2012-09-20 07:51:34 +04:00
|
|
|
/**
|
|
|
|
* xrdp: A Remote Desktop Protocol server.
|
|
|
|
*
|
2015-12-12 07:41:17 +03:00
|
|
|
* Copyright (C) Jay Sorg 2004-2015
|
2012-09-20 07:51:34 +04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
2005-01-30 07:34:19 +03:00
|
|
|
|
2006-05-26 00:34:32 +04:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @file sesman.c
|
|
|
|
* @brief Main program file
|
|
|
|
* @author Jay Sorg
|
2008-07-30 14:58:30 +04:00
|
|
|
*
|
2006-05-26 00:34:32 +04:00
|
|
|
*/
|
|
|
|
|
2017-03-03 07:33:23 +03:00
|
|
|
#if defined(HAVE_CONFIG_H)
|
|
|
|
#include <config_ac.h>
|
|
|
|
#endif
|
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
#include <stdarg.h>
|
|
|
|
|
2022-09-08 17:05:51 +03:00
|
|
|
#include "arch.h"
|
2005-09-25 07:30:09 +04:00
|
|
|
#include "sesman.h"
|
2022-02-14 12:16:42 +03:00
|
|
|
|
2023-03-20 18:08:04 +03:00
|
|
|
#include "sesman_auth.h"
|
|
|
|
#include "sesman_config.h"
|
2023-04-24 17:32:00 +03:00
|
|
|
#include "eicp.h"
|
|
|
|
#include "eicp_process.h"
|
|
|
|
#include "ercp.h"
|
|
|
|
#include "ercp_process.h"
|
|
|
|
#include "pre_session_list.h"
|
2023-03-22 19:25:28 +03:00
|
|
|
#include "session_list.h"
|
2022-03-19 14:29:28 +03:00
|
|
|
#include "lock_uds.h"
|
2022-09-08 17:05:51 +03:00
|
|
|
#include "os_calls.h"
|
|
|
|
#include "scp.h"
|
|
|
|
#include "scp_process.h"
|
2023-04-24 17:32:00 +03:00
|
|
|
#include "sesexec_control.h"
|
2022-09-08 17:05:51 +03:00
|
|
|
#include "sig.h"
|
|
|
|
#include "string_calls.h"
|
|
|
|
#include "trans.h"
|
|
|
|
#include "xrdp_configure_options.h"
|
2023-06-14 15:59:55 +03:00
|
|
|
#include "xrdp_sockets.h"
|
2020-06-22 12:27:54 +03:00
|
|
|
|
2021-07-19 12:21:20 +03:00
|
|
|
/**
|
2023-04-24 17:32:00 +03:00
|
|
|
* Maximum number of pre-session items
|
2021-07-19 12:21:20 +03:00
|
|
|
*/
|
2023-04-24 17:32:00 +03:00
|
|
|
#define MAX_PRE_SESSION_ITEMS 16
|
2021-07-19 12:21:20 +03:00
|
|
|
|
2022-11-08 14:18:34 +03:00
|
|
|
/**
|
|
|
|
* Define the mode of operation of the program
|
|
|
|
*/
|
|
|
|
enum sesman_mode
|
|
|
|
{
|
|
|
|
SSM_NORMAL = 0,
|
|
|
|
SSM_KILL_DAEMON,
|
|
|
|
SSM_RELOAD_DAEMON
|
|
|
|
};
|
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
struct sesman_startup_params
|
|
|
|
{
|
|
|
|
const char *sesman_ini;
|
2022-11-08 14:18:34 +03:00
|
|
|
enum sesman_mode mode;
|
2020-06-22 12:27:54 +03:00
|
|
|
int no_daemon;
|
|
|
|
int help;
|
|
|
|
int version;
|
2020-12-28 14:03:36 +03:00
|
|
|
int dump_config;
|
2020-06-22 12:27:54 +03:00
|
|
|
};
|
2005-11-14 01:06:49 +03:00
|
|
|
|
2022-03-03 18:37:46 +03:00
|
|
|
struct config_sesman *g_cfg;
|
2023-03-13 23:00:09 +03:00
|
|
|
static tintptr g_term_event = 0;
|
|
|
|
static tintptr g_sigchld_event = 0;
|
|
|
|
static tintptr g_reload_event = 0;
|
2005-01-30 07:34:19 +03:00
|
|
|
|
2022-03-03 18:37:46 +03:00
|
|
|
static struct trans *g_list_trans;
|
2022-03-19 14:29:28 +03:00
|
|
|
|
|
|
|
/* Variables used to lock g_list_trans */
|
|
|
|
static struct lock_uds *g_list_trans_lock;
|
|
|
|
|
2020-06-10 11:20:27 +03:00
|
|
|
static struct list *g_con_list = NULL;
|
2022-03-03 18:37:46 +03:00
|
|
|
static int g_pid;
|
2020-06-10 11:20:27 +03:00
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
/*****************************************************************************/
|
|
|
|
/**
|
|
|
|
* @brief looks for a case-insensitive match of a string in a list
|
|
|
|
* @param candidate String to match
|
|
|
|
* @param ... NULL-terminated list of strings to compare the candidate with
|
|
|
|
* @return !=0 if the candidate is found in the list
|
|
|
|
*/
|
|
|
|
static int nocase_matches(const char *candidate, ...)
|
|
|
|
{
|
|
|
|
va_list vl;
|
|
|
|
const char *member;
|
|
|
|
int result = 0;
|
|
|
|
|
|
|
|
va_start(vl, candidate);
|
|
|
|
while ((member = va_arg(vl, const char *)) != NULL)
|
|
|
|
{
|
|
|
|
if (g_strcasecmp(candidate, member) == 0)
|
|
|
|
{
|
|
|
|
result = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
va_end(vl);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @brief Command line argument parser
|
|
|
|
* @param[in] argc number of command line arguments
|
|
|
|
* @param[in] argv pointer array of commandline arguments
|
|
|
|
* @param[out] sesman_startup_params Returned startup parameters
|
|
|
|
* @return 0 on success, n on nth argument is unknown
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
sesman_process_params(int argc, char **argv,
|
|
|
|
struct sesman_startup_params *startup_params)
|
|
|
|
{
|
|
|
|
int index;
|
|
|
|
const char *option;
|
|
|
|
const char *value;
|
|
|
|
|
2022-11-08 14:18:34 +03:00
|
|
|
startup_params->mode = SSM_NORMAL;
|
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
index = 1;
|
|
|
|
|
|
|
|
while (index < argc)
|
|
|
|
{
|
|
|
|
option = argv[index];
|
|
|
|
|
|
|
|
if (index + 1 < argc)
|
|
|
|
{
|
|
|
|
value = argv[index + 1];
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
value = "";
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nocase_matches(option, "-help", "--help", "-h", NULL))
|
|
|
|
{
|
|
|
|
startup_params->help = 1;
|
|
|
|
}
|
|
|
|
else if (nocase_matches(option, "-kill", "--kill", "-k", NULL))
|
|
|
|
{
|
2022-11-08 14:18:34 +03:00
|
|
|
startup_params->mode = SSM_KILL_DAEMON;
|
|
|
|
}
|
|
|
|
else if (nocase_matches(option, "-reload", "--reload", "-r", NULL))
|
|
|
|
{
|
|
|
|
startup_params->mode = SSM_RELOAD_DAEMON;
|
2020-06-22 12:27:54 +03:00
|
|
|
}
|
|
|
|
else if (nocase_matches(option, "-nodaemon", "--nodaemon", "-n",
|
|
|
|
"-nd", "--nd", "-ns", "--ns", NULL))
|
|
|
|
{
|
|
|
|
startup_params->no_daemon = 1;
|
|
|
|
}
|
|
|
|
else if (nocase_matches(option, "-v", "--version", NULL))
|
|
|
|
{
|
|
|
|
startup_params->version = 1;
|
|
|
|
}
|
2020-12-28 14:03:36 +03:00
|
|
|
else if (nocase_matches(option, "--dump-config", NULL))
|
|
|
|
{
|
|
|
|
startup_params->dump_config = 1;
|
|
|
|
}
|
2020-06-22 12:27:54 +03:00
|
|
|
else if (nocase_matches(option, "-c", "--config", NULL))
|
|
|
|
{
|
|
|
|
index++;
|
|
|
|
startup_params->sesman_ini = value;
|
|
|
|
}
|
|
|
|
else /* unknown option */
|
|
|
|
{
|
|
|
|
return index;
|
|
|
|
}
|
|
|
|
|
|
|
|
index++;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-03-19 14:29:28 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
static int sesman_listen_test(struct config_sesman *cfg)
|
|
|
|
{
|
|
|
|
int status = sesman_create_listening_transport(cfg);
|
|
|
|
sesman_delete_listening_transport();
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2020-06-10 11:20:27 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
int
|
2023-04-24 17:32:00 +03:00
|
|
|
sesman_close_all(void)
|
2020-06-10 11:20:27 +03:00
|
|
|
{
|
2020-08-07 23:56:54 +03:00
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE, "sesman_close_all:");
|
2022-12-14 12:36:07 +03:00
|
|
|
|
2023-04-24 17:32:00 +03:00
|
|
|
pre_session_list_cleanup();
|
|
|
|
session_list_cleanup();
|
2022-12-14 12:36:07 +03:00
|
|
|
|
2023-03-13 23:00:09 +03:00
|
|
|
g_delete_wait_obj(g_reload_event);
|
|
|
|
g_delete_wait_obj(g_sigchld_event);
|
|
|
|
g_delete_wait_obj(g_term_event);
|
2023-04-24 17:32:00 +03:00
|
|
|
|
|
|
|
sesman_delete_listening_transport();
|
|
|
|
|
|
|
|
return 0;
|
2023-03-13 23:00:09 +03:00
|
|
|
}
|
|
|
|
|
2020-06-10 11:20:27 +03:00
|
|
|
/******************************************************************************/
|
2023-04-24 17:32:00 +03:00
|
|
|
int
|
|
|
|
sesman_scp_data_in(struct trans *self)
|
2020-06-10 11:20:27 +03:00
|
|
|
{
|
2022-02-14 12:16:42 +03:00
|
|
|
int rv;
|
|
|
|
int available;
|
2020-06-10 11:20:27 +03:00
|
|
|
|
2022-02-14 12:16:42 +03:00
|
|
|
rv = scp_msg_in_check_available(self, &available);
|
|
|
|
|
|
|
|
if (rv == 0 && available)
|
2020-06-10 11:20:27 +03:00
|
|
|
{
|
2023-04-24 17:32:00 +03:00
|
|
|
struct pre_session_item *psi;
|
|
|
|
psi = (struct pre_session_item *)self->callback_data;
|
|
|
|
|
|
|
|
if ((rv = scp_process(psi)) != 0)
|
2020-06-10 11:20:27 +03:00
|
|
|
{
|
2020-08-07 23:56:54 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_data_in: scp_process_msg failed");
|
2020-06-10 11:20:27 +03:00
|
|
|
}
|
2022-02-14 12:16:42 +03:00
|
|
|
scp_msg_in_reset(self);
|
2020-06-10 11:20:27 +03:00
|
|
|
}
|
2022-02-14 12:16:42 +03:00
|
|
|
|
|
|
|
return rv;
|
2020-06-10 11:20:27 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
static int
|
|
|
|
sesman_listen_conn_in(struct trans *self, struct trans *new_self)
|
|
|
|
{
|
2023-04-24 17:32:00 +03:00
|
|
|
struct pre_session_item *psi;
|
|
|
|
if (pre_session_list_get_count() >= MAX_PRE_SESSION_ITEMS)
|
2021-06-22 15:38:46 +03:00
|
|
|
{
|
2023-04-24 17:32:00 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_listen_conn_in: error, too many "
|
2021-06-22 15:38:46 +03:00
|
|
|
"connections, rejecting");
|
|
|
|
trans_delete(new_self);
|
|
|
|
}
|
2023-04-24 17:32:00 +03:00
|
|
|
else if ((psi = pre_session_list_new()) == NULL)
|
2021-06-22 15:38:46 +03:00
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_data_in: No memory to allocate "
|
|
|
|
"new connection");
|
2023-04-24 17:32:00 +03:00
|
|
|
trans_delete(new_self);
|
|
|
|
}
|
|
|
|
else if (scp_init_trans(new_self) != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_data_in: Can't init SCP connection");
|
|
|
|
trans_delete(new_self);
|
2021-06-22 15:38:46 +03:00
|
|
|
}
|
|
|
|
else
|
2020-06-10 11:20:27 +03:00
|
|
|
{
|
2023-04-24 17:32:00 +03:00
|
|
|
new_self->callback_data = (void *)psi;
|
|
|
|
new_self->trans_data_in = sesman_scp_data_in;
|
|
|
|
psi->client_trans = new_self;
|
2020-06-10 11:20:27 +03:00
|
|
|
}
|
2021-06-22 15:38:46 +03:00
|
|
|
|
2020-06-10 11:20:27 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2023-04-24 17:32:00 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
int
|
|
|
|
sesman_eicp_data_in(struct trans *self)
|
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
int available;
|
|
|
|
|
|
|
|
rv = eicp_msg_in_check_available(self, &available);
|
|
|
|
|
|
|
|
if (rv == 0 && available)
|
|
|
|
{
|
|
|
|
struct pre_session_item *psi;
|
|
|
|
psi = (struct pre_session_item *)self->callback_data;
|
|
|
|
if ((rv = eicp_process(psi)) != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_eicp_data_in: eicp_process_msg failed");
|
|
|
|
}
|
|
|
|
eicp_msg_in_reset(self);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
int
|
|
|
|
sesman_ercp_data_in(struct trans *self)
|
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
int available;
|
|
|
|
|
|
|
|
rv = ercp_msg_in_check_available(self, &available);
|
|
|
|
|
|
|
|
if (rv == 0 && available)
|
|
|
|
{
|
|
|
|
struct session_item *si = (struct session_item *)self->callback_data;
|
|
|
|
if ((rv = ercp_process(si)) != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_ercp_data_in: ercp_process_msg failed");
|
|
|
|
}
|
|
|
|
ercp_msg_in_reset(self);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2022-03-03 18:37:46 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
/**
|
|
|
|
* Informs the main loop a termination signal has been received
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
set_term_event(int sig)
|
|
|
|
{
|
|
|
|
/* Don't try to use a wait obj in a child process */
|
|
|
|
if (g_getpid() == g_pid)
|
|
|
|
{
|
|
|
|
g_set_wait_obj(g_term_event);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-04-24 17:32:00 +03:00
|
|
|
/*****************************************************************************/
|
|
|
|
/* No-op signal handler.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
sig_no_op(int sig)
|
|
|
|
{
|
|
|
|
/* no-op */
|
|
|
|
}
|
|
|
|
|
2022-03-03 18:37:46 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
/**
|
2023-04-24 17:32:00 +03:00
|
|
|
* Catch a SIGCHLD and ignore the main loop
|
|
|
|
*
|
|
|
|
* In theory we could use waitpid() in the signal handler, but that
|
|
|
|
* would prevent us adding any logging
|
2022-03-03 18:37:46 +03:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
set_sigchld_event(int sig)
|
|
|
|
{
|
|
|
|
/* Don't try to use a wait obj in a child process */
|
|
|
|
if (g_getpid() == g_pid)
|
|
|
|
{
|
|
|
|
g_set_wait_obj(g_sigchld_event);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
/**
|
|
|
|
* Informs the main loop a SIGHUP has been received
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
set_reload_event(int sig)
|
|
|
|
{
|
|
|
|
/* Don't try to use a wait obj in a child process */
|
|
|
|
if (g_getpid() == g_pid)
|
|
|
|
{
|
|
|
|
g_set_wait_obj(g_reload_event);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
void
|
|
|
|
sesman_delete_listening_transport(void)
|
|
|
|
{
|
2022-03-19 14:29:28 +03:00
|
|
|
if (g_getpid() == g_pid)
|
|
|
|
{
|
|
|
|
trans_delete(g_list_trans);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
trans_delete_from_child(g_list_trans);
|
|
|
|
}
|
2022-03-03 18:37:46 +03:00
|
|
|
g_list_trans = NULL;
|
2022-03-19 14:29:28 +03:00
|
|
|
|
2023-04-24 17:32:00 +03:00
|
|
|
unlock_uds(g_list_trans_lock); // Won't unlock anything for a child process
|
2022-03-19 14:29:28 +03:00
|
|
|
g_list_trans_lock = NULL;
|
2022-03-03 18:37:46 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
int
|
|
|
|
sesman_create_listening_transport(const struct config_sesman *cfg)
|
|
|
|
{
|
|
|
|
int rv = 1;
|
2022-03-19 14:29:28 +03:00
|
|
|
g_list_trans = trans_create(TRANS_MODE_UNIX, 8192, 8192);
|
2022-03-03 18:37:46 +03:00
|
|
|
if (g_list_trans == NULL)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "%s: trans_create failed", __func__);
|
|
|
|
}
|
2022-03-19 14:29:28 +03:00
|
|
|
else if ((g_list_trans_lock = lock_uds(cfg->listen_port)) != NULL)
|
2022-03-03 18:37:46 +03:00
|
|
|
{
|
2022-03-19 14:29:28 +03:00
|
|
|
/* Make sure the file is always created with the correct
|
|
|
|
* permissions, if it's not there */
|
|
|
|
int entry_umask = g_umask_hex(0x666);
|
|
|
|
LOG_DEVEL(LOG_LEVEL_DEBUG, "%s: port %s", __func__, cfg->listen_port);
|
|
|
|
rv = trans_listen_address(g_list_trans, cfg->listen_port, NULL);
|
2022-03-03 18:37:46 +03:00
|
|
|
if (rv != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "%s: trans_listen_address failed", __func__);
|
2022-03-19 14:29:28 +03:00
|
|
|
}
|
|
|
|
else if (g_chown(cfg->listen_port, g_getuid(), g_getuid()) != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
"Can't set ownership of '%s' [%s]",
|
|
|
|
cfg->listen_port, g_get_strerror());
|
|
|
|
}
|
|
|
|
else if ((rv = g_chmod_hex(cfg->listen_port, 0x666)) != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "%s: Can't set permissions on '%s' [%s]",
|
|
|
|
__func__, cfg->listen_port, g_get_strerror());
|
2022-03-03 18:37:46 +03:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
g_list_trans->trans_conn_in = sesman_listen_conn_in;
|
|
|
|
}
|
2022-03-19 14:29:28 +03:00
|
|
|
g_umask_hex(entry_umask);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rv != 0)
|
|
|
|
{
|
|
|
|
sesman_delete_listening_transport();
|
2022-03-03 18:37:46 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2023-04-24 17:32:00 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
int
|
|
|
|
sesman_is_term(void)
|
|
|
|
{
|
|
|
|
return g_is_wait_obj_set(g_term_event);
|
|
|
|
}
|
|
|
|
|
2006-05-26 00:34:32 +04:00
|
|
|
/******************************************************************************/
|
2005-11-14 01:06:49 +03:00
|
|
|
/**
|
|
|
|
*
|
2006-05-26 00:34:32 +04:00
|
|
|
* @brief Starts sesman main loop
|
2005-11-14 01:06:49 +03:00
|
|
|
*
|
|
|
|
*/
|
2020-06-22 12:27:54 +03:00
|
|
|
static int
|
2006-08-24 09:58:10 +04:00
|
|
|
sesman_main_loop(void)
|
2005-01-30 07:34:19 +03:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
int error;
|
|
|
|
int robjs_count;
|
2023-04-24 17:32:00 +03:00
|
|
|
intptr_t robjs[1024];
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2020-06-10 11:20:27 +03:00
|
|
|
g_con_list = list_create();
|
|
|
|
if (g_con_list == NULL)
|
2014-07-27 00:33:23 +04:00
|
|
|
{
|
2020-08-07 23:56:54 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_main_loop: list_create failed");
|
2017-05-17 10:23:30 +03:00
|
|
|
return 1;
|
2014-07-27 00:33:23 +04:00
|
|
|
}
|
2022-03-03 18:37:46 +03:00
|
|
|
if (sesman_create_listening_transport(g_cfg) != 0)
|
2005-01-30 07:34:19 +03:00
|
|
|
{
|
2022-03-03 18:37:46 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
"sesman_main_loop: sesman_create_listening_transport failed");
|
2020-06-10 11:20:27 +03:00
|
|
|
list_delete(g_con_list);
|
|
|
|
return 1;
|
|
|
|
}
|
2022-03-19 14:29:28 +03:00
|
|
|
LOG(LOG_LEVEL_INFO, "Sesman now listening on %s", g_cfg->listen_port);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2022-03-03 18:37:46 +03:00
|
|
|
error = 0;
|
|
|
|
while (!error)
|
2020-06-10 11:20:27 +03:00
|
|
|
{
|
|
|
|
robjs_count = 0;
|
|
|
|
robjs[robjs_count++] = g_term_event;
|
2022-03-03 18:37:46 +03:00
|
|
|
robjs[robjs_count++] = g_sigchld_event;
|
|
|
|
robjs[robjs_count++] = g_reload_event;
|
2023-04-24 17:32:00 +03:00
|
|
|
|
2022-03-03 18:37:46 +03:00
|
|
|
if (g_list_trans != NULL)
|
2020-06-10 11:20:27 +03:00
|
|
|
{
|
2022-03-03 18:37:46 +03:00
|
|
|
/* g_list_trans might be NULL on a reconfigure if sesman
|
|
|
|
* is unable to listen again */
|
2023-04-24 17:32:00 +03:00
|
|
|
error = trans_get_wait_objs(g_list_trans, robjs, &robjs_count);
|
2022-03-03 18:37:46 +03:00
|
|
|
if (error != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_main_loop: "
|
2023-04-24 17:32:00 +03:00
|
|
|
"trans_get_wait_objs failed");
|
2022-03-03 18:37:46 +03:00
|
|
|
break;
|
|
|
|
}
|
2020-06-10 11:20:27 +03:00
|
|
|
}
|
|
|
|
|
2023-04-24 17:32:00 +03:00
|
|
|
error = pre_session_list_get_wait_objs(robjs, &robjs_count);
|
|
|
|
if (error != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_main_loop: "
|
|
|
|
"pre_session_list_get_wait_objs failed");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
error = session_list_get_wait_objs(robjs, &robjs_count);
|
|
|
|
if (error != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_main_loop: "
|
|
|
|
"session_list_get_wait_objs failed");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (g_obj_wait(robjs, robjs_count, NULL, 0, -1) != 0)
|
2020-06-10 11:20:27 +03:00
|
|
|
{
|
2022-03-03 18:37:46 +03:00
|
|
|
/* should not get here */
|
|
|
|
LOG(LOG_LEVEL_WARNING, "sesman_main_loop: "
|
|
|
|
"Unexpected error from g_obj_wait()");
|
2020-06-10 11:20:27 +03:00
|
|
|
g_sleep(100);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (g_is_wait_obj_set(g_term_event)) /* term */
|
|
|
|
{
|
2022-03-03 18:37:46 +03:00
|
|
|
LOG(LOG_LEVEL_INFO, "sesman_main_loop: "
|
|
|
|
"sesman asked to terminate");
|
2020-06-10 11:20:27 +03:00
|
|
|
break;
|
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-04-24 17:32:00 +03:00
|
|
|
if (g_is_wait_obj_set(g_sigchld_event)) /* term */
|
2022-03-03 18:37:46 +03:00
|
|
|
{
|
|
|
|
g_reset_wait_obj(g_sigchld_event);
|
2023-04-24 17:32:00 +03:00
|
|
|
// Prevent any zombies from hanging around
|
|
|
|
while (g_waitchild(NULL) > 0)
|
|
|
|
{
|
|
|
|
;
|
|
|
|
}
|
2022-03-03 18:37:46 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (g_is_wait_obj_set(g_reload_event)) /* We're asked to reload */
|
|
|
|
{
|
|
|
|
g_reset_wait_obj(g_reload_event);
|
|
|
|
sig_sesman_reload_cfg();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (g_list_trans != NULL)
|
2005-10-09 23:53:51 +04:00
|
|
|
{
|
2022-03-03 18:37:46 +03:00
|
|
|
error = trans_check_wait_objs(g_list_trans);
|
|
|
|
if (error != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_main_loop: "
|
|
|
|
"trans_check_wait_objs failed");
|
|
|
|
break;
|
|
|
|
}
|
2005-01-30 07:34:19 +03:00
|
|
|
}
|
2023-04-24 17:32:00 +03:00
|
|
|
|
|
|
|
error = pre_session_list_check_wait_objs();
|
|
|
|
if (error != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_main_loop: "
|
|
|
|
"pre_session_list_check_wait_objs failed");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
error = session_list_check_wait_objs();
|
|
|
|
if (error != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "sesman_main_loop: "
|
|
|
|
"session_list_check_wait_objs failed");
|
|
|
|
break;
|
|
|
|
}
|
2005-01-30 07:34:19 +03:00
|
|
|
}
|
2022-12-14 12:36:07 +03:00
|
|
|
|
2023-04-24 17:32:00 +03:00
|
|
|
return error;
|
2005-11-14 01:06:49 +03:00
|
|
|
}
|
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
|
|
print_version(void)
|
|
|
|
{
|
|
|
|
g_writeln("xrdp-sesman %s", PACKAGE_VERSION);
|
|
|
|
g_writeln(" The xrdp session manager");
|
2023-04-24 17:32:00 +03:00
|
|
|
g_writeln(" Copyright (C) 2004-2023 Jay Sorg, "
|
2020-06-22 12:27:54 +03:00
|
|
|
"Neutrino Labs, and all contributors.");
|
|
|
|
g_writeln(" See https://github.com/neutrinolabs/xrdp for more information.");
|
|
|
|
g_writeln("%s", "");
|
|
|
|
|
|
|
|
#if defined(XRDP_CONFIGURE_OPTIONS)
|
|
|
|
g_writeln(" Configure options:");
|
|
|
|
g_writeln("%s", XRDP_CONFIGURE_OPTIONS);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2017-01-16 09:30:37 +03:00
|
|
|
/******************************************************************************/
|
2020-06-22 12:27:54 +03:00
|
|
|
static void
|
|
|
|
print_help(void)
|
2017-01-16 09:30:37 +03:00
|
|
|
{
|
|
|
|
g_printf("Usage: xrdp-sesman [options]\n");
|
2020-12-28 14:03:36 +03:00
|
|
|
g_printf(" -k, --kill shut down xrdp-sesman\n");
|
2022-11-08 14:18:34 +03:00
|
|
|
g_printf(" -r, --reload reload xrdp-sesman\n");
|
2020-12-28 14:03:36 +03:00
|
|
|
g_printf(" -h, --help show help\n");
|
|
|
|
g_printf(" -v, --version show version\n");
|
|
|
|
g_printf(" -n, --nodaemon don't fork into background\n");
|
|
|
|
g_printf(" -c, --config specify new path to sesman.ini\n");
|
2023-03-08 04:24:08 +03:00
|
|
|
g_printf(" --dump-config display config on stdout on startup\n");
|
2017-01-16 09:30:37 +03:00
|
|
|
g_deinit();
|
|
|
|
}
|
|
|
|
|
2005-11-14 01:06:49 +03:00
|
|
|
/******************************************************************************/
|
2022-11-08 14:18:34 +03:00
|
|
|
/**
|
|
|
|
* Reads the PID file
|
|
|
|
*/
|
2020-06-22 12:27:54 +03:00
|
|
|
static int
|
2022-11-08 14:18:34 +03:00
|
|
|
read_pid_file(const char *pid_file, int *pid)
|
2005-11-14 01:06:49 +03:00
|
|
|
{
|
2022-11-08 14:18:34 +03:00
|
|
|
int rv = 1;
|
2020-06-22 12:27:54 +03:00
|
|
|
int fd;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
/* check if sesman is running */
|
|
|
|
if (!g_file_exist(pid_file))
|
|
|
|
{
|
|
|
|
g_printf("sesman is not running (pid file not found - %s)\n", pid_file);
|
|
|
|
}
|
Split g_file_open() into _ro() and _rw() variants
Rename g_file_open() to g_file_open_rw(), and add a new g_file_open_ro()
call that wraps the common g_file_open_ex(file, 1, 0, 0, 0) idiom. This
will make the file access mode more explicit in the code.
Change all calls to g_file_open() to the _ro() or _rw() variant as
appropriate, and replace g_file_open_ex(file, 1, 0, 0, 0) with the _ro()
call.
Lastly, add tests for the two new calls to test_os_calls.c (code
courteously provided by matt335672).
2023-05-13 08:54:32 +03:00
|
|
|
else if ((fd = g_file_open_ro(pid_file)) < 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2020-06-22 12:27:54 +03:00
|
|
|
g_printf("error opening pid file[%s]: %s\n", pid_file, g_get_strerror());
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2022-11-08 14:18:34 +03:00
|
|
|
else
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2022-11-08 14:18:34 +03:00
|
|
|
char pid_s[32] = {0};
|
|
|
|
int error = g_file_read(fd, pid_s, sizeof(pid_s) - 1);
|
2020-06-22 12:27:54 +03:00
|
|
|
g_file_close(fd);
|
|
|
|
|
2022-11-08 14:18:34 +03:00
|
|
|
if (error < 0)
|
|
|
|
{
|
|
|
|
g_printf("error reading pid file: %s\n", g_get_strerror());
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*pid = g_atoi(pid_s);
|
|
|
|
rv = 0;
|
|
|
|
}
|
2020-06-22 12:27:54 +03:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2022-11-08 14:18:34 +03:00
|
|
|
return rv;
|
2020-06-22 12:27:54 +03:00
|
|
|
}
|
2022-11-08 14:18:34 +03:00
|
|
|
|
2023-06-14 12:17:19 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
/** Creates the socket path for sesman and session sockets
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
create_xrdp_socket_root_path(void)
|
|
|
|
{
|
|
|
|
int uid = g_getuid();
|
|
|
|
int gid = g_getgid();
|
|
|
|
|
|
|
|
/* Create the path using 0755 permissions */
|
|
|
|
int old_umask = g_umask_hex(0x22);
|
2023-06-14 16:23:07 +03:00
|
|
|
(void)g_create_path(XRDP_SOCKET_ROOT_PATH"/");
|
2023-06-14 12:17:19 +03:00
|
|
|
(void)g_umask_hex(old_umask);
|
|
|
|
|
|
|
|
/* Check the ownership and permissions on the last path element
|
|
|
|
* are as expected */
|
2023-06-14 16:23:07 +03:00
|
|
|
if (g_chown(XRDP_SOCKET_ROOT_PATH, uid, gid) != 0)
|
2023-06-14 12:17:19 +03:00
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
"create_xrdp_socket_root_path: Can't set owner of %s to %d:%d",
|
2023-06-14 16:23:07 +03:00
|
|
|
XRDP_SOCKET_ROOT_PATH, uid, gid);
|
2023-06-14 12:17:19 +03:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2023-06-14 16:23:07 +03:00
|
|
|
if (g_chmod_hex(XRDP_SOCKET_ROOT_PATH, 0x755) != 0)
|
2023-06-14 12:17:19 +03:00
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
"create_xrdp_socket_root_path: Can't set perms of %s to 0x755",
|
2023-06-14 16:23:07 +03:00
|
|
|
XRDP_SOCKET_ROOT_PATH);
|
2023-06-14 12:17:19 +03:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
int
|
|
|
|
main(int argc, char **argv)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
enum logReturns log_error;
|
|
|
|
char text[256];
|
|
|
|
char pid_file[256];
|
|
|
|
struct sesman_startup_params startup_params = {0};
|
|
|
|
int errored_argc;
|
|
|
|
int daemon;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
g_init("xrdp-sesman");
|
|
|
|
g_snprintf(pid_file, 255, "%s/xrdp-sesman.pid", XRDP_PID_PATH);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-04-24 17:32:00 +03:00
|
|
|
startup_params.sesman_ini = DEFAULT_SESMAN_INI;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
errored_argc = sesman_process_params(argc, argv, &startup_params);
|
|
|
|
if (errored_argc > 0)
|
|
|
|
{
|
|
|
|
print_version();
|
|
|
|
g_writeln("%s", "");
|
|
|
|
print_help();
|
|
|
|
g_writeln("%s", "");
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
g_writeln("Unknown option: %s", argv[errored_argc]);
|
|
|
|
g_deinit();
|
|
|
|
g_exit(1);
|
|
|
|
}
|
2006-04-24 01:54:12 +04:00
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
if (startup_params.help)
|
|
|
|
{
|
|
|
|
print_help();
|
|
|
|
g_exit(0);
|
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
if (startup_params.version)
|
|
|
|
{
|
|
|
|
print_version();
|
|
|
|
g_exit(0);
|
|
|
|
}
|
2005-11-14 01:06:49 +03:00
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
|
2022-11-08 14:18:34 +03:00
|
|
|
if (startup_params.mode == SSM_KILL_DAEMON)
|
2020-06-22 12:27:54 +03:00
|
|
|
{
|
2022-11-08 14:18:34 +03:00
|
|
|
int pid;
|
|
|
|
int error = 1;
|
|
|
|
if (read_pid_file(pid_file, &pid) == 0)
|
|
|
|
{
|
|
|
|
if (g_sigterm(pid) != 0)
|
|
|
|
{
|
|
|
|
g_printf("error killing sesman: %s\n", g_get_strerror());
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* File is no longer required */
|
|
|
|
g_file_delete(pid_file);
|
|
|
|
error = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
g_deinit();
|
|
|
|
g_exit(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (startup_params.mode == SSM_RELOAD_DAEMON)
|
|
|
|
{
|
|
|
|
int pid;
|
|
|
|
int error = 1;
|
|
|
|
if (read_pid_file(pid_file, &pid) == 0)
|
|
|
|
{
|
|
|
|
if (g_sighup(pid) != 0)
|
|
|
|
{
|
|
|
|
g_printf("error reloading sesman: %s\n", g_get_strerror());
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
error = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
g_deinit();
|
|
|
|
g_exit(error);
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2020-06-22 12:27:54 +03:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
if (g_file_exist(pid_file))
|
2006-09-18 08:40:43 +04:00
|
|
|
{
|
2017-01-16 09:30:37 +03:00
|
|
|
g_printf("xrdp-sesman is already running.\n");
|
2012-09-20 07:51:34 +04:00
|
|
|
g_printf("if it's not running, try removing ");
|
2016-03-28 20:55:20 +03:00
|
|
|
g_printf("%s", pid_file);
|
2012-09-20 07:51:34 +04:00
|
|
|
g_printf("\n");
|
|
|
|
g_deinit();
|
|
|
|
g_exit(1);
|
2006-09-18 08:40:43 +04:00
|
|
|
}
|
2006-04-24 01:54:12 +04:00
|
|
|
|
2022-03-25 16:29:44 +03:00
|
|
|
/* starting logging subsystem */
|
|
|
|
if (!g_file_exist(startup_params.sesman_ini))
|
2005-12-15 23:41:03 +03:00
|
|
|
{
|
2022-03-25 16:29:44 +03:00
|
|
|
g_printf("Config file %s does not exist\n", startup_params.sesman_ini);
|
2012-09-20 07:51:34 +04:00
|
|
|
g_deinit();
|
|
|
|
g_exit(1);
|
2005-12-15 23:41:03 +03:00
|
|
|
}
|
2022-03-03 18:37:09 +03:00
|
|
|
log_error = log_start(
|
|
|
|
startup_params.sesman_ini, "xrdp-sesman",
|
|
|
|
(startup_params.dump_config) ? LOG_START_DUMP_CONFIG : 0);
|
2006-04-24 01:54:12 +04:00
|
|
|
|
2016-03-17 00:32:14 +03:00
|
|
|
if (log_error != LOG_STARTUP_OK)
|
2005-11-14 01:06:49 +03:00
|
|
|
{
|
2016-03-17 00:32:14 +03:00
|
|
|
switch (log_error)
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
|
|
|
case LOG_ERROR_MALLOC:
|
|
|
|
g_writeln("error on malloc. cannot start logging. quitting.");
|
|
|
|
break;
|
|
|
|
case LOG_ERROR_FILE_OPEN:
|
|
|
|
g_writeln("error opening log file [%s]. quitting.",
|
|
|
|
getLogFile(text, 255));
|
|
|
|
break;
|
2015-12-12 07:41:17 +03:00
|
|
|
default:
|
2022-03-25 16:29:44 +03:00
|
|
|
// Assume sufficient messages have already been generated
|
2015-12-12 07:41:17 +03:00
|
|
|
break;
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2006-08-24 09:58:10 +04:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
g_deinit();
|
|
|
|
g_exit(1);
|
|
|
|
}
|
2007-05-07 01:02:25 +04:00
|
|
|
|
2022-03-25 16:29:44 +03:00
|
|
|
/* reading config */
|
|
|
|
if ((g_cfg = config_read(startup_params.sesman_ini)) == NULL)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ALWAYS, "error reading config %s: %s",
|
|
|
|
startup_params.sesman_ini, g_get_strerror());
|
|
|
|
log_end();
|
|
|
|
g_deinit();
|
|
|
|
g_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (startup_params.dump_config)
|
|
|
|
{
|
|
|
|
config_dump(g_cfg);
|
|
|
|
}
|
|
|
|
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_TRACE, "config loaded in %s at %s:%d", __func__, __FILE__, __LINE__);
|
2020-06-22 12:27:54 +03:00
|
|
|
LOG(LOG_LEVEL_TRACE, " sesman_ini = %s", g_cfg->sesman_ini);
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_TRACE, " listen_port = %s", g_cfg->listen_port);
|
|
|
|
LOG(LOG_LEVEL_TRACE, " enable_user_wm = %d", g_cfg->enable_user_wm);
|
|
|
|
LOG(LOG_LEVEL_TRACE, " default_wm = %s", g_cfg->default_wm);
|
|
|
|
LOG(LOG_LEVEL_TRACE, " user_wm = %s", g_cfg->user_wm);
|
|
|
|
LOG(LOG_LEVEL_TRACE, " reconnect_sh = %s", g_cfg->reconnect_sh);
|
|
|
|
LOG(LOG_LEVEL_TRACE, " auth_file_path = %s", g_cfg->auth_file_path);
|
2019-10-16 23:53:22 +03:00
|
|
|
|
2020-12-28 14:03:36 +03:00
|
|
|
daemon = !startup_params.no_daemon;
|
2018-06-01 16:44:51 +03:00
|
|
|
if (daemon)
|
|
|
|
{
|
|
|
|
/* not to spit on the console, shut up stdout/stderr before anything's logged */
|
|
|
|
g_file_close(0);
|
|
|
|
g_file_close(1);
|
|
|
|
g_file_close(2);
|
2019-10-16 23:53:22 +03:00
|
|
|
|
Split g_file_open() into _ro() and _rw() variants
Rename g_file_open() to g_file_open_rw(), and add a new g_file_open_ro()
call that wraps the common g_file_open_ex(file, 1, 0, 0, 0) idiom. This
will make the file access mode more explicit in the code.
Change all calls to g_file_open() to the _ro() or _rw() variant as
appropriate, and replace g_file_open_ex(file, 1, 0, 0, 0) with the _ro()
call.
Lastly, add tests for the two new calls to test_os_calls.c (code
courteously provided by matt335672).
2023-05-13 08:54:32 +03:00
|
|
|
if (g_file_open_rw("/dev/null") < 0)
|
2019-10-16 23:53:22 +03:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
Split g_file_open() into _ro() and _rw() variants
Rename g_file_open() to g_file_open_rw(), and add a new g_file_open_ro()
call that wraps the common g_file_open_ex(file, 1, 0, 0, 0) idiom. This
will make the file access mode more explicit in the code.
Change all calls to g_file_open() to the _ro() or _rw() variant as
appropriate, and replace g_file_open_ex(file, 1, 0, 0, 0) with the _ro()
call.
Lastly, add tests for the two new calls to test_os_calls.c (code
courteously provided by matt335672).
2023-05-13 08:54:32 +03:00
|
|
|
if (g_file_open_rw("/dev/null") < 0)
|
2019-10-16 23:53:22 +03:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
Split g_file_open() into _ro() and _rw() variants
Rename g_file_open() to g_file_open_rw(), and add a new g_file_open_ro()
call that wraps the common g_file_open_ex(file, 1, 0, 0, 0) idiom. This
will make the file access mode more explicit in the code.
Change all calls to g_file_open() to the _ro() or _rw() variant as
appropriate, and replace g_file_open_ex(file, 1, 0, 0, 0) with the _ro()
call.
Lastly, add tests for the two new calls to test_os_calls.c (code
courteously provided by matt335672).
2023-05-13 08:54:32 +03:00
|
|
|
if (g_file_open_rw("/dev/null") < 0)
|
2019-10-16 23:53:22 +03:00
|
|
|
{
|
|
|
|
}
|
2018-06-01 16:44:51 +03:00
|
|
|
}
|
|
|
|
|
2023-06-14 16:23:07 +03:00
|
|
|
/* Create the socket directory before we try to listen (or
|
2022-03-19 14:29:28 +03:00
|
|
|
* test-listen), so there's somewhere for the default socket to live */
|
2023-06-14 16:23:07 +03:00
|
|
|
if (create_xrdp_socket_root_path() != 0)
|
2022-03-19 14:29:28 +03:00
|
|
|
{
|
|
|
|
config_free(g_cfg);
|
|
|
|
log_end();
|
|
|
|
g_deinit();
|
|
|
|
g_exit(1);
|
|
|
|
}
|
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
if (daemon)
|
2005-11-14 01:06:49 +03:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
/* start of daemonizing code */
|
2017-12-27 18:00:18 +03:00
|
|
|
if (sesman_listen_test(g_cfg) != 0)
|
2018-01-09 08:09:13 +03:00
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR, "Failed to start xrdp-sesman daemon, "
|
|
|
|
"possibly address already in use.");
|
2020-06-22 12:27:54 +03:00
|
|
|
config_free(g_cfg);
|
2022-03-19 14:29:28 +03:00
|
|
|
log_end();
|
2017-12-27 18:00:18 +03:00
|
|
|
g_deinit();
|
|
|
|
g_exit(1);
|
|
|
|
}
|
2017-05-17 10:23:30 +03:00
|
|
|
|
2017-12-27 18:00:18 +03:00
|
|
|
if (0 != g_fork())
|
|
|
|
{
|
2020-06-22 12:27:54 +03:00
|
|
|
config_free(g_cfg);
|
2022-03-19 14:29:28 +03:00
|
|
|
log_end();
|
2012-09-20 07:51:34 +04:00
|
|
|
g_deinit();
|
|
|
|
g_exit(0);
|
|
|
|
}
|
|
|
|
|
2005-11-14 01:06:49 +03:00
|
|
|
}
|
2006-08-24 09:58:10 +04:00
|
|
|
|
2022-09-03 02:48:01 +03:00
|
|
|
/* Now we've forked (if necessary), we can get the program PID */
|
2012-09-20 07:51:34 +04:00
|
|
|
g_pid = g_getpid();
|
2022-03-19 14:29:28 +03:00
|
|
|
|
|
|
|
/* signal handling */
|
2022-03-03 18:37:46 +03:00
|
|
|
g_snprintf(text, 255, "xrdp_sesman_%8.8x_main_term", g_pid);
|
|
|
|
g_term_event = g_create_wait_obj(text);
|
|
|
|
g_snprintf(text, 255, "xrdp_sesman_%8.8x_sigchld", g_pid);
|
|
|
|
g_sigchld_event = g_create_wait_obj(text);
|
|
|
|
g_snprintf(text, 255, "xrdp_sesman_%8.8x_reload", g_pid);
|
|
|
|
g_reload_event = g_create_wait_obj(text);
|
|
|
|
|
|
|
|
g_signal_user_interrupt(set_term_event); /* SIGINT */
|
|
|
|
g_signal_terminate(set_term_event); /* SIGTERM */
|
2023-04-24 17:32:00 +03:00
|
|
|
g_signal_pipe(sig_no_op); /* SIGPIPE */
|
2022-03-03 18:37:46 +03:00
|
|
|
g_signal_child_stop(set_sigchld_event); /* SIGCHLD */
|
2023-04-24 17:32:00 +03:00
|
|
|
g_signal_hang_up(set_reload_event); /* SIGHUP */
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
|
|
if (daemon)
|
2008-12-26 05:20:03 +03:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
/* writing pid file */
|
2020-06-22 12:27:54 +03:00
|
|
|
char pid_s[32];
|
Split g_file_open() into _ro() and _rw() variants
Rename g_file_open() to g_file_open_rw(), and add a new g_file_open_ro()
call that wraps the common g_file_open_ex(file, 1, 0, 0, 0) idiom. This
will make the file access mode more explicit in the code.
Change all calls to g_file_open() to the _ro() or _rw() variant as
appropriate, and replace g_file_open_ex(file, 1, 0, 0, 0) with the _ro()
call.
Lastly, add tests for the two new calls to test_os_calls.c (code
courteously provided by matt335672).
2023-05-13 08:54:32 +03:00
|
|
|
int fd = g_file_open_rw(pid_file);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
|
|
if (-1 == fd)
|
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
"error opening pid file[%s]: %s",
|
|
|
|
pid_file, g_get_strerror());
|
2012-09-20 07:51:34 +04:00
|
|
|
log_end();
|
2020-06-22 12:27:54 +03:00
|
|
|
config_free(g_cfg);
|
2012-09-20 07:51:34 +04:00
|
|
|
g_deinit();
|
|
|
|
g_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
g_sprintf(pid_s, "%d", g_pid);
|
|
|
|
g_file_write(fd, pid_s, g_strlen(pid_s));
|
|
|
|
g_file_close(fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* start program main loop */
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_INFO,
|
|
|
|
"starting xrdp-sesman with pid %d", g_pid);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2017-07-12 09:56:40 +03:00
|
|
|
/* make sure the /tmp/.X11-unix directory exists */
|
2012-09-20 07:51:34 +04:00
|
|
|
if (!g_directory_exist("/tmp/.X11-unix"))
|
|
|
|
{
|
2014-07-20 00:06:25 +04:00
|
|
|
if (!g_create_dir("/tmp/.X11-unix"))
|
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR,
|
2014-07-20 00:06:25 +04:00
|
|
|
"sesman.c: error creating dir /tmp/.X11-unix");
|
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
g_chmod_hex("/tmp/.X11-unix", 0x1777);
|
2008-12-26 05:20:03 +03:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-04-24 17:32:00 +03:00
|
|
|
if ((error = pre_session_list_init(MAX_PRE_SESSION_ITEMS)) == 0 &&
|
|
|
|
(error = session_list_init()) == 0)
|
2023-03-22 19:25:28 +03:00
|
|
|
{
|
|
|
|
error = sesman_main_loop();
|
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
|
|
/* clean up PID file on exit */
|
|
|
|
if (daemon)
|
|
|
|
{
|
|
|
|
g_file_delete(pid_file);
|
|
|
|
}
|
|
|
|
|
2023-04-24 17:32:00 +03:00
|
|
|
sesman_close_all();
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-04-24 17:32:00 +03:00
|
|
|
log_end();
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2020-06-22 12:27:54 +03:00
|
|
|
config_free(g_cfg);
|
2012-09-20 07:51:34 +04:00
|
|
|
g_deinit();
|
2017-05-17 10:23:30 +03:00
|
|
|
g_exit(error);
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
2005-01-30 07:34:19 +03:00
|
|
|
}
|