2 ** Copyright (C) 2006 Thadeu Lima de Souza Cascardo <cascardo@minaslivre.org>
3 ** Copyright (C) 2009 Thadeu Lima de Souza Cascardo <cascardo@holoscopio.com>
5 ** This program is free software; you can redistribute it and/or modify
6 ** it under the terms of the GNU General Public License as published by
7 ** the Free Software Foundation; either version 2 of the License, or
8 ** (at your option) any later version.
10 ** This program is distributed in the hope that it will be useful,
11 ** but WITHOUT ANY WARRANTY; without even the implied warranty of
12 ** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 ** GNU General Public License for more details.
15 ** You should have received a copy of the GNU General Public License
16 ** along with this program; if not, write to the Free Software
17 ** Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
25 #include <gnutls/gnutls.h>
26 #include <netinet/in.h>
27 #include <arpa/inet.h>
33 #include "hcconn_ssl.h"
34 #include "tcp_connect.h"
38 #define CONFFILE SYSCONFDIR "/popproxy.conf"
48 server_conn_new (char *server, char *port, int ssl)
54 fd = hc_tcp_connect (server, port);
57 g_warning ("Could not connect to server at %s:%s.", server, port);
60 conn = hc_conn_new (NULL, NULL);
61 r = hc_conn_set_driver_channel (conn, fd);
70 ssl_conn = hc_conn_new (NULL, NULL);
71 r = hc_conn_set_driver_ssl_client (ssl_conn, conn);
74 hc_conn_close (ssl_conn);
82 client_conn_new (int fd)
88 conn = hc_conn_new (NULL, NULL);
89 r = hc_conn_set_driver_channel (conn, fd);
96 ssl_conn = hc_conn_new (NULL, NULL);
97 hc_conn_set_driver_ssl_server (ssl_conn, conn);
100 hc_conn_close (ssl_conn);
101 hc_conn_close (conn);
104 pop_conn = hc_conn_new (NULL, NULL);
105 r = hc_conn_set_driver_pop (pop_conn, ssl_conn);
108 hc_conn_close (pop_conn);
109 hc_conn_close (ssl_conn);
116 push_other (HCConn *conn, HCEvent event, gpointer data)
123 while ((r = hc_conn_read (conn, buffer, sizeof (buffer))) > 0)
124 hc_conn_write (data, buffer, r);
127 hc_conn_close (conn);
128 hc_conn_close (data);
134 new_client (int fd, struct sockaddr *addr, socklen_t saddr, gpointer data)
138 struct pop_address *address = data;
141 g_critical ("Server has received an error event.");
145 /* FIXME: Should be independent of address type. */
146 g_message ("Received connection from %s.",
147 inet_ntoa (((struct sockaddr_in *) addr)->sin_addr));
149 server_conn = server_conn_new (address->server, address->port,
151 if (server_conn == NULL)
155 client_conn = client_conn_new (fd);
156 if (client_conn == NULL)
158 hc_conn_close (server_conn);
162 hc_conn_set_callback (client_conn, push_other, server_conn);
163 hc_conn_set_callback (server_conn, push_other, client_conn);
167 static gchar *configfile;
168 static gboolean foreground;
170 static GOptionEntry opt_entries[] =
172 { "config-file", 'c', 0, G_OPTION_ARG_FILENAME, &configfile,
173 "Configuration file location", "file" },
174 { "foreground", 'f', 0, G_OPTION_ARG_NONE, &foreground,
175 "Run in foreground", 0 },
179 int main (int argc, char **argv)
182 GOptionContext *opt_ctx;
188 gchar *server_address;
194 struct pop_address pop_address;
196 signal (SIGPIPE, SIG_IGN);
198 gnutls_global_init ();
200 configfile = CONFFILE;
201 opt_ctx = g_option_context_new ("");
202 g_option_context_add_main_entries (opt_ctx, opt_entries, NULL);
205 if (!g_option_context_parse (opt_ctx, &argc, &argv, &error))
207 g_critical ("Could not parse command line options: %s.",
209 g_error_free (error);
212 g_option_context_free (opt_ctx);
214 keyfile = g_key_file_new ();
217 if (g_key_file_load_from_file (keyfile, configfile,
218 G_KEY_FILE_NONE, &error) == FALSE)
220 g_critical ("Could not load configuration file %s: %s.",
221 configfile, error->message);
222 g_error_free (error);
227 certfile = g_key_file_get_string (keyfile, "global", "certfile",
229 if (certfile == NULL && error != NULL)
231 g_critical ("No certification file specified: %s.",
233 g_error_free (error);
237 ssl_keyfile = g_key_file_get_string (keyfile, "global", "keyfile",
239 if (ssl_keyfile == NULL && error != NULL)
241 ssl_keyfile = g_strdup (certfile);
242 g_error_free (error);
247 conf_address = g_key_file_get_string (keyfile, "global", "address",
249 if (conf_address == NULL && error != NULL)
251 conf_address = g_strdup ("0.0.0.0");
252 g_error_free (error);
255 port = g_key_file_get_string (keyfile, "global", "port", &error);
256 if (port == NULL && error != NULL)
258 port = g_strdup ("110");
259 g_error_free (error);
262 server_address = g_key_file_get_string (keyfile, "global", "server",
264 if (server_address == NULL && error != NULL)
266 server_address = g_strdup ("127.0.0.1");
267 g_error_free (error);
270 server_port = g_key_file_get_string (keyfile, "global", "server_port",
272 if (server_port == NULL && error != NULL)
274 server_port = g_strdup ("995");
275 g_error_free (error);
278 server_ssl = g_key_file_get_boolean (keyfile, "global", "server_ssl",
280 if (server_ssl == 0 && error != NULL)
283 g_error_free (error);
287 policy = g_key_file_get_string (keyfile, "global", "policy",
289 if (policy == NULL && error != NULL)
291 policy = g_strdup ("deny");
292 g_error_free (error);
295 if (!strcmp (policy, "allow"))
296 ACCESS_DEFAULT = ACCESS_ALLOW;
300 pop_address.server = server_address;
301 pop_address.port = server_port;
302 pop_address.ssl = server_ssl;
304 server_fd = hc_tcp_server (port);
307 g_critical ("Could not create server.");
310 hc_server_add_watch (server_fd, new_client, &pop_address);
314 g_message ("Listening at %s:%s.", conf_address, port);
315 if (ACCESS_DEFAULT == ACCESS_ALLOW)
316 g_message ("Authorizing users by default.");
321 g_free (conf_address);
324 hc_conn_ssl_server_init_credentials (certfile, ssl_keyfile);
327 g_free (ssl_keyfile);
329 g_main_loop_run (g_main_loop_new (g_main_context_default (), TRUE));
331 gnutls_global_deinit ();
333 g_free (server_address);
334 g_free (server_port);