yp_server.c revision 46186
112891Swpaul/* 212891Swpaul * Copyright (c) 1995 312891Swpaul * Bill Paul <wpaul@ctr.columbia.edu>. All rights reserved. 412891Swpaul * 512891Swpaul * Redistribution and use in source and binary forms, with or without 612891Swpaul * modification, are permitted provided that the following conditions 712891Swpaul * are met: 812891Swpaul * 1. Redistributions of source code must retain the above copyright 912891Swpaul * notice, this list of conditions and the following disclaimer. 1012891Swpaul * 2. Redistributions in binary form must reproduce the above copyright 1112891Swpaul * notice, this list of conditions and the following disclaimer in the 1212891Swpaul * documentation and/or other materials provided with the distribution. 1312891Swpaul * 3. All advertising materials mentioning features or use of this software 1412891Swpaul * must display the following acknowledgement: 1512891Swpaul * This product includes software developed by Bill Paul. 1612891Swpaul * 4. Neither the name of the author nor the names of any co-contributors 1712891Swpaul * may be used to endorse or promote products derived from this software 1812891Swpaul * without specific prior written permission. 1912891Swpaul * 2012891Swpaul * THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ``AS IS'' AND 2112891Swpaul * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 2212891Swpaul * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 2312891Swpaul * ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR CONTRIBUTORS BE LIABLE 2412891Swpaul * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 2512891Swpaul * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 2612891Swpaul * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 2712891Swpaul * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 2812891Swpaul * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 2912891Swpaul * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 3012891Swpaul * SUCH DAMAGE. 3112891Swpaul * 3212891Swpaul */ 3312891Swpaul 3430827Scharnier#ifndef lint 3530827Scharnierstatic const char rcsid[] = 3646186Swpaul "$Id: yp_server.c,v 1.27 1999/02/10 16:16:14 wpaul Exp $"; 3730827Scharnier#endif /* not lint */ 3830827Scharnier 3920818Swpaul#include "yp.h" 4012891Swpaul#include "yp_extern.h" 4130827Scharnier#include <dirent.h> 4230827Scharnier#include <errno.h> 4312891Swpaul#include <stdlib.h> 4412891Swpaul#include <sys/stat.h> 4512891Swpaul#include <sys/param.h> 4612891Swpaul#include <sys/types.h> 4712891Swpaul#include <sys/socket.h> 4812891Swpaul#include <netinet/in.h> 4912891Swpaul#include <arpa/inet.h> 5012997Swpaul#include <rpc/rpc.h> 5112891Swpaul 5212891Swpaulint children = 0; 5312891Swpaul 5428042Swpaul#define MASTER_STRING "YP_MASTER_NAME" 5528042Swpaul#define MASTER_SZ sizeof(MASTER_STRING) - 1 5628042Swpaul#define ORDER_STRING "YP_LAST_MODIFIED" 5728042Swpaul#define ORDER_SZ sizeof(ORDER_STRING) - 1 5828042Swpaul 5946186Swpaulstatic pid_t yp_fork() 6046186Swpaul{ 6146186Swpaul if (yp_pid != getpid()) { 6246186Swpaul yp_error("child %d trying to fork!", getpid()); 6346186Swpaul errno = EEXIST; 6446186Swpaul return(-1); 6546186Swpaul } 6646186Swpaul 6746186Swpaul return(fork()); 6846186Swpaul} 6946186Swpaul 7014262Swpaul/* 7114262Swpaul * NIS v2 support. This is where most of the action happens. 7214262Swpaul */ 7314262Swpaul 7412891Swpaulvoid * 7512891Swpaulypproc_null_2_svc(void *argp, struct svc_req *rqstp) 7612891Swpaul{ 7712891Swpaul static char * result; 7812891Swpaul static char rval = 0; 7912891Swpaul 8019161Swpaul#ifdef DB_CACHE 8119161Swpaul if (yp_access(NULL, NULL, (struct svc_req *)rqstp)) 8219161Swpaul#else 8312891Swpaul if (yp_access(NULL, (struct svc_req *)rqstp)) 8419161Swpaul#endif 8512891Swpaul return(NULL); 8612891Swpaul 8712891Swpaul result = &rval; 8812891Swpaul 8912891Swpaul return((void *) &result); 9012891Swpaul} 9112891Swpaul 9212891Swpaulbool_t * 9312891Swpaulypproc_domain_2_svc(domainname *argp, struct svc_req *rqstp) 9412891Swpaul{ 9512891Swpaul static bool_t result; 9612891Swpaul 9719161Swpaul#ifdef DB_CACHE 9819161Swpaul if (yp_access(NULL, NULL, (struct svc_req *)rqstp)) { 9919161Swpaul#else 10012891Swpaul if (yp_access(NULL, (struct svc_req *)rqstp)) { 10119161Swpaul#endif 10212891Swpaul result = FALSE; 10312891Swpaul return (&result); 10412891Swpaul } 10512891Swpaul 10612891Swpaul if (argp == NULL || yp_validdomain(*argp)) 10712891Swpaul result = FALSE; 10812891Swpaul else 10912891Swpaul result = TRUE; 11012891Swpaul 11112891Swpaul return (&result); 11212891Swpaul} 11312891Swpaul 11412891Swpaulbool_t * 11512891Swpaulypproc_domain_nonack_2_svc(domainname *argp, struct svc_req *rqstp) 11612891Swpaul{ 11712891Swpaul static bool_t result; 11812891Swpaul 11919161Swpaul#ifdef DB_CACHE 12019161Swpaul if (yp_access(NULL, NULL, (struct svc_req *)rqstp)) 12119161Swpaul#else 12212891Swpaul if (yp_access(NULL, (struct svc_req *)rqstp)) 12319161Swpaul#endif 12412891Swpaul return (NULL); 12512891Swpaul 12612891Swpaul if (argp == NULL || yp_validdomain(*argp)) 12712891Swpaul return (NULL); 12812891Swpaul else 12912891Swpaul result = TRUE; 13012891Swpaul 13112891Swpaul return (&result); 13212891Swpaul} 13312891Swpaul 13412891Swpaulypresp_val * 13512891Swpaulypproc_match_2_svc(ypreq_key *argp, struct svc_req *rqstp) 13612891Swpaul{ 13712891Swpaul static ypresp_val result; 13812891Swpaul 13914304Swpaul result.val.valdat_val = ""; 14014304Swpaul result.val.valdat_len = 0; 14119161Swpaul 14219161Swpaul#ifdef DB_CACHE 14319161Swpaul if (yp_access(argp->map, argp->domain, (struct svc_req *)rqstp)) { 14419161Swpaul#else 14512891Swpaul if (yp_access(argp->map, (struct svc_req *)rqstp)) { 14619161Swpaul#endif 14712891Swpaul result.stat = YP_YPERR; 14812891Swpaul return (&result); 14912891Swpaul } 15012891Swpaul 15112891Swpaul if (argp->domain == NULL || argp->map == NULL) { 15212891Swpaul result.stat = YP_BADARGS; 15312891Swpaul return (&result); 15412891Swpaul } 15512891Swpaul 15633250Swpaul if (yp_select_map(argp->map, argp->domain, NULL, 1) != YP_TRUE) { 15720818Swpaul result.stat = yp_errno; 15820818Swpaul return(&result); 15912891Swpaul } 16012891Swpaul 16120818Swpaul result.stat = yp_getbykey(&argp->key, &result.val); 16220818Swpaul 16312891Swpaul /* 16412891Swpaul * Do DNS lookups for hosts maps if database lookup failed. 16512891Swpaul */ 16612891Swpaul 16719161Swpaul#ifdef DB_CACHE 16819161Swpaul if (result.stat != YP_TRUE && 16919161Swpaul (yp_testflag(argp->map, argp->domain, YP_INTERDOMAIN) || 17019161Swpaul (strstr(argp->map, "hosts") && do_dns))) { 17119161Swpaul#else 17212891Swpaul if (do_dns && result.stat != YP_TRUE && strstr(argp->map, "hosts")) { 17319161Swpaul#endif 17427589Swpaul char nbuf[YPMAXRECORD]; 17520818Swpaul 17620818Swpaul /* NUL terminate! NUL terminate!! NUL TERMINATE!!! */ 17727589Swpaul bcopy(argp->key.keydat_val, nbuf, argp->key.keydat_len); 17827589Swpaul nbuf[argp->key.keydat_len] = '\0'; 17912891Swpaul 18012891Swpaul if (debug) 18130827Scharnier yp_error("doing DNS lookup of %s", nbuf); 18212891Swpaul 18312891Swpaul if (!strcmp(argp->map, "hosts.byname")) 18427589Swpaul result.stat = yp_async_lookup_name(rqstp, nbuf); 18512891Swpaul else if (!strcmp(argp->map, "hosts.byaddr")) 18627589Swpaul result.stat = yp_async_lookup_addr(rqstp, nbuf); 18712891Swpaul 18820818Swpaul if (result.stat == YP_TRUE) 18920818Swpaul return(NULL); 19012891Swpaul } 19112891Swpaul 19212891Swpaul return (&result); 19312891Swpaul} 19412891Swpaul 19512891Swpaulypresp_key_val * 19612891Swpaulypproc_first_2_svc(ypreq_nokey *argp, struct svc_req *rqstp) 19712891Swpaul{ 19812891Swpaul static ypresp_key_val result; 19912891Swpaul 20014304Swpaul result.val.valdat_val = result.key.keydat_val = ""; 20114304Swpaul result.val.valdat_len = result.key.keydat_len = 0; 20219161Swpaul 20319161Swpaul#ifdef DB_CACHE 20419161Swpaul if (yp_access(argp->map, argp->domain, (struct svc_req *)rqstp)) { 20519161Swpaul#else 20612891Swpaul if (yp_access(argp->map, (struct svc_req *)rqstp)) { 20719161Swpaul#endif 20812891Swpaul result.stat = YP_YPERR; 20912891Swpaul return (&result); 21012891Swpaul } 21112891Swpaul 21212891Swpaul if (argp->domain == NULL) { 21312891Swpaul result.stat = YP_BADARGS; 21412891Swpaul return (&result); 21512891Swpaul } 21612891Swpaul 21733250Swpaul if (yp_select_map(argp->map, argp->domain, NULL, 0) != YP_TRUE) { 21812891Swpaul result.stat = yp_errno; 21912891Swpaul return(&result); 22012891Swpaul } 22112891Swpaul 22220818Swpaul result.stat = yp_firstbykey(&result.key, &result.val); 22312891Swpaul 22412891Swpaul return (&result); 22512891Swpaul} 22612891Swpaul 22712891Swpaulypresp_key_val * 22812891Swpaulypproc_next_2_svc(ypreq_key *argp, struct svc_req *rqstp) 22912891Swpaul{ 23012891Swpaul static ypresp_key_val result; 23112891Swpaul 23214304Swpaul result.val.valdat_val = result.key.keydat_val = ""; 23314304Swpaul result.val.valdat_len = result.key.keydat_len = 0; 23415426Swpaul 23519161Swpaul#ifdef DB_CACHE 23619161Swpaul if (yp_access(argp->map, argp->domain, (struct svc_req *)rqstp)) { 23719161Swpaul#else 23812891Swpaul if (yp_access(argp->map, (struct svc_req *)rqstp)) { 23919161Swpaul#endif 24012891Swpaul result.stat = YP_YPERR; 24112891Swpaul return (&result); 24212891Swpaul } 24312891Swpaul 24412891Swpaul if (argp->domain == NULL || argp->map == NULL) { 24512891Swpaul result.stat = YP_BADARGS; 24612891Swpaul return (&result); 24712891Swpaul } 24812891Swpaul 24920818Swpaul if (yp_select_map(argp->map, argp->domain, &argp->key, 0) != YP_TRUE) { 25012891Swpaul result.stat = yp_errno; 25112891Swpaul return(&result); 25212891Swpaul } 25312891Swpaul 25420818Swpaul result.key.keydat_len = argp->key.keydat_len; 25520818Swpaul result.key.keydat_val = argp->key.keydat_val; 25612891Swpaul 25720818Swpaul result.stat = yp_nextbykey(&result.key, &result.val); 25820818Swpaul 25912891Swpaul return (&result); 26012891Swpaul} 26112891Swpaul 26212997Swpaulstatic void ypxfr_callback(rval,addr,transid,prognum,port) 26312997Swpaul ypxfrstat rval; 26412997Swpaul struct sockaddr_in *addr; 26512997Swpaul unsigned int transid; 26612997Swpaul unsigned int prognum; 26712997Swpaul unsigned long port; 26812997Swpaul{ 26912997Swpaul CLIENT *clnt; 27012997Swpaul int sock = RPC_ANYSOCK; 27112997Swpaul struct timeval timeout; 27212997Swpaul yppushresp_xfr ypxfr_resp; 27313375Swpaul struct rpc_err err; 27412997Swpaul 27513375Swpaul timeout.tv_sec = 5; 27612997Swpaul timeout.tv_usec = 0; 27712997Swpaul addr->sin_port = htons(port); 27812997Swpaul 27919131Swpaul if ((clnt = clntudp_create(addr,prognum,1,timeout,&sock)) == NULL) { 28019131Swpaul yp_error("%s: %s", inet_ntoa(addr->sin_addr), 28119161Swpaul clnt_spcreateerror("failed to establish callback handle")); 28219131Swpaul return; 28319131Swpaul } 28412997Swpaul 28512997Swpaul ypxfr_resp.status = rval; 28612997Swpaul ypxfr_resp.transid = transid; 28712997Swpaul 28813375Swpaul /* Turn the timeout off -- we don't want to block. */ 28913375Swpaul timeout.tv_sec = 0; 29013375Swpaul if (clnt_control(clnt, CLSET_TIMEOUT, (char *)&timeout) == FALSE) 29113375Swpaul yp_error("failed to set timeout on ypproc_xfr callback"); 29212997Swpaul 29313375Swpaul if (yppushproc_xfrresp_1(&ypxfr_resp, clnt) == NULL) { 29413375Swpaul clnt_geterr(clnt, &err); 29513375Swpaul if (err.re_status != RPC_SUCCESS && 29613375Swpaul err.re_status != RPC_TIMEDOUT) 29713375Swpaul yp_error("%s", clnt_sperror(clnt, 29813375Swpaul "ypxfr callback failed")); 29913375Swpaul } 30013375Swpaul 30112997Swpaul clnt_destroy(clnt); 30212997Swpaul return; 30312997Swpaul} 30412997Swpaul 30515426Swpaul#define YPXFR_RETURN(CODE) \ 30615426Swpaul /* Order is important: send regular RPC reply, then callback */ \ 30715426Swpaul result.xfrstat = CODE; \ 30815426Swpaul svc_sendreply(rqstp->rq_xprt, xdr_ypresp_xfr, (char *)&result); \ 30915426Swpaul ypxfr_callback(CODE,rqhost,argp->transid, \ 31015426Swpaul argp->prog,argp->port); \ 31115426Swpaul return(NULL); 31215426Swpaul 31312891Swpaulypresp_xfr * 31412891Swpaulypproc_xfr_2_svc(ypreq_xfr *argp, struct svc_req *rqstp) 31512891Swpaul{ 31612891Swpaul static ypresp_xfr result; 31712997Swpaul struct sockaddr_in *rqhost; 31824780Swpaul ypresp_master *mres; 31924780Swpaul ypreq_nokey mreq; 32012891Swpaul 32113375Swpaul result.transid = argp->transid; 32213375Swpaul rqhost = svc_getcaller(rqstp->rq_xprt); 32313375Swpaul 32419161Swpaul#ifdef DB_CACHE 32519161Swpaul if (yp_access(argp->map_parms.map, 32619161Swpaul argp->map_parms.domain, (struct svc_req *)rqstp)) { 32719161Swpaul#else 32812891Swpaul if (yp_access(argp->map_parms.map, (struct svc_req *)rqstp)) { 32919161Swpaul#endif 33024780Swpaul YPXFR_RETURN(YPXFR_REFUSED) 33112891Swpaul } 33212891Swpaul 33324780Swpaul 33412891Swpaul if (argp->map_parms.domain == NULL) { 33524780Swpaul YPXFR_RETURN(YPXFR_BADARGS) 33612891Swpaul } 33712891Swpaul 33812891Swpaul if (yp_validdomain(argp->map_parms.domain)) { 33924780Swpaul YPXFR_RETURN(YPXFR_NODOM) 34012891Swpaul } 34112891Swpaul 34224780Swpaul /* 34324780Swpaul * Determine the master host ourselves. The caller may 34424780Swpaul * be up to no good. This has the side effect of verifying 34524780Swpaul * that the requested map and domain actually exist. 34624780Swpaul */ 34724780Swpaul 34824780Swpaul mreq.domain = argp->map_parms.domain; 34924780Swpaul mreq.map = argp->map_parms.map; 35024780Swpaul 35124780Swpaul mres = ypproc_master_2_svc(&mreq, rqstp); 35224780Swpaul 35324780Swpaul if (mres->stat != YP_TRUE) { 35424780Swpaul yp_error("couldn't find master for map %s@%s", 35524780Swpaul argp->map_parms.map, 35624780Swpaul argp->map_parms.domain); 35724780Swpaul yp_error("host at %s (%s) may be pulling my leg", 35824780Swpaul argp->map_parms.peer, 35924780Swpaul inet_ntoa(rqhost->sin_addr)); 36024780Swpaul YPXFR_RETURN(YPXFR_REFUSED) 36124780Swpaul } 36224780Swpaul 36346186Swpaul switch(yp_fork()) { 36412891Swpaul case 0: 36512891Swpaul { 36612891Swpaul char g[11], t[11], p[11]; 36712891Swpaul char ypxfr_command[MAXPATHLEN + 2]; 36812891Swpaul 36912891Swpaul sprintf (ypxfr_command, "%sypxfr", _PATH_LIBEXEC); 37012891Swpaul sprintf (t, "%u", argp->transid); 37112891Swpaul sprintf (g, "%u", argp->prog); 37212891Swpaul sprintf (p, "%u", argp->port); 37322321Swpaul if (debug) { 37412997Swpaul close(0); close(1); close(2); 37522321Swpaul } 37612997Swpaul if (strcmp(yp_dir, _PATH_YP)) { 37714304Swpaul execl(ypxfr_command, "ypxfr", 37814304Swpaul "-d", argp->map_parms.domain, 37924780Swpaul "-h", mres->peer, 38014304Swpaul "-p", yp_dir, "-C", t, 38114304Swpaul g, inet_ntoa(rqhost->sin_addr), 38214304Swpaul p, argp->map_parms.map, 38312997Swpaul NULL); 38412997Swpaul } else { 38514304Swpaul execl(ypxfr_command, "ypxfr", 38614304Swpaul "-d", argp->map_parms.domain, 38724780Swpaul "-h", mres->peer, 38814304Swpaul "-C", t, 38914304Swpaul g, inet_ntoa(rqhost->sin_addr), 39014304Swpaul p, argp->map_parms.map, 39112997Swpaul NULL); 39212997Swpaul } 39315426Swpaul yp_error("ypxfr execl(%s): %s", ypxfr_command, strerror(errno)); 39424780Swpaul YPXFR_RETURN(YPXFR_XFRERR) 39512997Swpaul break; 39612891Swpaul } 39712891Swpaul case -1: 39812891Swpaul yp_error("ypxfr fork(): %s", strerror(errno)); 39924780Swpaul YPXFR_RETURN(YPXFR_XFRERR) 40012891Swpaul break; 40112891Swpaul default: 40213375Swpaul result.xfrstat = YPXFR_SUCC; 40312997Swpaul children++; 40412891Swpaul break; 40512891Swpaul } 40613375Swpaul 40713375Swpaul return (&result); 40812891Swpaul} 40915426Swpaul#undef YPXFR_RETURN 41012891Swpaul 41112891Swpaulvoid * 41212891Swpaulypproc_clear_2_svc(void *argp, struct svc_req *rqstp) 41312891Swpaul{ 41412891Swpaul static char * result; 41512891Swpaul static char rval = 0; 41612891Swpaul 41719161Swpaul#ifdef DB_CACHE 41819161Swpaul if (yp_access(NULL, NULL, (struct svc_req *)rqstp)) 41919161Swpaul#else 42012891Swpaul if (yp_access(NULL, (struct svc_req *)rqstp)) 42119161Swpaul#endif 42212891Swpaul return (NULL); 42315426Swpaul#ifdef DB_CACHE 42415426Swpaul /* clear out the database cache */ 42515426Swpaul yp_flush_all(); 42615426Swpaul#endif 42714240Swpaul /* Re-read the securenets database for the hell of it. */ 42814240Swpaul load_securenets(); 42914240Swpaul 43012891Swpaul result = &rval; 43112891Swpaul return((void *) &result); 43212891Swpaul} 43312891Swpaul 43412891Swpaul/* 43512891Swpaul * For ypproc_all, we have to send a stream of ypresp_all structures 43612891Swpaul * via TCP, but the XDR filter generated from the yp.x protocol 43712891Swpaul * definition file only serializes one such structure. This means that 43812891Swpaul * to send the whole stream, you need a wrapper which feeds all the 43912891Swpaul * records into the underlying XDR routine until it hits an 'EOF.' 44012891Swpaul * But to use the wrapper, you have to violate the boundaries between 44112891Swpaul * RPC layers by calling svc_sendreply() directly from the ypproc_all 44212891Swpaul * service routine instead of letting the RPC dispatcher do it. 44312891Swpaul * 44412891Swpaul * Bleah. 44512891Swpaul */ 44612891Swpaul 44712891Swpaul/* 44820100Swpaul * Custom XDR routine for serialzing results of ypproc_all: keep 44920100Swpaul * reading from the database and spew until we run out of records 45020100Swpaul * or encounter an error. 45112891Swpaul */ 45212891Swpaulstatic bool_t 45312891Swpaulxdr_my_ypresp_all(register XDR *xdrs, ypresp_all *objp) 45412891Swpaul{ 45520100Swpaul while (1) { 45620100Swpaul /* Get a record. */ 45720100Swpaul if ((objp->ypresp_all_u.val.stat = 45820818Swpaul yp_nextbykey(&objp->ypresp_all_u.val.key, 45920818Swpaul &objp->ypresp_all_u.val.val)) == YP_TRUE) { 46020100Swpaul objp->more = TRUE; 46120100Swpaul } else { 46220100Swpaul objp->more = FALSE; 46320100Swpaul } 46420100Swpaul 46520100Swpaul /* Serialize. */ 46620100Swpaul if (!xdr_ypresp_all(xdrs, objp)) 46720100Swpaul return(FALSE); 46820100Swpaul if (objp->more == FALSE) 46920100Swpaul return(TRUE); 47020100Swpaul } 47112891Swpaul} 47212891Swpaul 47312891Swpaulypresp_all * 47412891Swpaulypproc_all_2_svc(ypreq_nokey *argp, struct svc_req *rqstp) 47512891Swpaul{ 47612891Swpaul static ypresp_all result; 47712891Swpaul 47812891Swpaul /* 47912891Swpaul * Set this here so that the client will be forced to make 48012891Swpaul * at least one attempt to read from us even if all we're 48112891Swpaul * doing is returning an error. 48212891Swpaul */ 48312891Swpaul result.more = TRUE; 48414304Swpaul result.ypresp_all_u.val.key.keydat_len = 0; 48514304Swpaul result.ypresp_all_u.val.key.keydat_val = ""; 48612891Swpaul 48719161Swpaul#ifdef DB_CACHE 48819161Swpaul if (yp_access(argp->map, argp->domain, (struct svc_req *)rqstp)) { 48919161Swpaul#else 49012891Swpaul if (yp_access(argp->map, (struct svc_req *)rqstp)) { 49119161Swpaul#endif 49212891Swpaul result.ypresp_all_u.val.stat = YP_YPERR; 49312891Swpaul return (&result); 49412891Swpaul } 49512891Swpaul 49612891Swpaul if (argp->domain == NULL || argp->map == NULL) { 49712891Swpaul result.ypresp_all_u.val.stat = YP_BADARGS; 49812891Swpaul return (&result); 49912891Swpaul } 50012891Swpaul 50120100Swpaul /* 50221389Swpaul * XXX If we hit the child limit, fail the request. 50321389Swpaul * If we don't, and the map is large, we could block for 50421389Swpaul * a long time in the parent. 50521389Swpaul */ 50621389Swpaul if (children >= MAX_CHILDREN) { 50721389Swpaul result.ypresp_all_u.val.stat = YP_YPERR; 50821389Swpaul return(&result); 50921389Swpaul } 51021389Swpaul 51121389Swpaul /* 51220100Swpaul * The ypproc_all procedure can take a while to complete. 51320100Swpaul * Best to handle it in a subprocess so the parent doesn't 51420100Swpaul * block. (Is there a better way to do this? Maybe with 51520100Swpaul * async socket I/O?) 51620100Swpaul */ 51743847Swpaul if (!debug) { 51846186Swpaul switch(yp_fork()) { 51943847Swpaul case 0: 52043847Swpaul break; 52143847Swpaul case -1: 52243847Swpaul yp_error("ypall fork(): %s", strerror(errno)); 52343847Swpaul result.ypresp_all_u.val.stat = YP_YPERR; 52443847Swpaul return(&result); 52543847Swpaul break; 52643847Swpaul default: 52743847Swpaul children++; 52843847Swpaul return (NULL); 52943847Swpaul break; 53043847Swpaul } 53120100Swpaul } 53220100Swpaul 53320818Swpaul if (yp_select_map(argp->map, argp->domain, 53420818Swpaul &result.ypresp_all_u.val.key, 0) != YP_TRUE) { 53512891Swpaul result.ypresp_all_u.val.stat = yp_errno; 53612891Swpaul return(&result); 53712891Swpaul } 53812891Swpaul 53912891Swpaul /* Kick off the actual data transfer. */ 54020100Swpaul svc_sendreply(rqstp->rq_xprt, xdr_my_ypresp_all, (char *)&result); 54120100Swpaul 54212891Swpaul /* 54312891Swpaul * Returning NULL prevents the dispatcher from calling 54412891Swpaul * svc_sendreply() since we already did it. 54512891Swpaul */ 54612891Swpaul return (NULL); 54712891Swpaul} 54812891Swpaul 54912891Swpaulypresp_master * 55012891Swpaulypproc_master_2_svc(ypreq_nokey *argp, struct svc_req *rqstp) 55112891Swpaul{ 55212891Swpaul static ypresp_master result; 55315426Swpaul static char ypvalbuf[YPMAXRECORD]; 55428042Swpaul keydat key = { MASTER_SZ, MASTER_STRING }; 55520818Swpaul valdat val; 55612891Swpaul 55714303Swpaul result.peer = ""; 55814303Swpaul 55919161Swpaul#ifdef DB_CACHE 56019161Swpaul if (yp_access(argp->map, argp->domain, (struct svc_req *)rqstp)) { 56119161Swpaul#else 56219161Swpaul if (yp_access(argp->map, (struct svc_req *)rqstp)) { 56319161Swpaul#endif 56412891Swpaul result.stat = YP_YPERR; 56512891Swpaul return(&result); 56612891Swpaul } 56712891Swpaul 56812891Swpaul if (argp->domain == NULL) { 56912891Swpaul result.stat = YP_BADARGS; 57012891Swpaul return (&result); 57112891Swpaul } 57212891Swpaul 57320818Swpaul if (yp_select_map(argp->map, argp->domain, &key, 1) != YP_TRUE) { 57420818Swpaul result.stat = yp_errno; 57520818Swpaul return(&result); 57620818Swpaul } 57720818Swpaul 57815426Swpaul /* 57915426Swpaul * Note that we copy the data retrieved from the database to 58015426Swpaul * a private buffer and NUL terminate the buffer rather than 58115426Swpaul * terminating the data in place. We do this because by stuffing 58215426Swpaul * a '\0' into data.data, we will actually be corrupting memory 58315426Swpaul * allocated by the DB package. This is a bad thing now that we 58415426Swpaul * cache DB handles rather than closing the database immediately. 58515426Swpaul */ 58620818Swpaul result.stat = yp_getbykey(&key, &val); 58720818Swpaul if (result.stat == YP_TRUE) { 58820818Swpaul bcopy((char *)val.valdat_val, (char *)&ypvalbuf, 58920818Swpaul val.valdat_len); 59020818Swpaul ypvalbuf[val.valdat_len] = '\0'; 59115426Swpaul result.peer = (char *)&ypvalbuf; 59212891Swpaul } else 59312891Swpaul result.peer = ""; 59412891Swpaul 59512891Swpaul return (&result); 59612891Swpaul} 59712891Swpaul 59812891Swpaulypresp_order * 59912891Swpaulypproc_order_2_svc(ypreq_nokey *argp, struct svc_req *rqstp) 60012891Swpaul{ 60112891Swpaul static ypresp_order result; 60228042Swpaul keydat key = { ORDER_SZ, ORDER_STRING }; 60320818Swpaul valdat val; 60412891Swpaul 60514304Swpaul result.ordernum = 0; 60614304Swpaul 60719161Swpaul#ifdef DB_CACHE 60819161Swpaul if (yp_access(argp->map, argp->domain, (struct svc_req *)rqstp)) { 60919161Swpaul#else 61019161Swpaul if (yp_access(argp->map, (struct svc_req *)rqstp)) { 61119161Swpaul#endif 61212891Swpaul result.stat = YP_YPERR; 61312891Swpaul return(&result); 61412891Swpaul } 61512891Swpaul 61612891Swpaul if (argp->domain == NULL) { 61712891Swpaul result.stat = YP_BADARGS; 61812891Swpaul return (&result); 61912891Swpaul } 62012891Swpaul 62112891Swpaul /* 62212891Swpaul * We could just check the timestamp on the map file, 62312891Swpaul * but that's a hack: we'll only know the last time the file 62412891Swpaul * was touched, not the last time the database contents were 62512891Swpaul * updated. 62612891Swpaul */ 62712891Swpaul 62820818Swpaul if (yp_select_map(argp->map, argp->domain, &key, 1) != YP_TRUE) { 62920818Swpaul result.stat = yp_errno; 63020818Swpaul return(&result); 63120818Swpaul } 63220818Swpaul 63320818Swpaul result.stat = yp_getbykey(&key, &val); 63420818Swpaul 63520818Swpaul if (result.stat == YP_TRUE) 63620818Swpaul result.ordernum = atoi((char *)val.valdat_val); 63712891Swpaul else 63812891Swpaul result.ordernum = 0; 63912891Swpaul 64012891Swpaul return (&result); 64112891Swpaul} 64212891Swpaul 64312891Swpaulstatic void yp_maplist_free(yp_maplist) 64412891Swpaul struct ypmaplist *yp_maplist; 64512891Swpaul{ 64612891Swpaul register struct ypmaplist *next; 64712891Swpaul 64812891Swpaul while(yp_maplist) { 64912891Swpaul next = yp_maplist->next; 65012891Swpaul free(yp_maplist->map); 65112891Swpaul free(yp_maplist); 65212891Swpaul yp_maplist = next; 65312891Swpaul } 65412891Swpaul return; 65512891Swpaul} 65612891Swpaul 65712891Swpaulstatic struct ypmaplist *yp_maplist_create(domain) 65812891Swpaul const char *domain; 65912891Swpaul{ 66012891Swpaul char yp_mapdir[MAXPATHLEN + 2]; 66112891Swpaul char yp_mapname[MAXPATHLEN + 2]; 66212891Swpaul struct ypmaplist *cur = NULL; 66312891Swpaul struct ypmaplist *yp_maplist = NULL; 66412891Swpaul DIR *dird; 66512891Swpaul struct dirent *dirp; 66612891Swpaul struct stat statbuf; 66712891Swpaul 66812891Swpaul snprintf(yp_mapdir, sizeof(yp_mapdir), "%s/%s", yp_dir, domain); 66912891Swpaul 67012891Swpaul if ((dird = opendir(yp_mapdir)) == NULL) { 67113800Swpaul yp_error("opendir(%s) failed: %s", yp_mapdir, strerror(errno)); 67212891Swpaul return(NULL); 67312891Swpaul } 67412891Swpaul 67512891Swpaul while ((dirp = readdir(dird)) != NULL) { 67612891Swpaul if (strcmp(dirp->d_name, ".") && strcmp(dirp->d_name, "..")) { 67714304Swpaul snprintf(yp_mapname, sizeof(yp_mapname), "%s/%s", 67814304Swpaul yp_mapdir,dirp->d_name); 67914304Swpaul if (stat(yp_mapname, &statbuf) < 0 || 68014304Swpaul !S_ISREG(statbuf.st_mode)) 68112891Swpaul continue; 68214304Swpaul if ((cur = (struct ypmaplist *) 68316044Swpaul malloc(sizeof(struct ypmaplist))) == NULL) { 68430827Scharnier yp_error("malloc() failed"); 68512891Swpaul closedir(dird); 68612891Swpaul yp_maplist_free(yp_maplist); 68712891Swpaul return(NULL); 68812891Swpaul } 68912891Swpaul if ((cur->map = (char *)strdup(dirp->d_name)) == NULL) { 69014304Swpaul yp_error("strdup() failed: %s",strerror(errno)); 69112891Swpaul closedir(dird); 69212891Swpaul yp_maplist_free(yp_maplist); 69312891Swpaul return(NULL); 69412891Swpaul } 69512891Swpaul cur->next = yp_maplist; 69612891Swpaul yp_maplist = cur; 69712891Swpaul if (debug) 69812891Swpaul yp_error("map: %s", yp_maplist->map); 69912891Swpaul } 70012891Swpaul 70112891Swpaul } 70212891Swpaul closedir(dird); 70312891Swpaul return(yp_maplist); 70412891Swpaul} 70512891Swpaul 70612891Swpaulypresp_maplist * 70712891Swpaulypproc_maplist_2_svc(domainname *argp, struct svc_req *rqstp) 70812891Swpaul{ 70915426Swpaul static ypresp_maplist result = { 0, NULL }; 71012891Swpaul 71119161Swpaul#ifdef DB_CACHE 71219161Swpaul if (yp_access(NULL, NULL, (struct svc_req *)rqstp)) { 71319161Swpaul#else 71412891Swpaul if (yp_access(NULL, (struct svc_req *)rqstp)) { 71519161Swpaul#endif 71612891Swpaul result.stat = YP_YPERR; 71712891Swpaul return(&result); 71812891Swpaul } 71912891Swpaul 72012891Swpaul if (argp == NULL) { 72112891Swpaul result.stat = YP_BADARGS; 72212891Swpaul return (&result); 72312891Swpaul } 72412891Swpaul 72512891Swpaul if (yp_validdomain(*argp)) { 72612891Swpaul result.stat = YP_NODOM; 72712891Swpaul return (&result); 72812891Swpaul } 72912891Swpaul 73012891Swpaul /* 73112891Swpaul * We have to construct a linked list for the ypproc_maplist 73212891Swpaul * procedure using dynamically allocated memory. Since the XDR 73312891Swpaul * layer won't free this list for us, we have to deal with it 73412891Swpaul * ourselves. We call yp_maplist_free() first to free any 73512891Swpaul * previously allocated data we may have accumulated to insure 73612891Swpaul * that we have only one linked list in memory at any given 73712891Swpaul * time. 73812891Swpaul */ 73912891Swpaul 74012891Swpaul yp_maplist_free(result.maps); 74112891Swpaul 74212891Swpaul if ((result.maps = yp_maplist_create(*argp)) == NULL) { 74312891Swpaul yp_error("yp_maplist_create failed"); 74412891Swpaul result.stat = YP_YPERR; 74512891Swpaul return(&result); 74612891Swpaul } else 74712891Swpaul result.stat = YP_TRUE; 74812891Swpaul 74912891Swpaul return (&result); 75012891Swpaul} 75114262Swpaul 75214262Swpaul/* 75314262Swpaul * NIS v1 support. The nullproc, domain and domain_nonack 75414262Swpaul * functions from v1 are identical to those in v2, so all 75514262Swpaul * we have to do is hand off to them. 75614262Swpaul * 75714262Swpaul * The other functions are mostly just wrappers around their v2 75814262Swpaul * counterparts. For example, for the v1 'match' procedure, we 75914262Swpaul * crack open the argument structure, make a request to the v2 76014262Swpaul * 'match' function, repackage the data into a v1 response and 76114262Swpaul * then send it on its way. 76214262Swpaul * 76314262Swpaul * Note that we don't support the pull, push and get procedures. 76414262Swpaul * There's little documentation available to show what they 76514262Swpaul * do, and I suspect they're meant largely for map transfers 76614262Swpaul * between master and slave servers. 76714262Swpaul */ 76814262Swpaul 76914262Swpaulvoid * 77014262Swpaulypoldproc_null_1_svc(void *argp, struct svc_req *rqstp) 77114262Swpaul{ 77214262Swpaul return(ypproc_null_2_svc(argp, rqstp)); 77314262Swpaul} 77414262Swpaul 77514262Swpaulbool_t * 77614262Swpaulypoldproc_domain_1_svc(domainname *argp, struct svc_req *rqstp) 77714262Swpaul{ 77814262Swpaul return(ypproc_domain_2_svc(argp, rqstp)); 77914262Swpaul} 78014262Swpaul 78114262Swpaulbool_t * 78214262Swpaulypoldproc_domain_nonack_1_svc(domainname *argp, struct svc_req *rqstp) 78314262Swpaul{ 78414262Swpaul return (ypproc_domain_nonack_2_svc(argp, rqstp)); 78514262Swpaul} 78614262Swpaul 78714304Swpaul/* 78814304Swpaul * the 'match' procedure sends a response of type YPRESP_VAL 78914304Swpaul */ 79014262Swpaulypresponse * 79114262Swpaulypoldproc_match_1_svc(yprequest *argp, struct svc_req *rqstp) 79214262Swpaul{ 79314262Swpaul static ypresponse result; 79414262Swpaul ypresp_val *v2_result; 79514262Swpaul 79614262Swpaul result.yp_resptype = YPRESP_VAL; 79714304Swpaul result.ypresponse_u.yp_resp_valtype.val.valdat_val = ""; 79814304Swpaul result.ypresponse_u.yp_resp_valtype.val.valdat_len = 0; 79914262Swpaul 80014262Swpaul if (argp->yp_reqtype != YPREQ_KEY) { 80114262Swpaul result.ypresponse_u.yp_resp_valtype.stat = YP_BADARGS; 80214262Swpaul return(&result); 80314262Swpaul } 80414262Swpaul 80514262Swpaul v2_result = ypproc_match_2_svc(&argp->yprequest_u.yp_req_keytype,rqstp); 80614262Swpaul if (v2_result == NULL) 80714262Swpaul return(NULL); 80814262Swpaul 80914262Swpaul bcopy((char *)v2_result, 81014262Swpaul (char *)&result.ypresponse_u.yp_resp_valtype, 81114262Swpaul sizeof(ypresp_val)); 81214262Swpaul 81314262Swpaul return (&result); 81414262Swpaul} 81514262Swpaul 81614304Swpaul/* 81714304Swpaul * the 'first' procedure sends a response of type YPRESP_KEY_VAL 81814304Swpaul */ 81914262Swpaulypresponse * 82014262Swpaulypoldproc_first_1_svc(yprequest *argp, struct svc_req *rqstp) 82114262Swpaul{ 82214262Swpaul static ypresponse result; 82314262Swpaul ypresp_key_val *v2_result; 82414262Swpaul 82514262Swpaul result.yp_resptype = YPRESP_KEY_VAL; 82614304Swpaul result.ypresponse_u.yp_resp_key_valtype.val.valdat_val = 82714304Swpaul result.ypresponse_u.yp_resp_key_valtype.key.keydat_val = ""; 82814304Swpaul result.ypresponse_u.yp_resp_key_valtype.val.valdat_len = 82914304Swpaul result.ypresponse_u.yp_resp_key_valtype.key.keydat_len = 0; 83014262Swpaul 83114262Swpaul if (argp->yp_reqtype != YPREQ_NOKEY) { 83214262Swpaul result.ypresponse_u.yp_resp_key_valtype.stat = YP_BADARGS; 83314262Swpaul return(&result); 83414262Swpaul } 83514262Swpaul 83614262Swpaul v2_result = ypproc_first_2_svc(&argp->yprequest_u.yp_req_nokeytype, 83714262Swpaul rqstp); 83814262Swpaul if (v2_result == NULL) 83914262Swpaul return(NULL); 84014262Swpaul 84114262Swpaul bcopy((char *)v2_result, 84214262Swpaul (char *)&result.ypresponse_u.yp_resp_key_valtype, 84314262Swpaul sizeof(ypresp_key_val)); 84414262Swpaul 84514262Swpaul return (&result); 84614262Swpaul} 84714262Swpaul 84814304Swpaul/* 84914304Swpaul * the 'next' procedure sends a response of type YPRESP_KEY_VAL 85014304Swpaul */ 85114262Swpaulypresponse * 85214262Swpaulypoldproc_next_1_svc(yprequest *argp, struct svc_req *rqstp) 85314262Swpaul{ 85414262Swpaul static ypresponse result; 85514262Swpaul ypresp_key_val *v2_result; 85614262Swpaul 85714262Swpaul result.yp_resptype = YPRESP_KEY_VAL; 85814304Swpaul result.ypresponse_u.yp_resp_key_valtype.val.valdat_val = 85914304Swpaul result.ypresponse_u.yp_resp_key_valtype.key.keydat_val = ""; 86014304Swpaul result.ypresponse_u.yp_resp_key_valtype.val.valdat_len = 86114304Swpaul result.ypresponse_u.yp_resp_key_valtype.key.keydat_len = 0; 86214262Swpaul 86314262Swpaul if (argp->yp_reqtype != YPREQ_KEY) { 86414262Swpaul result.ypresponse_u.yp_resp_key_valtype.stat = YP_BADARGS; 86514262Swpaul return(&result); 86614262Swpaul } 86714262Swpaul 86814262Swpaul v2_result = ypproc_next_2_svc(&argp->yprequest_u.yp_req_keytype,rqstp); 86914262Swpaul if (v2_result == NULL) 87014262Swpaul return(NULL); 87114262Swpaul 87214262Swpaul bcopy((char *)v2_result, 87314262Swpaul (char *)&result.ypresponse_u.yp_resp_key_valtype, 87414262Swpaul sizeof(ypresp_key_val)); 87514262Swpaul 87614262Swpaul return (&result); 87714262Swpaul} 87814262Swpaul 87914304Swpaul/* 88014304Swpaul * the 'poll' procedure sends a response of type YPRESP_MAP_PARMS 88114304Swpaul */ 88214262Swpaulypresponse * 88314262Swpaulypoldproc_poll_1_svc(yprequest *argp, struct svc_req *rqstp) 88414262Swpaul{ 88514262Swpaul static ypresponse result; 88614262Swpaul ypresp_master *v2_result1; 88714262Swpaul ypresp_order *v2_result2; 88814262Swpaul 88914262Swpaul result.yp_resptype = YPRESP_MAP_PARMS; 89014262Swpaul result.ypresponse_u.yp_resp_map_parmstype.domain = 89114262Swpaul argp->yprequest_u.yp_req_nokeytype.domain; 89214262Swpaul result.ypresponse_u.yp_resp_map_parmstype.map = 89314262Swpaul argp->yprequest_u.yp_req_nokeytype.map; 89414262Swpaul /* 89514262Swpaul * Hmm... there is no 'status' value in the 89614262Swpaul * yp_resp_map_parmstype structure, so I have to 89714262Swpaul * guess at what to do to indicate a failure. 89814262Swpaul * I hope this is right. 89914262Swpaul */ 90014262Swpaul result.ypresponse_u.yp_resp_map_parmstype.ordernum = 0; 90114262Swpaul result.ypresponse_u.yp_resp_map_parmstype.peer = ""; 90214262Swpaul 90314262Swpaul if (argp->yp_reqtype != YPREQ_MAP_PARMS) { 90414262Swpaul return(&result); 90514262Swpaul } 90614262Swpaul 90714262Swpaul v2_result1 = ypproc_master_2_svc(&argp->yprequest_u.yp_req_nokeytype, 90814262Swpaul rqstp); 90914262Swpaul if (v2_result1 == NULL) 91014262Swpaul return(NULL); 91114262Swpaul 91214262Swpaul if (v2_result1->stat != YP_TRUE) { 91314262Swpaul return(&result); 91414262Swpaul } 91514262Swpaul 91614262Swpaul v2_result2 = ypproc_order_2_svc(&argp->yprequest_u.yp_req_nokeytype, 91714262Swpaul rqstp); 91814262Swpaul if (v2_result2 == NULL) 91914262Swpaul return(NULL); 92014262Swpaul 92114262Swpaul if (v2_result2->stat != YP_TRUE) { 92214262Swpaul return(&result); 92314262Swpaul } 92414262Swpaul 92514262Swpaul result.ypresponse_u.yp_resp_map_parmstype.peer = 92614262Swpaul v2_result1->peer; 92714262Swpaul result.ypresponse_u.yp_resp_map_parmstype.ordernum = 92814262Swpaul v2_result2->ordernum; 92914262Swpaul 93014262Swpaul return (&result); 93114262Swpaul} 93214262Swpaul 93314262Swpaulypresponse * 93414262Swpaulypoldproc_push_1_svc(yprequest *argp, struct svc_req *rqstp) 93514262Swpaul{ 93614262Swpaul static ypresponse result; 93714262Swpaul 93814262Swpaul /* 93914262Swpaul * Not implemented. 94014262Swpaul */ 94114262Swpaul 94214262Swpaul return (&result); 94314262Swpaul} 94414262Swpaul 94514262Swpaulypresponse * 94614262Swpaulypoldproc_pull_1_svc(yprequest *argp, struct svc_req *rqstp) 94714262Swpaul{ 94814262Swpaul static ypresponse result; 94914262Swpaul 95014262Swpaul /* 95114262Swpaul * Not implemented. 95214262Swpaul */ 95314262Swpaul 95414262Swpaul return (&result); 95514262Swpaul} 95614262Swpaul 95714262Swpaulypresponse * 95814262Swpaulypoldproc_get_1_svc(yprequest *argp, struct svc_req *rqstp) 95914262Swpaul{ 96014262Swpaul static ypresponse result; 96114262Swpaul 96214262Swpaul /* 96314262Swpaul * Not implemented. 96414262Swpaul */ 96514262Swpaul 96614262Swpaul return (&result); 96714262Swpaul} 968