9ac351a4cb
added pid file generation improved some code documentation
323 lines
8.0 KiB
C
323 lines
8.0 KiB
C
/*
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
|
|
xrdp: A Remote Desktop Protocol server.
|
|
Copyright (C) Jay Sorg 2005
|
|
|
|
session manager
|
|
linux only
|
|
|
|
*/
|
|
|
|
#include "sesman.h"
|
|
|
|
#include <stdio.h>
|
|
#include <sys/types.h>
|
|
#include <signal.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
|
|
#define SESMAN_PID_FILE "/usr/local/xrdp/sesman.pid"
|
|
|
|
int g_sck;
|
|
int g_pid;
|
|
unsigned char g_fixedkey[8] = { 23, 82, 107, 6, 35, 78, 88, 7 };
|
|
struct session_item g_session_items[100]; /* sesman.h */
|
|
struct config_sesman g_cfg; /* config.h */
|
|
|
|
/******************************************************************************/
|
|
static void DEFAULT_CC
|
|
cterm(int s)
|
|
{
|
|
int i;
|
|
int pid;
|
|
|
|
if (g_getpid() != g_pid)
|
|
{
|
|
return;
|
|
}
|
|
pid = g_waitchild();
|
|
if (pid > 0)
|
|
{
|
|
for (i = 0; i < 100; i++)
|
|
{
|
|
if (g_session_items[i].pid == pid)
|
|
{
|
|
g_memset(g_session_items + i, 0, sizeof(struct session_item));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
*
|
|
*
|
|
* Starts sesman main loop
|
|
*
|
|
*/
|
|
static void DEFAULT_CC
|
|
sesman_main_loop()
|
|
{
|
|
int in_sck;
|
|
int code;
|
|
int i;
|
|
int size;
|
|
int version;
|
|
int width;
|
|
int height;
|
|
int bpp;
|
|
int display;
|
|
int error;
|
|
struct stream* in_s;
|
|
struct stream* out_s;
|
|
char user[256];
|
|
char pass[256];
|
|
struct session_item* s_item;
|
|
long data;
|
|
|
|
/*main program loop*/
|
|
make_stream(in_s);
|
|
init_stream(in_s, 8192);
|
|
make_stream(out_s);
|
|
init_stream(out_s, 8192);
|
|
|
|
log_message(LOG_LEVEL_INFO, "listening...");
|
|
g_sck = g_tcp_socket();
|
|
g_tcp_set_non_blocking(g_sck);
|
|
error = g_tcp_bind(g_sck, g_cfg.listen_port);
|
|
if (error == 0)
|
|
{
|
|
error = g_tcp_listen(g_sck);
|
|
if (error == 0)
|
|
{
|
|
in_sck = g_tcp_accept(g_sck);
|
|
while (in_sck == -1 && g_tcp_last_error_would_block(g_sck))
|
|
{
|
|
g_sleep(1000);
|
|
in_sck = g_tcp_accept(g_sck);
|
|
}
|
|
while (in_sck > 0)
|
|
{
|
|
init_stream(in_s, 8192);
|
|
if (tcp_force_recv(in_sck, in_s->data, 8) == 0)
|
|
{
|
|
in_uint32_be(in_s, version);
|
|
in_uint32_be(in_s, size);
|
|
init_stream(in_s, 8192);
|
|
if (tcp_force_recv(in_sck, in_s->data, size - 8) == 0)
|
|
{
|
|
if (version == 0)
|
|
{
|
|
in_uint16_be(in_s, code);
|
|
if (code == 0) /* check username - password, start session */
|
|
{
|
|
in_uint16_be(in_s, i);
|
|
in_uint8a(in_s, user, i);
|
|
user[i] = 0;
|
|
in_uint16_be(in_s, i);
|
|
in_uint8a(in_s, pass, i);
|
|
pass[i] = 0;
|
|
in_uint16_be(in_s, width);
|
|
in_uint16_be(in_s, height);
|
|
in_uint16_be(in_s, bpp);
|
|
data = auth_userpass(user, pass);
|
|
display = 0;
|
|
if (data)
|
|
{
|
|
s_item = session_find_item(user, width, height, bpp);
|
|
if (s_item != 0)
|
|
{
|
|
display = s_item->display;
|
|
auth_end(data);
|
|
/* don't set data to null here */
|
|
}
|
|
else
|
|
{
|
|
display = session_start(width, height, bpp, user, pass,
|
|
data);
|
|
}
|
|
if (display == 0)
|
|
{
|
|
auth_end(data);
|
|
data = 0;
|
|
}
|
|
}
|
|
init_stream(out_s, 8192);
|
|
out_uint32_be(out_s, 0); /* version */
|
|
out_uint32_be(out_s, 14); /* size */
|
|
out_uint16_be(out_s, 3); /* cmd */
|
|
out_uint16_be(out_s, data != 0); /* data */
|
|
out_uint16_be(out_s, display); /* data */
|
|
s_mark_end(out_s);
|
|
tcp_force_send(in_sck, out_s->data,
|
|
out_s->end - out_s->data);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
g_tcp_close(in_sck);
|
|
in_sck = g_tcp_accept(g_sck);
|
|
while (in_sck == -1 && g_tcp_last_error_would_block(g_sck))
|
|
{
|
|
g_sleep(1000);
|
|
in_sck = g_tcp_accept(g_sck);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
log_message(LOG_LEVEL_ERROR, "listen error");
|
|
}
|
|
}
|
|
else
|
|
{
|
|
log_message(LOG_LEVEL_ERROR, "bind error");
|
|
}
|
|
g_tcp_close(g_sck);
|
|
free_stream(in_s);
|
|
free_stream(out_s);
|
|
}
|
|
|
|
/******************************************************************************/
|
|
int DEFAULT_CC
|
|
main(int argc, char** argv)
|
|
{
|
|
int fd;
|
|
int error;
|
|
int daemon=1;
|
|
int pid;
|
|
char pid_s[8];
|
|
|
|
if (1==argc)
|
|
{
|
|
/* no options on command line. normal startup */
|
|
g_printf("starting sesman...\n");
|
|
daemon=1;
|
|
}
|
|
else if ( (2==argc) && ( (0 == g_strncasecmp(argv[1],"--nodaemon",11)) || (0 == g_strncasecmp(argv[1],"-n",11)) ) )
|
|
{
|
|
/* starts sesman not daemonized */
|
|
g_printf("starting sesman in foregroud...\n");
|
|
daemon=0;
|
|
}
|
|
else if ( (2==argc) && ( (0 == g_strncasecmp(argv[1],"--help",7)) || (0 == g_strncasecmp(argv[1],"-h",2)) ) )
|
|
{
|
|
/* help screen */
|
|
g_printf("...\n");
|
|
}
|
|
else if ( (2==argc) && ( (0 == g_strncasecmp(argv[1],"--kill",11)) || (0 == g_strncasecmp(argv[1],"-k",11)) ) )
|
|
{
|
|
/* killing running sesman */
|
|
fd = g_file_open(SESMAN_PID_FILE);
|
|
|
|
if (-1 == fd)
|
|
{
|
|
g_printf("error opening pid file: %s\n", strerror(errno));
|
|
return 1;
|
|
}
|
|
|
|
error = g_file_read(fd, pid_s, 7);
|
|
sscanf(pid_s, "%i", &pid);
|
|
|
|
error = g_sigterm(pid);
|
|
if (0 != error)
|
|
{
|
|
g_printf("error killing sesman: %s\n", strerror(errno));
|
|
}
|
|
|
|
g_exit(error);
|
|
}
|
|
else
|
|
{
|
|
/* there's something strange on the command line */
|
|
g_printf("sesman - xrdp session manager\n");
|
|
g_printf("usage: sesman [ --nodaemon | --kill ]\n");
|
|
g_exit(1);
|
|
}
|
|
|
|
/* reading config */
|
|
if (0 != config_read(&g_cfg))
|
|
{
|
|
g_printf("error reading config: %s\nquitting.\n", strerror(errno));
|
|
g_exit(1);
|
|
}
|
|
|
|
/* starting logging subsystem */
|
|
error = log_start(g_cfg.log.program_name, g_cfg.log.log_file, g_cfg.log.log_level,
|
|
g_cfg.log.enable_syslog, g_cfg.log.syslog_level);
|
|
|
|
if (error != LOG_STARTUP_OK)
|
|
{
|
|
switch (error)
|
|
{
|
|
case LOG_ERROR_MALLOC:
|
|
g_printf("error on malloc. cannot start logging. quitting.\n");
|
|
case LOG_ERROR_FILE_OPEN:
|
|
g_printf("error opening log file. quitting.\n");
|
|
}
|
|
g_exit(1);
|
|
}
|
|
|
|
if (daemon)
|
|
{
|
|
/* start of daemonizing code */
|
|
g_pid = g_fork();
|
|
|
|
if (0!=g_pid)
|
|
{
|
|
g_exit(0);
|
|
}
|
|
|
|
g_file_close(0);
|
|
g_file_close(1);
|
|
g_file_close(2);
|
|
|
|
g_file_open("/dev/null");
|
|
g_file_open("/dev/null");
|
|
g_file_open("/dev/null");
|
|
}
|
|
|
|
/* signal handling */
|
|
g_memset(&g_session_items, 0, sizeof(g_session_items));
|
|
g_pid = g_getpid();
|
|
g_signal(1, sig_sesman_reload_cfg); /* SIGHUP */
|
|
g_signal(2, sig_sesman_shutdown); /* SIGINT */
|
|
g_signal(9, sig_sesman_shutdown); /* SIGKILL */
|
|
g_signal(15, sig_sesman_shutdown); /* SIGTERM */
|
|
g_signal_child_stop(cterm); /* SIGCHLD */
|
|
|
|
/* writing pid file */
|
|
fd = g_file_open(SESMAN_PID_FILE);
|
|
if (-1 == fd)
|
|
{
|
|
log_message(LOG_LEVEL_ERROR, "error opening pid file: %s", strerror(errno));
|
|
log_end();
|
|
g_exit(1);
|
|
}
|
|
g_sprintf(pid_s, "%d", g_pid);
|
|
g_file_write(fd, pid_s, g_strlen(pid_s)+1);
|
|
g_file_close(fd);
|
|
|
|
/* start program main loop */
|
|
log_message(LOG_LEVEL_ALWAYS, "starting sesman with pid %d", g_pid);
|
|
|
|
sesman_main_loop();
|
|
|
|
log_end();
|
|
|
|
return 0;
|
|
}
|
|
|