mirror of
https://github.com/vincentmli/bpfire.git
synced 2026-04-26 19:00:34 +02:00
Alle Restartskripte umbenannt in CTRL Skripte
git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@812 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
This commit is contained in:
178
src/misc-progs/syslogdctrl.c
Normal file
178
src/misc-progs/syslogdctrl.c
Normal file
@@ -0,0 +1,178 @@
|
||||
/* This file is part of the IPCop Firewall.
|
||||
*
|
||||
* This program is distributed under the terms of the GNU General Public
|
||||
* Licence. See the file COPYING for details.
|
||||
*
|
||||
* Copyright (C) 2003-07-12 Robert Kerr <rkerr@go.to>
|
||||
*
|
||||
* $Id$
|
||||
*
|
||||
* Edited by the IPFire Team to change var log messages
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
#include <string.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/types.h>
|
||||
#include <fcntl.h>
|
||||
#include <signal.h>
|
||||
#include <errno.h>
|
||||
#include "libsmooth.h"
|
||||
#include "setuid.h"
|
||||
|
||||
#define ERR_ANY 1
|
||||
#define ERR_SETTINGS 2 /* error in settings file */
|
||||
#define ERR_ETC 3 /* error with CONFIG_ROOT/etc permissions */
|
||||
#define ERR_CONFIG 4 /* error updated sshd_config */
|
||||
#define ERR_SYSLOG 5 /* error restarting syslogd */
|
||||
|
||||
int main(void)
|
||||
{
|
||||
char buffer[STRING_SIZE], hostname[STRING_SIZE], varmessages[STRING_SIZE];
|
||||
int config_fd,rc,fd,pid;
|
||||
struct stat st;
|
||||
struct keyvalue *kv = NULL;
|
||||
memset(buffer, 0, STRING_SIZE);
|
||||
memset(hostname, 0, STRING_SIZE);
|
||||
memset(varmessages, 0, STRING_SIZE);
|
||||
|
||||
if (!(initsetuid()))
|
||||
exit(1);
|
||||
|
||||
|
||||
/* Read in and verify config */
|
||||
kv=initkeyvalues();
|
||||
|
||||
if (!readkeyvalues(kv, CONFIG_ROOT "/logging/settings"))
|
||||
{
|
||||
fprintf(stderr, "Cannot read syslog settings\n");
|
||||
exit(ERR_SETTINGS);
|
||||
}
|
||||
|
||||
if (!findkey(kv, "ENABLE_REMOTELOG", buffer))
|
||||
{
|
||||
fprintf(stderr, "Cannot read ENABLE_REMOTELOG\n");
|
||||
exit(ERR_SETTINGS);
|
||||
}
|
||||
|
||||
if (!findkey(kv, "REMOTELOG_ADDR", hostname))
|
||||
{
|
||||
fprintf(stderr, "Cannot read REMOTELOG_ADDR\n");
|
||||
exit(ERR_SETTINGS);
|
||||
}
|
||||
|
||||
if (!findkey(kv, "VARMESSAGES", varmessages))
|
||||
{
|
||||
fprintf(stderr, "Cannot read VARMESSAGES\n");
|
||||
exit(ERR_SETTINGS);
|
||||
}
|
||||
|
||||
if (strspn(hostname, VALID_FQDN) != strlen(hostname))
|
||||
{
|
||||
fprintf(stderr, "Bad REMOTELOG_ADDR: %s\n", hostname);
|
||||
exit(ERR_SETTINGS);
|
||||
}
|
||||
|
||||
freekeyvalues(kv);
|
||||
|
||||
|
||||
/* If anyone other than root can write to CONFIG_ROOT/etc this would be totally
|
||||
* insecure - same if anyone other than root owns CONFIG_ROOT/etc, as they could
|
||||
* change the file mode to give themselves or anyone else write access. */
|
||||
|
||||
if(lstat(CONFIG_ROOT "/etc",&st))
|
||||
{
|
||||
perror("Unable to stat" CONFIG_ROOT "/etc");
|
||||
exit(ERR_ETC);
|
||||
}
|
||||
if(!S_ISDIR(st.st_mode))
|
||||
{
|
||||
fprintf(stderr,CONFIG_ROOT "/etc is not a directory?!\n");
|
||||
exit(ERR_ETC);
|
||||
}
|
||||
if ( st.st_uid != 0 || st.st_mode & S_IWOTH ||
|
||||
((st.st_gid != 0) && (st.st_mode & S_IWGRP)) )
|
||||
{
|
||||
fprintf(stderr,CONFIG_ROOT "/etc is owned/writable by non-root users\n");
|
||||
exit(ERR_ETC);
|
||||
}
|
||||
|
||||
/* O_CREAT with O_EXCL will make open() fail if the file already exists -
|
||||
* mostly to prevent 2 copies running at once */
|
||||
if ((config_fd = open( CONFIG_ROOT "/etc/syslog.conf.new", O_WRONLY|O_CREAT|O_EXCL, 0644 )) == -1 )
|
||||
{
|
||||
perror("Unable to open new config file");
|
||||
exit(ERR_CONFIG);
|
||||
}
|
||||
|
||||
if (!strcmp(buffer,"on"))
|
||||
snprintf(buffer, STRING_SIZE - 1, "/bin/sed -e 's/^#\\?\\(\\*\\.\\*[[:blank:]]\\+@\\).\\+$/\\1%s/' " CONFIG_ROOT "/etc/syslog.conf >&%d", hostname, config_fd );
|
||||
else
|
||||
snprintf(buffer, STRING_SIZE - 1, "/bin/sed -e 's/^#\\?\\(\\*\\.\\*[[:blank:]]\\+@.\\+\\)$/#\\1/' " CONFIG_ROOT "/etc/syslog.conf >&%d", config_fd );
|
||||
|
||||
snprintf(buffer, STRING_SIZE - 1, "&& /bin/sed -e 's/*.\/var\/log\/messages/%s \/var\/log\/messages/' " CONFIG_ROOT "/etc/syslog.conf >&%d", varmessages, config_fd );
|
||||
|
||||
/* if the return code isn't 0 failsafe */
|
||||
if ((rc = unpriv_system(buffer,99,99)) != 0)
|
||||
{
|
||||
fprintf(stderr, "sed returned bad exit code: %d\n", rc);
|
||||
close(config_fd);
|
||||
unlink(CONFIG_ROOT "/etc/syslog.conf.new");
|
||||
exit(ERR_CONFIG);
|
||||
}
|
||||
close(config_fd);
|
||||
if (rename(CONFIG_ROOT "/etc/syslog.conf.new", CONFIG_ROOT "/etc/syslog.conf") == -1)
|
||||
{
|
||||
perror("Unable to replace old config file");
|
||||
unlink(CONFIG_ROOT "/etc/syslog.conf.new");
|
||||
exit(ERR_CONFIG);
|
||||
}
|
||||
|
||||
|
||||
/* Get syslogd to read the new config file */
|
||||
if ((fd = open("/var/run/syslogd.pid", O_RDONLY)) == -1)
|
||||
{
|
||||
if(errno == ENOENT)
|
||||
{
|
||||
/* pid file doesn't exists.. restart syslog */
|
||||
if((rc = safe_system("/usr/sbin/syslogd u syslogd -m 0")) == 0 )
|
||||
return 0;
|
||||
else
|
||||
{
|
||||
fprintf(stderr,
|
||||
"Unable to restart syslogd - returned exit code %d\n", rc);
|
||||
exit(ERR_SYSLOG);
|
||||
}
|
||||
} else {
|
||||
/* Something odd is going on, failsafe */
|
||||
perror("Unable to open pid file");
|
||||
exit(ERR_SYSLOG);
|
||||
}
|
||||
}
|
||||
|
||||
memset(buffer, 0, STRING_SIZE);
|
||||
if (read(fd, buffer, STRING_SIZE - 1) == -1)
|
||||
{
|
||||
close(fd);
|
||||
perror("Couldn't read from pid file");
|
||||
exit(ERR_SYSLOG);
|
||||
}
|
||||
close(fd);
|
||||
/* strtol does sanity checks that atoi doesn't do */
|
||||
errno = 0;
|
||||
pid = (int)strtol(buffer, (char **)NULL, 10);
|
||||
if (errno || pid <= 1)
|
||||
{
|
||||
fprintf(stderr, "Bad pid value\n");
|
||||
exit(ERR_SYSLOG);
|
||||
}
|
||||
if (kill(pid, SIGHUP) == -1)
|
||||
{
|
||||
fprintf(stderr, "Unable to send SIGHUP\n");
|
||||
exit(ERR_SYSLOG);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
Reference in New Issue
Block a user