2 * $Id: main.c,v 1.19 2005-04-28 20:49:49 bfernhomberg Exp $
4 * Copyright (c) 1990,1995 Regents of The University of Michigan.
5 * All Rights Reserved. See COPYRIGHT.
10 #endif /* HAVE_CONFIG_H */
14 #include <sys/param.h>
17 #if defined( sun ) && defined( __svr4__ )
18 #include </usr/ucbinclude/sys/file.h>
19 #else /* sun && __svr4__ */
21 #endif /* sun && __svr4__ */
22 #include <sys/socket.h>
23 #include <atalk/logger.h>
25 /* POSIX.1 sys/wait.h check */
26 #include <sys/types.h>
27 #ifdef HAVE_SYS_WAIT_H
29 #endif /* HAVE_SYS_WAIT_H */
31 #define WEXITSTATUS(stat_val) ((unsigned)(stat_val) >> 8)
32 #endif /* ! WEXITSTATUS */
34 #define WIFEXITED(stat_val) (((stat_val) & 255) == 0)
35 #endif /* ! WIFEXITED */
42 #else /* STDC_HEADERS */
46 #endif /* HAVE_STRCHR */
47 char *strchr (), *strrchr ();
49 #define memcpy(d,s,n) bcopy ((s), (d), (n))
50 #define memmove(d,s,n) bcopy ((s), (d), (n))
51 #endif /* ! HAVE_MEMCPY */
52 #endif /* STDC_HEADERS */
61 #endif /* HAVE_UNISTD_H */
63 #include <netatalk/endian.h>
64 #include <netatalk/at.h>
65 #include <atalk/compat.h>
66 #include <atalk/atp.h>
67 #include <atalk/pap.h>
68 #include <atalk/paths.h>
69 #include <atalk/util.h>
70 #include <atalk/nbp.h>
71 #include <atalk/unicode.h>
77 #include "print_cups.h"
79 #define _PATH_PAPDPPDFILE ".ppd"
81 #define PIPED_STATUS "status: print spooler processing job"
83 struct printer defprinter;
84 struct printer *printers = NULL;
87 static char *conffile = _PATH_PAPDCONF;
88 char *printcap = _PATH_PAPDPRINTCAP;
89 unsigned char connid, quantum, sock, oquantum = PAP_MAXQUANTUM;
90 char *cannedstatus = PIPED_STATUS;
91 struct printer *printer = NULL;
92 char *version = VERSION;
93 static char *pidfile = _PATH_PAPDLOCK;
96 char *uampath = _PATH_PAPDUAMPATH;
98 /* Prototypes for locally used functions */
99 int getstatus( struct printer *pr, char *buf );
100 int rprintcap( struct printer *pr );
101 static void getprinters( char *cf );
104 /* this only needs to be used by the server process */
105 static void papd_exit(const int i)
107 server_unlock(pidfile);
112 #if !defined( ibm032 ) && !defined( _IBMR2 )
114 #endif /* ! ibm032 && ! _IBMR2 */
121 memset(&addr, 0, sizeof(addr));
123 for ( pr = printers; pr; pr = pr->p_next ) {
124 if ( pr->p_flags & P_REGISTERED ) {
125 if ( nbp_unrgstr( pr->p_name, pr->p_type, pr->p_zone, &addr ) < 0 ) {
126 LOG(log_error, logtype_papd, "can't unregister %s:%s@%s", pr->p_name,
127 pr->p_type, pr->p_zone );
130 LOG(log_info, logtype_papd, "unregister %s:%s@%s", pr->p_name, pr->p_type,
134 if ( pr->p_flags & P_SPOOLED && pr->p_flags & P_CUPS_PPD ) {
135 LOG(log_info, logtype_papd, "Deleting CUPS temp PPD file for %s (%s)", pr->p_name, pr->p_ppdfile);
136 unlink (pr->p_ppdfile);
138 #endif /* HAVE_CUPS */
144 #if !defined( ibm032 ) && !defined( _IBMR2 )
146 #endif /* ! ibm032 && ! _IBMR2 */
152 while (( pid = wait3( &status, WNOHANG, 0 )) > 0 ) {
153 if ( WIFEXITED( status )) {
154 if ( WEXITSTATUS( status )) {
155 LOG(log_error, logtype_papd, "child %d exited with %d", pid,
156 WEXITSTATUS( status ));
158 LOG(log_info, logtype_papd, "child %d done", pid );
161 if ( WIFSIGNALED( status )) {
162 LOG(log_error, logtype_papd, "child %d killed with %d", pid,
165 LOG(log_error, logtype_papd, "child %d died", pid );
172 char rbuf[ 255 + 1 + 8 ];
181 struct atp_block atpb;
182 struct sockaddr_at sat;
187 char *p, hostname[ MAXHOSTNAMELEN ];
192 if ( gethostname( hostname, sizeof( hostname )) < 0 ) {
193 perror( "gethostname" );
196 if (( p = strchr( hostname, '.' )) != 0 ) {
199 if (( defprinter.p_name = (char *)malloc( strlen( hostname ) + 1 ))
204 strcpy( defprinter.p_name, hostname );
205 defprinter.p_type = "LaserWriter";
206 defprinter.p_zone = "*";
207 memset(&defprinter.p_addr, 0, sizeof(defprinter.p_addr));
208 defprinter.p_ppdfile = _PATH_PAPDPPDFILE;
210 defprinter.p_flags = P_PIPED;
211 defprinter.p_printer = "/usr/bin/lp -T PS";
213 defprinter.p_flags = P_SPOOLED;
214 defprinter.p_printer = "lp";
215 #endif /* __svr4__ */
216 defprinter.p_operator = "operator";
217 defprinter.p_spool = _PATH_PAPDSPOOLDIR;
219 defprinter.p_role = NULL;
220 defprinter.p_srvid = 0;
221 #endif /* ABS_PRINT */
222 defprinter.p_pagecost = 200; /* default cost */
223 defprinter.p_pagecost_msg = NULL;
224 defprinter.p_lock = "lock";
226 while (( c = getopt( ac, av, "adf:p:P:v" )) != EOF ) {
228 case 'a' : /* for compatibility with old papd */
231 case 'd' : /* debug */
235 case 'f' : /* conffile */
239 case 'p' : /* printcap */
247 case 'v' : /* version */
248 printf( "papd (version %s)\n", VERSION );
254 "Usage:\t%s [ -d ] [ -f conffile ] [ -p printcap ]\n",
261 switch (server_lock("papd", pidfile, debug)) {
262 case 0: /* open a couple things again in the child */
263 if ((c = open("/", O_RDONLY)) >= 0) {
281 if (( p = strrchr( av[ 0 ], '/' )) == NULL ) {
287 openlog( p, LOG_PID );
290 syslog_setup(log_debug, logtype_default, logoption_ndelay|logoption_pid, logfacility_lpr );
293 LOG(log_info, logtype_papd, "restart (%s)", version );
295 LOG(log_info, logtype_papd, "CUPS support enabled (%s)", CUPS_API_VERSION );
298 getprinters( conffile );
300 for ( pr = printers; pr; pr = pr->p_next ) {
301 if (( pr->p_flags & P_SPOOLED ) && rprintcap( pr ) < 0 ) {
302 LOG(log_error, logtype_papd, "printcap problem: %s", pr->p_printer );
305 if (!(pr->p_flags & P_CUPS)) {
306 if ((size_t)-1 != convert_string_allocate(CH_UNIX, CH_MAC, pr->p_name, strlen(pr->p_name), &atname)) {
307 pr->p_u_name = pr->p_name;
312 if (( pr->p_atp = atp_open( ATADDR_ANYPORT, &pr->p_addr )) == NULL ) {
313 LOG(log_error, logtype_papd, "atp_open: %m" );
316 if ( nbp_rgstr( atp_sockaddr( pr->p_atp ), pr->p_name, pr->p_type,
318 LOG(log_error, logtype_papd, "can't register %s:%s@%s", pr->p_u_name, pr->p_type,
322 if ( pr->p_flags & P_AUTH ) {
323 LOG(log_info, logtype_papd, "Authentication enabled: %s", pr->p_u_name );
326 LOG(log_info, logtype_papd, "Authentication disabled: %s", pr->p_u_name );
328 LOG(log_info, logtype_papd, "register %s:%s@%s", pr->p_u_name, pr->p_type,
330 pr->p_flags |= P_REGISTERED;
333 memset(&sv, 0, sizeof(sv));
335 sigemptyset( &sv.sa_mask );
336 sv.sa_flags = SA_RESTART;
337 if ( sigaction( SIGTERM, &sv, 0 ) < 0 ) {
338 LOG(log_error, logtype_papd, "sigaction: %m" );
342 sv.sa_handler = reap;
343 sigemptyset( &sv.sa_mask );
344 sv.sa_flags = SA_RESTART;
345 if ( sigaction( SIGCHLD, &sv, 0 ) < 0 ) {
346 LOG(log_error, logtype_papd, "sigaction: %m" );
353 auth_load(uampath, uamlist);
356 * Begin accepting connections.
360 for ( pr = printers; pr; pr = pr->p_next ) {
361 FD_SET( atp_fileno( pr->p_atp ), &fdset );
363 if (( c = select( FD_SETSIZE, &fdset, 0, 0, 0 )) < 0 ) {
364 if ( errno == EINTR ) {
367 LOG(log_error, logtype_papd, "select: %m" );
371 for ( pr = printers; pr; pr = pr->p_next ) {
372 if ( FD_ISSET( atp_fileno( pr->p_atp ), &fdset )) {
375 memset( &sat, 0, sizeof( struct sockaddr_at ));
377 sat.sat_len = sizeof( struct sockaddr_at );
379 sat.sat_family = AF_APPLETALK;
380 sat.sat_addr.s_net = ATADDR_ANYNET;
381 sat.sat_addr.s_node = ATADDR_ANYNODE;
382 sat.sat_port = ATADDR_ANYPORT;
383 /* do an atp_rsel(), to prevent hangs */
384 if (( c = atp_rsel( pr->p_atp, &sat, ATP_TREQ )) != ATP_TREQ ) {
387 atpb.atp_saddr = &sat;
388 atpb.atp_rreqdata = cbuf;
389 atpb.atp_rreqdlen = sizeof( cbuf );
390 if ( atp_rreq( pr->p_atp, &atpb ) < 0 ) {
391 LOG(log_error, logtype_papd, "atp_rreq: %m" );
395 /* should check length of req buf */
397 switch( cbuf[ 1 ] ) {
399 connid = (unsigned char)cbuf[ 0 ];
400 sock = (unsigned char)cbuf[ 4 ];
401 quantum = (unsigned char)cbuf[ 5 ];
402 rbuf[ 0 ] = cbuf[ 0 ];
403 rbuf[ 1 ] = PAP_OPENREPLY;
404 rbuf[ 2 ] = rbuf[ 3 ] = 0;
406 if (( pr->p_flags & P_SPOOLED ) && rprintcap( pr ) != 0 ) {
407 LOG(log_error, logtype_papd, "printcap problem: %s",
409 rbuf[ 2 ] = rbuf[ 3 ] = 0xff;
415 * If cups is not accepting jobs, we return
416 * 0xffff to indicate we're busy
419 LOG(log_debug, logtype_papd, "CUPS: PAP_OPEN");
421 if ( (pr->p_flags & P_SPOOLED) && (cups_get_printer_status ( pr ) == 0)) {
422 LOG(log_error, logtype_papd, "CUPS_PAP_OPEN: %s is not accepting jobs",
424 rbuf[ 2 ] = rbuf[ 3 ] = 0xff;
427 #endif /* HAVE_CUPS */
431 * If this fails, we've run out of sockets. Rather than
432 * just die(), let's try to continue. Maybe some sockets
433 * will close, and we can continue;
435 if (( atp = atp_open( ATADDR_ANYPORT,
436 &pr->p_addr)) == NULL ) {
437 LOG(log_error, logtype_papd, "atp_open: %m" );
438 rbuf[ 2 ] = rbuf[ 3 ] = 0xff;
441 rbuf[ 4 ] = atp_sockaddr( atp )->sat_port;
442 rbuf[ 5 ] = oquantum;
443 rbuf[ 6 ] = rbuf[ 7 ] = 0;
446 iov.iov_len = 8 + getstatus( pr, &rbuf[ 8 ] );
447 atpb.atp_sresiov = &iov;
448 atpb.atp_sresiovcnt = 1;
450 * This may error out if we lose a route, so we won't die().
452 if ( atp_sresp( pr->p_atp, &atpb ) < 0 ) {
453 LOG(log_error, logtype_papd, "atp_sresp: %m" );
461 switch ( c = fork()) {
463 LOG(log_error, logtype_papd, "fork: %m" );
470 if (( printer->p_flags & P_SPOOLED ) &&
471 chdir( printer->p_spool ) < 0 ) {
472 LOG(log_error, logtype_papd, "chdir %s: %m", printer->p_spool );
476 if (( printer->p_flags & P_SPOOLED ) &&
477 chdir( SPOOLDIR ) < 0 ) {
478 LOG(log_error, logtype_papd, "chdir %s: %m", SPOOLDIR );
484 sv.sa_handler = SIG_DFL;
485 sigemptyset( &sv.sa_mask );
486 sv.sa_flags = SA_RESTART;
487 if ( sigaction( SIGTERM, &sv, 0 ) < 0 ) {
488 LOG(log_error, logtype_papd, "sigaction: %m" );
492 for ( pr = printers; pr; pr = pr->p_next ) {
493 atp_close( pr->p_atp );
496 if ( session( atp, &sat ) < 0 ) {
497 LOG(log_error, logtype_papd, "bad session" );
503 default : /* parent */
504 LOG(log_info, logtype_papd, "child %d for \"%s\" from %u.%u",
505 c, pr->p_name, ntohs( sat.sat_addr.s_net ),
506 sat.sat_addr.s_node);
511 case PAP_SENDSTATUS :
513 rbuf[ 1 ] = PAP_STATUS;
514 rbuf[ 2 ] = rbuf[ 3 ] = 0;
515 rbuf[ 4 ] = rbuf[ 5 ] = 0;
516 rbuf[ 6 ] = rbuf[ 7 ] = 0;
519 iov.iov_len = 8 + getstatus( pr, &rbuf[ 8 ] );
520 atpb.atp_sresiov = &iov;
521 atpb.atp_sresiovcnt = 1;
523 * This may error out if we lose a route, so we won't die().
525 if ( atp_sresp( pr->p_atp, &atpb ) < 0 ) {
526 LOG(log_error, logtype_papd, "atp_sresp: %m" );
531 LOG(log_error, logtype_papd, "Bad request from %u.%u!",
532 ntohs( sat.sat_addr.s_net ), sat.sat_addr.s_node );
539 * Sometimes the child process will send its first READ
540 * before the parent has sent the OPEN REPLY. Moving this
541 * code into the OPEN/STATUS switch fixes this problem.
544 iov.iov_len = 8 + getstatus( pr, &rbuf[ 8 ] );
545 atpb.atp_sresiov = &iov;
546 atpb.atp_sresiovcnt = 1;
548 * This may error out if we lose a route, so we won't die().
550 if ( atp_sresp( pr->p_atp, &atpb ) < 0 ) {
551 LOG(log_error, logtype_papd, "atp_sresp: %m" );
561 * We assume buf is big enough for 255 bytes of data and a length byte.
564 int getstatus( pr, buf )
570 if ( pr->p_flags & P_PIPED ) {
571 *buf = strlen( cannedstatus );
572 strncpy( &buf[ 1 ], cannedstatus, *buf );
575 cups_get_printer_status( pr );
576 *buf = strlen ( pr->p_status );
577 strncpy ( &buf[1], pr->p_status, *buf);
582 char path[ MAXPATHLEN ];
585 if ( pr->p_flags & P_SPOOLED && ( pr->p_spool != NULL )) {
586 strcpy( path, pr->p_spool );
587 strcat( path, "/status" );
588 fd = open( path, O_RDONLY);
591 if (( pr->p_flags & P_PIPED ) || ( fd < 0 )) {
592 *buf = strlen( cannedstatus );
593 strncpy( &buf[ 1 ], cannedstatus, *buf );
596 if (( rc = read( fd, &buf[ 1 ], 255 )) < 0 ) {
600 if ( rc && buf[ rc ] == '\n' ) { /* remove trailing newline */
606 #endif /* HAVE_CUPS */
610 char *getpname(char **area, int bufsize);
612 #define PF_CONFBUFFER 1024
614 static void getprinters( cf )
617 char buf[ PF_CONFBUFFER ], area[ PF_CONFBUFFER ], *a, *p, *name, *type, *zone;
621 while (( c = getprent( cf, buf, PF_CONFBUFFER )) > 0 ) {
624 * Get the printer's nbp name.
626 if (( p = getpname( &a, PF_CONFBUFFER )) == NULL ) {
627 fprintf( stderr, "No printer name\n" );
631 if (( pr = (struct printer *)malloc( sizeof( struct printer )))
636 memset( pr, 0, sizeof( struct printer ));
638 name = defprinter.p_name;
639 type = defprinter.p_type;
640 zone = defprinter.p_zone;
641 if ( nbp_name( p, &name, &type, &zone )) {
642 fprintf( stderr, "Can't parse \"%s\"\n", name );
645 if ( name != defprinter.p_name ) {
646 if (( pr->p_name = (char *)malloc( strlen( name ) + 1 )) == NULL ) {
650 strcpy( pr->p_name, name );
654 if ( type != defprinter.p_type ) {
655 if (( pr->p_type = (char *)malloc( strlen( type ) + 1 )) == NULL ) {
659 strcpy( pr->p_type, type );
663 if ( zone != defprinter.p_zone ) {
664 if (( pr->p_zone = (char *)malloc( strlen( zone ) + 1 )) == NULL ) {
668 strcpy( pr->p_zone, zone );
673 if ( pnchktc( cf ) != 1 ) {
674 fprintf( stderr, "Bad papcap entry\n" );
681 if (( p = pgetstr( "pd", &a )) == NULL ) {
682 pr->p_ppdfile = defprinter.p_ppdfile;
684 if (( pr->p_ppdfile = (char *)malloc( strlen( p ) + 1 )) == NULL ) {
688 strcpy( pr->p_ppdfile, p );
692 * Get lpd printer name.
694 if (( p = pgetstr( "pr", &a )) == NULL ) {
695 pr->p_printer = defprinter.p_printer;
696 pr->p_flags = defprinter.p_flags;
700 pr->p_flags = P_PIPED;
702 pr->p_flags = P_SPOOLED;
704 if (( pr->p_printer = (char *)malloc( strlen( p ) + 1 )) == NULL ) {
708 strcpy( pr->p_printer, p );
712 * Do we want authenticated printing?
714 if ((p = pgetstr( "ca", &a )) != NULL ) {
715 if ((pr->p_authprintdir = (char *)malloc(strlen(p)+1)) == NULL) {
719 strcpy( pr->p_authprintdir, p );
720 pr->p_flags |= P_AUTH;
721 pr->p_flags |= P_AUTH_CAP;
722 } else { pr->p_authprintdir = NULL; }
724 if ( pgetflag( "sp" ) == 1 ) {
725 pr->p_flags |= P_AUTH;
726 pr->p_flags |= P_AUTH_PSSP;
729 if ((p = pgetstr("am", &a)) != NULL ) {
730 if ((uamlist = (char *)malloc(strlen(p)+1)) == NULL ) {
737 if ( pr->p_flags & P_SPOOLED ) {
741 if (( p = pgetstr( "op", &a )) == NULL ) {
742 pr->p_operator = defprinter.p_operator;
744 if (( pr->p_operator = (char *)malloc( strlen( p ) + 1 ))
749 strcpy( pr->p_operator, p );
753 /* get printer's appletalk address. */
754 if (( p = pgetstr( "pa", &a )) == NULL )
755 memcpy(&pr->p_addr, &defprinter.p_addr, sizeof(pr->p_addr));
757 atalk_aton(p, &pr->p_addr);
760 if ((p = pgetstr("co", &a)) != NULL ) {
761 pr->p_cupsoptions = strdup(p);
762 LOG (log_error, logtype_papd, "enabling cups-options for %s: %s", pr->p_name, pr->p_cupsoptions);
766 /* convert line endings for setup sections.
767 real ugly work around for foomatic deficiencies,
768 need to get rid of this */
769 if ( pgetflag("fo") == 1 ) {
770 pr->p_flags |= P_FOOMATIC_HACK;
771 LOG (log_error, logtype_papd, "enabling foomatic hack for %s", pr->p_name);
774 if (strncasecmp (pr->p_name, "cupsautoadd", 11) == 0)
777 pr = cups_autoadd_printers (pr, printers);
780 LOG (log_error, logtype_papd, "cupsautoadd: Cups support not compiled in");
781 #endif /* HAVE_CUPS */
785 if ( cups_check_printer ( pr, printers, 1) == 0)
787 pr->p_next = printers;
791 pr->p_next = printers;
793 #endif /* HAVE_CUPS */
798 } else { /* No capability file, do default */
799 printers = &defprinter;
811 if ( pr->p_flags & P_SPOOLED && !(pr->p_flags & P_CUPS_AUTOADDED) ) { /* Skip check if autoadded */
812 if ( cups_printername_ok ( pr->p_printer ) != 1) {
813 LOG(log_error, logtype_papd, "No such CUPS printer: '%s'", pr->p_printer );
819 * Check for ppd file, moved here because of cups_autoadd we cannot check at the usual location
822 if ( pr->p_ppdfile == defprinter.p_ppdfile ) {
823 if ( (p = (char *) cups_get_printer_ppd ( pr->p_printer )) != NULL ) {
824 if (( pr->p_ppdfile = (char *)malloc( strlen( p ) + 1 )) == NULL ) {
825 LOG(log_error, logtype_papd, "malloc: %m" );
828 strcpy( pr->p_ppdfile, p );
829 pr->p_flags |= P_CUPS_PPD;
830 /*LOG(log_info, logtype_papd, "PPD File for %s set to %s", pr->p_printer, pr->p_ppdfile );*/
837 char buf[ 1024 ], area[ 1024 ], *a, *p;
841 * Spool directory from printcap file.
843 if ( pr->p_flags & P_SPOOLED ) {
844 if ( pgetent( printcap, buf, pr->p_printer ) != 1 ) {
845 LOG(log_error, logtype_papd, "No such printer: %s", pr->p_printer );
852 if ( pr->p_spool != NULL && pr->p_spool != defprinter.p_spool ) {
856 if (( p = pgetstr( "sd", &a )) == NULL ) {
857 pr->p_spool = defprinter.p_spool;
859 if (( pr->p_spool = (char *)malloc( strlen( p ) + 1 )) == NULL ) {
860 LOG(log_error, logtype_papd, "malloc: %m" );
863 strcpy( pr->p_spool, p );
870 if ( pgetstr( "af", &a ) == NULL ) {
871 pr->p_flags &= ~P_ACCOUNT;
873 pr->p_flags |= P_ACCOUNT;
875 if ( pr->p_role != NULL && pr->p_role != defprinter.p_role ) {
879 if (( p = pgetstr( "ro", &a )) == NULL ) {
880 pr->p_role = defprinter.p_role;
883 (char *)malloc( strlen( p ) + 1 )) == NULL ) {
884 LOG(log_error, logtype_papd, "malloc: %m" );
887 strcpy( pr->p_role, p );
890 if (( c = pgetnum( "si" )) < 0 ) {
891 pr->p_srvid = defprinter.p_srvid;
895 #endif /* ABS_PRINT */
902 if ( pr->p_pagecost_msg != NULL &&
903 pr->p_pagecost_msg != defprinter.p_pagecost_msg ) {
904 free( pr->p_pagecost_msg );
907 if (( p = pgetstr( "pc", &a )) != NULL ) {
908 if (( pr->p_pagecost_msg =
909 (char *)malloc( strlen( p ) + 1 )) == NULL ) {
910 LOG(log_error, logtype_papd, "malloc: %m" );
913 strcpy( pr->p_pagecost_msg, p );
915 } else if ( pr->p_flags & P_ACCOUNT ) {
916 if (( c = pgetnum( "pc" )) < 0 ) {
917 pr->p_pagecost = defprinter.p_pagecost;
921 pr->p_pagecost_msg = NULL;
927 if ( pr->p_lock != NULL && pr->p_lock != defprinter.p_lock ) {
931 if (( p = pgetstr( "lo", &a )) == NULL ) {
932 pr->p_lock = defprinter.p_lock;
934 if (( pr->p_lock = (char *)malloc( strlen( p ) + 1 )) == NULL ) {
935 LOG(log_error, logtype_papd, "malloc: %m" );
938 strcpy( pr->p_lock, p );
943 * Must Kerberos authenticate?
945 if ( pgetflag( "ka" ) == 1 ) {
946 pr->p_flags |= P_KRB;
948 pr->p_flags &= ~P_KRB;
954 #endif /* HAVE_CUPS */