main.c revision ecdbe05ac696695432b580c3792e996c5e411261
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen/* Copyright (C) 2002 Timo Sirainen */
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "common.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "ioloop.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "lib-signals.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "network.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "env-util.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "fd-close-on-exec.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "write-full.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "askpass.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "auth-process.h"
300e4e43ed1ca46d0614459161ca2fb460ef661aTimo Sirainen#include "dict-process.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "login-process.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "mail-process.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "syslog-util.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "ssl-init.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include "log.h"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
ae46f6ba5bb9eee8900254d3042e89d490023be0Timo Sirainen#include <stdio.h>
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include <stdlib.h>
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include <unistd.h>
3f3ad16ff74d694796d22501250a9a29997c0729Timo Sirainen#include <fcntl.h>
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen#include <syslog.h>
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include <sys/stat.h>
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#include <sys/wait.h>
300e4e43ed1ca46d0614459161ca2fb460ef661aTimo Sirainen
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainenconst char *process_names[PROCESS_TYPE_MAX] = {
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen "unknown",
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen "auth",
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen "auth-worker",
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen "login",
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen "imap",
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen "pop3",
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen "ssl-build-param",
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen "dict"
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen};
0a53eb0283d7ec28c6105f61e118b96fce8ecb95Timo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainenstatic const char *configfile = SYSCONFDIR "/" PACKAGE ".conf";
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainenstatic struct timeout *to;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainenstatic const char *env_tz;
db693bf6fcae96d834567f1782257517b7207655Timo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainenstruct ioloop *ioloop;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainenstruct hash_table *pids;
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainenint null_fd, inetd_login_fd;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainenuid_t master_uid;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainenchar program_path[PATH_MAX];
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainenchar ssl_manual_key_password[100];
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#ifdef DEBUG
300e4e43ed1ca46d0614459161ca2fb460ef661aTimo Sirainenstatic bool gdb;
300e4e43ed1ca46d0614459161ca2fb460ef661aTimo Sirainen#endif
300e4e43ed1ca46d0614459161ca2fb460ef661aTimo Sirainen
300e4e43ed1ca46d0614459161ca2fb460ef661aTimo Sirainenstatic void listen_fds_open(bool retry);
300e4e43ed1ca46d0614459161ca2fb460ef661aTimo Sirainenstatic void listen_fds_close(struct server_settings *server);
db693bf6fcae96d834567f1782257517b7207655Timo Sirainen
300e4e43ed1ca46d0614459161ca2fb460ef661aTimo Sirainenbool validate_str(const char *str, size_t max_len)
300e4e43ed1ca46d0614459161ca2fb460ef661aTimo Sirainen{
300e4e43ed1ca46d0614459161ca2fb460ef661aTimo Sirainen size_t i;
300e4e43ed1ca46d0614459161ca2fb460ef661aTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen for (i = 0; i < max_len; i++) {
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen if (str[i] == '\0')
861f53be0cc2fa5665f3c107a7576e2a53bb2eb0Timo Sirainen return TRUE;
861f53be0cc2fa5665f3c107a7576e2a53bb2eb0Timo Sirainen }
db693bf6fcae96d834567f1782257517b7207655Timo Sirainen
861f53be0cc2fa5665f3c107a7576e2a53bb2eb0Timo Sirainen return FALSE;
861f53be0cc2fa5665f3c107a7576e2a53bb2eb0Timo Sirainen}
861f53be0cc2fa5665f3c107a7576e2a53bb2eb0Timo Sirainen
861f53be0cc2fa5665f3c107a7576e2a53bb2eb0Timo Sirainenvoid child_process_init_env(void)
861f53be0cc2fa5665f3c107a7576e2a53bb2eb0Timo Sirainen{
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen int facility;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen /* remove all environment, we don't need them */
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen env_clean();
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen /* we'll log through master process */
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen env_put("LOG_TO_MASTER=1");
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen if (env_tz != NULL)
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen env_put(t_strconcat("TZ=", env_tz, NULL));
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen if (settings_root == NULL ||
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen !syslog_facility_find(settings_root->defaults->syslog_facility,
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen &facility))
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen facility = LOG_MAIL;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen env_put(t_strdup_printf("SYSLOG_FACILITY=%d", facility));
db693bf6fcae96d834567f1782257517b7207655Timo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen#ifdef DEBUG
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen if (gdb) env_put("GDB=1");
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen#endif
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen}
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainenvoid client_process_exec(const char *cmd, const char *title)
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen{
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen const char *executable, *p, **argv;
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen /* very simple argument splitting. */
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen if (*title == '\0')
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen argv = t_strsplit(cmd, " ");
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen else
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen argv = t_strsplit(t_strconcat(cmd, " ", title, NULL), " ");
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen executable = argv[0];
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen /* hide the path, it's ugly */
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen p = strrchr(argv[0], '/');
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen if (p != NULL) argv[0] = p+1;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen execv(executable, (char **)argv);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen}
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainenstatic void set_logfile(struct settings *set)
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen{
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen int facility;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen if (*set->log_path == '\0') {
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen if (!syslog_facility_find(set->syslog_facility, &facility))
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen facility = LOG_MAIL;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen i_set_failure_syslog("dovecot", LOG_NDELAY, facility);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen } else {
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen /* log to file or stderr */
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen i_set_failure_file(set->log_path, "dovecot");
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen }
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
242abe3ad2423776e9cf05e1304eb8fda4831b23Timo Sirainen if (*set->info_log_path != '\0')
cf9d67e4a9bfee31cf3be05244555d51a3d1b9feTimo Sirainen i_set_info_file(set->info_log_path);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen i_set_failure_timestamp_format(set->log_timestamp);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen}
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainenstatic void settings_reload(void)
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen{
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen struct server_settings *old_set = settings_root;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen i_warning("SIGHUP received - reloading configuration");
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen /* restart auth and login processes */
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen login_processes_destroy_all();
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen auth_processes_destroy_all();
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen dict_process_kill();
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen if (!master_settings_read(configfile, FALSE))
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen i_warning("Invalid configuration, keeping old one");
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen else {
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen if (!IS_INETD()) {
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen listen_fds_close(old_set);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen listen_fds_open(TRUE);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen }
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen set_logfile(settings_root->defaults);
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen }
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen}
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainenstatic void sig_die(int signo, void *context __attr_unused__)
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen{
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen /* warn about being killed because of some signal, except SIGINT (^C)
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen which is too common at least while testing :) */
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen if (signo != SIGINT)
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen i_warning("Killed with signal %d", signo);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen io_loop_stop(ioloop);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen}
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
cf9d67e4a9bfee31cf3be05244555d51a3d1b9feTimo Sirainenstatic void sig_reload_settings(int signo __attr_unused__,
cf9d67e4a9bfee31cf3be05244555d51a3d1b9feTimo Sirainen void *context __attr_unused__)
cf9d67e4a9bfee31cf3be05244555d51a3d1b9feTimo Sirainen{
edd318d5866ac3fbc6e8df28fb24a4dfef93c884Timo Sirainen settings_reload();
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen}
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainenstatic void sig_reopen_logs(int signo __attr_unused__,
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen void *context __attr_unused__)
8dd76854cc680053986142d5f5e823f637447929Timo Sirainen{
8dd76854cc680053986142d5f5e823f637447929Timo Sirainen set_logfile(settings_root->defaults);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen}
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainenstatic const char *get_exit_status_message(enum fatal_exit_status status)
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen{
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen switch (status) {
b4ddb5b3c3722620a8fef387dd8c47bb411a5643Timo Sirainen case FATAL_LOGOPEN:
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen return "Can't open log file";
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen case FATAL_LOGWRITE:
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen return "Can't write to log file";
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen case FATAL_LOGERROR:
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen return "Internal logging error";
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen case FATAL_OUTOFMEM:
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen return "Out of memory";
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen case FATAL_EXEC:
0a53eb0283d7ec28c6105f61e118b96fce8ecb95Timo Sirainen return "exec() failed";
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen case FATAL_DEFAULT:
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen return NULL;
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen }
f9f77e06a148fd0816004e0e1b0f585307148a7dTimo Sirainen
f9f77e06a148fd0816004e0e1b0f585307148a7dTimo Sirainen return NULL;
f9f77e06a148fd0816004e0e1b0f585307148a7dTimo Sirainen}
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainenstatic void timeout_handler(void *context __attr_unused__)
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen{
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen const char *process_type_name, *msg;
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen pid_t pid;
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen int status, process_type;
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen while ((pid = waitpid(-1, &status, WNOHANG)) > 0) {
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen /* get the type and remove from hash */
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen process_type = PID_GET_PROCESS_TYPE(pid);
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen PID_REMOVE_PROCESS_TYPE(pid);
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen switch (process_type) {
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen case PROCESS_TYPE_IMAP:
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen case PROCESS_TYPE_POP3:
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen mail_process_destroyed(pid);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen break;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen case PROCESS_TYPE_SSL_PARAM:
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen ssl_parameter_process_destroyed(pid);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen break;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen case PROCESS_TYPE_DICT:
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen dict_process_restart();
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen break;
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen }
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen /* write errors to syslog */
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen process_type_name = process_names[process_type];
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen if (WIFEXITED(status)) {
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen status = WEXITSTATUS(status);
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen if (status != 0) {
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen if (process_type == PROCESS_TYPE_LOGIN)
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen login_process_abormal_exit(pid);
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen msg = get_exit_status_message(status);
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen msg = msg == NULL ? "" :
00e7c3010f7da4a49881a7feb05e413af353af0aTimo Sirainen t_strconcat(" (", msg, ")", NULL);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen i_error("child %s (%s) returned error %d%s",
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen dec2str(pid), process_type_name,
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen status, msg);
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen }
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen } else if (WIFSIGNALED(status)) {
2670cd577aa57eb9f915a4f4220ae48c9b4fc5fbTimo Sirainen if (process_type == PROCESS_TYPE_LOGIN)
login_process_abormal_exit(pid);
i_error("child %s (%s) killed with signal %d",
dec2str(pid), process_type_name,
WTERMSIG(status));
}
}
if (pid == -1 && errno != EINTR && errno != ECHILD)
i_warning("waitpid() failed: %m");
}
static void resolve_ip(const char *name, struct ip_addr *ip, unsigned int *port)
{
struct ip_addr *ip_list;
const char *p;
int ret, ips_count;
if (*name == '\0') {
/* defaults to "*" or "[::]" */
ip->family = 0;
return;
}
if (name[0] == '[') {
/* IPv6 address */
p = strchr(name, ']');
if (p == NULL)
i_fatal("Missing ']' in address %s", name);
name = t_strdup_until(name+1, p);
p++;
if (*p == '\0')
p = NULL;
else if (*p != ':')
i_fatal("Invalid data after ']' in address %s", name);
} else {
p = strrchr(name, ':');
if (p != NULL)
name = t_strdup_until(name, p);
}
if (p != NULL) {
if (!is_numeric(p+1, '\0'))
i_fatal("Invalid port in address %s", name);
*port = atoi(p+1);
}
if (strcmp(name, "*") == 0) {
/* IPv4 any */
net_get_ip_any4(ip);
return;
}
if (strcmp(name, "::") == 0) {
/* IPv6 any */
net_get_ip_any6(ip);
return;
}
/* Return the first IP if there happens to be multiple. */
ret = net_gethostbyname(name, &ip_list, &ips_count);
if (ret != 0) {
i_fatal("Can't resolve address %s: %s",
name, net_gethosterror(ret));
}
if (ips_count < 1)
i_fatal("No IPs for address: %s", name);
*ip = ip_list[0];
}
static void
check_conflicts_set(const struct settings *set, const struct ip_addr *ip,
unsigned int port, const char *name1, const char *name2)
{
if (set->listen_port == port && net_ip_compare(ip, &set->listen_ip) &&
set->listen_fd > 0) {
i_fatal("Protocols %s and %s are listening in same ip/port",
name1, name2);
}
if (set->ssl_listen_port == port &&
net_ip_compare(ip, &set->ssl_listen_ip) && set->ssl_listen_fd > 0) {
i_fatal("Protocols %ss and %s are listening in same ip/port",
name1, name2);
}
}
static void check_conflicts(const struct ip_addr *ip, unsigned int port,
const char *proto)
{
struct server_settings *server;
for (server = settings_root; server != NULL; server = server->next) {
if (server->imap != NULL) {
check_conflicts_set(server->imap, ip, port,
"imap", proto);
}
if (server->pop3 != NULL) {
check_conflicts_set(server->pop3, ip, port,
"pop3", proto);
}
}
}
static void listen_protocols(struct settings *set, bool retry)
{
struct ip_addr *ip;
const char *const *proto;
unsigned int port;
int *fd, i;
set->listen_port = set->protocol == MAIL_PROTOCOL_IMAP ? 143 : 110;
#ifdef HAVE_SSL
set->ssl_listen_port = set->protocol == MAIL_PROTOCOL_IMAP ? 993 : 995;
#else
set->ssl_listen_port = 0;
#endif
/* resolve */
resolve_ip(set->listen, &set->listen_ip, &set->listen_port);
resolve_ip(set->ssl_listen, &set->ssl_listen_ip, &set->ssl_listen_port);
/* if ssl_listen wasn't explicitly set in the config file,
use the non-ssl IP settings for the ssl listener, too. */
if (set->ssl_listen_ip.family == 0 && *set->ssl_listen == '\0')
set->ssl_listen_ip = set->listen_ip;
/* register wanted protocols */
proto = t_strsplit_spaces(set->protocols, " ");
for (; *proto != NULL; proto++) {
fd = NULL; ip = NULL; port = 0;
if (strcasecmp(*proto, "imap") == 0) {
if (set->protocol == MAIL_PROTOCOL_IMAP) {
fd = &set->listen_fd;
port = set->listen_port;
ip = &set->listen_ip;
}
} else if (strcasecmp(*proto, "imaps") == 0) {
if (set->protocol == MAIL_PROTOCOL_IMAP &&
!set->ssl_disable) {
fd = &set->ssl_listen_fd;
port = set->ssl_listen_port;
ip = &set->ssl_listen_ip;
}
} else if (strcasecmp(*proto, "pop3") == 0) {
if (set->protocol == MAIL_PROTOCOL_POP3) {
fd = &set->listen_fd;
port = set->listen_port;
ip = &set->listen_ip;
}
} else if (strcasecmp(*proto, "pop3s") == 0) {
if (set->protocol == MAIL_PROTOCOL_POP3 &&
!set->ssl_disable) {
fd = &set->ssl_listen_fd;
port = set->ssl_listen_port;
ip = &set->ssl_listen_ip;
}
} else {
i_fatal("Unknown protocol %s", *proto);
}
if (fd == NULL)
continue;
if (*fd != -1)
i_fatal("Protocol %s given more than once", *proto);
if (port == 0)
*fd = null_fd;
else {
for (i = 0; i < 10; i++) {
*fd = net_listen(ip, &port, 8);
if (*fd != -1 || errno != EADDRINUSE)
break;
check_conflicts(ip, port, *proto);
if (!retry)
break;
/* wait a while and try again. we're SIGHUPing
so we most likely just closed it ourself.. */
sleep(1);
}
if (*fd == -1)
i_fatal("listen(%d) failed: %m", port);
net_set_nonblock(*fd, TRUE);
}
fd_close_on_exec(*fd, TRUE);
}
if (set->listen_fd == -1)
set->listen_fd = null_fd;
if (set->ssl_listen_fd == -1)
set->ssl_listen_fd = null_fd;
}
static void listen_fds_open(bool retry)
{
struct server_settings *server;
for (server = settings_root; server != NULL; server = server->next) {
if (server->imap != NULL)
listen_protocols(server->imap, retry);
if (server->pop3 != NULL)
listen_protocols(server->pop3, retry);
}
}
static void listen_fds_close(struct server_settings *server)
{
for (; server != NULL; server = server->next) {
if (server->imap != NULL) {
if (server->imap->listen_fd != null_fd &&
close(server->imap->listen_fd) < 0)
i_error("close(imap.listen_fd) failed: %m");
if (server->imap->ssl_listen_fd != null_fd &&
close(server->imap->ssl_listen_fd) < 0)
i_error("close(imap.ssl_listen_fd) failed: %m");
}
if (server->pop3 != NULL) {
if (server->pop3->listen_fd != null_fd &&
close(server->pop3->listen_fd) < 0)
i_error("close(pop3.listen_fd) failed: %m");
if (server->pop3->ssl_listen_fd != null_fd &&
close(server->pop3->ssl_listen_fd) < 0)
i_error("close(pop3.ssl_listen_fd) failed: %m");
}
}
}
static bool have_stderr_set(struct settings *set)
{
if (*set->log_path != '\0' &&
strcmp(set->log_path, "/dev/stderr") == 0)
return TRUE;
if (*set->info_log_path != '\0' &&
strcmp(set->info_log_path, "/dev/stderr") == 0)
return TRUE;
return FALSE;
}
static bool have_stderr(struct server_settings *server)
{
while (server != NULL) {
if (server->imap != NULL && have_stderr_set(server->imap))
return TRUE;
if (server->pop3 != NULL && have_stderr_set(server->pop3))
return TRUE;
server = server->next;
}
return FALSE;
}
static void open_fds(void)
{
/* initialize fds. */
null_fd = open("/dev/null", O_RDONLY);
if (null_fd == -1)
i_fatal("Can't open /dev/null: %m");
fd_close_on_exec(null_fd, TRUE);
/* make sure all fds between 0..3 are used. */
while (null_fd < 4) {
null_fd = dup(null_fd);
fd_close_on_exec(null_fd, TRUE);
}
if (!IS_INETD())
listen_fds_open(FALSE);
/* close stdin and stdout. */
if (dup2(null_fd, 0) < 0)
i_fatal("dup2(0) failed: %m");
if (dup2(null_fd, 1) < 0)
i_fatal("dup2(1) failed: %m");
}
static void create_pid_file(const char *path)
{
const char *pid;
int fd;
pid = t_strconcat(dec2str(getpid()), "\n", NULL);
fd = open(path, O_WRONLY|O_CREAT|O_TRUNC, 0644);
if (fd == -1)
i_fatal("open(%s) failed: %m", path);
if (write_full(fd, pid, strlen(pid)) < 0)
i_fatal("write() failed in %s: %m", path);
(void)close(fd);
}
static void main_init(void)
{
/* deny file access from everyone else except owner */
(void)umask(0077);
/* close stderr unless we're logging into /dev/stderr. keep as little
distance between closing it and opening the actual log file so that
we don't lose anything. */
if (!have_stderr(settings_root)) {
if (dup2(null_fd, 2) < 0)
i_fatal("dup2(2) failed: %m");
}
set_logfile(settings_root->defaults);
i_info("Dovecot v"VERSION" starting up");
log_init();
lib_signals_init();
lib_signals_set_handler(SIGINT, TRUE, sig_die, NULL);
lib_signals_set_handler(SIGTERM, TRUE, sig_die, NULL);
lib_signals_ignore(SIGPIPE);
lib_signals_set_handler(SIGALRM, FALSE, NULL, NULL);
lib_signals_set_handler(SIGHUP, TRUE, sig_reload_settings, NULL);
lib_signals_set_handler(SIGUSR1, TRUE, sig_reopen_logs, NULL);
pids = hash_create(default_pool, default_pool, 128, NULL, NULL);
to = timeout_add(100, timeout_handler, NULL);
ssl_init();
dict_process_init();
auth_processes_init();
login_processes_init();
create_pid_file(t_strconcat(settings_root->defaults->base_dir,
"/master.pid", NULL));
}
static void main_deinit(void)
{
(void)unlink(t_strconcat(settings_root->defaults->base_dir,
"/master.pid", NULL));
/* make sure we log if child processes died unexpectedly */
timeout_handler(NULL);
login_processes_deinit();
auth_processes_deinit();
dict_process_deinit();
ssl_deinit();
timeout_remove(&to);
if (close(null_fd) < 0)
i_error("close(null_fd) failed: %m");
hash_destroy(pids);
lib_signals_deinit();
log_deinit();
closelog();
}
static void daemonize(struct settings *set)
{
pid_t pid;
pid = fork();
if (pid < 0)
i_fatal("fork() failed: %m");
if (pid != 0)
_exit(0);
if (setsid() < 0)
i_fatal("setsid() failed: %m");
if (chdir(set->base_dir) < 0)
i_fatal("chdir(%s) failed: %m", set->base_dir);
}
static void print_help(void)
{
printf(
"Usage: dovecot [-F] [-c <config file>] [-p] [-n] [-a]\n"
" [--exec-mail <protocol>] [--version] [--build-options]\n");
}
static void print_build_options(void)
{
printf("Build options:"
#ifdef IOLOOP_EPOLL
" ioloop=epoll"
#endif
#ifdef IOLOOP_KQUEUE
" ioloop=kqueue"
#endif
#ifdef IOLOOP_POLL
" ioloop=poll"
#endif
#ifdef IOLOOP_SELECT
" ioloop=select"
#endif
#ifdef IOLOOP_NOTIFY_DNOTIFY
" notify=dnotify"
#endif
#ifdef IOLOOP_NOTIFY_INOTIFY
" notify=inotify"
#endif
#ifdef IOLOOP_NOTIFY_KQUEUE
" notify=kqueue"
#endif
#ifdef HAVE_IPV6
" ipv6"
#endif
#ifdef HAVE_GNUTLS
" gnutls"
#endif
#ifdef HAVE_OPENSSL
" openssl"
#endif
"\nSQL drivers:"
#ifdef BUILD_MYSQL
" mysql"
#endif
#ifdef BUILD_PGSQL
" postgresql"
#endif
#ifdef BUILD_SQLITE
" sqlite"
#endif
"\nPassdb:"
#ifdef PASSDB_BSDAUTH
" bsdauth"
#endif
#ifdef PASSDB_CHECKPASSWORD
" checkpassword"
#endif
#ifdef PASSDB_LDAP
" ldap"
#endif
#ifdef PASSDB_PAM
" pam"
#endif
#ifdef PASSDB_PASSWD
" passwd"
#endif
#ifdef PASSDB_PASSWD_FILE
" passwd-file"
#endif
#ifdef PASSDB_SHADOW
" shadow"
#endif
#ifdef PASSDB_SQL
" sql"
#endif
#ifdef PASSDB_VPOPMAIL
" vpopmail"
#endif
"\nUserdb:"
#ifdef USERDB_CHECKPASSWORD
" checkpassword"
#endif
#ifdef USERDB_LDAP
" ldap"
#endif
#ifdef USERDB_PASSWD
" passwd"
#endif
#ifdef USERDB_PREFETCH
" prefetch"
#endif
#ifdef USERDB_PASSWD_FILE
" passwd-file"
#endif
#ifdef USERDB_SQL
" sql"
#endif
#ifdef USERDB_STATIC
" static"
#endif
#ifdef USERDB_VPOPMAIL
" vpopmail"
#endif
"\n");
}
int main(int argc, char *argv[])
{
/* parse arguments */
const char *exec_protocol = NULL, *exec_section = NULL, *user, *home;
bool foreground = FALSE, ask_key_pass = FALSE;
bool dump_config = FALSE, dump_config_nondefaults = FALSE;
int i;
#ifdef DEBUG
gdb = getenv("GDB") != NULL;
#endif
lib_init();
master_uid = geteuid();
inetd_login_fd = -1;
for (i = 1; i < argc; i++) {
if (strcmp(argv[i], "-F") == 0) {
/* foreground */
foreground = TRUE;
} else if (strcmp(argv[i], "-a") == 0) {
dump_config = TRUE;
} else if (strcmp(argv[i], "-c") == 0) {
/* config file */
i++;
if (i == argc) i_fatal("Missing config file argument");
configfile = argv[i];
} else if (strcmp(argv[i], "-n") == 0) {
dump_config_nondefaults = TRUE;
} else if (strcmp(argv[i], "-p") == 0) {
/* Ask SSL private key password */
ask_key_pass = TRUE;
} else if (strcmp(argv[i], "--exec-mail") == 0) {
/* <protocol> [<server section>]
read configuration and execute mail process */
i++;
if (i == argc) i_fatal("Missing protocol argument");
exec_protocol = argv[i];
if (i+1 != argc)
exec_section = argv[++i];
} else if (strcmp(argv[i], "--version") == 0) {
printf("%s\n", VERSION);
return 0;
} else if (strcmp(argv[i], "--build-options") == 0) {
print_build_options();
return 0;
} else {
print_help();
i_fatal("Unknown argument: %s", argv[1]);
}
}
if (getenv("DOVECOT_INETD") != NULL) {
/* starting through inetd. */
inetd_login_fd = dup(0);
if (inetd_login_fd == -1)
i_fatal("dup(0) failed: %m");
fd_close_on_exec(inetd_login_fd, TRUE);
foreground = TRUE;
}
/* read and verify settings before forking */
t_push();
master_settings_init();
if (!master_settings_read(configfile, exec_protocol != NULL))
exit(FATAL_DEFAULT);
t_pop();
if (dump_config || dump_config_nondefaults) {
printf("# %s\n", configfile);
master_settings_dump(settings_root, dump_config_nondefaults);
return 0;
}
if (ask_key_pass) {
const char *prompt;
t_push();
prompt = t_strdup_printf("Give the password for SSL key file "
"%s: ",
settings_root->defaults->ssl_key_file);
askpass(prompt, ssl_manual_key_password,
sizeof(ssl_manual_key_password));
t_pop();
}
/* save TZ environment. AIX depends on it to get the timezone
correctly. */
env_tz = getenv("TZ");
user = getenv("USER");
home = getenv("HOME");
/* clean up the environment of everything */
env_clean();
/* put back the TZ */
if (env_tz != NULL)
env_put(t_strconcat("TZ=", env_tz, NULL));
if (exec_protocol != NULL) {
/* Put back user and home */
env_put(t_strconcat("USER=", user, NULL));
env_put(t_strconcat("HOME=", home, NULL));
mail_process_exec(exec_protocol, exec_section);
}
open_fds();
if (!foreground)
daemonize(settings_root->defaults);
ioloop = io_loop_create(system_pool);
main_init();
io_loop_run(ioloop);
main_deinit();
master_settings_deinit();
io_loop_destroy(&ioloop);
lib_deinit();
return 0;
}