void*));
        strings = backtrace_symbols(stack_frames, size);
        for (i = 0; i < size; i++) {
                if (strings != NULL)
-                       syslog(LOG_ALERT, "%s\n", strings[i]);
+                       syslog(LOG_ALERT, "%s %s\n", p, strings[i]);
                else
-                       syslog(LOG_ALERT, "%p\n", stack_frames[i]);
+                       syslog(LOG_ALERT, "%s %p\n", p, stack_frames[i]);
        }
        free(strings);
 #endif
@@ -114,7 +78,7 @@ void cit_oneline_backtrace(void)
                                StrBufAppendPrintf(Buf, "%p : ", stack_frames[i]);
                }
                free(strings);
-               syslog(LOG_ALERT, "%s\n", ChrPtr(Buf));
+               syslog(LOG_ALERT, "%s %s\n", IOSTR, ChrPtr(Buf));
                FreeStrBuf(&Buf);
        }
 #endif
@@ -153,12 +117,25 @@ void master_startup(void) {
        FILE *urandom;
        struct ctdlroom qrbuf;
        int rv;
+       struct passwd *pw;
+       gid_t gid;
        
        syslog(LOG_DEBUG, "master_startup() started\n");
        time(&server_startup_time);
        get_config();
 
-       syslog(LOG_INFO, "Opening databases\n");
+       syslog(LOG_INFO, "Checking directory access");
+       if ((pw = getpwuid(CTDLUID)) == NULL) {
+               gid = getgid();
+       } else {
+               gid = pw->pw_gid;
+       }
+
+       if (create_run_directories(CTDLUID, gid) != 0) {
+               syslog(LOG_EMERG, "failed to access & create directories");
+               exit(1);
+       }
+       syslog(LOG_INFO, "Opening databases");
        open_databases();
        check_ref_counts();
 
@@ -369,99 +346,6 @@ int CtdlIsPublicClient(void)
 
 
 
-/*
- * Back-end function for starting a session
- */
-void begin_session(CitContext *con)
-{
-       /* 
-        * Initialize some variables specific to our context.
-        */
-       con->logged_in = 0;
-       con->internal_pgm = 0;
-       con->download_fp = NULL;
-       con->upload_fp = NULL;
-       con->cached_msglist = NULL;
-       con->cached_num_msgs = 0;
-       con->FirstExpressMessage = NULL;
-       time(&con->lastcmd);
-       time(&con->lastidle);
-       strcpy(con->lastcmdname, "    ");
-       strcpy(con->cs_clientname, "(unknown)");
-       strcpy(con->curr_user, NLI);
-       *con->net_node = '\0';
-       *con->fake_username = '\0';
-       *con->fake_hostname = '\0';
-       *con->fake_roomname = '\0';
-       *con->cs_clientinfo = '\0';
-       safestrncpy(con->cs_host, config.c_fqdn, sizeof con->cs_host);
-       safestrncpy(con->cs_addr, "", sizeof con->cs_addr);
-       con->cs_UDSclientUID = -1;
-       con->cs_host[sizeof con->cs_host - 1] = 0;
-       if (!CC->is_local_socket) {
-               locate_host(con->cs_host, sizeof con->cs_host,
-                       con->cs_addr, sizeof con->cs_addr,
-                       con->client_socket
-               );
-       }
-       else {
-               con->cs_host[0] = 0;
-               con->cs_addr[0] = 0;
-#ifdef HAVE_STRUCT_UCRED
-               {
-                       /* as http://www.wsinnovations.com/softeng/articles/uds.html told us... */
-                       struct ucred credentials;
-                       socklen_t ucred_length = sizeof(struct ucred);
-                       
-                       /*fill in the user data structure */
-                       if(getsockopt(con->client_socket, SOL_SOCKET, SO_PEERCRED, &credentials, &ucred_length)) {
-                               syslog(LOG_NOTICE, "could obtain credentials from unix domain socket");
-                               
-                       }
-                       else {          
-                               /* the process ID of the process on the other side of the socket */
-                               /* credentials.pid; */
-                               
-                               /* the effective UID of the process on the other side of the socket  */
-                               con->cs_UDSclientUID = credentials.uid;
-                               
-                               /* the effective primary GID of the process on the other side of the socket */
-                               /* credentials.gid; */
-                               
-                               /* To get supplemental groups, we will have to look them up in our account
-                                  database, after a reverse lookup on the UID to get the account name.
-                                  We can take this opportunity to check to see if this is a legit account.
-                               */
-                               snprintf(con->cs_clientinfo, sizeof(con->cs_clientinfo),
-                                        "PID: "F_PID_T"; UID: "F_UID_T"; GID: "F_XPID_T" ", 
-                                        credentials.pid,
-                                        credentials.uid,
-                                        credentials.gid);
-                       }
-               }
-#endif
-       }
-       con->cs_flags = 0;
-       con->upload_type = UPL_FILE;
-       con->dl_is_net = 0;
-
-       con->nologin = 0;
-       if (((config.c_maxsessions > 0)&&(num_sessions > config.c_maxsessions)) || CtdlWantSingleUser()) {
-               con->nologin = 1;
-       }
-
-       if (!CC->is_local_socket) {
-               syslog(LOG_NOTICE, "Session (%s) started from %s (%s).\n", con->ServiceName, con->cs_host, con->cs_addr);
-       }
-       else {
-               syslog(LOG_NOTICE, "Session (%s) started via local socket UID:%d.\n", con->ServiceName, con->cs_UDSclientUID);
-       }
-
-       /* Run any session startup routines registered by loadable modules */
-       PerformSessionHooks(EVT_START);
-}
-
-
 void citproto_begin_session() {
        if (CC->nologin==1) {
                cprintf("%d %s: Too many users are already online (maximum is %d)\n",