setadmin.c revision 5c51f1241dbbdf2656d0e10011981411ed0c9673
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2006 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
/* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */
/* All Rights Reserved */
#include <stdio.h>
#include <limits.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <errno.h>
#include <pkglocs.h>
#include <locale.h>
#include <libintl.h>
#include <pkglib.h>
#include <pkgerr.h>
#include <pkgweb.h>
#include <install.h>
#include <libinst.h>
#include <libadm.h>
#include <messages.h>
#define DEFMAIL "root"
extern struct admin adm; /* holds info about install admin */
extern int warnflag; /* != 0 non-fatal error occurred 2 */
static struct {
char **memloc;
char *tag;
} admlist[] = {
&adm.action, "action",
&adm.authentication, "authentication",
&adm.basedir, "basedir",
&adm.conflict, "conflict",
&adm.idepend, "idepend",
&adm.instance, "instance",
&adm.keystore, "keystore",
&adm.mail, "mail",
&adm.networkretries, "networkretries",
&adm.networktimeout, "networktimeout",
&adm.partial, "partial",
&adm.proxy, "proxy",
&adm.rdepend, "rdepend",
&adm.RSCRIPTALT, RSCRIPTALT_KEYWORD,
&adm.runlevel, "runlevel",
&adm.setuid, "setuid",
&adm.space, "space",
/* MUST BE LAST ENTRY IN LIST */
(char **)NULL, (char *)NULL
};
/*
* Name: setadminSetting
* Description: set one administration parameter setting
* Arguments: a_paramName - pointer to string representing the name of
* the administration parameter to set
* a_paramValue - pointer to string representing the value
* to set the specified administration parameter to
* Returns: char *
* - old value the parameter had before being set
* == NULL - the old paramter was not set
*/
char *
setadminSetting(char *a_paramName, char *a_paramValue)
{
char *oldValue = (char *)NULL;
int i;
/* locate and update the specified admin setting */
for (i = 0; admlist[i].memloc; i++) {
if (strcmp(a_paramName, admlist[i].tag) == 0) {
oldValue = *admlist[i].memloc;
*admlist[i].memloc = a_paramValue;
break;
}
}
if (admlist[i].memloc == (char **)NULL) {
logerr(WRN_UNKNOWN_ADM_PARAM, a_paramName);
}
return (oldValue);
}
/*
* Name: setadminFile
* Description: read and remember settings from administration file
* Arguments: file - pointer to string representing the path to the
* administration file to read - if this is NULL
* then the name "default" is used - if this is
* the string "none" then the admin "basedir"
* setting is set to "ask" so that the location
* of the administration file will be interactively
* asked at the appropriate time
* Returns: void
*/
void
setadminFile(char *file)
{
FILE *fp;
int i;
char param[MAX_PKG_PARAM_LENGTH];
char *value;
char path[PATH_MAX];
int mail = 0;
if (file == NULL)
file = "default";
else if (strcmp(file, "none") == 0) {
adm.basedir = "ask";
return;
}
if (file[0] == '/')
(void) strcpy(path, file);
else {
(void) snprintf(path, sizeof (path), "%s/admin/%s",
get_PKGADM(), file);
if (access(path, R_OK)) {
(void) snprintf(path, sizeof (path), "%s/admin/%s",
PKGADM, file);
}
}
if ((fp = fopen(path, "r")) == NULL) {
progerr(ERR_OPEN_ADMIN_FILE, file, strerror(errno));
quit(99);
}
param[0] = '\0';
while (value = fpkgparam(fp, param)) {
if (strcmp(param, "mail") == 0) {
mail = 1;
}
if (value[0] == '\0') {
param[0] = '\0';
continue; /* same as not being set at all */
}
for (i = 0; admlist[i].memloc; i++) {
if (strcmp(param, admlist[i].tag) == 0) {
*admlist[i].memloc = value;
break;
}
}
if (admlist[i].memloc == NULL) {
logerr(WRN_UNKNOWN_ADM_PARAM, param);
free(value);
}
param[0] = '\0';
}
(void) fclose(fp);
if (!mail) {
adm.mail = DEFMAIL; /* if we don't assign anything to it */
}
}
/*
* Function: web_ck_retries
* Description: Reads admin file setting for networkretries, or uses default
* Parameters: None
* Returns: admin file setting for networkretries, or the default if no
* admin file setting exists or if it is outside the
* allowable range.
*/
int
web_ck_retries(void)
{
int retries = NET_RETRIES_DEFAULT;
if (ADMSET(networkretries)) {
/* Make sure value is within valid range */
if ((retries = atoi(adm.networkretries)) == 0) {
return (NET_RETRIES_DEFAULT);
} else if (retries <= NET_RETRIES_MIN ||
retries > NET_RETRIES_MAX) {
return (NET_RETRIES_DEFAULT);
}
}
return (retries);
}
/*
* Function: web_ck_authentication
* Description: Retrieves admin file setting for authentication
* Parameters: None
* Returns: admin file policy for authentication - AUTH_QUIT
* or AUTH_NOCHECK.
* non-zero failure
*/
int
web_ck_authentication(void)
{
if (ADM(authentication, "nocheck"))
return (AUTH_NOCHECK);
return (AUTH_QUIT);
}
/*
* Function: web_ck_timeout
* Description: Retrieves admin file policy for networktimeout's
* Parameters: NONE
* Returns: Admin file setting for networktimeout, or default
* timeout value if admin file does not specify one,
* or specifies one that is out of the allowable range.
*/
int
web_ck_timeout(void)
{
int timeout = NET_TIMEOUT_DEFAULT;
if (ADMSET(networktimeout)) {
/* Make sure value is within valid range */
if ((timeout = atoi(adm.networktimeout)) == 0) {
return (NET_TIMEOUT_DEFAULT);
} else if (timeout <= NET_TIMEOUT_MIN ||
timeout > NET_TIMEOUT_MAX) {
return (NET_TIMEOUT_DEFAULT);
}
}
return (timeout);
}
/*
* Function: check_keystore_admin
* Description: Retrieves security keystore setting from admin file,
* or validates user-supplied keystore policy.
* Parameters: keystore - Where to store resulting keystore policy
* Returns: B_TRUE - admin file contained valid keystore, or
* user-supplied keystore passed in "keystore" was
* valid. Resulting keystore stored in "keystore"
*
* B_FALSE - No location supplied to store result,
* or user-supplied keystore was not valid.
*/
boolean_t
check_keystore_admin(char **keystore)
{
if (!keystore) {
/* no location to store keystore */
return (B_FALSE);
}
if (*keystore != NULL) {
if (!path_valid(*keystore)) {
/* the given keystore is invalid */
return (B_FALSE);
}
/* the user-supplied keystore was valid */
return (B_TRUE);
}
/* no user-supplied, so use default */
if ((*keystore = set_keystore_admin()) == NULL) {
*keystore = PKGSEC;
}
return (B_TRUE);
}
/*
* Function: get_proxy_port_admin
* Description: Retrieves proxy setting from admin file
* Parameters: proxy - where to store resulting proxy (host:port or URL)
* port - Where to store resulting proxy port
* Returns: B_TRUE - admin file had a valid proxy setting,
* and it is stored in "proxy".
* B_FALSE - no proxy setting in admin file, or
* invalid setting in admin file.
*/
boolean_t
get_proxy_port_admin(char **proxy, ushort_t *port)
{
if (ADMSET(proxy) && !path_valid(adm.proxy)) {
/* admin file has bad keystore */
return (B_FALSE);
} else if (ADMSET(proxy)) {
*proxy = strdup(adm.proxy);
*port = strip_port(adm.proxy);
}
return (B_TRUE);
}
/*
* Function: set_keystore_admin
* Description: Retrieves security keystore setting from admin file,
* Parameters: NONE
* Returns: Keystore file policy from admin file, if set
* and valid. NULL otherwise.
*/
char *
set_keystore_admin(void)
{
if (ADMSET(keystore) && !path_valid(adm.keystore)) {
return (NULL);
}
if (!ADMSET(keystore)) {
return (NULL);
}
return (adm.keystore);
}