2 Copyright (c) 2012 Frank Lahm <franklahm@gmail.com>
4 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2 of the License, or
7 (at your option) any later version.
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
17 #endif /* HAVE_CONFIG_H */
27 #include <sys/param.h>
28 #include <sys/socket.h>
29 #include <netinet/in.h>
30 #include <arpa/inet.h>
34 #include <atalk/afp.h>
35 #include <atalk/util.h>
36 #include <atalk/logger.h>
38 #include <atalk/globals.h>
39 #include <atalk/errchk.h>
40 #include <atalk/iniparser.h>
41 #include <atalk/unix.h>
42 #include <atalk/cnid.h>
43 #include <atalk/dsi.h>
44 #include <atalk/uuid.h>
45 #include <atalk/netatalk_conf.h>
49 #define IS_VAR(a, b) (strncmp((a), (b), 2) == 0)
51 /**************************************************************
53 **************************************************************/
55 static struct vol *Volumes = NULL;
56 static uint16_t lastvid = 0;
59 * Get a volumes UUID from the config file.
60 * If there is none, it is generated and stored there.
62 * Returns pointer to allocated storage on success, NULL on error.
64 static char *get_vol_uuid(const AFPObj *obj, const char *volname)
67 char buf[1024], uuid[UUID_PRINTABLE_STRING_LENGTH], *p;
72 if ((fp = fopen(obj->options.uuidconf, "r")) != NULL) { /* read open? */
73 /* scan in the conf file */
74 while (fgets(buf, sizeof(buf), fp) != NULL) {
76 while (p && isblank(*p))
78 if (!p || (*p == '#') || (*p == '\n'))
79 continue; /* invalid line */
82 if ((volname_conf = strtok( p, "\"" )) == NULL)
83 continue; /* syntax error */
85 if ((volname_conf = strtok( p, " \t" )) == NULL)
86 continue; /* syntax error: invalid name */
91 continue; /* syntax error */
93 if (strcmp(volname, volname_conf) != 0)
94 continue; /* another volume name */
96 while (p && isblank(*p))
99 if (sscanf(p, "%36s", uuid) == 1 ) {
100 for (int i=0; uuid[i]; i++)
101 uuid[i] = toupper(uuid[i]);
102 LOG(log_debug, logtype_afpd, "get_uuid('%s'): UUID: '%s'", volname, uuid);
112 /* not found or no file, reopen in append mode */
114 if (stat(obj->options.uuidconf, &tmpstat)) { /* no file */
115 if (( fd = creat(obj->options.uuidconf, 0644 )) < 0 ) {
116 LOG(log_error, logtype_afpd, "ERROR: Cannot create %s (%s).",
117 obj->options.uuidconf, strerror(errno));
120 if (( fp = fdopen( fd, "w" )) == NULL ) {
121 LOG(log_error, logtype_afpd, "ERROR: Cannot fdopen %s (%s).",
122 obj->options.uuidconf, strerror(errno));
126 } else if ((fp = fopen(obj->options.uuidconf, "a+")) == NULL) { /* not found */
127 LOG(log_error, logtype_afpd, "Cannot create or append to %s (%s).",
128 obj->options.uuidconf, strerror(errno));
131 fseek(fp, 0L, SEEK_END);
132 if(ftell(fp) == 0) { /* size = 0 */
133 fprintf(fp, "# DON'T TOUCH NOR COPY THOUGHTLESSLY!\n");
134 fprintf(fp, "# This file is auto-generated by afpd\n");
135 fprintf(fp, "# and stores UUIDs for TM volumes.\n\n");
137 fseek(fp, -1L, SEEK_END);
138 if(fgetc(fp) != '\n') fputc('\n', fp); /* last char is \n? */
141 /* generate uuid and write to file */
144 randombytes((void *)id, 16);
145 cp = uuid_bin2string(id);
147 LOG(log_debug, logtype_afpd, "get_uuid('%s'): generated UUID '%s'", volname, cp);
149 fprintf(fp, "\"%s\"\t%36s\n", volname, cp);
156 Check if the underlying filesystem supports EAs.
157 If not, switch to ea:ad.
158 As we can't check (requires write access) on ro-volumes, we switch ea:auto
159 volumes that are options:ro to ea:none.
161 static int do_check_ea_support(const struct vol *vol)
164 char eaname[] = {"org.netatalk.supports-eas.XXXXXX"};
165 const char *eacontent = "yes";
167 if ((vol->v_flags & AFPVOL_RO) == AFPVOL_RO) {
168 LOG(log_note, logtype_afpd, "read-only volume '%s', can't test for EA support, assuming yes", vol->v_localname);
176 if ((sys_setxattr(vol->v_path, eaname, eacontent, 4, 0)) == 0) {
177 sys_removexattr(vol->v_path, eaname);
180 LOG(log_warning, logtype_afpd, "volume \"%s\" does not support Extended Attributes",
190 static void check_ea_support(struct vol *vol)
193 char eaname[] = {"org.netatalk.supports-eas.XXXXXX"};
194 const char *eacontent = "yes";
196 haseas = do_check_ea_support(vol);
198 if (vol->v_vfs_ea == AFPVOL_EA_AUTO) {
199 if ((vol->v_flags & AFPVOL_RO) == AFPVOL_RO) {
200 LOG(log_info, logtype_afpd, "read-only volume '%s', can't test for EA support, disabling EAs", vol->v_localname);
201 vol->v_vfs_ea = AFPVOL_EA_NONE;
206 vol->v_vfs_ea = AFPVOL_EA_SYS;
208 LOG(log_warning, logtype_afpd, "volume \"%s\" does not support Extended Attributes, using ea:ad instead",
210 vol->v_vfs_ea = AFPVOL_EA_AD;
214 if (vol->v_adouble == AD_VERSION_EA) {
216 vol->v_adouble = AD_VERSION2;
221 * Check whether a volume supports ACLs
223 * @param vol (r) volume
225 * @returns 0 if not, 1 if yes
227 static int check_vol_acl_support(const struct vol *vol)
231 #ifdef HAVE_SOLARIS_ACLS
234 if (get_nfsv4_acl(vol->v_path, &aces) == -1)
237 #ifdef HAVE_POSIX_ACLS
240 if ((acl = acl_get_file(vol->v_path, ACL_TYPE_ACCESS)) == NULL)
244 #ifdef HAVE_SOLARIS_ACLS
245 if (aces) free(aces);
247 #ifdef HAVE_POSIX_ACLS
248 if (acl) acl_free(acl);
249 #endif /* HAVE_POSIX_ACLS */
251 LOG(log_debug, logtype_afpd, "Volume \"%s\" ACL support: %s",
252 vol->v_path, ret ? "yes" : "no");
257 * Handle variable substitutions. here's what we understand:
258 * $b -> basename of path
259 * $c -> client ip/appletalk address
260 * $d -> volume pathname on server
261 * $f -> full name (whatever's in the gecos field)
264 * $i -> client ip/appletalk address without port
265 * $s -> server name (hostname if it doesn't exist)
266 * $u -> username (guest is usually nobody)
267 * $v -> volume name or basename if null
270 * This get's called from readvolfile with
271 * path = NULL, volname = NULL for xlating the volumes path
272 * path = path, volname = NULL for xlating the volumes name
273 * ... and from volumes options parsing code when xlating eg dbpath with
274 * path = path, volname = volname
276 * Using this information we can reject xlation of any variable depeninding on a login
277 * context which is not given in the afp master, where we must evaluate this whole stuff
278 * too for the Zeroconf announcements.
280 static char *volxlate(const AFPObj *obj,
284 const struct passwd *pwd,
292 int xlatevolname = 0;
294 if (path && !volname)
302 dest = calloc(destlen +1, 1);
308 strlcpy(dest, src, destlen +1);
309 if ((p = strchr(src, '$')) == NULL) /* nothing to do */
312 /* first part of the path. just forward to the next variable. */
313 len = MIN((size_t)(p - src), destlen);
319 while (p && destlen > 0) {
320 /* now figure out what the variable is */
322 if (IS_VAR(p, "$b")) {
323 if (!obj->uid && xlatevolname)
326 if ((q = strrchr(path, '/')) == NULL)
328 else if (*(q + 1) != '\0')
331 } else if (IS_VAR(p, "$c")) {
332 if (!obj->uid && xlatevolname)
335 len = sprintf(dest, "%s:%u",
336 getip_string((struct sockaddr *)&dsi->client),
337 getip_port((struct sockaddr *)&dsi->client));
340 } else if (IS_VAR(p, "$d")) {
341 if (!obj->uid && xlatevolname)
344 } else if (pwd && IS_VAR(p, "$f")) {
345 if (!obj->uid && xlatevolname)
347 if ((r = strchr(pwd->pw_gecos, ',')))
350 } else if (pwd && IS_VAR(p, "$g")) {
351 if (!obj->uid && xlatevolname)
353 struct group *grp = getgrgid(pwd->pw_gid);
356 } else if (IS_VAR(p, "$h")) {
357 q = obj->options.hostname;
358 } else if (IS_VAR(p, "$i")) {
359 if (!obj->uid && xlatevolname)
362 q = getip_string((struct sockaddr *)&dsi->client);
363 } else if (IS_VAR(p, "$s")) {
364 q = obj->options.hostname;
365 } else if (obj->username && IS_VAR(p, "$u")) {
366 if (!obj->uid && xlatevolname)
369 if ( obj->options.ntseparator && (sep = strchr(obj->username, obj->options.ntseparator[0])) != NULL)
373 } else if (IS_VAR(p, "$v")) {
374 if (!obj->uid && xlatevolname)
380 if ((q = strrchr(path, '/')) == NULL)
382 else if (*(q + 1) != '\0')
385 } else if (IS_VAR(p, "$$")) {
390 /* copy the stuff over. if we don't understand something that we
391 * should, just skip it over. */
393 len = MIN(p == q ? 2 : strlen(q), destlen);
394 strncpy(dest, q, len);
399 /* stuff up to next $ */
401 p = strchr(src, '$');
402 len = p ? MIN((size_t)(p - src), destlen) : destlen;
404 strncpy(dest, src, len);
415 * this function wants something of the following form:
416 * "@group,name,name2,@group2,name3"
417 * A NULL argument allows everybody to have access.
418 * We return three things:
420 * 0: list exists, but name isn't in it
423 static int accessvol(const AFPObj *obj, const char *args, const char *name)
425 char buf[MAXPATHLEN + 1], *p;
431 strlcpy(buf, args, sizeof(buf));
432 if ((p = strtok(buf, ",")) == NULL) /* nothing, return okay */
436 if (*p == '@') { /* it's a group */
437 if ((gr = getgrnam(p + 1)) && gmem(gr->gr_gid, obj->ngroups, obj->groups))
439 } else if (strcasecmp(p, name) == 0) /* it's a user name */
441 p = strtok(NULL, ",");
447 static int hostaccessvol(const AFPObj *obj, const char *volname, const char *args)
450 char buf[MAXPATHLEN + 1], *p, *b;
451 struct sockaddr_storage client;
452 const DSI *dsi = obj->dsi;
457 strlcpy(buf, args, sizeof(buf));
458 if ((p = strtok_r(buf, ",", &b)) == NULL) /* nothing, return okay */
463 char *ipaddr, *mask_char;
464 struct addrinfo hints, *ai;
466 ipaddr = strtok(p, "/");
467 mask_char = strtok(NULL,"/");
469 /* Get address from string with getaddrinfo */
470 memset(&hints, 0, sizeof hints);
471 hints.ai_family = AF_UNSPEC;
472 hints.ai_socktype = SOCK_STREAM;
473 if ((ret = getaddrinfo(ipaddr, NULL, &hints, &ai)) != 0) {
474 LOG(log_error, logtype_afpd, "hostaccessvol: getaddrinfo: %s\n", gai_strerror(ret));
479 if (mask_char != NULL)
480 mask_int = atoi(mask_char); /* apply_ip_mask does range checking on it */
482 if (ai->ai_family == AF_INET) /* IPv4 */
488 /* Apply mask to addresses */
489 client = dsi->client;
490 apply_ip_mask((struct sockaddr *)&client, mask_int);
491 apply_ip_mask(ai->ai_addr, mask_int);
493 if (compare_ip((struct sockaddr *)&client, ai->ai_addr) == 0) {
500 p = strtok_r(NULL, ",", &b);
507 * Get option string from config, use default value if not set
509 * @param conf (r) config handle
510 * @param vol (r) volume name
511 * @param opt (r) option
512 * @param def (r) if "option" is not found in "name", try to find it in section "def"
514 * @returns const option string or NULL
516 static const char *getoption(const dictionary *conf, const char *vol, const char *opt, const char *def)
519 const char *result = NULL;
521 if (!(result = iniparser_getstring(conf, vol, opt, NULL)))
522 result = iniparser_getstring(conf, def, opt, NULL);
529 * Create volume struct
531 * @param obj (r) handle
532 * @param pwd (r) struct passwd of logged in user, may be NULL in master afpd
533 * @param path (r) volume path
534 * @param name (r) volume name
535 * @param preset (r) default preset, may be NULL
536 * @returns 0 on success, -1 on error
538 static int creatvol(AFPObj *obj,
539 const struct passwd *pwd,
545 struct vol *volume = NULL;
546 int suffixlen, vlen, tmpvlen, u8mvlen, macvlen;
547 char tmpname[AFPVOL_U8MNAMELEN+1];
548 ucs2_t u8mtmpname[(AFPVOL_U8MNAMELEN+1)*2], mactmpname[(AFPVOL_MACNAMELEN+1)*2];
549 char suffix[6]; /* max is #FFFF */
554 LOG(log_debug, logtype_afpd, "createvol(volume: '%s', path: \"%s\", preset: '%s'): BEGIN",
555 name, path, preset ? preset : "-");
557 if ( name == NULL || *name == '\0' ) {
558 if ((name = strrchr( path, '/' )) == NULL) {
562 /* if you wish to share /, you need to specify a name. */
567 /* Once volumes are loaded, we never change options again, we just delete em when they're removed from afp.conf */
568 for (struct vol *vol = Volumes; vol; vol = vol->v_next) {
569 if (STRCMP(name, ==, vol->v_localname)) {
570 LOG(log_debug, logtype_afpd, "createvol('%s'): already loaded", name);
577 * Check allow/deny lists:
578 * allow -> either no list (-1), or in list (1)
579 * deny -> either no list (-1), or not in list (0)
582 if (accessvol(obj, getoption(obj->iniconfig, name, "deny", preset), pwd->pw_name) == 1)
584 if (accessvol(obj, getoption(obj->iniconfig, name, "allow", preset), pwd->pw_name) == 0)
586 if (hostaccessvol(obj, name, getoption(obj->iniconfig, name, "denied_hosts", preset)) == 1)
588 if (hostaccessvol(obj, name, getoption(obj->iniconfig, name, "allowed_hosts", preset)) == 0)
592 EC_NULL( volume = calloc(1, sizeof(struct vol)) );
594 volume->v_flags = AFPVOL_USEDOTS | AFPVOL_UNIX_PRIV;
596 volume->v_flags |= AFPVOL_ACLS;
598 volume->v_vfs_ea = AFPVOL_EA_AUTO;
599 volume->v_umask = obj->options.umask;
601 if (val = getoption(obj->iniconfig, name, "password", preset))
602 EC_NULL( volume->v_password = strdup(val) );
604 if (val = getoption(obj->iniconfig, name, "veto", preset))
605 EC_NULL( volume->v_password = strdup(val) );
607 if (val = getoption(obj->iniconfig, name, "volcharset", preset))
608 EC_NULL( volume->v_volcodepage = strdup(val) );
610 if (val = getoption(obj->iniconfig, name, "maccharset", preset))
611 EC_NULL( volume->v_maccodepage = strdup(val) );
613 if (val = getoption(obj->iniconfig, name, "dbpath", preset))
614 EC_NULL( volume->v_dbpath = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) );
616 if (val = getoption(obj->iniconfig, name, "cnidscheme", preset))
617 EC_NULL( volume->v_cnidscheme = strdup(val) );
619 if (val = getoption(obj->iniconfig, name, "umask", preset))
620 volume->v_umask = (int)strtol(val, NULL, 8);
622 if (val = getoption(obj->iniconfig, name, "dperm", preset))
623 volume->v_dperm = (int)strtol(val, NULL, 8);
625 if (val = getoption(obj->iniconfig, name, "fperm", preset))
626 volume->v_fperm = (int)strtol(val, NULL, 8);
628 if (val = getoption(obj->iniconfig, name, "perm", preset))
629 volume->v_perm = (int)strtol(val, NULL, 8);
631 if (val = getoption(obj->iniconfig, name, "volsizelimit", preset))
632 volume->v_limitsize = (uint32_t)strtoul(val, NULL, 10);
634 if (val = getoption(obj->iniconfig, name, "preexec", preset))
635 EC_NULL( volume->v_preexec = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) );
637 if (val = getoption(obj->iniconfig, name, "postexec", preset))
638 EC_NULL( volume->v_postexec = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) );
640 if (val = getoption(obj->iniconfig, name, "root_preexec", preset))
641 EC_NULL( volume->v_root_preexec = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) );
643 if (val = getoption(obj->iniconfig, name, "root_postexec", preset))
644 EC_NULL( volume->v_root_postexec = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) );
646 if (val = getoption(obj->iniconfig, name, "adouble", preset)) {
647 if (strcmp(val, "v2") == 0)
648 volume->v_adouble = AD_VERSION2;
649 else if (strcmp(val, "ea") == 0)
650 volume->v_adouble = AD_VERSION_EA;
652 volume->v_adouble = AD_VERSION;
655 if (val = getoption(obj->iniconfig, name, "cnidserver", preset)) {
656 EC_NULL( p = strdup(val) );
657 volume->v_cnidserver = p;
658 if (q = strrchr(val, ':')) {
660 volume->v_cnidport = q;
662 volume->v_cnidport = "4700";
667 if (val = getoption(obj->iniconfig, name, "ea", preset)) {
668 if (strcasecmp(val, "ad") == 0)
669 volume->v_vfs_ea = AFPVOL_EA_AD;
670 else if (strcasecmp(val, "sys") == 0)
671 volume->v_vfs_ea = AFPVOL_EA_SYS;
672 else if (strcasecmp(val, "none") == 0)
673 volume->v_vfs_ea = AFPVOL_EA_NONE;
676 if (val = getoption(obj->iniconfig, name, "casefold", preset)) {
677 if (strcasecmp(val, "tolower") == 0)
678 volume->v_casefold = AFPVOL_UMLOWER;
679 else if (strcasecmp(val, "toupper") == 0)
680 volume->v_casefold = AFPVOL_UMUPPER;
681 else if (strcasecmp(val, "xlatelower") == 0)
682 volume->v_casefold = AFPVOL_UUPPERMLOWER;
683 else if (strcasecmp(val, "xlateupper") == 0)
684 volume->v_casefold = AFPVOL_ULOWERMUPPER;
687 if (val = getoption(obj->iniconfig, name, "options", preset)) {
689 if (p = strtok(q, ", ")) {
691 if (strcasecmp(p, "ro") == 0)
692 volume->v_flags |= AFPVOL_RO;
693 else if (strcasecmp(p, "nohex") == 0)
694 volume->v_flags |= AFPVOL_NOHEX;
695 else if (strcasecmp(p, "nousedots") == 0)
696 volume->v_flags &= ~AFPVOL_USEDOTS;
697 else if (strcasecmp(p, "invisibledots") == 0)
698 volume->v_flags |= volume->v_flags;
699 else if (strcasecmp(p, "nostat") == 0)
700 volume->v_flags |= AFPVOL_NOSTAT;
701 else if (strcasecmp(p, "noupriv") == 0)
702 volume->v_flags &= ~AFPVOL_UNIX_PRIV;
703 else if (strcasecmp(p, "nodev") == 0)
704 volume->v_flags |= AFPVOL_NODEV;
705 else if (strcasecmp(p, "caseinsensitive") == 0)
706 volume->v_flags |= AFPVOL_CASEINSEN;
707 else if (strcasecmp(p, "illegalseq") == 0)
708 volume->v_flags |= AFPVOL_EILSEQ;
709 else if (strcasecmp(p, "tm") == 0)
710 volume->v_flags |= AFPVOL_TM;
711 else if (strcasecmp(p, "searchdb") == 0)
712 volume->v_flags |= AFPVOL_SEARCHDB;
713 else if (strcasecmp(p, "nonetids") == 0)
714 volume->v_flags |= AFPVOL_NONETIDS;
715 else if (strcasecmp(p, "noacls") == 0)
716 volume->v_flags &= ~AFPVOL_ACLS;
717 else if (strcasecmp(p, "nov2toeaconv") == 0)
718 volume->v_flags |= AFPVOL_NOV2TOEACONV;
719 else if (strcasecmp(p, "preexec_close") == 0)
720 volume->v_preexec_close = 1;
721 else if (strcasecmp(p, "root_preexec_close") == 0)
722 volume->v_root_preexec_close = 1;
723 p = strtok(NULL, ", ");
730 * Handle read-only behaviour. semantics:
731 * 1) neither the rolist nor the rwlist exist -> rw
732 * 2) rolist exists -> ro if user is in it.
733 * 3) rwlist exists -> ro unless user is in it.
736 if (accessvol(obj, getoption(obj->iniconfig, name, "rolist", preset), pwd->pw_name) == 1
737 || accessvol(obj, getoption(obj->iniconfig, name, "rwlist", preset), pwd->pw_name) == 0)
738 volume->v_flags |= AFPVOL_RO;
741 if ((volume->v_flags & AFPVOL_NODEV))
742 volume->v_ad_options |= ADVOL_NODEV;
743 if ((volume->v_flags & AFPVOL_UNIX_PRIV))
744 volume->v_ad_options |= ADVOL_UNIXPRIV;
745 if ((volume->v_flags & AFPVOL_INV_DOTS))
746 volume->v_ad_options |= ADVOL_INVDOTS;
748 /* Mac to Unix conversion flags*/
749 if (!(volume->v_flags & AFPVOL_NOHEX))
750 volume->v_mtou_flags |= CONV_ESCAPEHEX;
751 if (!(volume->v_flags & AFPVOL_USEDOTS))
752 volume->v_mtou_flags |= CONV_ESCAPEDOTS;
753 if ((volume->v_flags & AFPVOL_EILSEQ))
754 volume->v_mtou_flags |= CONV__EILSEQ;
756 if ((volume->v_casefold & AFPVOL_MTOUUPPER))
757 volume->v_mtou_flags |= CONV_TOUPPER;
758 else if ((volume->v_casefold & AFPVOL_MTOULOWER))
759 volume->v_mtou_flags |= CONV_TOLOWER;
761 /* Unix to Mac conversion flags*/
762 volume->v_utom_flags = CONV_IGNORE | CONV_UNESCAPEHEX;
763 if ((volume->v_casefold & AFPVOL_UTOMUPPER))
764 volume->v_utom_flags |= CONV_TOUPPER;
765 else if ((volume->v_casefold & AFPVOL_UTOMLOWER))
766 volume->v_utom_flags |= CONV_TOLOWER;
767 if ((volume->v_flags & AFPVOL_EILSEQ))
768 volume->v_utom_flags |= CONV__EILSEQ;
770 /* suffix for mangling use (lastvid + 1) */
771 /* because v_vid has not been decided yet. */
772 suffixlen = sprintf(suffix, "#%X", lastvid + 1 );
774 vlen = strlen( name );
776 /* Unicode Volume Name */
777 /* Firstly convert name from unixcharset to UTF8-MAC */
779 tmpvlen = convert_charset(obj->options.unixcharset, CH_UTF8_MAC, 0, name, vlen, tmpname, AFPVOL_U8MNAMELEN, &flags);
781 strcpy(tmpname, "???");
785 /* Do we have to mangle ? */
786 if ( (flags & CONV_REQMANGLE) || (tmpvlen > obj->options.volnamelen)) {
787 if (tmpvlen + suffixlen > obj->options.volnamelen) {
789 tmpvlen = convert_charset(obj->options.unixcharset, CH_UTF8_MAC, 0, name, vlen, tmpname, obj->options.volnamelen - suffixlen, &flags);
790 tmpname[tmpvlen >= 0 ? tmpvlen : 0] = 0;
792 strcat(tmpname, suffix);
793 tmpvlen = strlen(tmpname);
796 /* Secondly convert name from UTF8-MAC to UCS2 */
797 if ( 0 >= ( u8mvlen = convert_string(CH_UTF8_MAC, CH_UCS2, tmpname, tmpvlen, u8mtmpname, AFPVOL_U8MNAMELEN*2)) )
800 LOG(log_maxdebug, logtype_afpd, "createvol: Volume '%s' -> UTF8-MAC Name: '%s'", name, tmpname);
802 /* Maccharset Volume Name */
803 /* Firsty convert name from unixcharset to maccharset */
805 tmpvlen = convert_charset(obj->options.unixcharset, obj->options.maccharset, 0, name, vlen, tmpname, AFPVOL_U8MNAMELEN, &flags);
807 strcpy(tmpname, "???");
811 /* Do we have to mangle ? */
812 if ( (flags & CONV_REQMANGLE) || (tmpvlen > AFPVOL_MACNAMELEN)) {
813 if (tmpvlen + suffixlen > AFPVOL_MACNAMELEN) {
815 tmpvlen = convert_charset(obj->options.unixcharset,
816 obj->options.maccharset,
821 AFPVOL_MACNAMELEN - suffixlen,
823 tmpname[tmpvlen >= 0 ? tmpvlen : 0] = 0;
825 strcat(tmpname, suffix);
826 tmpvlen = strlen(tmpname);
829 /* Secondly convert name from maccharset to UCS2 */
830 if ( 0 >= ( macvlen = convert_string(obj->options.maccharset,
835 AFPVOL_U8MNAMELEN*2)) )
838 LOG(log_maxdebug, logtype_afpd, "createvol: Volume '%s' -> Longname: '%s'", name, tmpname);
840 EC_NULL( volume->v_localname = strdup(name) );
841 EC_NULL( volume->v_u8mname = strdup_w(u8mtmpname) );
842 EC_NULL( volume->v_macname = strdup_w(mactmpname) );
843 EC_NULL( volume->v_path = malloc(strlen(path) + 1) );
845 volume->v_name = utf8_encoding(obj) ? volume->v_u8mname : volume->v_macname;
846 strcpy(volume->v_path, path);
850 #endif /* __svr4__ */
852 /* os X start at 1 and use network order ie. 1 2 3 */
853 volume->v_vid = ++lastvid;
854 volume->v_vid = htons(volume->v_vid);
857 if (!check_vol_acl_support(volume)) {
858 LOG(log_debug, logtype_afpd, "creatvol(\"%s\"): disabling ACL support", volume->v_path);
859 volume->v_flags &= ~AFPVOL_ACLS;
863 volume->v_dperm |= volume->v_perm;
864 volume->v_fperm |= volume->v_perm;
866 /* Check EA support on volume */
867 if (volume->v_vfs_ea == AFPVOL_EA_AUTO || volume->v_adouble == AD_VERSION_EA)
868 check_ea_support(volume);
871 /* get/store uuid from file in afpd master*/
872 if (!(pwd) && (volume->v_flags & AFPVOL_TM)) {
873 char *uuid = get_vol_uuid(obj, volume->v_localname);
875 LOG(log_error, logtype_afpd, "Volume '%s': couldn't get UUID",
876 volume->v_localname);
878 volume->v_uuid = uuid;
879 LOG(log_debug, logtype_afpd, "Volume '%s': UUID '%s'",
880 volume->v_localname, volume->v_uuid);
884 /* no errors shall happen beyond this point because the cleanup would mess the volume chain up */
885 volume->v_next = Volumes;
896 LOG(log_debug, logtype_afpd, "createvol: END: %d", ret);
900 /* ----------------------
902 static int volfile_changed(struct afp_options *p)
906 if (!stat(p->configfile, &st) && st.st_mtime > p->volfile.mtime) {
907 p->volfile.mtime = st.st_mtime;
913 static int vol_section(const char *sec)
915 if (STRCMP(sec, ==, INISEC_GLOBAL))
917 if (STRCMP(sec, ==, INISEC_AFP))
919 if (STRCMP(sec, ==, INISEC_CNID))
924 #define MAXPRESETLEN 100
926 * Read volumes from iniconfig and add the volumes contained within to
927 * the global volume list. This gets called from the forked afpd childs.
928 * The master now reads this too for Zeroconf announcements.
930 static int readvolfile(AFPObj *obj, const struct passwd *pwent)
933 char path[MAXPATHLEN + 1];
934 char volname[AFPVOL_U8MNAMELEN + 1];
935 char tmp[MAXPATHLEN + 1];
936 const char *preset, *default_preset, *p;
939 LOG(log_debug, logtype_afpd, "readvolfile: BEGIN");
941 int secnum = iniparser_getnsec(obj->iniconfig);
942 LOG(log_debug, logtype_afpd, "readvolfile: sections: %d", secnum);
945 if ((p = iniparser_getstring(obj->iniconfig, INISEC_GLOBAL, "preset", NULL))) {
947 LOG(log_debug, logtype_afpd, "readvolfile: default_preset: %s", default_preset);
950 for (i = 0; i < secnum; i++) {
951 secname = iniparser_getsecname(obj->iniconfig, i);
953 if (!vol_section(secname))
957 if ((p = iniparser_getstring(obj->iniconfig, secname, "path", NULL)) == NULL)
959 strlcpy(tmp, p, MAXPATHLEN);
960 if (volxlate(obj, path, sizeof(path) - 1, tmp, pwent, NULL, NULL) == NULL)
963 strlcpy(tmp, secname, AFPVOL_U8MNAMELEN);
964 LOG(log_debug, logtype_afpd, "readvolfile: volume: %s", volname);
966 /* do variable substitution for volname */
967 if (volxlate(obj, volname, sizeof(volname) - 1, tmp, pwent, path, NULL) == NULL) {
971 preset = iniparser_getstring(obj->iniconfig, secname, "preset", NULL);
973 creatvol(obj, pwent, path, volname, preset ? preset : default_preset ? default_preset : NULL);
980 /**************************************************************
982 **************************************************************/
985 * Remove a volume from the linked list of volumes
987 void volume_unlink(struct vol *volume)
989 struct vol *vol, *ovol, *nvol;
991 if (volume == Volumes) {
995 for ( vol = Volumes->v_next, ovol = Volumes; vol; vol = nvol) {
1009 * Free all resources allocated in a struct vol, only struct dir *v_root can't be freed
1011 void volume_free(struct vol *vol)
1013 LOG(log_debug, logtype_afpd, "volume_free('%s'): BEGIN", vol->v_localname);
1015 free(vol->v_localname);
1016 free(vol->v_u8mname);
1017 free(vol->v_macname);
1019 free(vol->v_password);
1021 free(vol->v_volcodepage);
1022 free(vol->v_maccodepage);
1023 free(vol->v_cnidscheme);
1024 free(vol->v_dbpath);
1027 free(vol->v_cnidserver);
1029 /* NO! Just points to v_cnidserver + x */
1030 free(vol->v_cnidport);
1032 free(vol->v_root_preexec);
1033 free(vol->v_postexec);
1035 LOG(log_debug, logtype_afpd, "volume_free: END");
1039 * Initialize volumes and load ini configfile
1041 * Depending on the value of obj->uid either access checks are done (!=0) or skipped (=0)
1043 * @param obj (r) handle
1044 * @param delvol_fn (r) callback called for deleted volumes
1046 int load_volumes(AFPObj *obj, void (*delvol_fn)(struct vol *))
1050 struct passwd *pwent = NULL;
1055 LOG(log_debug, logtype_afpd, "load_volumes: BEGIN");
1058 if (!volfile_changed(&obj->options))
1060 for (vol = Volumes; vol; vol = vol->v_next)
1063 LOG(log_debug, logtype_afpd, "load_volumes: no volumes yet");
1064 EC_ZERO_LOG( lstat(obj->options.configfile, &st) );
1065 obj->options.volfile.mtime = st.st_mtime;
1068 /* try putting a read lock on the volume file twice, sleep 1 second if first attempt fails */
1070 fd = open(obj->options.configfile, O_RDONLY);
1072 while (retries < 2) {
1073 if ((read_lock(fd, 0, SEEK_SET, 0)) != 0) {
1076 LOG(log_error, logtype_afpd, "readvolfile: can't lock configfile \"%s\"",
1077 obj->options.configfile);
1087 pwent = getpwuid(obj->uid);
1090 iniparser_freedict(obj->iniconfig);
1091 LOG(log_debug, logtype_afpd, "load_volumes: loading: %s", obj->options.configfile);
1092 obj->iniconfig = iniparser_load(obj->options.configfile);
1094 EC_ZERO_LOG( readvolfile(obj, pwent) );
1096 for ( vol = Volumes; vol; vol = vol->v_next ) {
1097 if (vol->v_deleted) {
1098 LOG(log_debug, logtype_afpd, "load_volumes: deleted: %s", vol->v_localname);
1109 LOG(log_debug, logtype_afpd, "load_volumes: END");
1113 void unload_volumes(AFPObj *obj)
1117 LOG(log_debug, logtype_afpd, "unload_volumes: BEGIN");
1119 for (vol = Volumes; vol; vol = vol->v_next)
1122 obj->options.volfile.mtime = 0;
1124 LOG(log_debug, logtype_afpd, "unload_volumes: END");
1127 struct vol *getvolumes(void)
1132 struct vol *getvolbyvid(const uint16_t vid )
1136 for ( vol = Volumes; vol; vol = vol->v_next ) {
1137 if ( vid == vol->v_vid ) {
1141 if ( vol == NULL || ( vol->v_flags & AFPVOL_OPEN ) == 0 ) {
1148 struct vol *getvolbypath(const char *path)
1150 struct vol *vol = NULL;
1153 for (tmp = Volumes; tmp; tmp = tmp->v_next) {
1154 if (strncmp(path, tmp->v_path, strlen(tmp->v_path)) == 0) {
1164 * Initialize an AFPObj and options from ini config file
1166 int afp_config_parse(AFPObj *AFPObj)
1170 struct afp_options *options = &AFPObj->options;
1172 const char *p, *tmp;
1176 AFPObj->afp_version = 11;
1177 options->configfile = AFPObj->cmdlineconfigfile ? strdup(AFPObj->cmdlineconfigfile) : strdup(_PATH_CONFDIR "afp.conf");
1178 options->sigconffile = strdup(_PATH_CONFDIR "afp_signature.conf");
1179 options->uuidconf = strdup(_PATH_CONFDIR "afp_voluuid.conf");
1180 options->flags = OPTION_ACL2MACCESS | OPTION_UUID | OPTION_SERVERNOTIF | AFPObj->cmdlineflags;
1182 if ((config = iniparser_load(AFPObj->options.configfile)) == NULL)
1184 AFPObj->iniconfig = config;
1187 options->logconfig = iniparser_getstrdup(config, INISEC_GLOBAL, "loglevel", "default:note");
1188 options->logfile = iniparser_getstrdup(config, INISEC_GLOBAL, "logfile", NULL);
1190 /* [AFP] "options" options wo values */
1191 if (p = iniparser_getstrdup(config, INISEC_AFP, "options", NULL)) {
1192 if (p = strtok(q, ", ")) {
1194 if (strcasecmp(p, "nozeroconf"))
1195 options->flags |= OPTION_NOZEROCONF;
1196 if (strcasecmp(p, "icon"))
1197 options->flags |= OPTION_CUSTOMICON;
1198 if (strcasecmp(p, "noicon"))
1199 options->flags &= ~OPTION_CUSTOMICON;
1200 if (strcasecmp(p, "advertise_ssh"))
1201 options->flags |= OPTION_ANNOUNCESSH;
1202 if (strcasecmp(p, "noacl2maccess"))
1203 options->flags &= ~OPTION_ACL2MACCESS;
1204 if (strcasecmp(p, "keepsessions"))
1205 options->flags |= OPTION_KEEPSESSIONS;
1206 if (strcasecmp(p, "closevol"))
1207 options->flags |= OPTION_CLOSEVOL;
1208 if (strcasecmp(p, "client_polling"))
1209 options->flags &= ~OPTION_SERVERNOTIF;
1210 if (strcasecmp(p, "nosavepassword"))
1211 options->passwdbits |= PASSWD_NOSAVE;
1212 if (strcasecmp(p, "savepassword"))
1213 options->passwdbits &= ~PASSWD_NOSAVE;
1214 if (strcasecmp(p, "nosetpassword"))
1215 options->passwdbits &= ~PASSWD_SET;
1216 if (strcasecmp(p, "setpassword"))
1217 options->passwdbits |= PASSWD_SET;
1218 p = strtok(NULL, ", ");
1222 /* figure out options w values */
1224 options->loginmesg = iniparser_getstrdup(config, INISEC_AFP, "loginmesg", "");
1225 options->guest = iniparser_getstrdup(config, INISEC_AFP, "guestname", "nobody");
1226 options->passwdfile = iniparser_getstrdup(config, INISEC_AFP, "passwdfile", _PATH_AFPDPWFILE);
1227 options->uampath = iniparser_getstrdup(config, INISEC_AFP, "uampath", _PATH_AFPDUAMPATH);
1228 options->uamlist = iniparser_getstrdup(config, INISEC_AFP, "uamlist", "uams_dhx.so,uams_dhx2.so");
1229 options->port = iniparser_getstrdup(config, INISEC_AFP, "port", "548");
1230 options->signatureopt = iniparser_getstrdup(config, INISEC_AFP, "signature", "auto");
1231 options->k5service = iniparser_getstrdup(config, INISEC_AFP, "k5service", NULL);
1232 options->k5realm = iniparser_getstrdup(config, INISEC_AFP, "k5realm", NULL);
1233 options->listen = iniparser_getstrdup(config, INISEC_AFP, "listen", NULL);
1234 options->ntdomain = iniparser_getstrdup(config, INISEC_AFP, "ntdomain", NULL);
1235 options->ntseparator = iniparser_getstrdup(config, INISEC_AFP, "ntseparator", NULL);
1236 options->mimicmodel = iniparser_getstrdup(config, INISEC_AFP, "mimicmodel", NULL);
1237 options->adminauthuser = iniparser_getstrdup(config, INISEC_AFP, "adminauthuser", NULL);
1238 options->connections = iniparser_getint (config, INISEC_AFP, "maxcon", 200);
1239 options->passwdminlen = iniparser_getint (config, INISEC_AFP, "passwdminlen", 0);
1240 options->tickleval = iniparser_getint (config, INISEC_AFP, "tickleval", 30);
1241 options->timeout = iniparser_getint (config, INISEC_AFP, "timeout", 4);
1242 options->dsireadbuf = iniparser_getint (config, INISEC_AFP, "dsireadbuf", 12);
1243 options->server_quantum = iniparser_getint (config, INISEC_AFP, "server_quantum", DSI_SERVQUANT_DEF);
1244 options->volnamelen = iniparser_getint (config, INISEC_AFP, "volnamelen", 80);
1245 options->dircachesize = iniparser_getint (config, INISEC_AFP, "dircachesize", DEFAULT_MAX_DIRCACHE_SIZE);
1246 options->tcp_sndbuf = iniparser_getint (config, INISEC_AFP, "tcpsndbuf", 0);
1247 options->tcp_rcvbuf = iniparser_getint (config, INISEC_AFP, "tcprcvbuf", 0);
1248 options->fce_fmodwait = iniparser_getint (config, INISEC_AFP, "fceholdfmod", 60);
1249 options->sleep = iniparser_getint (config, INISEC_AFP, "sleep", 10) * 60 * 2;
1250 options->disconnected = iniparser_getint (config, INISEC_AFP, "disconnect", 24) * 60 * 2;
1252 if ((p = iniparser_getstring(config, INISEC_AFP, "hostname", NULL))) {
1253 EC_NULL_LOG( options->hostname = strdup(p) );
1255 if (gethostname(val, sizeof(val)) < 0 ) {
1256 perror( "gethostname" );
1259 if ((q = strchr(val, '.')))
1261 options->hostname = strdup(val);
1264 if ((p = iniparser_getstring(config, INISEC_AFP, "k5keytab", NULL))) {
1265 EC_NULL_LOG( options->k5keytab = malloc(strlen(p) + 14) );
1266 snprintf(options->k5keytab, strlen(p) + 14, "KRB5_KTNAME=%s", p);
1267 putenv(options->k5keytab);
1271 if ((p = iniparser_getstring(config, INISEC_AFP, "admingroup", NULL))) {
1272 struct group *gr = getgrnam(p);
1274 options->admingid = gr->gr_gid;
1276 #endif /* ADMIN_GRP */
1278 q = iniparser_getstrdup(config, INISEC_AFP, "cnidserver", "localhost:4700");
1279 r = strrchr(q, ':');
1282 options->Cnid_srv = strdup(q);
1284 options->Cnid_port = strdup(r + 1);
1286 options->Cnid_port = strdup("4700");
1287 LOG(log_debug, logtype_afpd, "CNID Server: %s:%s", options->Cnid_srv, options->Cnid_port);
1291 if ((q = iniparser_getstrdup(config, INISEC_AFP, "fqdn", NULL))) {
1292 /* do a little checking for the domain name. */
1296 if (gethostbyname(q)) {
1299 EC_NULL_LOG( options->fqdn = strdup(q) );
1301 LOG(log_error, logtype_afpd, "error parsing -fqdn, gethostbyname failed for: %s", c);
1306 if (!(p = iniparser_getstring(config, INISEC_AFP, "unixcodepage", NULL))) {
1307 options->unixcharset = CH_UNIX;
1308 options->unixcodepage = strdup("LOCALE");
1310 if ((options->unixcharset = add_charset(p)) == (charset_t)-1) {
1311 options->unixcharset = CH_UNIX;
1312 options->unixcodepage = strdup("LOCALE");
1313 LOG(log_warning, logtype_afpd, "Setting Unix codepage to '%s' failed", p);
1315 options->unixcodepage = strdup(p);
1319 if (!(p = iniparser_getstring(config, INISEC_AFP, "maccodepage", NULL))) {
1320 options->maccharset = CH_MAC;
1321 options->maccodepage = strdup("MAC_ROMAN");
1323 if ((options->maccharset = add_charset(p)) == (charset_t)-1) {
1324 options->maccharset = CH_MAC;
1325 options->maccodepage = strdup("MAC_ROMAN");
1326 LOG(log_warning, logtype_afpd, "Setting Mac codepage to '%s' failed", p);
1328 options->maccodepage = strdup(p);
1332 /* Check for sane values */
1333 if (options->tickleval <= 0)
1334 options->tickleval = 30;
1335 if (options->timeout <= 0)
1336 options->timeout = 4;
1337 if (options->sleep <= 4)
1338 options->disconnected = options->sleep = 4;
1339 if (options->dsireadbuf < 6)
1340 options->dsireadbuf = 6;
1341 if (options->volnamelen < 8)
1342 options->volnamelen = 8; /* max mangled volname "???#FFFF" */
1343 if (options->volnamelen > 255)
1344 options->volnamelen = 255; /* AFP3 spec */