X-Git-Url: https://arthur.barton.de/cgi-bin/gitweb.cgi?a=blobdiff_plain;f=libatalk%2Futil%2Fnetatalk_conf.c;h=2e861a06aba2b94304dbe351fc400775c4da6a6e;hb=a7f754026326a7a5187a969f1de9ce615b49fec1;hp=9baf18f20bd2c32b4b30312b783761512ff61afa;hpb=374699dc0923d69adfbb6a5e1c9a449c999debf7;p=netatalk.git diff --git a/libatalk/util/netatalk_conf.c b/libatalk/util/netatalk_conf.c index 9baf18f2..2e861a06 100644 --- a/libatalk/util/netatalk_conf.c +++ b/libatalk/util/netatalk_conf.c @@ -30,6 +30,13 @@ #include #include #include +#include +#if HAVE_LOCALE_H +#include +#endif +#if HAVE_LANGINFO_H +#include +#endif #include #include @@ -42,53 +49,21 @@ #include #include #include - -#define VOLOPT_ALLOW 0 /* user allow list */ -#define VOLOPT_DENY 1 /* user deny list */ -#define VOLOPT_RWLIST 2 /* user rw list */ -#define VOLOPT_ROLIST 3 /* user ro list */ -#define VOLOPT_PASSWORD 4 /* volume password */ -#define VOLOPT_CASEFOLD 5 /* character case mangling */ -#define VOLOPT_FLAGS 6 /* various flags */ -#define VOLOPT_DBPATH 7 /* path to database */ -#define VOLOPT_LIMITSIZE 8 /* Limit the size of the volume */ -/* Usable slot: 9 */ -#define VOLOPT_VETO 10 /* list of veto filespec */ -#define VOLOPT_PREEXEC 11 /* preexec command */ -#define VOLOPT_ROOTPREEXEC 12 /* root preexec command */ -#define VOLOPT_POSTEXEC 13 /* postexec command */ -#define VOLOPT_ROOTPOSTEXEC 14 /* root postexec command */ -#define VOLOPT_ENCODING 15 /* mac encoding (pre OSX)*/ -#define VOLOPT_MACCHARSET 16 -#define VOLOPT_CNIDSCHEME 17 -#define VOLOPT_ADOUBLE 18 /* adouble version */ -/* Usable slot: 19/20 */ -#define VOLOPT_UMASK 21 -#define VOLOPT_ALLOWED_HOSTS 22 -#define VOLOPT_DENIED_HOSTS 23 -#define VOLOPT_DPERM 24 /* dperm default directories perms */ -#define VOLOPT_FPERM 25 /* fperm default files perms */ -#define VOLOPT_DFLTPERM 26 /* perm */ -#define VOLOPT_EA_VFS 27 /* Extended Attributes vfs indirection */ -#define VOLOPT_CNIDSERVER 28 /* CNID Server ip address*/ -#define VOLOPT_CNIDPORT 30 /* CNID server tcp port */ - -#define VOLOPT_MAX 31 /* <== IMPORTANT !!!!!! */ -#define VOLOPT_NUM (VOLOPT_MAX + 1) +#include +#include #define VOLPASSLEN 8 +#ifndef UUID_PRINTABLE_STRING_LENGTH +#define UUID_PRINTABLE_STRING_LENGTH 37 +#endif #define IS_VAR(a, b) (strncmp((a), (b), 2) == 0) -struct vol_option { - char *c_value; - int i_value; -}; - /************************************************************** * Locals **************************************************************/ +static int have_uservol = 0; /* whether there's generic user home share in config ("~" or "~/path", but not "~user") */ static struct vol *Volumes = NULL; static uint16_t lastvid = 0; @@ -169,7 +144,7 @@ static char *get_vol_uuid(const AFPObj *obj, const char *volname) if(ftell(fp) == 0) { /* size = 0 */ fprintf(fp, "# DON'T TOUCH NOR COPY THOUGHTLESSLY!\n"); fprintf(fp, "# This file is auto-generated by afpd\n"); - fprintf(fp, "# and stores UUIDs for TM volumes.\n\n"); + fprintf(fp, "# and stores UUIDs for Time Machine volumes.\n\n"); } else { fseek(fp, -1L, SEEK_END); if(fgetc(fp) != '\n') fputc('\n', fp); /* last char is \n? */ @@ -195,26 +170,28 @@ static char *get_vol_uuid(const AFPObj *obj, const char *volname) As we can't check (requires write access) on ro-volumes, we switch ea:auto volumes that are options:ro to ea:none. */ +#define EABUFSZ 4 static int do_check_ea_support(const struct vol *vol) { int haseas; - char eaname[] = {"org.netatalk.supports-eas.XXXXXX"}; + const char *eaname = "org.netatalk.has-Extended-Attributes"; const char *eacontent = "yes"; + char buf[EABUFSZ]; - if ((vol->v_flags & AFPVOL_RO) == AFPVOL_RO) { - LOG(log_note, logtype_afpd, "read-only volume '%s', can't test for EA support, assuming yes", vol->v_localname); + if (sys_lgetxattr(vol->v_path, eaname, buf, EABUFSZ) != -1) return 1; - } - mktemp(eaname); + if (vol->v_flags & AFPVOL_RO) { + LOG(log_debug, logtype_afpd, "read-only volume '%s', can't test for EA support, assuming yes", vol->v_localname); + return 1; + } become_root(); - if ((sys_setxattr(vol->v_path, eaname, eacontent, 4, 0)) == 0) { - sys_removexattr(vol->v_path, eaname); + if ((sys_setxattr(vol->v_path, eaname, eacontent, strlen(eacontent) + 1, 0)) == 0) { haseas = 1; } else { - LOG(log_warning, logtype_afpd, "volume \"%s\" does not support Extended Attributes", + LOG(log_warning, logtype_afpd, "volume \"%s\" does not support Extended Attributes or read-only volume", vol->v_localname); haseas = 0; } @@ -227,25 +204,14 @@ static int do_check_ea_support(const struct vol *vol) static void check_ea_support(struct vol *vol) { int haseas; - char eaname[] = {"org.netatalk.supports-eas.XXXXXX"}; - const char *eacontent = "yes"; haseas = do_check_ea_support(vol); if (vol->v_vfs_ea == AFPVOL_EA_AUTO) { - if ((vol->v_flags & AFPVOL_RO) == AFPVOL_RO) { - LOG(log_info, logtype_afpd, "read-only volume '%s', can't test for EA support, disabling EAs", vol->v_localname); - vol->v_vfs_ea = AFPVOL_EA_NONE; - return; - } - - if (haseas) { + if (haseas) vol->v_vfs_ea = AFPVOL_EA_SYS; - } else { - LOG(log_warning, logtype_afpd, "volume \"%s\" does not support Extended Attributes, using ea:ad instead", - vol->v_localname); - vol->v_vfs_ea = AFPVOL_EA_AD; - } + else + vol->v_vfs_ea = AFPVOL_EA_NONE; } if (vol->v_adouble == AD_VERSION_EA) { @@ -290,23 +256,6 @@ static int check_vol_acl_support(const struct vol *vol) return ret; } -static void volfree(struct vol_option *options, const struct vol_option *save) -{ - int i; - - if (save) { - for (i = 0; i < VOLOPT_MAX; i++) { - if (options[i].c_value && (options[i].c_value != save[i].c_value)) - free(options[i].c_value); - } - } else { - for (i = 0; i < VOLOPT_MAX; i++) { - if (options[i].c_value) - free(options[i].c_value); - } - } -} - /* * Handle variable substitutions. here's what we understand: * $b -> basename of path @@ -334,10 +283,10 @@ static void volfree(struct vol_option *options, const struct vol_option *save) static char *volxlate(const AFPObj *obj, char *dest, size_t destlen, - char *src, + const char *src, const struct passwd *pwd, - char *path, - char *volname) + const char *path, + const char *volname) { char *p, *r; const char *q; @@ -374,8 +323,6 @@ static char *volxlate(const AFPObj *obj, /* now figure out what the variable is */ q = NULL; if (IS_VAR(p, "$b")) { - if (!obj->uid && xlatevolname) - return NULL; if (path) { if ((q = strrchr(path, '/')) == NULL) q = path; @@ -383,50 +330,38 @@ static char *volxlate(const AFPObj *obj, q++; } } else if (IS_VAR(p, "$c")) { - if (!obj->uid && xlatevolname) - return NULL; - DSI *dsi = obj->dsi; - len = sprintf(dest, "%s:%u", - getip_string((struct sockaddr *)&dsi->client), - getip_port((struct sockaddr *)&dsi->client)); - dest += len; - destlen -= len; + if (IS_AFP_SESSION(obj)) { + DSI *dsi = obj->dsi; + len = sprintf(dest, "%s:%u", + getip_string((struct sockaddr *)&dsi->client), + getip_port((struct sockaddr *)&dsi->client)); + dest += len; + destlen -= len; + } } else if (IS_VAR(p, "$d")) { - if (!obj->uid && xlatevolname) - return NULL; q = path; } else if (pwd && IS_VAR(p, "$f")) { - if (!obj->uid && xlatevolname) - return NULL; if ((r = strchr(pwd->pw_gecos, ','))) *r = '\0'; q = pwd->pw_gecos; } else if (pwd && IS_VAR(p, "$g")) { - if (!obj->uid && xlatevolname) - return NULL; struct group *grp = getgrgid(pwd->pw_gid); if (grp) q = grp->gr_name; } else if (IS_VAR(p, "$h")) { q = obj->options.hostname; } else if (IS_VAR(p, "$i")) { - if (!obj->uid && xlatevolname) - return NULL; DSI *dsi = obj->dsi; q = getip_string((struct sockaddr *)&dsi->client); } else if (IS_VAR(p, "$s")) { q = obj->options.hostname; - } else if (obj->username && IS_VAR(p, "$u")) { - if (!obj->uid && xlatevolname) - return NULL; + } else if (obj->username[0] && IS_VAR(p, "$u")) { char* sep = NULL; if ( obj->options.ntseparator && (sep = strchr(obj->username, obj->options.ntseparator[0])) != NULL) q = sep+1; else q = obj->username; } else if (IS_VAR(p, "$v")) { - if (!obj->uid && xlatevolname) - return NULL; if (volname) { q = volname; } @@ -463,197 +398,438 @@ static char *volxlate(const AFPObj *obj, return ret; } -/* -------------------- */ -static void setoption(struct vol_option *options, const struct vol_option *save, int opt, const char *val) +/*! + * check access list + * + * this function wants something of the following form: + * "@group,name,name2,@group2,name3" or "@group name name2 @group2 name3" + * A NULL argument allows everybody to have access. + * We return three things: + * -1: no list + * 0: list exists, but name isn't in it + * 1: in list + */ +static int accessvol(const AFPObj *obj, const char *args, const char *name) { - if (options[opt].c_value && (!save || options[opt].c_value != save[opt].c_value)) - free(options[opt].c_value); - options[opt].c_value = strdup(val); -} + char buf[MAXPATHLEN + 1], *p; + struct group *gr; -/* Parse iniconfig and initalize volume options */ -static void volset(const dictionary *conf, const char *vol, struct vol_option *options, const struct vol_option *save) -{ - const char *val; - char *p, *q; + if (!args) + return -1; - if (val = iniparser_getstring(conf, vol, "allow", NULL)) - setoption(options, save, VOLOPT_ALLOW, val); + strlcpy(buf, args, sizeof(buf)); + if ((p = strtok(buf, ", ")) == NULL) /* nothing, return okay */ + return -1; - if (val = iniparser_getstring(conf, vol, "deny", NULL)) - setoption(options, save, VOLOPT_DENY, val); + while (p) { + if (*p == '@') { /* it's a group */ + if ((gr = getgrnam(p + 1)) && gmem(gr->gr_gid, obj->ngroups, obj->groups)) + return 1; + } else if (strcasecmp(p, name) == 0) /* it's a user name */ + return 1; + p = strtok(NULL, ", "); + } - if (val = iniparser_getstring(conf, vol, "rwlist", NULL)) - setoption(options, save, VOLOPT_RWLIST, val); + return 0; +} - if (val = iniparser_getstring(conf, vol, "rolist", NULL)) - setoption(options, save, VOLOPT_ROLIST, val); +static int hostaccessvol(const AFPObj *obj, const char *volname, const char *args) +{ + int mask_int; + char buf[MAXPATHLEN + 1], *p, *b; + struct sockaddr_storage client; + const DSI *dsi = obj->dsi; - if (val = iniparser_getstring(conf, vol, "volcharset", NULL)) - setoption(options, save, VOLOPT_ENCODING, val); + if (!args || !dsi) + return -1; - if (val = iniparser_getstring(conf, vol, "maccharset", NULL)) - setoption(options, save, VOLOPT_MACCHARSET, val); + strlcpy(buf, args, sizeof(buf)); + if ((p = strtok_r(buf, ", ", &b)) == NULL) /* nothing, return okay */ + return -1; - if (val = iniparser_getstring(conf, vol, "veto", NULL)) - setoption(options, save, VOLOPT_VETO, val); + while (p) { + int ret; + char *ipaddr, *mask_char; + struct addrinfo hints, *ai; - if (val = iniparser_getstring(conf, vol, "cnidscheme", NULL)) - setoption(options, save, VOLOPT_CNIDSCHEME, val); + ipaddr = strtok(p, "/"); + mask_char = strtok(NULL,"/"); - if (val = iniparser_getstring(conf, vol, "dbpath", NULL)) - setoption(options, save, VOLOPT_DBPATH, val); + /* Get address from string with getaddrinfo */ + memset(&hints, 0, sizeof hints); + hints.ai_family = AF_UNSPEC; + hints.ai_socktype = SOCK_STREAM; + if ((ret = getaddrinfo(ipaddr, NULL, &hints, &ai)) != 0) { + LOG(log_error, logtype_afpd, "hostaccessvol: getaddrinfo: %s\n", gai_strerror(ret)); + continue; + } - if (val = iniparser_getstring(conf, vol, "password", NULL)) - setoption(options, save, VOLOPT_PASSWORD, val); + /* netmask */ + if (mask_char != NULL) + mask_int = atoi(mask_char); /* apply_ip_mask does range checking on it */ + else { + if (ai->ai_family == AF_INET) /* IPv4 */ + mask_int = 32; + else /* IPv6 */ + mask_int = 128; + } - if (val = iniparser_getstring(conf, vol, "root_preexec", NULL)) - setoption(options, save, VOLOPT_ROOTPREEXEC, val); + /* Apply mask to addresses */ + client = dsi->client; + apply_ip_mask((struct sockaddr *)&client, mask_int); + apply_ip_mask(ai->ai_addr, mask_int); - if (val = iniparser_getstring(conf, vol, "preexec", NULL)) - setoption(options, save, VOLOPT_PREEXEC, val); + if (compare_ip((struct sockaddr *)&client, ai->ai_addr) == 0) { + freeaddrinfo(ai); + return 1; + } - if (val = iniparser_getstring(conf, vol, "root_postexec", NULL)) - setoption(options, save, VOLOPT_ROOTPOSTEXEC, val); + /* next address */ + freeaddrinfo(ai); + p = strtok_r(NULL, ", ", &b); + } - if (val = iniparser_getstring(conf, vol, "postexec", NULL)) - setoption(options, save, VOLOPT_POSTEXEC, val); + return 0; +} - if (val = iniparser_getstring(conf, vol, "allowed_hosts", NULL)) - setoption(options, save, VOLOPT_ALLOWED_HOSTS, val); +/*! + * Get option string from config, use default value if not set + * + * @param conf (r) config handle + * @param vol (r) volume name (must be section name ie wo vars expanded) + * @param opt (r) option + * @param defsec (r) if "option" is not found in "vol", try to find it in section "defsec" + * @param defval (r) if neither "vol" nor "defsec" contain "opt" return "defval" + * + * @returns const option string from "vol" or "defsec", or "defval" if not found + */ +static const char *getoption(const dictionary *conf, const char *vol, const char *opt, const char *defsec, const char *defval) +{ + EC_INIT; + const char *result; - if (val = iniparser_getstring(conf, vol, "denied_hosts", NULL)) - setoption(options, save, VOLOPT_DENIED_HOSTS, val); + if ((!(result = iniparser_getstring(conf, vol, opt, NULL))) && (defsec != NULL)) + result = iniparser_getstring(conf, defsec, opt, NULL); + +EC_CLEANUP: + if (result == NULL) + result = defval; + return result; +} - if (val = iniparser_getstring(conf, vol, "umask", NULL)) - options[VOLOPT_UMASK].i_value = (int)strtol(val, NULL, 8); +/*! + * Get boolean option from config, use default value if not set + * + * @param conf (r) config handle + * @param vol (r) volume name (must be section name ie wo vars expanded) + * @param opt (r) option + * @param defsec (r) if "option" is not found in "vol", try to find it in section "defsec" + * @param defval (r) if neither "vol" nor "defsec" contain "opt" return "defval" + * + * @returns const option string from "vol" or "defsec", or "defval" if not found + */ +static int getoption_bool(const dictionary *conf, const char *vol, const char *opt, const char *defsec, int defval) +{ + EC_INIT; + int result; - if (val = iniparser_getstring(conf, vol, "dperm", NULL)) - options[VOLOPT_DPERM].i_value = (int)strtol(val, NULL, 8); + if (((result = iniparser_getboolean(conf, vol, opt, -1)) == -1) && (defsec != NULL)) + result = iniparser_getboolean(conf, defsec, opt, -1); + +EC_CLEANUP: + if (result == -1) + result = defval; + return result; +} - if (val = iniparser_getstring(conf, vol, "fperm", NULL)) - options[VOLOPT_FPERM].i_value = (int)strtol(val, NULL, 8); +/*! + * Create volume struct + * + * @param obj (r) handle + * @param pwd (r) struct passwd of logged in user, may be NULL in master afpd + * @param section (r) volume name wo variables expanded (exactly as in iniconfig) + * @param name (r) volume name + * @param path_in (r) volume path + * @param preset (r) default preset, may be NULL + * @returns vol on success, NULL on error + */ +static struct vol *creatvol(AFPObj *obj, + const struct passwd *pwd, + const char *section, + const char *name, + const char *path_in, + const char *preset) +{ + EC_INIT; + struct vol *volume = NULL; + size_t current_pathlen, another_pathlen; + int i, suffixlen, vlen, tmpvlen, u8mvlen, macvlen; + char *tmpname; + char path[MAXPATHLEN + 1]; + ucs2_t u8mtmpname[(AFPVOL_U8MNAMELEN+1)*2], mactmpname[(AFPVOL_MACNAMELEN+1)*2]; + char suffix[6]; /* max is #FFFF */ + uint16_t flags; + const char *val; + char *p, *q; - if (val = iniparser_getstring(conf, vol, "perm", NULL)) - options[VOLOPT_DFLTPERM].i_value = (int)strtol(val, NULL, 8); + strlcpy(path, path_in, MAXPATHLEN); - if (val = iniparser_getstring(conf, vol, "volsizelimit", NULL)) - options[VOLOPT_LIMITSIZE].i_value = (uint32_t)strtoul(val, NULL, 10); + LOG(log_debug, logtype_afpd, "createvol(volume: '%s', path: \"%s\", preset: '%s'): BEGIN", + name, path, preset ? preset : "-"); - if (val = iniparser_getstring(conf, vol, "casefold", NULL)) { - if (strcasecmp(val, "tolower") == 0) - options[VOLOPT_CASEFOLD].i_value = AFPVOL_UMLOWER; - else if (strcasecmp(val, "toupper") == 0) - options[VOLOPT_CASEFOLD].i_value = AFPVOL_UMUPPER; - else if (strcasecmp(val, "xlatelower") == 0) - options[VOLOPT_CASEFOLD].i_value = AFPVOL_UUPPERMLOWER; - else if (strcasecmp(val, "xlateupper") == 0) - options[VOLOPT_CASEFOLD].i_value = AFPVOL_ULOWERMUPPER; + if ( name == NULL || *name == '\0' ) { + if ((name = strrchr( path, '/' )) == NULL) + EC_FAIL; + /* if you wish to share /, you need to specify a name. */ + if (*++name == '\0') + EC_FAIL; } - if (val = iniparser_getstring(conf, vol, "adouble", NULL)) { - if (strcasecmp(val, "v2") == 0) - options[VOLOPT_ADOUBLE].i_value = AD_VERSION2; - else if (strcasecmp(val, "ea") == 0) - options[VOLOPT_ADOUBLE].i_value = AD_VERSION_EA; + /* Once volumes are loaded, we never change options again, we just delete em when they're removed from afp.conf */ + + /* + * Check for duplicated or nested volumes, eg: + * /Volumes/name /Volumes/name [duplicate], and + * /Volumes/name /Volumes/name/dir [nested], but beware of simple strncmp test: + * /Volumes/name /Volumes/name1 [strncmp match if n=strlen("Volumes/name") -> false positive] + */ + current_pathlen = strlen(path); + for (struct vol *vol = Volumes; vol; vol = vol->v_next) { + another_pathlen = strlen(vol->v_path); + if (strncmp(path, vol->v_path, MIN(current_pathlen, another_pathlen)) == 0) { + if (current_pathlen == another_pathlen) { + LOG(log_error, logtype_afpd, "volume \"%s\" paths is duplicated: \"%s\"", name, path); + vol->v_deleted = 0; + volume = vol; + goto EC_CLEANUP; + } else { + const char *shorter_path, *longer_path; + int shorter_len; + if (another_pathlen > current_pathlen) { + shorter_len = current_pathlen; + shorter_path = path; + longer_path = vol->v_path; + } else { + shorter_len = another_pathlen; + shorter_path = vol->v_path; + longer_path = path; + } + if (longer_path[shorter_len] == '/') + LOG(log_info, logtype_afpd, "volume \"%s\" paths are nested: \"%s\" and \"%s\"", name, path, vol->v_path); + } + } } - if (val = iniparser_getstring(conf, vol, "ea", NULL)) { - if (strcasecmp(val, "ad") == 0) - options[VOLOPT_EA_VFS].i_value = AFPVOL_EA_AD; - else if (strcasecmp(val, "sys") == 0) - options[VOLOPT_EA_VFS].i_value = AFPVOL_EA_SYS; - else if (strcasecmp(val, "none") == 0) - options[VOLOPT_EA_VFS].i_value = AFPVOL_EA_NONE; + /* + * Check allow/deny lists: + * allow -> either no list (-1), or in list (1) + * deny -> either no list (-1), or not in list (0) + */ + if (pwd) { + if (accessvol(obj, getoption(obj->iniconfig, section, "invalid users", preset, NULL), pwd->pw_name) == 1) + goto EC_CLEANUP; + if (accessvol(obj, getoption(obj->iniconfig, section, "valid users", preset, NULL), pwd->pw_name) == 0) + goto EC_CLEANUP; + if (hostaccessvol(obj, section, getoption(obj->iniconfig, section, "hosts deny", preset, NULL)) == 1) + goto EC_CLEANUP; + if (hostaccessvol(obj, section, getoption(obj->iniconfig, section, "hosts allow", preset, NULL)) == 0) + goto EC_CLEANUP; } - if (p = iniparser_getstrdup(conf, vol, "cnidserver", NULL)) { - if (q = strrchr(val, ':')) { - *q = 0; - setoption(options, save, VOLOPT_CNIDPORT, q + 1); + EC_NULL( volume = calloc(1, sizeof(struct vol)) ); + + EC_NULL( volume->v_configname = strdup(section)); + + volume->v_vfs_ea = AFPVOL_EA_AUTO; + volume->v_umask = obj->options.umask; + + if (val = getoption(obj->iniconfig, section, "password", preset, NULL)) + EC_NULL( volume->v_password = strdup(val) ); + + if (val = getoption(obj->iniconfig, section, "veto files", preset, NULL)) + EC_NULL( volume->v_veto = strdup(val) ); + + /* vol charset is in [G] and [V] */ + if (val = getoption(obj->iniconfig, section, "vol charset", preset, NULL)) { + if (strcasecmp(val, "UTF-8") == 0) { + val = strdup("UTF8"); } - setoption(options, save, VOLOPT_CNIDSERVER, p); - LOG(log_debug, logtype_afpd, "CNID Server for volume '%s': %s:%s", - vol, p, q ? q + 1 : "4700"); - free(p); - } - - if (q = iniparser_getstrdup(conf, vol, "options", NULL)) { - if (p = strtok(q, ", ")) { - while (p) { - if (strcasecmp(p, "ro") == 0) - options[VOLOPT_FLAGS].i_value |= AFPVOL_RO; - else if (strcasecmp(p, "nohex") == 0) - options[VOLOPT_FLAGS].i_value |= AFPVOL_NOHEX; - else if (strcasecmp(p, "nousedots") == 0) - options[VOLOPT_FLAGS].i_value &= ~AFPVOL_USEDOTS; - else if (strcasecmp(p, "invisibledots") == 0) - options[VOLOPT_FLAGS].i_value |= AFPVOL_USEDOTS; - else if (strcasecmp(p, "nostat") == 0) - options[VOLOPT_FLAGS].i_value |= AFPVOL_NOSTAT; - else if (strcasecmp(p, "preexec_close") == 0) - options[VOLOPT_PREEXEC].i_value = 1; - else if (strcasecmp(p, "root_preexec_close") == 0) - options[VOLOPT_ROOTPREEXEC].i_value = 1; - else if (strcasecmp(p, "noupriv") == 0) - options[VOLOPT_FLAGS].i_value &= ~AFPVOL_UNIX_PRIV; - else if (strcasecmp(p, "nodev") == 0) - options[VOLOPT_FLAGS].i_value |= AFPVOL_NODEV; - else if (strcasecmp(p, "caseinsensitive") == 0) - options[VOLOPT_FLAGS].i_value |= AFPVOL_CASEINSEN; - else if (strcasecmp(p, "illegalseq") == 0) - options[VOLOPT_FLAGS].i_value |= AFPVOL_EILSEQ; - else if (strcasecmp(p, "tm") == 0) - options[VOLOPT_FLAGS].i_value |= AFPVOL_TM; - else if (strcasecmp(p, "searchdb") == 0) - options[VOLOPT_FLAGS].i_value |= AFPVOL_SEARCHDB; - else if (strcasecmp(p, "nonetids") == 0) - options[VOLOPT_FLAGS].i_value |= AFPVOL_NONETIDS; - else if (strcasecmp(p, "noacls") == 0) - options[VOLOPT_FLAGS].i_value &= ~AFPVOL_ACLS; - else if (strcasecmp(p, "nov2toeaconv") == 0) - options[VOLOPT_FLAGS].i_value |= AFPVOL_NOV2TOEACONV; - p = strtok(NULL, ", "); - } + EC_NULL( volume->v_volcodepage = strdup(val) ); + } + else + EC_NULL( volume->v_volcodepage = strdup(obj->options.volcodepage) ); + + /* mac charset is in [G] and [V] */ + if (val = getoption(obj->iniconfig, section, "mac charset", preset, NULL)) { + if (strncasecmp(val, "MAC", 3) != 0) { + LOG(log_warning, logtype_afpd, "Is '%s' really mac charset? ", val); } - free(q); + EC_NULL( volume->v_maccodepage = strdup(val) ); } -} + else + EC_NULL( volume->v_maccodepage = strdup(obj->options.maccodepage) ); -/* ------------------------------- */ -static int creatvol(const AFPObj *obj, const struct passwd *pwd, - char *path, char *name, - struct vol_option *options) -{ - struct vol *volume; - int suffixlen, vlen, tmpvlen, u8mvlen, macvlen; - int hide = 0; - char tmpname[AFPVOL_U8MNAMELEN+1]; - ucs2_t u8mtmpname[(AFPVOL_U8MNAMELEN+1)*2], mactmpname[(AFPVOL_MACNAMELEN+1)*2]; - char suffix[6]; /* max is #FFFF */ - uint16_t flags; + vlen = strlen(name); + tmpname = strdup(name); + for(i = 0; i < vlen; i++) + if(tmpname[i] == '/') tmpname[i] = ':'; - LOG(log_debug, logtype_afpd, "createvol: Volume '%s'", name); + bstring dbpath; + EC_NULL_LOG( val = iniparser_getstring(obj->iniconfig, INISEC_GLOBAL, "vol dbpath", _PATH_STATEDIR "CNID/") ); + EC_NULL_LOG( dbpath = bformat("%s/%s/", val, tmpname) ); + EC_NULL_LOG( volume->v_dbpath = strdup(bdata(dbpath)) ); + bdestroy(dbpath); - if ( name == NULL || *name == '\0' ) { - if ((name = strrchr( path, '/' )) == NULL) { - return -1; /* Obviously not a fully qualified path */ + if (val = getoption(obj->iniconfig, section, "cnid scheme", preset, NULL)) + EC_NULL( volume->v_cnidscheme = strdup(val) ); + else + volume->v_cnidscheme = strdup(DEFAULT_CNID_SCHEME); + + if (val = getoption(obj->iniconfig, section, "umask", preset, NULL)) + volume->v_umask = (int)strtol(val, NULL, 8); + + if (val = getoption(obj->iniconfig, section, "directory perm", preset, NULL)) + volume->v_dperm = (int)strtol(val, NULL, 8); + + if (val = getoption(obj->iniconfig, section, "file perm", preset, NULL)) + volume->v_fperm = (int)strtol(val, NULL, 8); + + if (val = getoption(obj->iniconfig, section, "vol size limit", preset, NULL)) + volume->v_limitsize = (uint32_t)strtoul(val, NULL, 10); + + if (val = getoption(obj->iniconfig, section, "preexec", preset, NULL)) + EC_NULL( volume->v_preexec = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) ); + + if (val = getoption(obj->iniconfig, section, "postexec", preset, NULL)) + EC_NULL( volume->v_postexec = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) ); + + if (val = getoption(obj->iniconfig, section, "root preexec", preset, NULL)) + EC_NULL( volume->v_root_preexec = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) ); + + if (val = getoption(obj->iniconfig, section, "root postexec", preset, NULL)) + EC_NULL( volume->v_root_postexec = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) ); + + if (val = getoption(obj->iniconfig, section, "appledouble", preset, NULL)) { + if (strcmp(val, "v2") == 0) + volume->v_adouble = AD_VERSION2; + else if (strcmp(val, "ea") == 0) + volume->v_adouble = AD_VERSION_EA; + } else { + volume->v_adouble = AD_VERSION; + } + + if (val = getoption(obj->iniconfig, section, "cnid server", preset, NULL)) { + EC_NULL( p = strdup(val) ); + volume->v_cnidserver = p; + if (q = strrchr(val, ':')) { + *q++ = 0; + volume->v_cnidport = strdup(q); + } else { + volume->v_cnidport = strdup("4700"); } - /* if you wish to share /, you need to specify a name. */ - if (*++name == '\0') - return -1; + } else { + volume->v_cnidserver = strdup(obj->options.Cnid_srv); + volume->v_cnidport = strdup(obj->options.Cnid_port); + } + + if (val = getoption(obj->iniconfig, section, "ea", preset, NULL)) { + if (strcasecmp(val, "ad") == 0) + volume->v_vfs_ea = AFPVOL_EA_AD; + else if (strcasecmp(val, "sys") == 0) + volume->v_vfs_ea = AFPVOL_EA_SYS; + else if (strcasecmp(val, "none") == 0) + volume->v_vfs_ea = AFPVOL_EA_NONE; + } + + if (val = getoption(obj->iniconfig, section, "casefold", preset, NULL)) { + if (strcasecmp(val, "tolower") == 0) + volume->v_casefold = AFPVOL_UMLOWER; + else if (strcasecmp(val, "toupper") == 0) + volume->v_casefold = AFPVOL_UMUPPER; + else if (strcasecmp(val, "xlatelower") == 0) + volume->v_casefold = AFPVOL_UUPPERMLOWER; + else if (strcasecmp(val, "xlateupper") == 0) + volume->v_casefold = AFPVOL_ULOWERMUPPER; + } + + if (getoption_bool(obj->iniconfig, section, "read only", preset, 0)) + volume->v_flags |= AFPVOL_RO; + if (getoption_bool(obj->iniconfig, section, "invisible dots", preset, 0)) + volume->v_flags |= AFPVOL_INV_DOTS; + if (!getoption_bool(obj->iniconfig, section, "stat vol", preset, 1)) + volume->v_flags |= AFPVOL_NOSTAT; + if (getoption_bool(obj->iniconfig, section, "unix priv", preset, 1)) + volume->v_flags |= AFPVOL_UNIX_PRIV; + if (!getoption_bool(obj->iniconfig, section, "cnid dev", preset, 1)) + volume->v_flags |= AFPVOL_NODEV; + if (getoption_bool(obj->iniconfig, section, "illegal seq", preset, 0)) + volume->v_flags |= AFPVOL_EILSEQ; + if (getoption_bool(obj->iniconfig, section, "time machine", preset, 0)) + volume->v_flags |= AFPVOL_TM; + if (getoption_bool(obj->iniconfig, section, "search db", preset, 0)) + volume->v_flags |= AFPVOL_SEARCHDB; + if (!getoption_bool(obj->iniconfig, section, "network ids", preset, 1)) + volume->v_flags |= AFPVOL_NONETIDS; +#ifdef HAVE_ACLS + if (getoption_bool(obj->iniconfig, section, "acls", preset, 1)) + volume->v_flags |= AFPVOL_ACLS; +#endif + if (!getoption_bool(obj->iniconfig, section, "convert appledouble", preset, 1)) + volume->v_flags |= AFPVOL_NOV2TOEACONV; + + if (getoption_bool(obj->iniconfig, section, "preexec close", preset, 0)) + volume->v_preexec_close = 1; + if (getoption_bool(obj->iniconfig, section, "root preexec close", preset, 0)) + volume->v_root_preexec_close = 1; + + /* + * Handle read-only behaviour. semantics: + * 1) neither the rolist nor the rwlist exist -> rw + * 2) rolist exists -> ro if user is in it. + * 3) rwlist exists -> ro unless user is in it. + * 4) cnid scheme = last -> ro forcibly. + */ + if (pwd) { + if (accessvol(obj, getoption(obj->iniconfig, section, "rolist", preset, NULL), pwd->pw_name) == 1 + || accessvol(obj, getoption(obj->iniconfig, section, "rwlist", preset, NULL), pwd->pw_name) == 0) + volume->v_flags |= AFPVOL_RO; } + if (0 == strcmp(volume->v_cnidscheme, "last")) + volume->v_flags |= AFPVOL_RO; + + if ((volume->v_flags & AFPVOL_NODEV)) + volume->v_ad_options |= ADVOL_NODEV; + if ((volume->v_flags & AFPVOL_UNIX_PRIV)) + volume->v_ad_options |= ADVOL_UNIXPRIV; + if ((volume->v_flags & AFPVOL_INV_DOTS)) + volume->v_ad_options |= ADVOL_INVDOTS; + + /* Mac to Unix conversion flags*/ + if ((volume->v_flags & AFPVOL_EILSEQ)) + volume->v_mtou_flags |= CONV__EILSEQ; + + if ((volume->v_casefold & AFPVOL_MTOUUPPER)) + volume->v_mtou_flags |= CONV_TOUPPER; + else if ((volume->v_casefold & AFPVOL_MTOULOWER)) + volume->v_mtou_flags |= CONV_TOLOWER; + + /* Unix to Mac conversion flags*/ + volume->v_utom_flags = CONV_IGNORE; + if ((volume->v_casefold & AFPVOL_UTOMUPPER)) + volume->v_utom_flags |= CONV_TOUPPER; + else if ((volume->v_casefold & AFPVOL_UTOMLOWER)) + volume->v_utom_flags |= CONV_TOLOWER; + if ((volume->v_flags & AFPVOL_EILSEQ)) + volume->v_utom_flags |= CONV__EILSEQ; /* suffix for mangling use (lastvid + 1) */ /* because v_vid has not been decided yet. */ suffixlen = sprintf(suffix, "#%X", lastvid + 1 ); - vlen = strlen( name ); - /* Unicode Volume Name */ /* Firstly convert name from unixcharset to UTF8-MAC */ - flags = CONV_IGNORE; + flags = CONV_IGNORE | CONV_ALLOW_SLASH; tmpvlen = convert_charset(obj->options.unixcharset, CH_UTF8_MAC, 0, name, vlen, tmpname, AFPVOL_U8MNAMELEN, &flags); if (tmpvlen <= 0) { strcpy(tmpname, "???"); @@ -663,7 +839,7 @@ static int creatvol(const AFPObj *obj, const struct passwd *pwd, /* Do we have to mangle ? */ if ( (flags & CONV_REQMANGLE) || (tmpvlen > obj->options.volnamelen)) { if (tmpvlen + suffixlen > obj->options.volnamelen) { - flags = CONV_FORCE; + flags = CONV_FORCE | CONV_ALLOW_SLASH; tmpvlen = convert_charset(obj->options.unixcharset, CH_UTF8_MAC, 0, name, vlen, tmpname, obj->options.volnamelen - suffixlen, &flags); tmpname[tmpvlen >= 0 ? tmpvlen : 0] = 0; } @@ -673,13 +849,13 @@ static int creatvol(const AFPObj *obj, const struct passwd *pwd, /* Secondly convert name from UTF8-MAC to UCS2 */ if ( 0 >= ( u8mvlen = convert_string(CH_UTF8_MAC, CH_UCS2, tmpname, tmpvlen, u8mtmpname, AFPVOL_U8MNAMELEN*2)) ) - return -1; + EC_FAIL; LOG(log_maxdebug, logtype_afpd, "createvol: Volume '%s' -> UTF8-MAC Name: '%s'", name, tmpname); /* Maccharset Volume Name */ /* Firsty convert name from unixcharset to maccharset */ - flags = CONV_IGNORE; + flags = CONV_IGNORE | CONV_ALLOW_SLASH; tmpvlen = convert_charset(obj->options.unixcharset, obj->options.maccharset, 0, name, vlen, tmpname, AFPVOL_U8MNAMELEN, &flags); if (tmpvlen <= 0) { strcpy(tmpname, "???"); @@ -689,7 +865,7 @@ static int creatvol(const AFPObj *obj, const struct passwd *pwd, /* Do we have to mangle ? */ if ( (flags & CONV_REQMANGLE) || (tmpvlen > AFPVOL_MACNAMELEN)) { if (tmpvlen + suffixlen > AFPVOL_MACNAMELEN) { - flags = CONV_FORCE; + flags = CONV_FORCE | CONV_ALLOW_SLASH; tmpvlen = convert_charset(obj->options.unixcharset, obj->options.maccharset, 0, @@ -711,181 +887,39 @@ static int creatvol(const AFPObj *obj, const struct passwd *pwd, tmpvlen, mactmpname, AFPVOL_U8MNAMELEN*2)) ) - return -1; + EC_FAIL; LOG(log_maxdebug, logtype_afpd, "createvol: Volume '%s' -> Longname: '%s'", name, tmpname); - /* check duplicate */ - for ( volume = Volumes; volume; volume = volume->v_next ) { - if ((utf8_encoding() && (strcasecmp_w(volume->v_u8mname, u8mtmpname) == 0)) - || - (!utf8_encoding() && (strcasecmp_w(volume->v_macname, mactmpname) == 0))) { - LOG (log_error, logtype_afpd, - "Duplicate volume name, check AppleVolumes files: previous: \"%s\", new: \"%s\"", - volume->v_localname, name); - if (volume->v_deleted) { - volume->v_new = hide = 1; - } - else { - return -1; /* Won't be able to access it, anyway... */ - } - } - } - - if (!( volume = (struct vol *)calloc(1, sizeof( struct vol ))) ) { - LOG(log_error, logtype_afpd, "creatvol: malloc: %s", strerror(errno) ); - return -1; - } - if ( NULL == ( volume->v_localname = strdup(name))) { - LOG(log_error, logtype_afpd, "creatvol: malloc: %s", strerror(errno) ); - free(volume); - return -1; - } - - if ( NULL == ( volume->v_u8mname = strdup_w(u8mtmpname))) { - LOG(log_error, logtype_afpd, "creatvol: malloc: %s", strerror(errno) ); - volume_free(volume); - free(volume); - return -1; - } - if ( NULL == ( volume->v_macname = strdup_w(mactmpname))) { - LOG(log_error, logtype_afpd, "creatvol: malloc: %s", strerror(errno) ); - volume_free(volume); - free(volume); - return -1; - } - if (!( volume->v_path = (char *)malloc( strlen( path ) + 1 )) ) { - LOG(log_error, logtype_afpd, "creatvol: malloc: %s", strerror(errno) ); - volume_free(volume); - free(volume); - return -1; - } - - volume->v_name = utf8_encoding()?volume->v_u8mname:volume->v_macname; - volume->v_hide = hide; - strcpy( volume->v_path, path ); + EC_NULL( volume->v_localname = strdup(name) ); + EC_NULL( volume->v_u8mname = strdup_w(u8mtmpname) ); + EC_NULL( volume->v_macname = strdup_w(mactmpname) ); + EC_NULL( volume->v_path = strdup(path) ); + + volume->v_name = utf8_encoding(obj) ? volume->v_u8mname : volume->v_macname; #ifdef __svr4__ volume->v_qfd = -1; #endif /* __svr4__ */ + /* os X start at 1 and use network order ie. 1 2 3 */ volume->v_vid = ++lastvid; volume->v_vid = htons(volume->v_vid); + #ifdef HAVE_ACLS if (!check_vol_acl_support(volume)) { LOG(log_debug, logtype_afpd, "creatvol(\"%s\"): disabling ACL support", volume->v_path); - options[VOLOPT_FLAGS].i_value &= ~AFPVOL_ACLS; + volume->v_flags &= ~AFPVOL_ACLS; } #endif - /* handle options */ - if (options) { - volume->v_casefold = options[VOLOPT_CASEFOLD].i_value; - volume->v_flags |= options[VOLOPT_FLAGS].i_value; - - if (options[VOLOPT_EA_VFS].i_value) - volume->v_vfs_ea = options[VOLOPT_EA_VFS].i_value; - - volume->v_ad_options = 0; - if ((volume->v_flags & AFPVOL_NODEV)) - volume->v_ad_options |= ADVOL_NODEV; - if ((volume->v_flags & AFPVOL_UNIX_PRIV)) - volume->v_ad_options |= ADVOL_UNIXPRIV; - if ((volume->v_flags & AFPVOL_INV_DOTS)) - volume->v_ad_options |= ADVOL_INVDOTS; - - if (options[VOLOPT_PASSWORD].c_value) - volume->v_password = strdup(options[VOLOPT_PASSWORD].c_value); - - if (options[VOLOPT_VETO].c_value) - volume->v_veto = strdup(options[VOLOPT_VETO].c_value); - - if (options[VOLOPT_ENCODING].c_value) - volume->v_volcodepage = strdup(options[VOLOPT_ENCODING].c_value); - - if (options[VOLOPT_MACCHARSET].c_value) - volume->v_maccodepage = strdup(options[VOLOPT_MACCHARSET].c_value); - - if (options[VOLOPT_DBPATH].c_value) - volume->v_dbpath = volxlate(obj, NULL, MAXPATHLEN, options[VOLOPT_DBPATH].c_value, pwd, path, name); - - if (options[VOLOPT_CNIDSCHEME].c_value) - volume->v_cnidscheme = strdup(options[VOLOPT_CNIDSCHEME].c_value); - - if (options[VOLOPT_CNIDSERVER].c_value) - volume->v_cnidserver = strdup(options[VOLOPT_CNIDSERVER].c_value); - - if (options[VOLOPT_CNIDPORT].c_value) - volume->v_cnidport = strdup(options[VOLOPT_CNIDPORT].c_value); - - if (options[VOLOPT_UMASK].i_value) - volume->v_umask = (mode_t)options[VOLOPT_UMASK].i_value; - - if (options[VOLOPT_DPERM].i_value) - volume->v_dperm = (mode_t)options[VOLOPT_DPERM].i_value; - - if (options[VOLOPT_FPERM].i_value) - volume->v_fperm = (mode_t)options[VOLOPT_FPERM].i_value; - - if (options[VOLOPT_DFLTPERM].i_value) - volume->v_perm = (mode_t)options[VOLOPT_DFLTPERM].i_value; - - if (options[VOLOPT_ADOUBLE].i_value) - volume->v_adouble = options[VOLOPT_ADOUBLE].i_value; - else - volume->v_adouble = AD_VERSION; - - if (options[VOLOPT_LIMITSIZE].i_value) - volume->v_limitsize = options[VOLOPT_LIMITSIZE].i_value; - - /* Mac to Unix conversion flags*/ - volume->v_mtou_flags = 0; - if (!(volume->v_flags & AFPVOL_NOHEX)) - volume->v_mtou_flags |= CONV_ESCAPEHEX; - if (!(volume->v_flags & AFPVOL_USEDOTS)) - volume->v_mtou_flags |= CONV_ESCAPEDOTS; - if ((volume->v_flags & AFPVOL_EILSEQ)) - volume->v_mtou_flags |= CONV__EILSEQ; - - if ((volume->v_casefold & AFPVOL_MTOUUPPER)) - volume->v_mtou_flags |= CONV_TOUPPER; - else if ((volume->v_casefold & AFPVOL_MTOULOWER)) - volume->v_mtou_flags |= CONV_TOLOWER; - - /* Unix to Mac conversion flags*/ - volume->v_utom_flags = CONV_IGNORE | CONV_UNESCAPEHEX; - if ((volume->v_casefold & AFPVOL_UTOMUPPER)) - volume->v_utom_flags |= CONV_TOUPPER; - else if ((volume->v_casefold & AFPVOL_UTOMLOWER)) - volume->v_utom_flags |= CONV_TOLOWER; - - if ((volume->v_flags & AFPVOL_EILSEQ)) - volume->v_utom_flags |= CONV__EILSEQ; - - if (options[VOLOPT_PREEXEC].c_value) - volume->v_preexec = volxlate(obj, NULL, MAXPATHLEN, options[VOLOPT_PREEXEC].c_value, pwd, path, name); - volume->v_preexec_close = options[VOLOPT_PREEXEC].i_value; - - if (options[VOLOPT_POSTEXEC].c_value) - volume->v_postexec = volxlate(obj, NULL, MAXPATHLEN, options[VOLOPT_POSTEXEC].c_value, pwd, path, name); - - if (options[VOLOPT_ROOTPREEXEC].c_value) - volume->v_root_preexec = volxlate(obj, NULL, MAXPATHLEN, options[VOLOPT_ROOTPREEXEC].c_value, pwd, path, name); - volume->v_root_preexec_close = options[VOLOPT_ROOTPREEXEC].i_value; - - if (options[VOLOPT_ROOTPOSTEXEC].c_value) - volume->v_root_postexec = volxlate(obj, NULL, MAXPATHLEN, options[VOLOPT_ROOTPOSTEXEC].c_value, pwd, path, name); - } - volume->v_dperm |= volume->v_perm; - volume->v_fperm |= volume->v_perm; - /* Check EA support on volume */ if (volume->v_vfs_ea == AFPVOL_EA_AUTO || volume->v_adouble == AD_VERSION_EA) check_ea_support(volume); initvol_vfs(volume); /* get/store uuid from file in afpd master*/ - if ((parent_or_child == 0) && (volume->v_flags & AFPVOL_TM)) { + if (!(pwd) && (volume->v_flags & AFPVOL_TM)) { char *uuid = get_vol_uuid(obj, volume->v_localname); if (!uuid) { LOG(log_error, logtype_afpd, "Volume '%s': couldn't get UUID", @@ -897,127 +931,28 @@ static int creatvol(const AFPObj *obj, const struct passwd *pwd, } } + /* no errors shall happen beyond this point because the cleanup would mess the volume chain up */ volume->v_next = Volumes; Volumes = volume; - return 0; -} + volume->v_obj = obj; -/* check access list. this function wants something of the following - * form: - * @group,name,name2,@group2,name3 - * - * a NULL argument allows everybody to have access. - * we return three things: - * -1: no list - * 0: list exists, but name isn't in it - * 1: in list - */ +EC_CLEANUP: + LOG(log_debug, logtype_afpd, "createvol: END: %d", ret); + if (ret != 0) { + if (volume) { + volume_free(volume); + free(volume); + } + return NULL; + } + return volume; +} -#ifndef NO_REAL_USER_NAME -/* authentication is case insensitive - * FIXME should we do the same with group name? +/* ---------------------- */ -#define access_strcmp strcasecmp - -#else -#define access_strcmp strcmp - -#endif - -static int accessvol(const AFPObj *obj, const char *args, const char *name) -{ - char buf[MAXPATHLEN + 1], *p; - struct group *gr; - - if (!args) - return -1; - - strlcpy(buf, args, sizeof(buf)); - if ((p = strtok(buf, ",")) == NULL) /* nothing, return okay */ - return -1; - - while (p) { - if (*p == '@') { /* it's a group */ - if ((gr = getgrnam(p + 1)) && gmem(gr->gr_gid, obj->ngroups, obj->groups)) - return 1; - } else if (access_strcmp(p, name) == 0) /* it's a user name */ - return 1; - p = strtok(NULL, ","); - } - - return 0; -} - -static int hostaccessvol(const AFPObj *obj, int type, const char *volname, const char *args) -{ - int mask_int; - char buf[MAXPATHLEN + 1], *p, *b; - struct sockaddr_storage client; - const DSI *dsi = obj->dsi; - - if (!args) - return -1; - - strlcpy(buf, args, sizeof(buf)); - if ((p = strtok_r(buf, ",", &b)) == NULL) /* nothing, return okay */ - return -1; - - while (p) { - int ret; - char *ipaddr, *mask_char; - struct addrinfo hints, *ai; - - ipaddr = strtok(p, "/"); - mask_char = strtok(NULL,"/"); - - /* Get address from string with getaddrinfo */ - memset(&hints, 0, sizeof hints); - hints.ai_family = AF_UNSPEC; - hints.ai_socktype = SOCK_STREAM; - if ((ret = getaddrinfo(ipaddr, NULL, &hints, &ai)) != 0) { - LOG(log_error, logtype_afpd, "hostaccessvol: getaddrinfo: %s\n", gai_strerror(ret)); - continue; - } - - /* netmask */ - if (mask_char != NULL) - mask_int = atoi(mask_char); /* apply_ip_mask does range checking on it */ - else { - if (ai->ai_family == AF_INET) /* IPv4 */ - mask_int = 32; - else /* IPv6 */ - mask_int = 128; - } - - /* Apply mask to addresses */ - client = dsi->client; - apply_ip_mask((struct sockaddr *)&client, mask_int); - apply_ip_mask(ai->ai_addr, mask_int); - - if (compare_ip((struct sockaddr *)&client, ai->ai_addr) == 0) { - if (type == VOLOPT_DENIED_HOSTS) - LOG(log_info, logtype_afpd, "AFP access denied for client IP '%s' to volume '%s' by denied list", - getip_string((struct sockaddr *)&client), volname); - freeaddrinfo(ai); - return 1; - } - - /* next address */ - freeaddrinfo(ai); - p = strtok_r(NULL, ",", &b); - } - - if (type == VOLOPT_ALLOWED_HOSTS) - LOG(log_info, logtype_afpd, "AFP access denied for client IP '%s' to volume '%s', not in allowed list", - getip_string((struct sockaddr *)&dsi->client), volname); - return 0; -} - -/* ---------------------- - */ -static int volfile_changed(struct afp_options *p) -{ - struct stat st; +static int volfile_changed(struct afp_options *p) +{ + struct stat st; if (!stat(p->configfile, &st) && st.st_mtime > p->volfile.mtime) { p->volfile.mtime = st.st_mtime; @@ -1030,137 +965,273 @@ static int vol_section(const char *sec) { if (STRCMP(sec, ==, INISEC_GLOBAL)) return 0; - if (STRCMP(sec, ==, INISEC_AFP)) - return 0; - if (STRCMP(sec, ==, INISEC_CNID)) - return 0; return 1; } -/* ---------------------- +#define MAXPRESETLEN 100 +/*! * Read volumes from iniconfig and add the volumes contained within to * the global volume list. This gets called from the forked afpd childs. * The master now reads this too for Zeroconf announcements. */ -static int readvolfile(const AFPObj *obj, const struct passwd *pwent) +static int readvolfile(AFPObj *obj, const struct passwd *pwent) { - char path[MAXPATHLEN + 1]; + EC_INIT; + static int regexerr = -1; + static regex_t reg; + char *realvolpath; char volname[AFPVOL_U8MNAMELEN + 1]; - char tmp[MAXPATHLEN + 1]; - char *u; - const char *p; - int fd; + char path[MAXPATHLEN + 1], tmp[MAXPATHLEN + 1]; + const char *preset, *default_preset, *p, *basedir; + char *q, *u; int i; - struct passwd *pw; - struct vol_option save_options[VOLOPT_NUM]; - struct vol_option default_options[VOLOPT_NUM]; - struct vol_option options[VOLOPT_NUM]; + struct passwd *pw; + regmatch_t match[1]; LOG(log_debug, logtype_afpd, "readvolfile: BEGIN"); - memset(default_options, 0, sizeof(default_options)); - - /* Enable some default options for all volumes */ - default_options[VOLOPT_FLAGS].i_value |= AFPVOL_USEDOTS | AFPVOL_UNIX_PRIV; -#ifdef HAVE_ACLS - default_options[VOLOPT_FLAGS].i_value |= AFPVOL_ACLS; -#endif - default_options[VOLOPT_EA_VFS].i_value = AFPVOL_EA_AUTO; - default_options[VOLOPT_UMASK].i_value = obj->options.umask; - memcpy(save_options, default_options, sizeof(options)); - int secnum = iniparser_getnsec(obj->iniconfig); LOG(log_debug, logtype_afpd, "readvolfile: sections: %d", secnum); const char *secname; + if ((default_preset = iniparser_getstring(obj->iniconfig, INISEC_GLOBAL, "vol preset", NULL))) { + LOG(log_debug, logtype_afpd, "readvolfile: default_preset: %s", default_preset); + } + for (i = 0; i < secnum; i++) { secname = iniparser_getsecname(obj->iniconfig, i); - if (!vol_section(secname)) - continue; - strlcpy(volname, secname, AFPVOL_U8MNAMELEN); - LOG(log_debug, logtype_afpd, "readvolfile: volume: %s", volname); - - if ((p = iniparser_getstrdup(obj->iniconfig, secname, "path", NULL)) == NULL) - continue; - strlcpy(path, p, MAXPATHLEN); - strcpy(tmp, path); - - if (volxlate(obj, path, sizeof(path) - 1, tmp, pwent, NULL, NULL) == NULL) + if (!vol_section(secname)) continue; + if (STRCMP(secname, ==, INISEC_HOMES)) { + have_uservol = 1; + if (!IS_AFP_SESSION(obj) + || strcmp(obj->username, obj->options.guest) == 0) + /* not an AFP session, but cnid daemon, dbd or ad util, or guest login */ + continue; + if (pwent->pw_dir == NULL || STRCMP("", ==, pwent->pw_dir)) + /* no user home */ + continue; - memcpy(options, default_options, sizeof(options)); - volset(obj->iniconfig, secname, options, default_options); - - /* check allow/deny lists (if not afpd master loading volumes for Zeroconf reg.): - allow -> either no list (-1), or in list (1) - deny -> either no list (-1), or not in list (0) */ + if ((realpath(pwent->pw_dir, tmp)) == NULL) + continue; - if (pwent) { - if (accessvol(obj, options[VOLOPT_DENY].c_value, pwent->pw_name) == 1) + /* check if user home matches our "basedir regex" */ + if ((basedir = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "basedir regex", NULL)) == NULL) { + LOG(log_error, logtype_afpd, "\"basedir regex =\" must be defined in [Homes] section"); continue; - if (accessvol(obj, options[VOLOPT_ALLOW].c_value, pwent->pw_name) == 0) + } + LOG(log_debug, logtype_afpd, "readvolfile: basedir regex: '%s'", basedir); + + if (regexerr != 0 && (regexerr = regcomp(®, basedir, REG_EXTENDED)) != 0) { + char errbuf[1024]; + regerror(regexerr, ®, errbuf, sizeof(errbuf)); + LOG(log_debug, logtype_default, "readvolfile: bad basedir regex: %s", errbuf); continue; - if (hostaccessvol(obj, VOLOPT_DENIED_HOSTS, volname, options[VOLOPT_DENIED_HOSTS].c_value) == 1) + } + + if (regexec(®, tmp, 1, match, 0) == REG_NOMATCH) { + LOG(log_error, logtype_default, "readvolfile: user home \"%s\" doesn't match basedir regex \"%s\"", + tmp, basedir); continue; - if (hostaccessvol(obj, VOLOPT_ALLOWED_HOSTS, volname, options[VOLOPT_ALLOWED_HOSTS].c_value) == 0) + } + + if (p = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "path", NULL)) { + strlcat(tmp, "/", MAXPATHLEN); + strlcat(tmp, p, MAXPATHLEN); + } + } else { + /* Get path */ + if ((p = iniparser_getstring(obj->iniconfig, secname, "path", NULL)) == NULL) continue; + strlcpy(tmp, p, MAXPATHLEN); } - /* handle read-only behaviour. semantics: - * 1) neither the rolist nor the rwlist exist -> rw - * 2) rolist exists -> ro if user is in it. - * 3) rwlist exists -> ro unless user is in it. */ - if (pwent && !(options[VOLOPT_FLAGS].i_value & AFPVOL_RO)) { - if (accessvol(obj, options[VOLOPT_ROLIST].c_value, pwent->pw_name) == 1 - || accessvol(obj, options[VOLOPT_RWLIST].c_value, pwent->pw_name) == 0) - options[VOLOPT_FLAGS].i_value |= AFPVOL_RO; + if (volxlate(obj, path, sizeof(path) - 1, tmp, pwent, NULL, NULL) == NULL) + continue; + + /* do variable substitution for volume name */ + if (STRCMP(secname, ==, INISEC_HOMES)) { + p = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "home name", "$u's home"); + if (strstr(p, "$u") == NULL) { + LOG(log_warning, logtype_afpd, "home name must contain $u."); + p = "$u's home"; + } + if (strchr(p, ':') != NULL) { + LOG(log_warning, logtype_afpd, "home name must not contain \":\"."); + p = "$u's home"; + } + strlcpy(tmp, p, MAXPATHLEN); + } else { + strlcpy(tmp, secname, AFPVOL_U8MNAMELEN); } + if (volxlate(obj, volname, sizeof(volname) - 1, tmp, pwent, path, NULL) == NULL) + continue; + + preset = iniparser_getstring(obj->iniconfig, secname, "vol preset", NULL); - /* do variable substitution for volname */ - if (volxlate(obj, tmp, sizeof(tmp) - 1, volname, pwent, path, NULL) == NULL) { - volfree(options, default_options); + if ((realvolpath = realpath_safe(path)) == NULL) continue; - } - creatvol(obj, pwent, path, tmp, options); - volfree(options, default_options); + creatvol(obj, pwent, secname, volname, realvolpath, preset ? preset : default_preset ? default_preset : NULL); + free(realvolpath); } - volfree(save_options, NULL); - return( 0 ); + +EC_CLEANUP: + EC_EXIT; } -/* ------------------------------- */ -static void free_volumes(void) +static struct extmap *Extmap = NULL, *Defextmap = NULL; +static int Extmap_cnt; + +static int setextmap(char *ext, char *type, char *creator) { - struct vol *vol; - struct vol *nvol, *ovol; + EC_INIT; + struct extmap *em; + int cnt; - for ( vol = Volumes; vol; vol = vol->v_next ) { - if (( vol->v_flags & AFPVOL_OPEN ) ) { - vol->v_deleted = 1; - continue; + if (Extmap == NULL) { + EC_NULL_LOG( Extmap = calloc(1, sizeof( struct extmap )) ); + } + + ext++; + + for (em = Extmap, cnt = 0; em->em_ext; em++, cnt++) + if ((strdiacasecmp(em->em_ext, ext)) == 0) + goto EC_CLEANUP; + + EC_NULL_LOG( Extmap = realloc(Extmap, sizeof(struct extmap) * (cnt + 2)) ); + (Extmap + cnt + 1)->em_ext = NULL; + em = Extmap + cnt; + + EC_NULL( em->em_ext = strdup(ext) ); + + if ( *type == '\0' ) { + memcpy(em->em_type, "\0\0\0\0", sizeof( em->em_type )); + } else { + memcpy(em->em_type, type, sizeof( em->em_type )); + } + if ( *creator == '\0' ) { + memcpy(em->em_creator, "\0\0\0\0", sizeof( em->em_creator )); + } else { + memcpy(em->em_creator, creator, sizeof( em->em_creator )); + } + +EC_CLEANUP: + EC_EXIT; +} + +/* -------------------------- */ +static int extmap_cmp(const void *map1, const void *map2) +{ + const struct extmap *em1 = map1; + const struct extmap *em2 = map2; + return strdiacasecmp(em1->em_ext, em2->em_ext); +} + +static void sortextmap( void) +{ + struct extmap *em; + + Extmap_cnt = 0; + if ((em = Extmap) == NULL) { + return; + } + while (em->em_ext) { + em++; + Extmap_cnt++; + } + if (Extmap_cnt) { + qsort(Extmap, Extmap_cnt, sizeof(struct extmap), extmap_cmp); + if (*Extmap->em_ext == 0) { + /* the first line is really "." the default entry, + * we remove the leading '.' in setextmap + */ + Defextmap = Extmap; } - volume_free(vol); } +} - for ( vol = Volumes, ovol = NULL; vol; vol = nvol) { - nvol = vol->v_next; +static void free_extmap( void) +{ + struct extmap *em; - if (vol->v_localname == NULL) { - if (Volumes == vol) { - Volumes = nvol; - ovol = Volumes; - } - else { - ovol->v_next = nvol; - } - free(vol); + if (Extmap) { + for ( em = Extmap; em->em_ext; em++) { + free (em->em_ext); } - else { - ovol = vol; + free(Extmap); + Extmap = NULL; + Defextmap = Extmap; + Extmap_cnt = 0; + } +} + +static int ext_cmp_key(const void *key, const void *obj) +{ + const char *p = key; + const struct extmap *em = obj; + return strdiacasecmp(p, em->em_ext); +} + +struct extmap *getextmap(const char *path) +{ + char *p; + struct extmap *em; + + if (!Extmap_cnt || NULL == ( p = strrchr( path, '.' )) ) { + return( Defextmap ); + } + p++; + if (!*p) { + return( Defextmap ); + } + em = bsearch(p, Extmap, Extmap_cnt, sizeof(struct extmap), ext_cmp_key); + if (em) { + return( em ); + } else { + return( Defextmap ); + } +} + +struct extmap *getdefextmap(void) +{ + return( Defextmap ); +} + +static int readextmap(const char *file) +{ + EC_INIT; + FILE *fp; + char ext[256]; + char buf[256]; + char type[5], creator[5]; + + LOG(log_debug, logtype_afpd, "readextmap: loading \"%s\"", file); + + EC_NULL_LOGSTR( fp = fopen(file, "r"), "Couldn't open extension maping file %s", file); + + while (fgets(buf, sizeof(buf), fp) != NULL) { + initline(strlen(buf), buf); + parseline(sizeof(ext) - 1, ext); + + switch (ext[0]) { + case '.' : + parseline(sizeof(type) - 1, type); + parseline(sizeof(creator) - 1, creator); + setextmap(ext, type, creator); + LOG(log_debug, logtype_afpd, "readextmap: mapping: '%s' -> %s/%s", ext, type, creator); + break; } } + + sortextmap(); + EC_ZERO( fclose(fp) ); + + LOG(log_debug, logtype_afpd, "readextmap: done", file); + +EC_CLEANUP: + EC_EXIT; } /************************************************************** @@ -1175,7 +1246,7 @@ void volume_unlink(struct vol *volume) struct vol *vol, *ovol, *nvol; if (volume == Volumes) { - Volumes = Volumes->v_next; + Volumes = NULL; return; } for ( vol = Volumes->v_next, ovol = Volumes; vol; vol = nvol) { @@ -1192,16 +1263,15 @@ void volume_unlink(struct vol *volume) } /*! - * Free all resources allocated in a struct vol + * Free all resources allocated in a struct vol, only struct dir *v_root can't be freed */ void volume_free(struct vol *vol) { + LOG(log_debug, logtype_afpd, "volume_free('%s'): BEGIN", vol->v_localname); + free(vol->v_localname); - vol->v_localname = NULL; free(vol->v_u8mname); - vol->v_u8mname = NULL; free(vol->v_macname); - vol->v_macname = NULL; free(vol->v_path); free(vol->v_password); free(vol->v_veto); @@ -1210,8 +1280,31 @@ void volume_free(struct vol *vol) free(vol->v_cnidscheme); free(vol->v_dbpath); free(vol->v_gvs); - if (vol->v_uuid) - free(vol->v_uuid); + free(vol->v_uuid); + free(vol->v_cnidserver); + free(vol->v_cnidport); + free(vol->v_root_preexec); + free(vol->v_postexec); + + LOG(log_debug, logtype_afpd, "volume_free: END"); +} + +/*! + * Load charsets for a volume + */ +int load_charset(struct vol *vol) +{ + if ((vol->v_maccharset = add_charset(vol->v_maccodepage)) == (charset_t)-1) { + LOG(log_error, logtype_default, "Setting mac charset '%s' failed", vol->v_maccodepage); + return -1; + } + + if ((vol->v_volcharset = add_charset(vol->v_volcodepage)) == (charset_t)-1) { + LOG(log_error, logtype_default, "Setting vol charset '%s' failed", vol->v_volcodepage); + return -1; + } + + return 0; } /*! @@ -1222,7 +1315,7 @@ void volume_free(struct vol *vol) * @param obj (r) handle * @param delvol_fn (r) callback called for deleted volumes */ -int load_volumes(AFPObj *obj, void (*delvol_fn)(const struct vol *)) +int load_volumes(AFPObj *obj, void (*delvol_fn)(const AFPObj *obj, struct vol *)) { EC_INIT; int fd = -1; @@ -1236,7 +1329,14 @@ int load_volumes(AFPObj *obj, void (*delvol_fn)(const struct vol *)) if (Volumes) { if (!volfile_changed(&obj->options)) goto EC_CLEANUP; - free_volumes(); + have_uservol = 0; + for (vol = Volumes; vol; vol = vol->v_next) { + vol->v_deleted = 1; + } + } else { + LOG(log_debug, logtype_afpd, "load_volumes: no volumes yet"); + EC_ZERO_LOG( lstat(obj->options.configfile, &st) ); + obj->options.volfile.mtime = st.st_mtime; } /* try putting a read lock on the volume file twice, sleep 1 second if first attempt fails */ @@ -1262,14 +1362,16 @@ int load_volumes(AFPObj *obj, void (*delvol_fn)(const struct vol *)) if (obj->iniconfig) iniparser_freedict(obj->iniconfig); - LOG(log_debug, logtype_afpd, "load_volumes: reloading: %s", obj->options.configfile); + LOG(log_debug, logtype_afpd, "load_volumes: loading: %s", obj->options.configfile); obj->iniconfig = iniparser_load(obj->options.configfile); EC_ZERO_LOG( readvolfile(obj, pwent) ); for ( vol = Volumes; vol; vol = vol->v_next ) { - if (vol->v_deleted && !vol->v_new ) { - delvol_fn(vol); + if (vol->v_deleted) { + LOG(log_debug, logtype_afpd, "load_volumes: deleted: %s", vol->v_localname); + if (delvol_fn) + delvol_fn(obj, vol); vol = Volumes; } } @@ -1277,21 +1379,30 @@ int load_volumes(AFPObj *obj, void (*delvol_fn)(const struct vol *)) EC_CLEANUP: if (fd != -1) (void)close(fd); + + LOG(log_debug, logtype_afpd, "load_volumes: END"); EC_EXIT; } -void unload_volumes(void) +void unload_volumes(AFPObj *obj) { - LOG(log_debug, logtype_afpd, "unload_volumes"); - free_volumes(); + struct vol *vol; + + LOG(log_debug, logtype_afpd, "unload_volumes: BEGIN"); + + for (vol = Volumes; vol; vol = vol->v_next) + volume_free(vol); + Volumes = NULL; + obj->options.volfile.mtime = 0; + + LOG(log_debug, logtype_afpd, "unload_volumes: END"); } -const struct vol *getvolumes(void) +struct vol *getvolumes(void) { return Volumes; } -/* ------------------------- */ struct vol *getvolbyvid(const uint16_t vid ) { struct vol *vol; @@ -1308,11 +1419,180 @@ struct vol *getvolbyvid(const uint16_t vid ) return( vol ); } +/*! + * Search volume by path, creating user home vols as necessary + * + * Path may be absolute or relative. Ordinary volume structs are created when + * the ini config is initially parsed (load_volumes()), but user volumes are + * as load_volumes() only can create the user volume of the logged in user + * in an AFP session in afpd, but not when called from eg cnid_metad or dbd. + * Both cnid_metad and dbd thus need a way to lookup and create struct vols + * for user home by path. This is what this func does as well. + * + * (1) Search "normal" volume list + * (2) Check if theres a [Homes] section, load_volumes() remembers this for us + * (3) If there is, match "path" with "basedir regex" to get the user home parent dir + * (4) Built user home path by appending the basedir matched in (3) and appending the username + * (5) The next path element then is the username + * (6) Append [Homes]->path subdirectory if defined + * (7) Create volume + * + * @param obj (rw) handle + * @param path (r) path, may be relative or absolute + */ +struct vol *getvolbypath(AFPObj *obj, const char *path) +{ + EC_INIT; + static int regexerr = -1; + static regex_t reg; + struct vol *vol; + struct vol *tmp; + const struct passwd *pw; + char volname[AFPVOL_U8MNAMELEN + 1]; + char abspath[MAXPATHLEN + 1]; + char volpath[MAXPATHLEN + 1], *realvolpath = NULL; + char tmpbuf[MAXPATHLEN + 1]; + const char *secname, *basedir, *p = NULL, *subpath = NULL, *subpathconfig; + char *user = NULL, *prw; + regmatch_t match[1]; + + LOG(log_debug, logtype_afpd, "getvolbypath(\"%s\")", path); + + if (path[0] != '/') { + /* relative path, build absolute path */ + EC_NULL_LOG( getcwd(abspath, MAXPATHLEN) ); + strlcat(abspath, "/", MAXPATHLEN); + strlcat(abspath, path, MAXPATHLEN); + path = abspath; + } + + + for (tmp = Volumes; tmp; tmp = tmp->v_next) { /* (1) */ + if (strncmp(path, tmp->v_path, strlen(tmp->v_path)) == 0) { + vol = tmp; + goto EC_CLEANUP; + } + } + + if (!have_uservol) /* (2) */ + EC_FAIL_LOG("getvolbypath(\"%s\"): no volume for path", path); + + int secnum = iniparser_getnsec(obj->iniconfig); + + for (int i = 0; i < secnum; i++) { + secname = iniparser_getsecname(obj->iniconfig, i); + if (STRCMP(secname, ==, INISEC_HOMES)) + break; + } + + if (STRCMP(secname, !=, INISEC_HOMES)) + EC_FAIL_LOG("getvolbypath(\"%s\"): no volume for path", path); + + /* (3) */ + EC_NULL_LOG( basedir = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "basedir regex", NULL) ); + LOG(log_debug, logtype_afpd, "getvolbypath: user home section: '%s', basedir: '%s'", secname, basedir); + + if (regexerr != 0 && (regexerr = regcomp(®, basedir, REG_EXTENDED)) != 0) { + char errbuf[1024]; + regerror(regexerr, ®, errbuf, sizeof(errbuf)); + printf("error: %s\n", errbuf); + EC_FAIL_LOG("getvolbypath(\"%s\"): bad basedir regex: %s", errbuf); + } + + if (regexec(®, path, 1, match, 0) == REG_NOMATCH) + EC_FAIL_LOG("getvolbypath(\"%s\"): no volume for path", path); + + if (match[0].rm_eo - match[0].rm_so > MAXPATHLEN) + EC_FAIL_LOG("getvolbypath(\"%s\"): path too long", path); + + /* (4) */ + strncpy(tmpbuf, path + match[0].rm_so, match[0].rm_eo - match[0].rm_so); + tmpbuf[match[0].rm_eo - match[0].rm_so] = 0; + + LOG(log_debug, logtype_afpd, "getvolbypath: basedir regex: '%s', basedir match: \"%s\"", + basedir, tmpbuf); + + strlcat(tmpbuf, "/", MAXPATHLEN); + + /* (5) */ + p = path + strlen(basedir); + while (*p == '/') + p++; + EC_NULL_LOG( user = strdup(p) ); + + if (prw = strchr(user, '/')) + *prw++ = 0; + if (prw != 0) + subpath = prw; + + strlcat(tmpbuf, user, MAXPATHLEN); + strlcpy(obj->username, user, MAXUSERLEN); + strlcat(tmpbuf, "/", MAXPATHLEN); + + /* (6) */ + if (subpathconfig = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "path", NULL)) { + /* + if (!subpath || strncmp(subpathconfig, subpath, strlen(subpathconfig)) != 0) { + EC_FAIL; + } + */ + strlcat(tmpbuf, subpathconfig, MAXPATHLEN); + strlcat(tmpbuf, "/", MAXPATHLEN); + } + + + /* (7) */ + if (volxlate(obj, volpath, sizeof(volpath) - 1, tmpbuf, pw, NULL, NULL) == NULL) + EC_FAIL; + + EC_NULL( realvolpath = realpath_safe(volpath) ); + EC_NULL( pw = getpwnam(user) ); + + LOG(log_debug, logtype_afpd, "getvolbypath(\"%s\"): user: %s, homedir: %s => realvolpath: \"%s\"", + path, user, pw->pw_dir, realvolpath); + + /* do variable substitution for volume name */ + p = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "home name", "$u's home"); + if (strstr(p, "$u") == NULL) + p = "$u's home"; + strlcpy(tmpbuf, p, AFPVOL_U8MNAMELEN); + EC_NULL_LOG( volxlate(obj, volname, sizeof(volname) - 1, tmpbuf, pw, realvolpath, NULL) ); + + const char *preset, *default_preset; + default_preset = iniparser_getstring(obj->iniconfig, INISEC_GLOBAL, "vol preset", NULL); + preset = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "vol preset", NULL); + + vol = creatvol(obj, pw, INISEC_HOMES, volname, realvolpath, preset ? preset : default_preset ? default_preset : NULL); + +EC_CLEANUP: + if (user) + free(user); + if (realvolpath) + free(realvolpath); + if (ret != 0) + vol = NULL; + return vol; +} + +struct vol *getvolbyname(const char *name) +{ + struct vol *vol = NULL; + struct vol *tmp; + + for (tmp = Volumes; tmp; tmp = tmp->v_next) { + if (strncmp(name, tmp->v_configname, strlen(tmp->v_configname)) == 0) { + vol = tmp; + break; + } + } + return vol; +} + #define MAXVAL 1024 /*! * Initialize an AFPObj and options from ini config file */ -int afp_config_parse(AFPObj *AFPObj) +int afp_config_parse(AFPObj *AFPObj, char *processname) { EC_INIT; dictionary *config; @@ -1322,82 +1602,80 @@ int afp_config_parse(AFPObj *AFPObj) char *q, *r; char val[MAXVAL]; - options->configfile = AFPObj->cmdlineconfigfile ? strdup(AFPObj->cmdlineconfigfile) : strdup(_PATH_CONFDIR "afp.conf"); - options->sigconffile = strdup(_PATH_CONFDIR "afp_signature.conf"); - options->uuidconf = strdup(_PATH_CONFDIR "afp_voluuid.conf"); - options->flags = OPTION_ACL2MACCESS | OPTION_UUID | OPTION_SERVERNOTIF | AFPObj->cmdlineflags; + if (processname != NULL) + set_processname(processname); + AFPObj->afp_version = 11; + options->configfile = AFPObj->cmdlineconfigfile ? strdup(AFPObj->cmdlineconfigfile) : strdup(_PATH_CONFDIR "afp.conf"); + options->sigconffile = strdup(_PATH_STATEDIR "afp_signature.conf"); + options->uuidconf = strdup(_PATH_STATEDIR "afp_voluuid.conf"); + options->flags = OPTION_UUID | AFPObj->cmdlineflags; + if ((config = iniparser_load(AFPObj->options.configfile)) == NULL) return -1; AFPObj->iniconfig = config; /* [Global] */ - options->logconfig = iniparser_getstrdup(config, INISEC_GLOBAL, "loglevel", "default:note"); - options->logfile = iniparser_getstrdup(config, INISEC_GLOBAL, "logfile", NULL); - - /* [AFP] "options" options wo values */ - if (p = iniparser_getstrdup(config, INISEC_AFP, "options", NULL)) { - if (p = strtok(q, ", ")) { - while (p) { - if (strcasecmp(p, "nozeroconf")) - options->flags |= OPTION_NOZEROCONF; - if (strcasecmp(p, "icon")) - options->flags |= OPTION_CUSTOMICON; - if (strcasecmp(p, "noicon")) - options->flags &= ~OPTION_CUSTOMICON; - if (strcasecmp(p, "advertise_ssh")) - options->flags |= OPTION_ANNOUNCESSH; - if (strcasecmp(p, "noacl2maccess")) - options->flags &= ~OPTION_ACL2MACCESS; - if (strcasecmp(p, "keepsessions")) - options->flags |= OPTION_KEEPSESSIONS; - if (strcasecmp(p, "closevol")) - options->flags |= OPTION_CLOSEVOL; - if (strcasecmp(p, "client_polling")) - options->flags &= ~OPTION_SERVERNOTIF; - if (strcasecmp(p, "nosavepassword")) - options->passwdbits |= PASSWD_NOSAVE; - if (strcasecmp(p, "savepassword")) - options->passwdbits &= ~PASSWD_NOSAVE; - if (strcasecmp(p, "nosetpassword")) - options->passwdbits &= ~PASSWD_SET; - if (strcasecmp(p, "setpassword")) - options->passwdbits |= PASSWD_SET; - p = strtok(NULL, ", "); - } - } - } - /* figure out options w values */ + options->logconfig = iniparser_getstrdup(config, INISEC_GLOBAL, "log level", "default:note"); + options->logfile = iniparser_getstrdup(config, INISEC_GLOBAL, "log file", NULL); + + setuplog(options->logconfig, options->logfile); + + /* "server options" boolean options */ + if (!iniparser_getboolean(config, INISEC_GLOBAL, "zeroconf", 1)) + options->flags |= OPTION_NOZEROCONF; + if (iniparser_getboolean(config, INISEC_GLOBAL, "advertise ssh", 0)) + options->flags |= OPTION_ANNOUNCESSH; + if (iniparser_getboolean(config, INISEC_GLOBAL, "map acls", 1)) + options->flags |= OPTION_ACL2MACCESS; + if (iniparser_getboolean(config, INISEC_GLOBAL, "keep sessions", 0)) + options->flags |= OPTION_KEEPSESSIONS; + if (iniparser_getboolean(config, INISEC_GLOBAL, "close vol", 0)) + options->flags |= OPTION_CLOSEVOL; + if (!iniparser_getboolean(config, INISEC_GLOBAL, "client polling", 0)) + options->flags |= OPTION_SERVERNOTIF; + if (!iniparser_getboolean(config, INISEC_GLOBAL, "use sendfile", 1)) + options->flags |= OPTION_NOSENDFILE; + if (iniparser_getboolean(config, INISEC_GLOBAL, "solaris share reservations", 1)) + options->flags |= OPTION_SHARE_RESERV; + if (iniparser_getboolean(config, INISEC_GLOBAL, "afp read locks", 0)) + options->flags |= OPTION_AFP_READ_LOCK; + if (!iniparser_getboolean(config, INISEC_GLOBAL, "save password", 1)) + options->passwdbits |= PASSWD_NOSAVE; + if (iniparser_getboolean(config, INISEC_GLOBAL, "set password", 0)) + options->passwdbits |= PASSWD_SET; - options->loginmesg = iniparser_getstrdup(config, INISEC_AFP, "loginmesg", ""); - options->guest = iniparser_getstrdup(config, INISEC_AFP, "guestname", "nobody"); - options->passwdfile = iniparser_getstrdup(config, INISEC_AFP, "passwdfile", _PATH_AFPDPWFILE); - options->uampath = iniparser_getstrdup(config, INISEC_AFP, "uampath", _PATH_AFPDUAMPATH); - options->uamlist = iniparser_getstrdup(config, INISEC_AFP, "uamlist", "uams_dhx.so,uams_dhx2.so"); - options->port = iniparser_getstrdup(config, INISEC_AFP, "port", "548"); - options->signatureopt = iniparser_getstrdup(config, INISEC_AFP, "signature", "auto"); - options->k5service = iniparser_getstrdup(config, INISEC_AFP, "k5service", NULL); - options->k5realm = iniparser_getstrdup(config, INISEC_AFP, "k5realm", NULL); - options->listen = iniparser_getstrdup(config, INISEC_AFP, "listen", NULL); - options->ntdomain = iniparser_getstrdup(config, INISEC_AFP, "ntdomain", NULL); - options->ntseparator = iniparser_getstrdup(config, INISEC_AFP, "ntseparator", NULL); - options->mimicmodel = iniparser_getstrdup(config, INISEC_AFP, "mimicmodel", NULL); - options->adminauthuser = iniparser_getstrdup(config, INISEC_AFP, "adminauthuser", NULL); - options->connections = iniparser_getint (config, INISEC_AFP, "maxcon", 200); - options->passwdminlen = iniparser_getint (config, INISEC_AFP, "passwdminlen", 0); - options->tickleval = iniparser_getint (config, INISEC_AFP, "tickleval", 30); - options->timeout = iniparser_getint (config, INISEC_AFP, "timeout", 4); - options->dsireadbuf = iniparser_getint (config, INISEC_AFP, "dsireadbuf", 12); - options->server_quantum = iniparser_getint (config, INISEC_AFP, "server_quantum", DSI_SERVQUANT_DEF); - options->volnamelen = iniparser_getint (config, INISEC_AFP, "volnamelen", 80); - options->dircachesize = iniparser_getint (config, INISEC_AFP, "dircachesize", DEFAULT_MAX_DIRCACHE_SIZE); - options->tcp_sndbuf = iniparser_getint (config, INISEC_AFP, "tcpsndbuf", 0); - options->tcp_rcvbuf = iniparser_getint (config, INISEC_AFP, "tcprcvbuf", 0); - options->fce_fmodwait = iniparser_getint (config, INISEC_AFP, "fceholdfmod", 60); - options->sleep = iniparser_getint (config, INISEC_AFP, "sleep", 10) * 60 * 2; - options->disconnected = iniparser_getint (config, INISEC_AFP, "disconnect", 24) * 60 * 2; - - if ((p = iniparser_getstring(config, INISEC_AFP, "hostname", NULL))) { + /* figure out options w values */ + options->loginmesg = iniparser_getstrdup(config, INISEC_GLOBAL, "login message", NULL); + options->guest = iniparser_getstrdup(config, INISEC_GLOBAL, "guest account", "nobody"); + options->extmapfile = iniparser_getstrdup(config, INISEC_GLOBAL, "extmap file", _PATH_CONFDIR "afp_extmap.conf"); + options->passwdfile = iniparser_getstrdup(config, INISEC_GLOBAL, "passwd file", _PATH_AFPDPWFILE); + options->uampath = iniparser_getstrdup(config, INISEC_GLOBAL, "uam path", _PATH_AFPDUAMPATH); + options->uamlist = iniparser_getstrdup(config, INISEC_GLOBAL, "uam list", "uams_dhx.so uams_dhx2.so"); + options->port = iniparser_getstrdup(config, INISEC_GLOBAL, "afp port", "548"); + options->signatureopt = iniparser_getstrdup(config, INISEC_GLOBAL, "signature", ""); + options->k5service = iniparser_getstrdup(config, INISEC_GLOBAL, "k5 service", NULL); + options->k5realm = iniparser_getstrdup(config, INISEC_GLOBAL, "k5 realm", NULL); + options->listen = iniparser_getstrdup(config, INISEC_GLOBAL, "afp listen", NULL); + options->ntdomain = iniparser_getstrdup(config, INISEC_GLOBAL, "nt domain", NULL); + options->ntseparator = iniparser_getstrdup(config, INISEC_GLOBAL, "nt separator", NULL); + options->mimicmodel = iniparser_getstrdup(config, INISEC_GLOBAL, "mimic model", NULL); + options->adminauthuser = iniparser_getstrdup(config, INISEC_GLOBAL, "admin auth user",NULL); + options->connections = iniparser_getint (config, INISEC_GLOBAL, "max connections",200); + options->passwdminlen = iniparser_getint (config, INISEC_GLOBAL, "passwd minlen", 0); + options->tickleval = iniparser_getint (config, INISEC_GLOBAL, "tickleval", 30); + options->timeout = iniparser_getint (config, INISEC_GLOBAL, "timeout", 4); + options->dsireadbuf = iniparser_getint (config, INISEC_GLOBAL, "dsireadbuf", 12); + options->server_quantum = iniparser_getint (config, INISEC_GLOBAL, "server quantum", DSI_SERVQUANT_DEF); + options->volnamelen = iniparser_getint (config, INISEC_GLOBAL, "volnamelen", 80); + options->dircachesize = iniparser_getint (config, INISEC_GLOBAL, "dircachesize", DEFAULT_MAX_DIRCACHE_SIZE); + options->tcp_sndbuf = iniparser_getint (config, INISEC_GLOBAL, "tcpsndbuf", 0); + options->tcp_rcvbuf = iniparser_getint (config, INISEC_GLOBAL, "tcprcvbuf", 0); + options->fce_fmodwait = iniparser_getint (config, INISEC_GLOBAL, "fce holdfmod", 60); + options->sleep = iniparser_getint (config, INISEC_GLOBAL, "sleep time", 10); + options->disconnected = iniparser_getint (config, INISEC_GLOBAL, "disconnect time",24); + + if ((p = iniparser_getstring(config, INISEC_GLOBAL, "hostname", NULL))) { EC_NULL_LOG( options->hostname = strdup(p) ); } else { if (gethostname(val, sizeof(val)) < 0 ) { @@ -1409,21 +1687,21 @@ int afp_config_parse(AFPObj *AFPObj) options->hostname = strdup(val); } - if ((p = iniparser_getstring(config, INISEC_AFP, "k5keytab", NULL))) { + if ((p = iniparser_getstring(config, INISEC_GLOBAL, "k5 keytab", NULL))) { EC_NULL_LOG( options->k5keytab = malloc(strlen(p) + 14) ); snprintf(options->k5keytab, strlen(p) + 14, "KRB5_KTNAME=%s", p); putenv(options->k5keytab); } #ifdef ADMIN_GRP - if ((p = iniparser_getstring(config, INISEC_AFP, "admingroup", NULL))) { + if ((p = iniparser_getstring(config, INISEC_GLOBAL, "admin group", NULL))) { struct group *gr = getgrnam(p); if (gr != NULL) options->admingid = gr->gr_gid; } #endif /* ADMIN_GRP */ - q = iniparser_getstrdup(config, INISEC_AFP, "cnidserver", "localhost:4700"); + q = iniparser_getstrdup(config, INISEC_GLOBAL, "cnid server", "localhost:4700"); r = strrchr(q, ':'); if (r) *r = 0; @@ -1436,7 +1714,7 @@ int afp_config_parse(AFPObj *AFPObj) if (q) free(q); - if ((q = iniparser_getstrdup(config, INISEC_AFP, "fqdn", NULL))) { + if ((q = iniparser_getstrdup(config, INISEC_GLOBAL, "fqdn", NULL))) { /* do a little checking for the domain name. */ r = strchr(q, ':'); if (r) @@ -1451,35 +1729,64 @@ int afp_config_parse(AFPObj *AFPObj) free(q); } - if (!(p = iniparser_getstring(config, INISEC_AFP, "unixcodepage", NULL))) { - options->unixcharset = CH_UNIX; - options->unixcodepage = strdup("LOCALE"); + /* Charset Options */ + + /* unix charset is in [G] only */ + if (!(p = iniparser_getstring(config, INISEC_GLOBAL, "unix charset", NULL))) { + options->unixcodepage = strdup("UTF8"); + set_charset_name(CH_UNIX, "UTF8"); } else { - if ((options->unixcharset = add_charset(p)) == (charset_t)-1) { - options->unixcharset = CH_UNIX; - options->unixcodepage = strdup("LOCALE"); - LOG(log_warning, logtype_afpd, "Setting Unix codepage to '%s' failed", p); - } else { - options->unixcodepage = strdup(p); + if (strcasecmp(p, "LOCALE") == 0) { +#if defined(CODESET) + setlocale(LC_ALL, ""); + p = nl_langinfo(CODESET); + LOG(log_debug, logtype_afpd, "Locale charset is '%s'", p); +#else /* system doesn't have LOCALE support */ + LOG(log_warning, logtype_afpd, "system doesn't have LOCALE support"); + p = strdup("UTF8"); +#endif } + if (strcasecmp(p, "UTF-8") == 0) { + p = strdup("UTF8"); + } + options->unixcodepage = strdup(p); + set_charset_name(CH_UNIX, p); + } + options->unixcharset = CH_UNIX; + LOG(log_debug, logtype_afpd, "Global unix charset is %s", options->unixcodepage); + + /* vol charset is in [G] and [V] */ + if (!(p = iniparser_getstring(config, INISEC_GLOBAL, "vol charset", NULL))) { + options->volcodepage = strdup(options->unixcodepage); + } else { + if (strcasecmp(p, "UTF-8") == 0) { + p = strdup("UTF8"); + } + options->volcodepage = strdup(p); } - - if (!(p = iniparser_getstring(config, INISEC_AFP, "maccodepage", NULL))) { - options->maccharset = CH_MAC; + LOG(log_debug, logtype_afpd, "Global vol charset is %s", options->volcodepage); + + /* mac charset is in [G] and [V] */ + if (!(p = iniparser_getstring(config, INISEC_GLOBAL, "mac charset", NULL))) { options->maccodepage = strdup("MAC_ROMAN"); + set_charset_name(CH_MAC, "MAC_ROMAN"); } else { - if ((options->maccharset = add_charset(p)) == (charset_t)-1) { - options->maccharset = CH_MAC; - options->maccodepage = strdup("MAC_ROMAN"); - LOG(log_warning, logtype_afpd, "Setting Unix codepage to '%s' failed", p); - } else { - options->maccodepage = strdup(p); + if (strncasecmp(p, "MAC", 3) != 0) { + LOG(log_warning, logtype_afpd, "Is '%s' really mac charset? ", p); } + options->maccodepage = strdup(p); + set_charset_name(CH_MAC, p); } + options->maccharset = CH_MAC; + LOG(log_debug, logtype_afpd, "Global mac charset is %s", options->maccodepage); + + EC_ZERO_LOG( readextmap(options->extmapfile) ); /* Check for sane values */ if (options->tickleval <= 0) options->tickleval = 30; + options->disconnected *= 3600 / options->tickleval; + options->sleep *= 3600 / options->tickleval; if (options->timeout <= 0) options->timeout = 4; if (options->sleep <= 4) @@ -1489,9 +1796,8 @@ int afp_config_parse(AFPObj *AFPObj) if (options->volnamelen < 8) options->volnamelen = 8; /* max mangled volname "???#FFFF" */ if (options->volnamelen > 255) - options->volnamelen = 255; /* AFP3 spec */ + options->volnamelen = 255; /* AFP3 spec */ EC_CLEANUP: EC_EXIT; } -