1056 lines
34 KiB
C
1056 lines
34 KiB
C
/*
|
|
* FCRON - periodic command scheduler
|
|
*
|
|
* Copyright 2000-2014 Thibault Godouet <fcron@free.fr>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*
|
|
* The GNU General Public License can also be found in the file
|
|
* `LICENSE' that comes with the fcron source distribution.
|
|
*/
|
|
|
|
|
|
/* This file contains all fcron's code (server) to handle communication with fcrondyn */
|
|
|
|
|
|
#include "fcron.h"
|
|
#include "socket.h"
|
|
#include "getloadavg.h"
|
|
#include "database.h"
|
|
#include "fcronconf.h"
|
|
|
|
|
|
void remove_connection(struct fcrondyn_cl **client,
|
|
struct fcrondyn_cl *prev_client);
|
|
void exe_cmd(struct fcrondyn_cl *client);
|
|
#ifdef SO_PEERCRED /* linux */
|
|
void auth_client_so_peercred(struct fcrondyn_cl *client);
|
|
#elif defined(HAVE_GETPEERUCRED) || defined(HAVE_GETPEEREID) /* resp. solaris 10 and Free/OpenBSD) */
|
|
void auth_client_getpeer(struct fcrondyn_cl *client);
|
|
#endif
|
|
void auth_client_password(struct fcrondyn_cl *client);
|
|
void cmd_ls(struct fcrondyn_cl *client, long int *cmd, int fd, int is_root);
|
|
void print_fields(int fd, unsigned char *details);
|
|
void print_line(int fd, struct cl_t *line, unsigned char *details, pid_t pid,
|
|
int index, time_t until);
|
|
void cmd_on_exeq(struct fcrondyn_cl *client, long int *cmd, int fd,
|
|
int is_root);
|
|
void cmd_renice(struct fcrondyn_cl *client, long int *cmd, int fd, exe_t * e,
|
|
int is_root);
|
|
void cmd_send_signal(struct fcrondyn_cl *client, long int *cmd, int fd,
|
|
exe_t * e);
|
|
void cmd_run(struct fcrondyn_cl *client, long int *cmd, int fd, int is_root);
|
|
void add_to_select_set(int fd, fd_set * set, int *max_fd);
|
|
void remove_from_select_set(int fd, fd_set * set, int *max_fd);
|
|
|
|
fcrondyn_cl *fcrondyn_cl_base; /* list of connected fcrondyn clients */
|
|
int fcrondyn_cl_num = 0; /* number of fcrondyn clients currently connected */
|
|
fd_set read_set; /* client fds list : cmd waiting ? */
|
|
fd_set master_set; /* master set : needed since select() modify read_set */
|
|
int set_max_fd = 0; /* needed by select() */
|
|
int listen_fd = -1; /* fd which catches incoming connection */
|
|
int auth_fail = 0; /* number of auth failure */
|
|
time_t auth_nofail_since = 0; /* we refuse auth since x due to too many failures */
|
|
|
|
/* some error messages ... */
|
|
char err_no_err_str[] = "Command successfully completed.\n";
|
|
char err_unknown_str[] =
|
|
"Fcron has encountered an error : command not completed.\n";
|
|
char err_cmd_unknown_str[] = "Unknown command.\n";
|
|
char err_job_nfound_str[] = "No corresponding job found.\n";
|
|
char err_rjob_nfound_str[] =
|
|
"No corresponding running job found.\n (The job may have "
|
|
"just finished its execution.)\n";
|
|
char err_invalid_user_str[] = "Invalid user : unable to find a passwd entry.\n";
|
|
char err_invalid_args_str[] = "Invalid arguments.\n";
|
|
char err_job_nallowed_str[] = "You are not allowed to see/change this line.\n";
|
|
char err_all_nallowed_str[] = "You are not allowed to list all jobs.\n";
|
|
char err_others_nallowed_str[] =
|
|
"You are not allowed to list other users' jobs.\n";
|
|
|
|
/* Send an error message to fcrondyn */
|
|
#define Send_err_msg(FD, MSG) \
|
|
send(FD, MSG, sizeof(MSG), 0);
|
|
|
|
/* to tell fcrondyn there's no more data to wait */
|
|
#define Tell_no_more_data(FD) \
|
|
send(FD, END_STR, sizeof(END_STR), 0);
|
|
|
|
/* Send an error message to fcrondyn and return */
|
|
#define Send_err_msg_end(FD, MSG) \
|
|
{ \
|
|
send(FD, MSG, sizeof(MSG), 0); \
|
|
Tell_no_more_data(FD); \
|
|
}
|
|
|
|
/* which bit corresponds to which field ? */
|
|
#define FIELD_USER 0
|
|
#define FIELD_RQ 1
|
|
#define FIELD_PID 2
|
|
#define FIELD_SCHEDULE 3
|
|
#define FIELD_LAVG 4
|
|
#define FIELD_INDEX 5
|
|
#define FIELD_OPTIONS 6
|
|
|
|
/* the number of char we need (8 bits (i.e. fields) per char) */
|
|
#define FIELD_NUM_SIZE 1
|
|
|
|
|
|
void
|
|
add_to_select_set(int fd, fd_set * set, int *max_fd)
|
|
/* add fd to set, and update max_fd if necessary (for select()) */
|
|
{
|
|
FD_SET(fd, set);
|
|
if (fd > *max_fd)
|
|
*max_fd = fd;
|
|
}
|
|
|
|
|
|
void
|
|
remove_from_select_set(int fd, fd_set * set, int *max_fd)
|
|
/* remove fd to set, and update max_fd if necessary (for select()) */
|
|
{
|
|
FD_CLR(fd, set);
|
|
if (fd == *max_fd) {
|
|
/* find the biggest fd in order to update max_fd */
|
|
struct fcrondyn_cl *client;
|
|
int tmp_max_fd = listen_fd;
|
|
|
|
for (client = fcrondyn_cl_base; client != NULL;
|
|
client = client->fcl_next) {
|
|
if (client->fcl_sock_fd > tmp_max_fd)
|
|
tmp_max_fd = client->fcl_sock_fd;
|
|
}
|
|
|
|
/* update max_fd */
|
|
*max_fd = tmp_max_fd;
|
|
}
|
|
}
|
|
|
|
|
|
void
|
|
init_socket(void)
|
|
/* do everything needed to get a working listening socket */
|
|
{
|
|
struct sockaddr_un addr;
|
|
int len = 0;
|
|
int sun_len = 0;
|
|
|
|
/* used in fcron.c:main_loop():select() */
|
|
FD_ZERO(&read_set);
|
|
FD_ZERO(&master_set);
|
|
|
|
if ((listen_fd = socket(PF_UNIX, SOCK_STREAM, 0)) == -1) {
|
|
error_e("Could not create socket : fcrondyn won't work");
|
|
return;
|
|
}
|
|
|
|
addr.sun_family = AF_UNIX;
|
|
len = strlen(fifofile);
|
|
if (len > sizeof(addr.sun_path) - 1) {
|
|
error("Error : fifo file path too long (max is %d)",
|
|
sizeof(addr.sun_path) - 1);
|
|
goto err;
|
|
}
|
|
strncpy(addr.sun_path, fifofile, sizeof(addr.sun_path));
|
|
addr.sun_path[sizeof(addr.sun_path) - 1] = '\0';
|
|
sun_len = (addr.sun_path - (char *)&addr) + len;
|
|
#if HAVE_SA_LEN
|
|
addr.sun_len = sun_len;
|
|
#endif
|
|
|
|
unlink(fifofile);
|
|
if (bind(listen_fd, (struct sockaddr *)&addr, sun_len) != 0) {
|
|
error_e("Cannot bind socket to '%s'", fifofile);
|
|
goto err;
|
|
}
|
|
|
|
if (listen(listen_fd, MAX_CONNECTION) != 0) {
|
|
error_e("Cannot set socket in listen mode");
|
|
goto err;
|
|
}
|
|
|
|
/* */
|
|
/* The exec bit is not necessary and ignored on all systems but AIX, where it is
|
|
* needed to allow fcrondyn to open the file */
|
|
if (chmod
|
|
(fifofile,
|
|
S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IWGRP | S_IXGRP | S_IROTH |
|
|
S_IWOTH | S_IXOTH) != 0)
|
|
error_e("Cannot chmod() socket file");
|
|
/* */
|
|
|
|
fcntl(listen_fd, F_SETFD, 1);
|
|
/* set listen_fd to O_NONBLOCK : we do not want fcron to be stopped on error, etc */
|
|
if (fcntl(listen_fd, F_SETFL, fcntl(listen_fd, F_GETFL) | O_NONBLOCK) == -1) {
|
|
error_e
|
|
("Could not set listen_fd attribute O_NONBLOCK : no fcrondyn support");
|
|
goto err;
|
|
}
|
|
|
|
/* no error */
|
|
add_to_select_set(listen_fd, &master_set, &set_max_fd);
|
|
|
|
/* copy master in read_fs, because read_fs will be modified by select() */
|
|
read_set = master_set;
|
|
debug("Socket initialized : listen_fd : %d set_max_fd : %d ", listen_fd,
|
|
set_max_fd);
|
|
return;
|
|
|
|
err:
|
|
close_socket();
|
|
|
|
}
|
|
|
|
#if defined(HAVE_GETPEERUCRED)
|
|
void
|
|
auth_client_getpeer(struct fcrondyn_cl *client)
|
|
/* check client identity by reading its credentials from the socket
|
|
* using getpeerucred() (Solaris 10 onward).
|
|
* Sets client->fcl_user on success, don't do anything on failure
|
|
* so that the client stays unauthenticated */
|
|
{
|
|
struct passwd *p_entry = NULL;
|
|
ucred_t *ucred = NULL;
|
|
uid_t uid = -1;
|
|
|
|
if (getpeerucred(client->fcl_sock_fd, &ucred) < 0) {
|
|
error_e("Could not get client credentials using getpeerucred()");
|
|
return;
|
|
}
|
|
uid = ucred_getruid(ucred);
|
|
if (uid == -1) {
|
|
error_e("Could not get client uid from ucred_t");
|
|
return;
|
|
}
|
|
p_entry = getpwuid(uid);
|
|
if (p_entry == NULL) {
|
|
error_e("Could not find password entry for uid %d", uid);
|
|
return;
|
|
}
|
|
|
|
/* Successfully identified user: */
|
|
client->fcl_user = strdup2(p_entry->pw_name);
|
|
|
|
explain("Client's pid=%d, uid=%d, username=%s",
|
|
ucred_getpid(ucred), uid, client->fcl_user);
|
|
|
|
}
|
|
#endif /* HAVE_GETPEERUCRED */
|
|
|
|
#if defined(HAVE_GETPEEREID)
|
|
/*
|
|
* WARNING: UNTESTED CODE !!!
|
|
*/
|
|
void
|
|
auth_client_getpeer(struct fcrondyn_cl *client)
|
|
/* check client identity by reading its credentials from the socket
|
|
* using getpeerucred() (Solaris 10 onward) or getpeereid(open/freeBSD).
|
|
* Sets client->fcl_user on success, don't do anything on failure
|
|
* so that the client stays unauthenticated */
|
|
{
|
|
struct passwd *p_entry = NULL;
|
|
uid_t euid = -1;
|
|
gid_t egid = -1;
|
|
|
|
if (getpeereid(client->fcl_sock_fd, &euid, &egid) < 0) {
|
|
error_e("Could not get client credentials using getpeereid()");
|
|
return;
|
|
}
|
|
p_entry = getpwuid(euid);
|
|
if (p_entry == NULL) {
|
|
error_e("Could not find password entry for uid %d", euid);
|
|
return;
|
|
}
|
|
|
|
/* Successfully identified user: */
|
|
client->fcl_user = strdup2(p_entry->pw_name);
|
|
|
|
explain("Client's uid=%d, gid=%d username=%s", euid, egid,
|
|
client->fcl_user);
|
|
|
|
}
|
|
#endif /* HAVE_GETPEEREID */
|
|
|
|
|
|
|
|
#ifdef SO_PEERCRED
|
|
void
|
|
auth_client_so_peercred(struct fcrondyn_cl *client)
|
|
/* check client identity by reading its credentials from the socket
|
|
* using getsockopt(SO_PEERCRED) (Linux)
|
|
* Sets client->fcl_user on success, don't do anything on failure
|
|
* so that the client stays unauthenticated */
|
|
{
|
|
const int true = 1;
|
|
/* There is no ucred.h (or equivalent) on linux to define struct ucred (!!)
|
|
* so we do it here */
|
|
#if ! ( defined(HAVE_CRED_H) && defined(HAVE_UCRED_H) \
|
|
&& defined(HAVE_SYS_CRED_H) && defined(HAVE_SYS_UCRED_H) )
|
|
struct ucred {
|
|
pid_t pid;
|
|
uid_t uid;
|
|
gid_t gid;
|
|
};
|
|
#endif /* struct ucred not defined */
|
|
struct ucred cred;
|
|
socklen_t cred_size = sizeof(cred);
|
|
struct passwd *p_entry = NULL;
|
|
|
|
setsockopt(client->fcl_sock_fd, SOL_SOCKET, SO_PASSCRED, &true,
|
|
sizeof(true));
|
|
if (getsockopt
|
|
(client->fcl_sock_fd, SOL_SOCKET, SO_PEERCRED, &cred,
|
|
&cred_size) != 0) {
|
|
error_e
|
|
("Could not get client credentials using getsockopt(SO_PEERCRED)");
|
|
return;
|
|
}
|
|
|
|
p_entry = getpwuid(cred.uid);
|
|
if (p_entry == NULL) {
|
|
error_e("Could not find password entry for uid %d", cred.uid);
|
|
return;
|
|
}
|
|
|
|
/* Successfully identified user: */
|
|
client->fcl_user = strdup2(p_entry->pw_name);
|
|
|
|
explain("Client's pid=%d, uid=%d, gid=%d username=%s", cred.pid, cred.uid,
|
|
cred.gid, client->fcl_user);
|
|
|
|
}
|
|
#endif /* SO_PEERCRED */
|
|
|
|
void
|
|
auth_client_password(struct fcrondyn_cl *client)
|
|
/* check client identity by asking him to input his password */
|
|
{
|
|
char *pass_cry = NULL;
|
|
char *pass_sys = NULL;
|
|
char *pass_str = NULL;
|
|
|
|
#ifdef HAVE_GETSPNAM
|
|
struct spwd *pass_sp = NULL;
|
|
if ((pass_sp = getspnam((char *)client->fcl_cmd)) == NULL) {
|
|
error_e("could not getspnam %s", (char *)client->fcl_cmd);
|
|
send(client->fcl_sock_fd, "0", sizeof("0"), 0);
|
|
return;
|
|
}
|
|
pass_sys = pass_sp->sp_pwdp;
|
|
#else
|
|
struct passwd *pass = NULL;
|
|
errno = 0;
|
|
if ((pass = getpwnam((char *)client->fcl_cmd)) == NULL) {
|
|
error_e("could not getpwnam %s", (char *)client->fcl_cmd);
|
|
send(client->fcl_sock_fd, "0", sizeof("0"), 0);
|
|
return;
|
|
}
|
|
pass_sys = pass->pw_passwd;
|
|
#endif
|
|
|
|
/* */
|
|
debug("auth_client_password() : socket : %d", client->fcl_sock_fd);
|
|
/* */
|
|
|
|
/* we need to limit auth failures : otherwise fcron may be used to "read"
|
|
* shadow password !!! (or to crack it using a test-all-possible-password attack) */
|
|
if (auth_fail > 0 && auth_nofail_since + AUTH_WAIT <= now)
|
|
/* no auth time exceeded : set counter to 0 */
|
|
auth_fail = 0;
|
|
if (auth_fail >= MAX_AUTH_FAIL) {
|
|
error("Too many authentication failures : try to connect later.");
|
|
send(client->fcl_sock_fd, "0", sizeof("0"), 0);
|
|
auth_fail = auth_nofail_since = 0;
|
|
return;
|
|
}
|
|
|
|
/* the password is stored after the user name */
|
|
pass_str = &((char *)client->fcl_cmd)[strlen((char *)client->fcl_cmd) + 1];
|
|
if ((pass_cry = crypt(pass_str, pass_sys)) == NULL) {
|
|
error_e("could not crypt()");
|
|
send(client->fcl_sock_fd, "0", sizeof("0"), 0);
|
|
Overwrite(pass_str);
|
|
return;
|
|
}
|
|
|
|
/* debug("pass_sp->sp_pwdp : %s", pass_sp->sp_pwdp); */
|
|
/* debug("pass_cry : %s", pass_cry); */
|
|
if (strcmp(pass_cry, pass_sys) == 0) {
|
|
client->fcl_user = strdup2((char *)client->fcl_cmd);
|
|
send(client->fcl_sock_fd, "1", sizeof("1"), 0);
|
|
}
|
|
else {
|
|
auth_fail++;
|
|
auth_nofail_since = now;
|
|
error("Invalid passwd for %s from socket %d",
|
|
(char *)client->fcl_cmd, client->fcl_sock_fd);
|
|
send(client->fcl_sock_fd, "0", sizeof("0"), 0);
|
|
}
|
|
|
|
Overwrite(pass_str);
|
|
}
|
|
|
|
|
|
#define Test_add_field(FIELD_NB, FIELD_STR) \
|
|
if ( (bit_test(details, FIELD_NB)) ) { \
|
|
strncat(fields, FIELD_STR, sizeof(fields)-1 - len); \
|
|
len += (sizeof(FIELD_STR)-1); \
|
|
}
|
|
#define Add_field(FIELD_STR) \
|
|
strncat(fields, FIELD_STR, sizeof(fields) - len - 1); \
|
|
len += (sizeof(FIELD_STR)-1);
|
|
|
|
void
|
|
print_fields(int fd, unsigned char *details)
|
|
/* print a line describing the field types used in print_line() */
|
|
{
|
|
char fields[TERM_LEN];
|
|
char field_id[] = "ID ";
|
|
char field_user[] = "|USER ";
|
|
char field_rq[] = "|R&Q ";
|
|
char field_options[] = "|OPTIONS ";
|
|
char field_schedule[] = "|SCHEDULE ";
|
|
char field_until[] = "|LAVG 1,5,15 UNTIL STRICT";
|
|
char field_pid[] = "|PID ";
|
|
char field_index[] = "|INDEX";
|
|
char field_cmd[] = "|CMD";
|
|
char field_endline[] = "\n";
|
|
int len = 0;
|
|
|
|
fields[0] = '\0';
|
|
|
|
Add_field(field_id);
|
|
Test_add_field(FIELD_USER, field_user);
|
|
Test_add_field(FIELD_PID, field_pid);
|
|
Test_add_field(FIELD_INDEX, field_index);
|
|
Test_add_field(FIELD_RQ, field_rq);
|
|
Test_add_field(FIELD_OPTIONS, field_options);
|
|
Test_add_field(FIELD_LAVG, field_until);
|
|
Test_add_field(FIELD_SCHEDULE, field_schedule);
|
|
Add_field(field_cmd);
|
|
Add_field(field_endline);
|
|
|
|
fields[TERM_LEN - 1] = '\0';
|
|
|
|
if (send(fd, fields, (len < sizeof(fields)) ? len : sizeof(fields), 0) < 0)
|
|
error_e("error in send()");
|
|
|
|
}
|
|
|
|
|
|
void
|
|
print_line(int fd, struct cl_t *line, unsigned char *details, pid_t pid,
|
|
int index, time_t until)
|
|
/* print some basic fields of a line, and some more if details == 1 */
|
|
{
|
|
char buf[TERM_LEN];
|
|
int len = 0;
|
|
struct tm *ftime;
|
|
|
|
|
|
len = snprintf(buf, sizeof(buf), "%-5ld", line->cl_id);
|
|
if (bit_test(details, FIELD_USER))
|
|
len +=
|
|
snprintf(buf + len, sizeof(buf) - len, "|%-9s",
|
|
line->cl_file->cf_user);
|
|
if (bit_test(details, FIELD_PID))
|
|
len += snprintf(buf + len, sizeof(buf) - len, "|%-7d", (int)pid);
|
|
if (bit_test(details, FIELD_INDEX))
|
|
len += snprintf(buf + len, sizeof(buf) - len, "|%-5d", index);
|
|
if (bit_test(details, FIELD_RQ))
|
|
len += snprintf(buf + len, sizeof(buf) - len, "|%-4d", line->cl_numexe);
|
|
if (bit_test(details, FIELD_OPTIONS)) {
|
|
char opt[9];
|
|
int i = 0;
|
|
opt[0] = '\0';
|
|
if (is_lavg(line->cl_option))
|
|
i += snprintf(opt + i, sizeof(opt) - i, "L%.*s",
|
|
(is_lavg_sev(line->cl_option)) ? 0 : 1, "O");
|
|
if (is_serial(line->cl_option))
|
|
i += snprintf(opt + i, sizeof(opt) - i, "%.*sS%.*s", i, ",",
|
|
(is_serial_sev(line->cl_option)) ? 0 : 1, "O");
|
|
if (is_exe_sev(line->cl_option))
|
|
i += snprintf(opt + i, sizeof(opt) - i, "%.*sES", i, ",");
|
|
|
|
len += snprintf(buf + len, sizeof(buf) - len, "|%-9s", opt);
|
|
}
|
|
if (bit_test(details, FIELD_LAVG)) {
|
|
len += snprintf(buf + len, sizeof(buf) - len, "|%.1f,%.1f,%.1f",
|
|
((double)((line->cl_lavg)[0])) / 10,
|
|
((double)((line->cl_lavg)[1])) / 10,
|
|
((double)((line->cl_lavg)[2])) / 10);
|
|
if (until > 0) {
|
|
ftime = localtime(&until);
|
|
len +=
|
|
snprintf(buf + len, sizeof(buf) - len,
|
|
" %04d-%02d-%02d %02d:%02d %s",
|
|
(ftime->tm_year + 1900), (ftime->tm_mon + 1),
|
|
ftime->tm_mday, ftime->tm_hour, ftime->tm_min,
|
|
(is_strict(line->cl_option)) ? "Y" : "N");
|
|
}
|
|
else
|
|
len +=
|
|
snprintf(buf + len, sizeof(buf) - len, " %18s",
|
|
" (no until set) ");
|
|
}
|
|
if (bit_test(details, FIELD_SCHEDULE)) {
|
|
ftime = localtime(&(line->cl_nextexe));
|
|
len +=
|
|
snprintf(buf + len, sizeof(buf) - len, "|%04d-%02d-%02d %02d:%02d",
|
|
(ftime->tm_year + 1900), (ftime->tm_mon + 1),
|
|
ftime->tm_mday, ftime->tm_hour, ftime->tm_min);
|
|
}
|
|
len += snprintf(buf + len, sizeof(buf) - len, "|%s\n", line->cl_shell);
|
|
|
|
if (send(fd, buf, (len < sizeof(buf)) ? len : sizeof(buf), 0) < 0)
|
|
error_e("error in send()");
|
|
|
|
}
|
|
|
|
|
|
#define Test_line(LINE, PID, INDEX, UNTIL) \
|
|
{ \
|
|
if (all || strcmp(user, LINE->cl_file->cf_user) == 0 ) { \
|
|
print_line(fd, LINE, fields, PID, INDEX, UNTIL); \
|
|
found = 1; \
|
|
} \
|
|
}
|
|
void
|
|
cmd_ls(struct fcrondyn_cl *client, long int *cmd, int fd, int is_root)
|
|
/* run a command which lists some jobs */
|
|
{
|
|
int found = 0;
|
|
int all = (cmd[1] == ALL) ? 1 : 0;
|
|
char *user = NULL;
|
|
struct job_t *j;
|
|
int i;
|
|
unsigned char fields[FIELD_NUM_SIZE];
|
|
exe_t *e = NULL;
|
|
lavg_t *l = NULL;
|
|
|
|
for (i = 0; i < FIELD_NUM_SIZE; i++)
|
|
fields[i] = 0;
|
|
|
|
switch (cmd[0]) {
|
|
case CMD_DETAILS:
|
|
bit_set(fields, FIELD_SCHEDULE);
|
|
bit_set(fields, FIELD_RQ);
|
|
bit_set(fields, FIELD_USER);
|
|
bit_set(fields, FIELD_OPTIONS);
|
|
print_fields(fd, fields);
|
|
for (j = queue_base; j != NULL; j = j->j_next) {
|
|
if (cmd[1] == j->j_line->cl_id) {
|
|
if (strcmp(client->fcl_user, j->j_line->cl_file->cf_user) == 0
|
|
|| is_root)
|
|
print_line(fd, j->j_line, fields, 0, 0, 0);
|
|
else
|
|
Send_err_msg(fd, err_job_nfound_str);
|
|
found = 1;
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case CMD_LIST_JOBS:
|
|
case CMD_LIST_LAVGQ:
|
|
case CMD_LIST_SERIALQ:
|
|
case CMD_LIST_EXEQ:
|
|
if (cmd[0] == CMD_LIST_LAVGQ) {
|
|
double lavg[3] = { 0, 0, 0 };
|
|
char lavg_str[TERM_LEN];
|
|
getloadavg(lavg, 3);
|
|
i = snprintf(lavg_str, sizeof(lavg_str), "Current load average : "
|
|
"%.1f, %.1f, %.1f\n", lavg[0], lavg[1], lavg[2]);
|
|
send(fd, lavg_str, i, 0);
|
|
|
|
bit_set(fields, FIELD_LAVG);
|
|
}
|
|
else
|
|
bit_set(fields, FIELD_SCHEDULE);
|
|
|
|
if (cmd[0] == CMD_LIST_SERIALQ)
|
|
bit_set(fields, FIELD_INDEX);
|
|
|
|
if (cmd[0] == CMD_LIST_EXEQ)
|
|
bit_set(fields, FIELD_PID);
|
|
|
|
if (all && !is_root) {
|
|
warn("User %s tried to list *all* jobs.", client->fcl_user);
|
|
Send_err_msg_end(fd, err_all_nallowed_str);
|
|
return;
|
|
}
|
|
if (all)
|
|
bit_set(fields, FIELD_USER);
|
|
print_fields(fd, fields);
|
|
|
|
if (!all) {
|
|
struct passwd *pass;
|
|
|
|
#ifdef SYSFCRONTAB
|
|
if (cmd[1] == SYSFCRONTAB_UID)
|
|
user = SYSFCRONTAB;
|
|
else {
|
|
#endif
|
|
if ((pass = getpwuid((uid_t) cmd[1])) == NULL) {
|
|
warn_e("Unable to find passwd entry for %ld", cmd[1]);
|
|
Send_err_msg_end(fd, err_invalid_user_str);
|
|
return;
|
|
}
|
|
if (!is_root && strcmp(pass->pw_name, client->fcl_user) != 0) {
|
|
warn_e("%s is not allowed to see %s's jobs. %ld",
|
|
client->fcl_user, pass->pw_name);
|
|
Send_err_msg_end(fd, err_others_nallowed_str);
|
|
return;
|
|
}
|
|
user = pass->pw_name;
|
|
#ifdef SYSFCRONTAB
|
|
}
|
|
#endif
|
|
}
|
|
|
|
/* list all jobs one by one and find the corresponding ones */
|
|
switch (cmd[0]) {
|
|
case CMD_LIST_JOBS:
|
|
for (j = queue_base; j != NULL; j = j->j_next)
|
|
Test_line(j->j_line, 0, 0, 0);
|
|
break;
|
|
|
|
case CMD_LIST_EXEQ:
|
|
for (e = exe_list_first(exe_list); e != NULL;
|
|
e = exe_list_next(exe_list)) {
|
|
if (e->e_line == NULL) {
|
|
if (is_root) {
|
|
send_msg_fd(fd, "job no more in an fcrontab: pid %d",
|
|
e->e_job_pid);
|
|
found = 1;
|
|
}
|
|
}
|
|
else {
|
|
Test_line(e->e_line, e->e_job_pid, 0, 0);
|
|
}
|
|
}
|
|
break;
|
|
|
|
case CMD_LIST_LAVGQ:
|
|
for (l = lavg_list_first(lavg_list); l != NULL;
|
|
l = lavg_list_next(lavg_list))
|
|
Test_line(l->l_line, 0, 0, l->l_until);
|
|
break;
|
|
|
|
case CMD_LIST_SERIALQ:
|
|
{
|
|
int j;
|
|
i = serial_array_index;
|
|
for (j = 0; j < serial_num; j++) {
|
|
Test_line(serial_array[i], 0, j, 0);
|
|
if (++i >= serial_array_size)
|
|
i -= serial_array_size;
|
|
}
|
|
break;
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
if (!found)
|
|
Send_err_msg(fd, err_job_nfound_str);
|
|
/* to tell fcrondyn there's no more data to wait */
|
|
Tell_no_more_data(fd);
|
|
|
|
}
|
|
|
|
|
|
void
|
|
cmd_on_exeq(struct fcrondyn_cl *client, long int *cmd, int fd, int is_root)
|
|
/* common code to all cmds working on jobs in the exeq */
|
|
{
|
|
int found = 0;
|
|
char *err_str = NULL;
|
|
exe_t *e = NULL;
|
|
|
|
/* find the corresponding job */
|
|
for (e = exe_list_first(exe_list); e != NULL; e = exe_list_next(exe_list)) {
|
|
if (e->e_line != NULL && cmd[2] == e->e_line->cl_id) {
|
|
|
|
found = 1;
|
|
|
|
/* check if the request is valid */
|
|
if (!is_root &&
|
|
strcmp(client->fcl_user, e->e_line->cl_file->cf_user) != 0) {
|
|
|
|
if (cmd[0] == CMD_RENICE)
|
|
err_str = "%s tried to renice to %ld job id %ld for %s : "
|
|
"not allowed.";
|
|
else if (cmd[0] == CMD_SEND_SIGNAL)
|
|
err_str = "%s tried to send signal %ld to id %ld for %s : "
|
|
"not allowed.";
|
|
else
|
|
err_str = "cannot run unknown cmd with arg %ld on job id "
|
|
"%ld for %s : not allowed.";
|
|
|
|
warn(err_str, client->fcl_user, cmd[1], cmd[2],
|
|
client->fcl_user);
|
|
Send_err_msg_end(fd, err_job_nfound_str);
|
|
}
|
|
else {
|
|
/* request is valid : do it */
|
|
|
|
if (cmd[0] == CMD_SEND_SIGNAL)
|
|
cmd_send_signal(client, cmd, fd, e);
|
|
else if (cmd[0] == CMD_RENICE)
|
|
cmd_renice(client, cmd, fd, e, is_root);
|
|
else {
|
|
Send_err_msg_end(fd, err_cmd_unknown_str);
|
|
exe_list_end_iteration(exe_list);
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!found) {
|
|
|
|
if (cmd[0] == CMD_RENICE)
|
|
err_str = "cannot renice job id %ld for %s : no corresponding "
|
|
"running job.";
|
|
else if (cmd[0] == CMD_SEND_SIGNAL)
|
|
err_str = "cannot send signal to job id %ld for %s :"
|
|
" no corresponding running job.";
|
|
else
|
|
err_str = "cannot run unknown cmd on job id %ld for %s :"
|
|
" no corresponding running job.";
|
|
|
|
warn(err_str, cmd[2], client->fcl_user);
|
|
Send_err_msg_end(fd, err_rjob_nfound_str);
|
|
}
|
|
else {
|
|
Tell_no_more_data(fd);
|
|
}
|
|
|
|
}
|
|
|
|
|
|
void
|
|
cmd_renice(struct fcrondyn_cl *client, long int *cmd, int fd, exe_t * e,
|
|
int is_root)
|
|
/* change nice value of a running job */
|
|
{
|
|
|
|
#ifdef HAVE_SETPRIORITY
|
|
/* check if arguments are valid */
|
|
if (e->e_job_pid <= 0 || ((int)cmd[1] < 0 && !is_root)
|
|
|| (int)cmd[1] > 20 || (int)cmd[1] < -20) {
|
|
warn("renice: invalid args : pid: %d nice_value: %d user: %s.",
|
|
e->e_job_pid, (int)cmd[1], client->fcl_user);
|
|
Send_err_msg_end(fd, err_invalid_args_str);
|
|
return;
|
|
}
|
|
|
|
/* ok, now setpriority() the job */
|
|
if (setpriority(PRIO_PROCESS, e->e_job_pid, (int)cmd[1]) != 0) {
|
|
error_e("could not setpriority(PRIO_PROCESS, %d, %d)",
|
|
e->e_job_pid, (int)cmd[1]);
|
|
Send_err_msg_end(fd, err_unknown_str);
|
|
return;
|
|
}
|
|
else {
|
|
send_msg_fd(fd, "Command successfully completed on process %d.",
|
|
e->e_job_pid);
|
|
return;
|
|
}
|
|
|
|
#else /* HAVE_SETPRIORITY */
|
|
warn("System has no setpriority() : cannot renice. pid: %d nice_value: %d user: %s.", e->e_job_pid, (int)cmd[1], client->fcl_user);
|
|
Send_err_msg_end(fd, err_cmd_unknown_str);
|
|
|
|
#endif /* HAVE_SETPRIORITY */
|
|
}
|
|
|
|
|
|
void
|
|
cmd_send_signal(struct fcrondyn_cl *client, long int *cmd, int fd, exe_t * e)
|
|
/* send a signal to a running job */
|
|
{
|
|
if (e->e_job_pid <= 0 || (int)cmd[1] <= 0) {
|
|
warn("send_signal: invalid args : pid: %d signal: %d user: %s",
|
|
e->e_job_pid, (int)cmd[1], client->fcl_user);
|
|
Send_err_msg_end(fd, err_invalid_args_str);
|
|
return;
|
|
}
|
|
|
|
/* ok, now kill() the job */
|
|
if (kill(e->e_job_pid, (int)cmd[1]) != 0) {
|
|
error_e("could not kill(%d, %d)", e->e_job_pid, (int)cmd[1]);
|
|
Send_err_msg_end(fd, err_unknown_str);
|
|
return;
|
|
}
|
|
else {
|
|
send_msg_fd(fd, "Command successfully completed on process %d.",
|
|
e->e_job_pid);
|
|
return;
|
|
}
|
|
}
|
|
|
|
|
|
void
|
|
cmd_run(struct fcrondyn_cl *client, long int *cmd, int fd, int is_root)
|
|
/* Run a job and rescheduled if requested */
|
|
{
|
|
|
|
struct job_t *j = NULL;
|
|
|
|
for (j = queue_base; j != NULL; j = j->j_next) {
|
|
if (cmd[1] == j->j_line->cl_id) {
|
|
if (strcmp(client->fcl_user, j->j_line->cl_file->cf_user) == 0
|
|
|| is_root) {
|
|
|
|
if (is_lavg(j->j_line->cl_option))
|
|
add_lavg_job(j->j_line, fd);
|
|
else if (is_serial(j->j_line->cl_option))
|
|
add_serial_job(j->j_line, fd);
|
|
else
|
|
run_normal_job(j->j_line, fd);
|
|
|
|
if (cmd[0] == CMD_RUNNOW)
|
|
set_next_exe(j->j_line, FROM_CUR_NEXTEXE, fd);
|
|
|
|
Tell_no_more_data(fd);
|
|
|
|
return;
|
|
|
|
}
|
|
}
|
|
}
|
|
|
|
/* we don't come here if a job has been found */
|
|
Send_err_msg_end(fd, err_job_nfound_str);
|
|
|
|
}
|
|
|
|
void
|
|
exe_cmd(struct fcrondyn_cl *client)
|
|
/* read command, and call corresponding function */
|
|
{
|
|
long int *cmd;
|
|
int fd;
|
|
int is_root = 0;
|
|
|
|
is_root = (strcmp(client->fcl_user, ROOTNAME) == 0) ? 1 : 0;
|
|
|
|
/* to make things clearer (avoid repeating client->fcl_ all the time) */
|
|
cmd = client->fcl_cmd;
|
|
fd = client->fcl_sock_fd;
|
|
|
|
/* */
|
|
debug("exe_cmd [0,1,2] : %d %d %d", cmd[0], cmd[1], cmd[2]);
|
|
/* */
|
|
|
|
switch (cmd[0]) {
|
|
|
|
case CMD_SEND_SIGNAL:
|
|
case CMD_RENICE:
|
|
cmd_on_exeq(client, cmd, fd, is_root);
|
|
break;
|
|
|
|
case CMD_DETAILS:
|
|
case CMD_LIST_JOBS:
|
|
case CMD_LIST_LAVGQ:
|
|
case CMD_LIST_SERIALQ:
|
|
case CMD_LIST_EXEQ:
|
|
cmd_ls(client, cmd, fd, is_root);
|
|
break;
|
|
|
|
case CMD_RUN:
|
|
case CMD_RUNNOW:
|
|
cmd_run(client, cmd, fd, is_root);
|
|
break;
|
|
|
|
default:
|
|
Send_err_msg_end(fd, err_cmd_unknown_str);
|
|
}
|
|
}
|
|
|
|
void
|
|
remove_connection(struct fcrondyn_cl **client, struct fcrondyn_cl *prev_client)
|
|
/* close the connection, remove it from the list
|
|
and make client points to the next entry */
|
|
{
|
|
debug("closing connection : fd : %d", (*client)->fcl_sock_fd);
|
|
shutdown((*client)->fcl_sock_fd, SHUT_RDWR);
|
|
remove_from_select_set((*client)->fcl_sock_fd, &master_set, &set_max_fd);
|
|
xclose_check(&((*client)->fcl_sock_fd), "client fd");
|
|
if (prev_client == NULL) {
|
|
fcrondyn_cl_base = (*client)->fcl_next;
|
|
Free_safe((*client)->fcl_user);
|
|
Free_safe(*client);
|
|
*client = fcrondyn_cl_base;
|
|
}
|
|
else {
|
|
prev_client->fcl_next = (*client)->fcl_next;
|
|
Free_safe((*client)->fcl_user);
|
|
Free_safe(*client);
|
|
*client = prev_client->fcl_next;
|
|
}
|
|
fcrondyn_cl_num -= 1;
|
|
}
|
|
|
|
void
|
|
check_socket(int num)
|
|
/* check for new connection, command, connection closed */
|
|
{
|
|
int fd = -1, avoid_fd = -1;
|
|
socklen_t addr_len = sizeof(struct sockaddr_un);
|
|
struct sockaddr_un client_addr;
|
|
long int buf_int[SOCKET_MSG_LEN];
|
|
int read_len = 0;
|
|
struct fcrondyn_cl *client = NULL, *prev_client = NULL;
|
|
|
|
if (num <= 0)
|
|
/* no socket to check : go directly to the end of that function */
|
|
goto final_settings;
|
|
|
|
debug("Checking socket ...");
|
|
|
|
if (FD_ISSET(listen_fd, &read_set)) {
|
|
debug("got new connection ...");
|
|
fd = accept(listen_fd, (struct sockaddr *)&client_addr, &addr_len);
|
|
if (fd == -1) {
|
|
error_e
|
|
("could not accept new connection : isset(listen_fd = %d) = %d",
|
|
listen_fd, FD_ISSET(listen_fd, &read_set));
|
|
}
|
|
else {
|
|
fcntl(fd, F_SETFD, 1);
|
|
/* set fd to O_NONBLOCK : we do not want fcron to be stopped on error, etc */
|
|
if (fcntl(fd, F_SETFL, fcntl(fd, F_GETFL) | O_NONBLOCK) == -1) {
|
|
error_e
|
|
("Could not set fd attribute O_NONBLOCK : connection rejected.");
|
|
shutdown(fd, SHUT_RDWR);
|
|
xclose_check(&fd, "client fd");
|
|
}
|
|
else {
|
|
Alloc(client, fcrondyn_cl);
|
|
client->fcl_sock_fd = fd;
|
|
/* means : not authenticated yet : */
|
|
client->fcl_user = NULL;
|
|
client->fcl_cmd = NULL;
|
|
|
|
/* include new entry in client list */
|
|
client->fcl_next = fcrondyn_cl_base;
|
|
fcrondyn_cl_base = client;
|
|
client->fcl_idle_since = now;
|
|
/* to avoid trying to read from it in this call */
|
|
avoid_fd = fd;
|
|
|
|
add_to_select_set(fd, &master_set, &set_max_fd);
|
|
fcrondyn_cl_num += 1;
|
|
|
|
debug("Added connection fd : %d - %d connections", fd,
|
|
fcrondyn_cl_num);
|
|
|
|
#ifdef SO_PEERCRED
|
|
auth_client_so_peercred(client);
|
|
#elif defined(HAVE_GETPEERUCRED) || defined(HAVE_GETPEEREID)
|
|
auth_client_getpeer(client);
|
|
#endif /* SO_PEERCRED */
|
|
}
|
|
}
|
|
}
|
|
|
|
client = fcrondyn_cl_base;
|
|
while (client != NULL) {
|
|
if (!FD_ISSET(client->fcl_sock_fd, &read_set)
|
|
|| client->fcl_sock_fd == avoid_fd) {
|
|
/* check if the connection has not been idle for too long ... */
|
|
if (client->fcl_user == NULL
|
|
&& now - client->fcl_idle_since > MAX_AUTH_TIME) {
|
|
warn("Connection with no auth for more than %ds : closing it.",
|
|
MAX_AUTH_TIME);
|
|
remove_connection(&client, prev_client);
|
|
}
|
|
else if (now - client->fcl_idle_since > MAX_IDLE_TIME) {
|
|
warn("Connection of %s is idle for more than %ds : closing it.",
|
|
client->fcl_user, MAX_IDLE_TIME);
|
|
remove_connection(&client, prev_client);
|
|
}
|
|
else {
|
|
/* nothing to do on this one ... check the next one */
|
|
prev_client = client;
|
|
client = client->fcl_next;
|
|
}
|
|
continue;
|
|
}
|
|
|
|
if ((read_len =
|
|
recv(client->fcl_sock_fd, buf_int, sizeof(buf_int), 0)) <= 0) {
|
|
if (read_len == 0) {
|
|
/* connection closed by client */
|
|
remove_connection(&client, prev_client);
|
|
}
|
|
else {
|
|
error_e("error recv() from sock fd %d", client->fcl_sock_fd);
|
|
prev_client = client;
|
|
client = client->fcl_next;
|
|
}
|
|
}
|
|
else {
|
|
client->fcl_cmd_len = read_len;
|
|
client->fcl_cmd = buf_int;
|
|
if (client->fcl_user == NULL)
|
|
/* not authenticated yet */
|
|
auth_client_password(client);
|
|
else {
|
|
/* we've just read a command ... */
|
|
client->fcl_idle_since = now;
|
|
exe_cmd(client);
|
|
}
|
|
prev_client = client;
|
|
client = client->fcl_next;
|
|
}
|
|
}
|
|
|
|
final_settings:
|
|
/* copy master_set in read_set, because read_set is modified by select() */
|
|
read_set = master_set;
|
|
}
|
|
|
|
|
|
void
|
|
close_socket(void)
|
|
/* close connections, close socket, remove socket file */
|
|
{
|
|
struct fcrondyn_cl *client, *client_buf = NULL;
|
|
|
|
if (listen_fd) {
|
|
shutdown(listen_fd, SHUT_RDWR);
|
|
xclose_check(&listen_fd, "listening fd");
|
|
unlink(fifofile);
|
|
|
|
client = fcrondyn_cl_base;
|
|
while (client != NULL) {
|
|
shutdown(client->fcl_sock_fd, SHUT_RDWR);
|
|
xclose_check(&(client->fcl_sock_fd), "client fd");
|
|
|
|
client_buf = client->fcl_next;
|
|
Free_safe(client);
|
|
fcrondyn_cl_num -= 1;
|
|
client = client_buf;
|
|
}
|
|
}
|
|
}
|