2 Copyright (c) 2012 Frank Lahm <franklahm@gmail.com>
4 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2 of the License, or
7 (at your option) any later version.
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
17 #endif /* HAVE_CONFIG_H */
27 #include <sys/param.h>
28 #include <sys/socket.h>
29 #include <netinet/in.h>
30 #include <arpa/inet.h>
41 #include <atalk/afp.h>
42 #include <atalk/util.h>
43 #include <atalk/logger.h>
45 #include <atalk/globals.h>
46 #include <atalk/errchk.h>
47 #include <atalk/iniparser.h>
48 #include <atalk/unix.h>
49 #include <atalk/cnid.h>
50 #include <atalk/dsi.h>
51 #include <atalk/uuid.h>
52 #include <atalk/netatalk_conf.h>
53 #include <atalk/bstrlib.h>
54 #include <atalk/bstradd.h>
57 #ifndef UUID_PRINTABLE_STRING_LENGTH
58 #define UUID_PRINTABLE_STRING_LENGTH 37
61 #define IS_VAR(a, b) (strncmp((a), (b), 2) == 0)
63 /**************************************************************
65 **************************************************************/
67 static int have_uservol = 0; /* whether there's generic user home share in config ("~" or "~/path", but not "~user") */
68 static struct vol *Volumes = NULL;
69 static uint16_t lastvid = 0;
72 * Get a volumes UUID from the config file.
73 * If there is none, it is generated and stored there.
75 * Returns pointer to allocated storage on success, NULL on error.
77 static char *get_vol_uuid(const AFPObj *obj, const char *volname)
80 char buf[1024], uuid[UUID_PRINTABLE_STRING_LENGTH], *p;
85 if ((fp = fopen(obj->options.uuidconf, "r")) != NULL) { /* read open? */
86 /* scan in the conf file */
87 while (fgets(buf, sizeof(buf), fp) != NULL) {
89 while (p && isblank(*p))
91 if (!p || (*p == '#') || (*p == '\n'))
92 continue; /* invalid line */
95 if ((volname_conf = strtok( p, "\"" )) == NULL)
96 continue; /* syntax error */
98 if ((volname_conf = strtok( p, " \t" )) == NULL)
99 continue; /* syntax error: invalid name */
104 continue; /* syntax error */
106 if (strcmp(volname, volname_conf) != 0)
107 continue; /* another volume name */
109 while (p && isblank(*p))
112 if (sscanf(p, "%36s", uuid) == 1 ) {
113 for (int i=0; uuid[i]; i++)
114 uuid[i] = toupper(uuid[i]);
115 LOG(log_debug, logtype_afpd, "get_uuid('%s'): UUID: '%s'", volname, uuid);
125 /* not found or no file, reopen in append mode */
127 if (stat(obj->options.uuidconf, &tmpstat)) { /* no file */
128 if (( fd = creat(obj->options.uuidconf, 0644 )) < 0 ) {
129 LOG(log_error, logtype_afpd, "ERROR: Cannot create %s (%s).",
130 obj->options.uuidconf, strerror(errno));
133 if (( fp = fdopen( fd, "w" )) == NULL ) {
134 LOG(log_error, logtype_afpd, "ERROR: Cannot fdopen %s (%s).",
135 obj->options.uuidconf, strerror(errno));
139 } else if ((fp = fopen(obj->options.uuidconf, "a+")) == NULL) { /* not found */
140 LOG(log_error, logtype_afpd, "Cannot create or append to %s (%s).",
141 obj->options.uuidconf, strerror(errno));
144 fseek(fp, 0L, SEEK_END);
145 if(ftell(fp) == 0) { /* size = 0 */
146 fprintf(fp, "# DON'T TOUCH NOR COPY THOUGHTLESSLY!\n");
147 fprintf(fp, "# This file is auto-generated by afpd\n");
148 fprintf(fp, "# and stores UUIDs for Time Machine volumes.\n\n");
150 fseek(fp, -1L, SEEK_END);
151 if(fgetc(fp) != '\n') fputc('\n', fp); /* last char is \n? */
154 /* generate uuid and write to file */
157 randombytes((void *)id, 16);
158 cp = uuid_bin2string(id);
160 LOG(log_debug, logtype_afpd, "get_uuid('%s'): generated UUID '%s'", volname, cp);
162 fprintf(fp, "\"%s\"\t%36s\n", volname, cp);
169 Check if the underlying filesystem supports EAs.
170 If not, switch to ea:ad.
171 As we can't check (requires write access) on ro-volumes, we switch ea:auto
172 volumes that are options:ro to ea:none.
175 static int do_check_ea_support(const struct vol *vol)
178 const char *eaname = "org.netatalk.has-Extended-Attributes";
179 const char *eacontent = "yes";
182 if (sys_lgetxattr(vol->v_path, eaname, buf, EABUFSZ) != -1)
185 if (vol->v_flags & AFPVOL_RO) {
186 LOG(log_debug, logtype_afpd, "read-only volume '%s', can't test for EA support, assuming yes", vol->v_localname);
192 if ((sys_setxattr(vol->v_path, eaname, eacontent, strlen(eacontent) + 1, 0)) == 0) {
195 LOG(log_warning, logtype_afpd, "volume \"%s\" does not support Extended Attributes or read-only volume",
205 static void check_ea_support(struct vol *vol)
209 haseas = do_check_ea_support(vol);
211 if (vol->v_vfs_ea == AFPVOL_EA_AUTO) {
213 vol->v_vfs_ea = AFPVOL_EA_SYS;
215 vol->v_vfs_ea = AFPVOL_EA_NONE;
218 if (vol->v_adouble == AD_VERSION_EA) {
220 vol->v_adouble = AD_VERSION2;
225 * Check whether a volume supports ACLs
227 * @param vol (r) volume
229 * @returns 0 if not, 1 if yes
231 static int check_vol_acl_support(const struct vol *vol)
235 #ifdef HAVE_SOLARIS_ACLS
238 if (get_nfsv4_acl(vol->v_path, &aces) == -1)
241 #ifdef HAVE_POSIX_ACLS
244 if ((acl = acl_get_file(vol->v_path, ACL_TYPE_ACCESS)) == NULL)
248 #ifdef HAVE_SOLARIS_ACLS
249 if (aces) free(aces);
251 #ifdef HAVE_POSIX_ACLS
252 if (acl) acl_free(acl);
253 #endif /* HAVE_POSIX_ACLS */
255 LOG(log_debug, logtype_afpd, "Volume \"%s\" ACL support: %s",
256 vol->v_path, ret ? "yes" : "no");
261 * Handle variable substitutions. here's what we understand:
262 * $b -> basename of path
263 * $c -> client ip/appletalk address
264 * $d -> volume pathname on server
265 * $f -> full name (whatever's in the gecos field)
268 * $i -> client ip/appletalk address without port
269 * $s -> server name (hostname if it doesn't exist)
270 * $u -> username (guest is usually nobody)
271 * $v -> volume name or basename if null
274 * This get's called from readvolfile with
275 * path = NULL, volname = NULL for xlating the volumes path
276 * path = path, volname = NULL for xlating the volumes name
277 * ... and from volumes options parsing code when xlating eg dbpath with
278 * path = path, volname = volname
280 * Using this information we can reject xlation of any variable depeninding on a login
281 * context which is not given in the afp master, where we must evaluate this whole stuff
282 * too for the Zeroconf announcements.
284 static char *volxlate(const AFPObj *obj,
288 const struct passwd *pwd,
296 int xlatevolname = 0;
298 if (path && !volname)
306 dest = calloc(destlen +1, 1);
312 strlcpy(dest, src, destlen +1);
313 if ((p = strchr(src, '$')) == NULL) /* nothing to do */
316 /* first part of the path. just forward to the next variable. */
317 len = MIN((size_t)(p - src), destlen);
323 while (p && destlen > 0) {
324 /* now figure out what the variable is */
326 if (IS_VAR(p, "$b")) {
328 if ((q = strrchr(path, '/')) == NULL)
330 else if (*(q + 1) != '\0')
333 } else if (IS_VAR(p, "$c")) {
334 if (IS_AFP_SESSION(obj)) {
336 len = sprintf(dest, "%s:%u",
337 getip_string((struct sockaddr *)&dsi->client),
338 getip_port((struct sockaddr *)&dsi->client));
342 } else if (IS_VAR(p, "$d")) {
344 } else if (pwd && IS_VAR(p, "$f")) {
345 if ((r = strchr(pwd->pw_gecos, ',')))
348 } else if (pwd && IS_VAR(p, "$g")) {
349 struct group *grp = getgrgid(pwd->pw_gid);
352 } else if (IS_VAR(p, "$h")) {
353 q = obj->options.hostname;
354 } else if (IS_VAR(p, "$i")) {
356 q = getip_string((struct sockaddr *)&dsi->client);
357 } else if (IS_VAR(p, "$s")) {
358 q = obj->options.hostname;
359 } else if (obj->username[0] && IS_VAR(p, "$u")) {
361 if ( obj->options.ntseparator && (sep = strchr(obj->username, obj->options.ntseparator[0])) != NULL)
365 } else if (IS_VAR(p, "$v")) {
370 if ((q = strrchr(path, '/')) == NULL)
372 else if (*(q + 1) != '\0')
375 } else if (IS_VAR(p, "$$")) {
380 /* copy the stuff over. if we don't understand something that we
381 * should, just skip it over. */
383 len = MIN(p == q ? 2 : strlen(q), destlen);
384 strncpy(dest, q, len);
389 /* stuff up to next $ */
391 p = strchr(src, '$');
392 len = p ? MIN((size_t)(p - src), destlen) : destlen;
394 strncpy(dest, src, len);
405 * this function wants a string consisting of names seperated by comma
406 * or space. Names may be quoted within a pair of quotes. Groups are
407 * denoted by a leading @ symbol.
409 * user1 user2, user3, @group1 @group2, @group3 "user name1", "@group name1"
410 * A NULL argument allows everybody to have access.
411 * We return three things:
413 * 0: list exists, but name isn't in it
416 static int accessvol(const AFPObj *obj, const char *args, const char *name)
419 char *names = NULL, *p;
425 EC_NULL_LOG( names = strdup(args) );
427 if ((p = strtok_quote(names, ", ")) == NULL) /* nothing, return okay */
431 if (*p == '@') { /* it's a group */
432 if ((gr = getgrnam(p + 1)) && gmem(gr->gr_gid, obj->ngroups, obj->groups))
434 } else if (strcasecmp(p, name) == 0) /* it's a user name */
436 p = strtok_quote(NULL, ", ");
445 static int hostaccessvol(const AFPObj *obj, const char *volname, const char *args)
448 char buf[MAXPATHLEN + 1], *p, *b;
449 struct sockaddr_storage client;
450 const DSI *dsi = obj->dsi;
455 strlcpy(buf, args, sizeof(buf));
456 if ((p = strtok_r(buf, ", ", &b)) == NULL) /* nothing, return okay */
461 char *ipaddr, *mask_char;
462 struct addrinfo hints, *ai;
464 ipaddr = strtok(p, "/");
465 mask_char = strtok(NULL,"/");
467 /* Get address from string with getaddrinfo */
468 memset(&hints, 0, sizeof hints);
469 hints.ai_family = AF_UNSPEC;
470 hints.ai_socktype = SOCK_STREAM;
471 if ((ret = getaddrinfo(ipaddr, NULL, &hints, &ai)) != 0) {
472 LOG(log_error, logtype_afpd, "hostaccessvol: getaddrinfo: %s\n", gai_strerror(ret));
477 if (mask_char != NULL)
478 mask_int = atoi(mask_char); /* apply_ip_mask does range checking on it */
480 if (ai->ai_family == AF_INET) /* IPv4 */
486 /* Apply mask to addresses */
487 client = dsi->client;
488 apply_ip_mask((struct sockaddr *)&client, mask_int);
489 apply_ip_mask(ai->ai_addr, mask_int);
491 if (compare_ip((struct sockaddr *)&client, ai->ai_addr) == 0) {
498 p = strtok_r(NULL, ", ", &b);
505 * Get option string from config, use default value if not set
507 * @param conf (r) config handle
508 * @param vol (r) volume name (must be section name ie wo vars expanded)
509 * @param opt (r) option
510 * @param defsec (r) if "option" is not found in "vol", try to find it in section "defsec"
511 * @param defval (r) if neither "vol" nor "defsec" contain "opt" return "defval"
513 * @returns const option string from "vol" or "defsec", or "defval" if not found
515 static const char *getoption(const dictionary *conf, const char *vol, const char *opt, const char *defsec, const char *defval)
519 if ((!(result = iniparser_getstring(conf, vol, opt, NULL))) && (defsec != NULL))
520 result = iniparser_getstring(conf, defsec, opt, NULL);
528 * Get boolean option from config, use default value if not set
530 * @param conf (r) config handle
531 * @param vol (r) volume name (must be section name ie wo vars expanded)
532 * @param opt (r) option
533 * @param defsec (r) if "option" is not found in "vol", try to find it in section "defsec"
534 * @param defval (r) if neither "vol" nor "defsec" contain "opt" return "defval"
536 * @returns const option string from "vol" or "defsec", or "defval" if not found
538 static int getoption_bool(const dictionary *conf, const char *vol, const char *opt, const char *defsec, int defval)
542 if (((result = iniparser_getboolean(conf, vol, opt, -1)) == -1) && (defsec != NULL))
543 result = iniparser_getboolean(conf, defsec, opt, -1);
551 * Create volume struct
553 * @param obj (r) handle
554 * @param pwd (r) struct passwd of logged in user, may be NULL in master afpd
555 * @param section (r) volume name wo variables expanded (exactly as in iniconfig)
556 * @param name (r) volume name
557 * @param path_in (r) volume path
558 * @param preset (r) default preset, may be NULL
559 * @returns vol on success, NULL on error
561 static struct vol *creatvol(AFPObj *obj,
562 const struct passwd *pwd,
569 struct vol *volume = NULL;
570 int i, suffixlen, vlen, tmpvlen, u8mvlen, macvlen;
571 char tmpname[AFPVOL_U8MNAMELEN+1];
572 char path[MAXPATHLEN + 1];
573 ucs2_t u8mtmpname[(AFPVOL_U8MNAMELEN+1)*2], mactmpname[(AFPVOL_MACNAMELEN+1)*2];
574 char suffix[6]; /* max is #FFFF */
579 strlcpy(path, path_in, MAXPATHLEN);
581 LOG(log_debug, logtype_afpd, "createvol(volume: '%s', path: \"%s\", preset: '%s'): BEGIN",
582 name, path, preset ? preset : "-");
584 if ( name == NULL || *name == '\0' ) {
585 if ((name = strrchr( path, '/' )) == NULL)
587 /* if you wish to share /, you need to specify a name. */
592 /* Once volumes are loaded, we never change options again, we just delete em when they're removed from afp.conf */
594 for (struct vol *vol = Volumes; vol; vol = vol->v_next) {
595 if (STRCMP(name, ==, vol->v_localname) && vol->v_deleted) {
597 * reloading config, volume still present, nothing else to do,
598 * we don't change options for volumes once they're loaded
604 if (STRCMP(path, ==, vol->v_path)) {
605 LOG(log_note, logtype_afpd, "volume \"%s\" path \"%s\" is the same as volumes \"%s\" path",
606 name, path, vol->v_configname);
610 * We could check for nested volume paths here, but
611 * nobody was able to come up with an implementation yet,
612 * that is simple, fast and correct.
617 * Check allow/deny lists:
618 * allow -> either no list (-1), or in list (1)
619 * deny -> either no list (-1), or not in list (0)
622 if (accessvol(obj, getoption(obj->iniconfig, section, "invalid users", preset, NULL), pwd->pw_name) == 1)
624 if (accessvol(obj, getoption(obj->iniconfig, section, "valid users", preset, NULL), pwd->pw_name) == 0)
626 if (hostaccessvol(obj, section, getoption(obj->iniconfig, section, "hosts deny", preset, NULL)) == 1)
628 if (hostaccessvol(obj, section, getoption(obj->iniconfig, section, "hosts allow", preset, NULL)) == 0)
632 EC_NULL( volume = calloc(1, sizeof(struct vol)) );
634 EC_NULL( volume->v_configname = strdup(section));
636 volume->v_vfs_ea = AFPVOL_EA_AUTO;
637 volume->v_umask = obj->options.umask;
639 if ((val = getoption(obj->iniconfig, section, "password", preset, NULL)))
640 EC_NULL( volume->v_password = strdup(val) );
642 if ((val = getoption(obj->iniconfig, section, "veto files", preset, NULL)))
643 EC_NULL( volume->v_veto = strdup(val) );
645 /* vol charset is in [G] and [V] */
646 if ((val = getoption(obj->iniconfig, section, "vol charset", preset, NULL))) {
647 if (strcasecmp(val, "UTF-8") == 0) {
648 val = strdup("UTF8");
650 EC_NULL( volume->v_volcodepage = strdup(val) );
653 EC_NULL( volume->v_volcodepage = strdup(obj->options.volcodepage) );
655 /* mac charset is in [G] and [V] */
656 if ((val = getoption(obj->iniconfig, section, "mac charset", preset, NULL))) {
657 if (strncasecmp(val, "MAC", 3) != 0) {
658 LOG(log_warning, logtype_afpd, "Is '%s' really mac charset? ", val);
660 EC_NULL( volume->v_maccodepage = strdup(val) );
663 EC_NULL( volume->v_maccodepage = strdup(obj->options.maccodepage) );
666 strlcpy(tmpname, name, sizeof(tmpname));
667 for(i = 0; i < vlen; i++)
668 if(tmpname[i] == '/') tmpname[i] = ':';
671 EC_NULL( val = iniparser_getstring(obj->iniconfig, INISEC_GLOBAL, "vol dbpath", _PATH_STATEDIR "CNID/") );
672 EC_NULL( dbpath = bformat("%s/%s/", val, tmpname) );
673 EC_NULL( volume->v_dbpath = strdup(cfrombstr(dbpath)) );
676 if ((val = getoption(obj->iniconfig, section, "cnid scheme", preset, NULL)))
677 EC_NULL( volume->v_cnidscheme = strdup(val) );
679 volume->v_cnidscheme = strdup(DEFAULT_CNID_SCHEME);
681 if ((val = getoption(obj->iniconfig, section, "umask", preset, NULL)))
682 volume->v_umask = (int)strtol(val, NULL, 8);
684 if ((val = getoption(obj->iniconfig, section, "directory perm", preset, NULL)))
685 volume->v_dperm = (int)strtol(val, NULL, 8);
687 if ((val = getoption(obj->iniconfig, section, "file perm", preset, NULL)))
688 volume->v_fperm = (int)strtol(val, NULL, 8);
690 if ((val = getoption(obj->iniconfig, section, "vol size limit", preset, NULL)))
691 volume->v_limitsize = (uint32_t)strtoul(val, NULL, 10);
693 if ((val = getoption(obj->iniconfig, section, "preexec", preset, NULL)))
694 EC_NULL( volume->v_preexec = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) );
696 if ((val = getoption(obj->iniconfig, section, "postexec", preset, NULL)))
697 EC_NULL( volume->v_postexec = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) );
699 if ((val = getoption(obj->iniconfig, section, "root preexec", preset, NULL)))
700 EC_NULL( volume->v_root_preexec = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) );
702 if ((val = getoption(obj->iniconfig, section, "root postexec", preset, NULL)))
703 EC_NULL( volume->v_root_postexec = volxlate(obj, NULL, MAXPATHLEN, val, pwd, path, name) );
705 if ((val = getoption(obj->iniconfig, section, "appledouble", preset, NULL))) {
706 if (strcmp(val, "v2") == 0)
707 volume->v_adouble = AD_VERSION2;
708 else if (strcmp(val, "ea") == 0)
709 volume->v_adouble = AD_VERSION_EA;
711 volume->v_adouble = AD_VERSION;
714 if ((val = getoption(obj->iniconfig, section, "cnid server", preset, NULL))) {
715 EC_NULL( p = strdup(val) );
716 volume->v_cnidserver = p;
717 if ((q = strrchr(val, ':'))) {
719 volume->v_cnidport = strdup(q);
721 volume->v_cnidport = strdup("4700");
725 volume->v_cnidserver = strdup(obj->options.Cnid_srv);
726 volume->v_cnidport = strdup(obj->options.Cnid_port);
729 if ((val = getoption(obj->iniconfig, section, "ea", preset, NULL))) {
730 if (strcasecmp(val, "ad") == 0)
731 volume->v_vfs_ea = AFPVOL_EA_AD;
732 else if (strcasecmp(val, "sys") == 0)
733 volume->v_vfs_ea = AFPVOL_EA_SYS;
734 else if (strcasecmp(val, "none") == 0)
735 volume->v_vfs_ea = AFPVOL_EA_NONE;
738 if ((val = getoption(obj->iniconfig, section, "casefold", preset, NULL))) {
739 if (strcasecmp(val, "tolower") == 0)
740 volume->v_casefold = AFPVOL_UMLOWER;
741 else if (strcasecmp(val, "toupper") == 0)
742 volume->v_casefold = AFPVOL_UMUPPER;
743 else if (strcasecmp(val, "xlatelower") == 0)
744 volume->v_casefold = AFPVOL_UUPPERMLOWER;
745 else if (strcasecmp(val, "xlateupper") == 0)
746 volume->v_casefold = AFPVOL_ULOWERMUPPER;
749 if (getoption_bool(obj->iniconfig, section, "read only", preset, 0))
750 volume->v_flags |= AFPVOL_RO;
751 if (getoption_bool(obj->iniconfig, section, "invisible dots", preset, 0))
752 volume->v_flags |= AFPVOL_INV_DOTS;
753 if (!getoption_bool(obj->iniconfig, section, "stat vol", preset, 1))
754 volume->v_flags |= AFPVOL_NOSTAT;
755 if (getoption_bool(obj->iniconfig, section, "unix priv", preset, 1))
756 volume->v_flags |= AFPVOL_UNIX_PRIV;
757 if (!getoption_bool(obj->iniconfig, section, "cnid dev", preset, 1))
758 volume->v_flags |= AFPVOL_NODEV;
759 if (getoption_bool(obj->iniconfig, section, "illegal seq", preset, 0))
760 volume->v_flags |= AFPVOL_EILSEQ;
761 if (getoption_bool(obj->iniconfig, section, "time machine", preset, 0))
762 volume->v_flags |= AFPVOL_TM;
763 if (getoption_bool(obj->iniconfig, section, "search db", preset, 0))
764 volume->v_flags |= AFPVOL_SEARCHDB;
765 if (!getoption_bool(obj->iniconfig, section, "network ids", preset, 1))
766 volume->v_flags |= AFPVOL_NONETIDS;
768 if (getoption_bool(obj->iniconfig, section, "acls", preset, 1))
769 volume->v_flags |= AFPVOL_ACLS;
771 if (!getoption_bool(obj->iniconfig, section, "convert appledouble", preset, 1))
772 volume->v_flags |= AFPVOL_NOV2TOEACONV;
773 if (getoption_bool(obj->iniconfig, section, "follow symlinks", preset, 0))
774 volume->v_flags |= AFPVOL_FOLLOWSYM;
775 if (getoption_bool(obj->iniconfig, section, "spotlight", preset, obj->options.flags & OPTION_SPOTLIGHT_VOL)) {
776 volume->v_flags |= AFPVOL_SPOTLIGHT;
777 obj->options.flags |= OPTION_SPOTLIGHT;
780 if (getoption_bool(obj->iniconfig, section, "preexec close", preset, 0))
781 volume->v_preexec_close = 1;
782 if (getoption_bool(obj->iniconfig, section, "root preexec close", preset, 0))
783 volume->v_root_preexec_close = 1;
786 * Handle read-only behaviour. semantics:
787 * 1) neither the rolist nor the rwlist exist -> rw
788 * 2) rolist exists -> ro if user is in it.
789 * 3) rwlist exists -> ro unless user is in it.
790 * 4) cnid scheme = last -> ro forcibly.
793 if (accessvol(obj, getoption(obj->iniconfig, section, "rolist", preset, NULL), pwd->pw_name) == 1
794 || accessvol(obj, getoption(obj->iniconfig, section, "rwlist", preset, NULL), pwd->pw_name) == 0)
795 volume->v_flags |= AFPVOL_RO;
797 if (0 == strcmp(volume->v_cnidscheme, "last"))
798 volume->v_flags |= AFPVOL_RO;
800 if ((volume->v_flags & AFPVOL_NODEV))
801 volume->v_ad_options |= ADVOL_NODEV;
802 if ((volume->v_flags & AFPVOL_UNIX_PRIV))
803 volume->v_ad_options |= ADVOL_UNIXPRIV;
804 if ((volume->v_flags & AFPVOL_INV_DOTS))
805 volume->v_ad_options |= ADVOL_INVDOTS;
806 if ((volume->v_flags & AFPVOL_FOLLOWSYM))
807 volume->v_ad_options |= ADVOL_FOLLO_SYML;
808 if ((volume->v_flags & AFPVOL_RO))
809 volume->v_ad_options |= ADVOL_RO;
811 /* Mac to Unix conversion flags*/
812 if ((volume->v_flags & AFPVOL_EILSEQ))
813 volume->v_mtou_flags |= CONV__EILSEQ;
815 if ((volume->v_casefold & AFPVOL_MTOUUPPER))
816 volume->v_mtou_flags |= CONV_TOUPPER;
817 else if ((volume->v_casefold & AFPVOL_MTOULOWER))
818 volume->v_mtou_flags |= CONV_TOLOWER;
820 /* Unix to Mac conversion flags*/
821 volume->v_utom_flags = CONV_IGNORE;
822 if ((volume->v_casefold & AFPVOL_UTOMUPPER))
823 volume->v_utom_flags |= CONV_TOUPPER;
824 else if ((volume->v_casefold & AFPVOL_UTOMLOWER))
825 volume->v_utom_flags |= CONV_TOLOWER;
826 if ((volume->v_flags & AFPVOL_EILSEQ))
827 volume->v_utom_flags |= CONV__EILSEQ;
829 /* suffix for mangling use (lastvid + 1) */
830 /* because v_vid has not been decided yet. */
831 suffixlen = sprintf(suffix, "#%X", lastvid + 1 );
833 /* Unicode Volume Name */
834 /* Firstly convert name from unixcharset to UTF8-MAC */
836 tmpvlen = convert_charset(obj->options.unixcharset, CH_UTF8_MAC, 0, name, vlen, tmpname, AFPVOL_U8MNAMELEN, &flags);
838 strcpy(tmpname, "???");
842 /* Do we have to mangle ? */
843 if ( (flags & CONV_REQMANGLE) || (tmpvlen > obj->options.volnamelen)) {
844 if (tmpvlen + suffixlen > obj->options.volnamelen) {
846 tmpvlen = convert_charset(obj->options.unixcharset, CH_UTF8_MAC, 0, name, vlen, tmpname, obj->options.volnamelen - suffixlen, &flags);
847 tmpname[tmpvlen >= 0 ? tmpvlen : 0] = 0;
849 strcat(tmpname, suffix);
850 tmpvlen = strlen(tmpname);
853 /* Secondly convert name from UTF8-MAC to UCS2 */
854 if ( 0 >= ( u8mvlen = convert_string(CH_UTF8_MAC, CH_UCS2, tmpname, tmpvlen, u8mtmpname, AFPVOL_U8MNAMELEN*2)) )
857 LOG(log_maxdebug, logtype_afpd, "createvol: Volume '%s' -> UTF8-MAC Name: '%s'", name, tmpname);
859 /* Maccharset Volume Name */
860 /* Firsty convert name from unixcharset to maccharset */
862 tmpvlen = convert_charset(obj->options.unixcharset, obj->options.maccharset, 0, name, vlen, tmpname, AFPVOL_U8MNAMELEN, &flags);
864 strcpy(tmpname, "???");
868 /* Do we have to mangle ? */
869 if ( (flags & CONV_REQMANGLE) || (tmpvlen > AFPVOL_MACNAMELEN)) {
870 if (tmpvlen + suffixlen > AFPVOL_MACNAMELEN) {
872 tmpvlen = convert_charset(obj->options.unixcharset,
873 obj->options.maccharset,
878 AFPVOL_MACNAMELEN - suffixlen,
880 tmpname[tmpvlen >= 0 ? tmpvlen : 0] = 0;
882 strcat(tmpname, suffix);
883 tmpvlen = strlen(tmpname);
886 /* Secondly convert name from maccharset to UCS2 */
887 if ( 0 >= ( macvlen = convert_string(obj->options.maccharset,
892 AFPVOL_U8MNAMELEN*2)) )
895 LOG(log_maxdebug, logtype_afpd, "createvol: Volume '%s' -> Longname: '%s'", name, tmpname);
897 EC_NULL( volume->v_localname = strdup(name) );
898 EC_NULL( volume->v_u8mname = strdup_w(u8mtmpname) );
899 EC_NULL( volume->v_macname = strdup_w(mactmpname) );
900 EC_NULL( volume->v_path = strdup(path) );
902 volume->v_name = utf8_encoding(obj) ? volume->v_u8mname : volume->v_macname;
906 #endif /* __svr4__ */
908 /* os X start at 1 and use network order ie. 1 2 3 */
909 volume->v_vid = ++lastvid;
910 volume->v_vid = htons(volume->v_vid);
913 if (!check_vol_acl_support(volume)) {
914 LOG(log_debug, logtype_afpd, "creatvol(\"%s\"): disabling ACL support", volume->v_path);
915 volume->v_flags &= ~AFPVOL_ACLS;
919 /* Check EA support on volume */
920 if (volume->v_vfs_ea == AFPVOL_EA_AUTO || volume->v_adouble == AD_VERSION_EA)
921 check_ea_support(volume);
924 /* get/store uuid from file in afpd master*/
926 char *uuid = get_vol_uuid(obj, volume->v_localname);
929 LOG(log_error, logtype_afpd, "Volume '%s': couldn't get UUID",
930 volume->v_localname);
932 volume->v_uuid = uuid;
933 LOG(log_debug, logtype_afpd, "Volume '%s': UUID '%s'",
934 volume->v_localname, volume->v_uuid);
937 /* no errors shall happen beyond this point because the cleanup would mess the volume chain up */
938 volume->v_next = Volumes;
943 LOG(log_debug, logtype_afpd, "createvol: END: %d", ret);
952 /* ----------------------
954 static int volfile_changed(struct afp_options *p)
958 if (!stat(p->configfile, &st) && st.st_mtime > p->volfile.mtime) {
959 p->volfile.mtime = st.st_mtime;
965 static int vol_section(const char *sec)
967 if (STRCMP(sec, ==, INISEC_GLOBAL))
972 #define MAXPRESETLEN 100
974 * Read volumes from iniconfig and add the volumes contained within to
975 * the global volume list. This gets called from the forked afpd childs.
976 * The master now reads this too for Zeroconf announcements.
978 static int readvolfile(AFPObj *obj, const struct passwd *pwent)
981 static int regexerr = -1;
984 char volname[AFPVOL_U8MNAMELEN + 1];
985 char path[MAXPATHLEN + 1], tmp[MAXPATHLEN + 1];
986 const char *preset, *default_preset, *p, *basedir;
990 LOG(log_debug, logtype_afpd, "readvolfile: BEGIN");
992 int secnum = iniparser_getnsec(obj->iniconfig);
993 LOG(log_debug, logtype_afpd, "readvolfile: sections: %d", secnum);
996 if ((default_preset = iniparser_getstring(obj->iniconfig, INISEC_GLOBAL, "vol preset", NULL))) {
997 LOG(log_debug, logtype_afpd, "readvolfile: default_preset: %s", default_preset);
1000 for (i = 0; i < secnum; i++) {
1001 secname = iniparser_getsecname(obj->iniconfig, i);
1003 if (!vol_section(secname))
1005 if (STRCMP(secname, ==, INISEC_HOMES)) {
1007 if (!IS_AFP_SESSION(obj)
1008 || strcmp(obj->username, obj->options.guest) == 0)
1009 /* not an AFP session, but cnid daemon, dbd or ad util, or guest login */
1011 if (pwent->pw_dir == NULL || STRCMP("", ==, pwent->pw_dir))
1015 if ((realpath(pwent->pw_dir, tmp)) == NULL)
1018 /* check if user home matches our "basedir regex" */
1019 if ((basedir = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "basedir regex", NULL)) == NULL) {
1020 LOG(log_error, logtype_afpd, "\"basedir regex =\" must be defined in [Homes] section");
1023 LOG(log_debug, logtype_afpd, "readvolfile: basedir regex: '%s'", basedir);
1025 if (regexerr != 0 && (regexerr = regcomp(®, basedir, REG_EXTENDED)) != 0) {
1027 regerror(regexerr, ®, errbuf, sizeof(errbuf));
1028 LOG(log_debug, logtype_default, "readvolfile: bad basedir regex: %s", errbuf);
1032 if (regexec(®, tmp, 1, match, 0) == REG_NOMATCH) {
1033 LOG(log_error, logtype_default, "readvolfile: user home \"%s\" doesn't match basedir regex \"%s\"",
1038 if ((p = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "path", NULL))) {
1039 strlcat(tmp, "/", MAXPATHLEN);
1040 strlcat(tmp, p, MAXPATHLEN);
1044 if ((p = iniparser_getstring(obj->iniconfig, secname, "path", NULL)) == NULL)
1046 strlcpy(tmp, p, MAXPATHLEN);
1049 if (volxlate(obj, path, sizeof(path) - 1, tmp, pwent, NULL, NULL) == NULL)
1052 /* do variable substitution for volume name */
1053 if (STRCMP(secname, ==, INISEC_HOMES)) {
1054 p = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "home name", "$u's home");
1055 if (strstr(p, "$u") == NULL) {
1056 LOG(log_warning, logtype_afpd, "home name must contain $u.");
1059 if (strchr(p, ':') != NULL) {
1060 LOG(log_warning, logtype_afpd, "home name must not contain \":\".");
1063 strlcpy(tmp, p, MAXPATHLEN);
1065 strlcpy(tmp, secname, AFPVOL_U8MNAMELEN);
1067 if (volxlate(obj, volname, sizeof(volname) - 1, tmp, pwent, path, NULL) == NULL)
1070 preset = iniparser_getstring(obj->iniconfig, secname, "vol preset", NULL);
1072 if ((realvolpath = realpath_safe(path)) == NULL)
1075 creatvol(obj, pwent, secname, volname, realvolpath, preset ? preset : default_preset ? default_preset : NULL);
1083 static struct extmap *Extmap = NULL, *Defextmap = NULL;
1084 static int Extmap_cnt;
1086 static int setextmap(char *ext, char *type, char *creator)
1092 if (Extmap == NULL) {
1093 EC_NULL_LOG( Extmap = calloc(1, sizeof( struct extmap )) );
1098 for (em = Extmap, cnt = 0; em->em_ext; em++, cnt++)
1099 if ((strdiacasecmp(em->em_ext, ext)) == 0)
1102 EC_NULL_LOG( Extmap = realloc(Extmap, sizeof(struct extmap) * (cnt + 2)) );
1103 (Extmap + cnt + 1)->em_ext = NULL;
1106 EC_NULL( em->em_ext = strdup(ext) );
1108 if ( *type == '\0' ) {
1109 memcpy(em->em_type, "\0\0\0\0", sizeof( em->em_type ));
1111 memcpy(em->em_type, type, sizeof( em->em_type ));
1113 if ( *creator == '\0' ) {
1114 memcpy(em->em_creator, "\0\0\0\0", sizeof( em->em_creator ));
1116 memcpy(em->em_creator, creator, sizeof( em->em_creator ));
1123 /* -------------------------- */
1124 static int extmap_cmp(const void *map1, const void *map2)
1126 const struct extmap *em1 = map1;
1127 const struct extmap *em2 = map2;
1128 return strdiacasecmp(em1->em_ext, em2->em_ext);
1131 static void sortextmap( void)
1136 if ((em = Extmap) == NULL) {
1139 while (em->em_ext) {
1144 qsort(Extmap, Extmap_cnt, sizeof(struct extmap), extmap_cmp);
1145 if (*Extmap->em_ext == 0) {
1146 /* the first line is really "." the default entry,
1147 * we remove the leading '.' in setextmap
1154 static void free_extmap( void)
1159 for ( em = Extmap; em->em_ext; em++) {
1169 static int ext_cmp_key(const void *key, const void *obj)
1171 const char *p = key;
1172 const struct extmap *em = obj;
1173 return strdiacasecmp(p, em->em_ext);
1176 struct extmap *getextmap(const char *path)
1181 if (!Extmap_cnt || NULL == ( p = strrchr( path, '.' )) ) {
1182 return( Defextmap );
1186 return( Defextmap );
1188 em = bsearch(p, Extmap, Extmap_cnt, sizeof(struct extmap), ext_cmp_key);
1192 return( Defextmap );
1196 struct extmap *getdefextmap(void)
1198 return( Defextmap );
1201 static int readextmap(const char *file)
1207 char type[5], creator[5];
1209 LOG(log_debug, logtype_afpd, "readextmap: loading \"%s\"", file);
1211 EC_NULL_LOGSTR( fp = fopen(file, "r"), "Couldn't open extension maping file %s", file);
1213 while (fgets(buf, sizeof(buf), fp) != NULL) {
1214 initline(strlen(buf), buf);
1215 parseline(sizeof(ext) - 1, ext);
1219 parseline(sizeof(type) - 1, type);
1220 parseline(sizeof(creator) - 1, creator);
1221 setextmap(ext, type, creator);
1222 LOG(log_debug, logtype_afpd, "readextmap: mapping: '%s' -> %s/%s", ext, type, creator);
1228 EC_ZERO( fclose(fp) );
1230 LOG(log_debug, logtype_afpd, "readextmap: done", file);
1236 /**************************************************************
1238 **************************************************************/
1241 * Remove a volume from the linked list of volumes
1243 void volume_unlink(struct vol *volume)
1245 struct vol *vol, *ovol, *nvol;
1247 if (volume == Volumes) {
1251 for ( vol = Volumes->v_next, ovol = Volumes; vol; vol = nvol) {
1254 if (vol == volume) {
1255 ovol->v_next = nvol;
1265 * Free all resources allocated in a struct vol in load_volumes()
1267 * Actually opening a volume (afp_openvol()) will allocate additional
1268 * ressources which are freed in closevol()
1270 void volume_free(struct vol *vol)
1272 free(vol->v_configname);
1273 free(vol->v_localname);
1274 free(vol->v_u8mname);
1275 free(vol->v_macname);
1277 free(vol->v_password);
1279 free(vol->v_volcodepage);
1280 free(vol->v_maccodepage);
1281 free(vol->v_cnidscheme);
1282 free(vol->v_dbpath);
1285 free(vol->v_cnidserver);
1286 free(vol->v_cnidport);
1287 free(vol->v_preexec);
1288 free(vol->v_root_preexec);
1289 free(vol->v_postexec);
1290 free(vol->v_root_postexec);
1296 * Load charsets for a volume
1298 int load_charset(struct vol *vol)
1300 if ((vol->v_maccharset = add_charset(vol->v_maccodepage)) == (charset_t)-1) {
1301 LOG(log_error, logtype_default, "Setting mac charset '%s' failed", vol->v_maccodepage);
1305 if ((vol->v_volcharset = add_charset(vol->v_volcodepage)) == (charset_t)-1) {
1306 LOG(log_error, logtype_default, "Setting vol charset '%s' failed", vol->v_volcodepage);
1314 * Initialize volumes and load ini configfile
1316 * Depending on the value of obj->uid either access checks are done (!=0) or skipped (=0)
1318 * @param obj (r) handle
1319 * @param delvol_fn (r) callback called for deleted volumes
1321 int load_volumes(AFPObj *obj)
1325 struct passwd *pwent = NULL;
1330 LOG(log_debug, logtype_afpd, "load_volumes: BEGIN");
1333 pwent = getpwuid(obj->uid);
1336 if (!volfile_changed(&obj->options))
1339 for (vol = Volumes; vol; vol = vol->v_next) {
1344 ret = set_groups(obj, pwent);
1347 LOG(log_error, logtype_afpd, "load_volumes: set_groups: %s", strerror(errno));
1352 LOG(log_debug, logtype_afpd, "load_volumes: no volumes yet");
1353 EC_ZERO_LOG( lstat(obj->options.configfile, &st) );
1354 obj->options.volfile.mtime = st.st_mtime;
1357 /* try putting a read lock on the volume file twice, sleep 1 second if first attempt fails */
1359 fd = open(obj->options.configfile, O_RDONLY);
1361 while (retries < 2) {
1362 if ((read_lock(fd, 0, SEEK_SET, 0)) != 0) {
1365 LOG(log_error, logtype_afpd, "readvolfile: can't lock configfile \"%s\"",
1366 obj->options.configfile);
1376 iniparser_freedict(obj->iniconfig);
1377 LOG(log_debug, logtype_afpd, "load_volumes: loading: %s", obj->options.configfile);
1378 obj->iniconfig = iniparser_load(obj->options.configfile);
1380 EC_ZERO_LOG( readvolfile(obj, pwent) );
1382 struct vol *p, *prevvol;
1388 if (vol->v_deleted && !(vol->v_flags & AFPVOL_OPEN)) {
1389 LOG(log_debug, logtype_afpd, "load_volumes: deleted: %s", vol->v_localname);
1391 prevvol->v_next = vol->v_next;
1407 LOG(log_debug, logtype_afpd, "load_volumes: END");
1411 void unload_volumes(AFPObj *obj)
1413 struct vol *vol, *p;
1415 LOG(log_debug, logtype_afpd, "unload_volumes: BEGIN");
1424 obj->options.volfile.mtime = 0;
1426 LOG(log_debug, logtype_afpd, "unload_volumes: END");
1429 struct vol *getvolumes(void)
1434 struct vol *getvolbyvid(const uint16_t vid )
1438 for ( vol = Volumes; vol; vol = vol->v_next ) {
1439 if ( vid == vol->v_vid ) {
1443 if ( vol == NULL || ( vol->v_flags & AFPVOL_OPEN ) == 0 ) {
1451 * get username by path
1453 * getvolbypath() assumes that the user home directory has the same name as the username.
1454 * If that is not true, getuserbypath() is called and tries to retrieve the username
1455 * from the directory owner, checking its validity.
1457 * @param path (r) absolute volume path
1458 * @returns NULL if no match is found, pointer to username if successfull
1461 static char *getuserbypath(const char *path)
1468 LOG(log_debug, logtype_afpd, "getuserbypath(\"%s\")", path);
1470 /* does folder exists? */
1471 if (stat(path, &sbuf) != 0)
1474 /* get uid of dir owner */
1475 if ((pwd = getpwuid(sbuf.st_uid)) == NULL)
1478 /* does user home directory exists? */
1479 if (stat(pwd->pw_dir, &sbuf) != 0)
1482 /* resolve and remove symlinks */
1483 if ((hdir = realpath_safe(pwd->pw_dir)) == NULL)
1486 /* handle subdirectories, path = */
1487 if (strncmp(path, hdir, strlen(hdir)) != 0)
1490 LOG(log_debug, logtype_afpd, "getuserbypath: match user: %s, home: %s, realhome: %s",
1491 pwd->pw_name, pwd->pw_dir, hdir);
1498 return pwd->pw_name;
1501 * Search volume by path, creating user home vols as necessary
1503 * Path may be absolute or relative. Ordinary volume structs are created when
1504 * the ini config is initially parsed (load_volumes()), but user volumes are
1505 * as load_volumes() only can create the user volume of the logged in user
1506 * in an AFP session in afpd, but not when called from eg cnid_metad or dbd.
1507 * Both cnid_metad and dbd thus need a way to lookup and create struct vols
1508 * for user home by path. This is what this func does as well.
1510 * (1) Search "normal" volume list
1511 * (2) Check if theres a [Homes] section, load_volumes() remembers this for us
1512 * (3) If there is, match "path" with "basedir regex" to get the user home parent dir
1513 * (4) Built user home path by appending the basedir matched in (3) and appending the username
1514 * (5) The next path element then is the username
1515 * (5b) getvolbypath() assumes that the user home directory has the same name as the username.
1516 * If that is not true, getuserbypath() is called and tries to retrieve the username
1517 * from the directory owner, checking its validity
1518 * (6) Append [Homes]->path subdirectory if defined
1521 * @param obj (rw) handle
1522 * @param path (r) path, may be relative or absolute
1524 struct vol *getvolbypath(AFPObj *obj, const char *path)
1527 static int regexerr = -1;
1531 const struct passwd *pw;
1532 char volname[AFPVOL_U8MNAMELEN + 1];
1533 char abspath[MAXPATHLEN + 1];
1534 char volpath[MAXPATHLEN + 1], *realvolpath = NULL;
1535 char tmpbuf[MAXPATHLEN + 1];
1536 const char *secname, *basedir, *p = NULL, *subpath = NULL, *subpathconfig;
1537 char *user = NULL, *prw;
1538 regmatch_t match[1];
1540 LOG(log_debug, logtype_afpd, "getvolbypath(\"%s\")", path);
1542 if (path[0] != '/') {
1543 /* relative path, build absolute path */
1544 EC_NULL_LOG( getcwd(abspath, MAXPATHLEN) );
1545 strlcat(abspath, "/", MAXPATHLEN);
1546 strlcat(abspath, path, MAXPATHLEN);
1551 for (tmp = Volumes; tmp; tmp = tmp->v_next) { /* (1) */
1552 if (strncmp(path, tmp->v_path, strlen(tmp->v_path)) == 0) {
1558 if (!have_uservol) /* (2) */
1559 EC_FAIL_LOG("getvolbypath(\"%s\"): no volume for path", path);
1561 int secnum = iniparser_getnsec(obj->iniconfig);
1563 for (int i = 0; i < secnum; i++) {
1564 secname = iniparser_getsecname(obj->iniconfig, i);
1565 if (STRCMP(secname, ==, INISEC_HOMES))
1569 if (STRCMP(secname, !=, INISEC_HOMES))
1570 EC_FAIL_LOG("getvolbypath(\"%s\"): no volume for path", path);
1573 EC_NULL_LOG( basedir = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "basedir regex", NULL) );
1574 LOG(log_debug, logtype_afpd, "getvolbypath: user home section: '%s', basedir: '%s'", secname, basedir);
1576 if (regexerr != 0 && (regexerr = regcomp(®, basedir, REG_EXTENDED)) != 0) {
1578 regerror(regexerr, ®, errbuf, sizeof(errbuf));
1579 printf("error: %s\n", errbuf);
1580 EC_FAIL_LOG("getvolbypath(\"%s\"): bad basedir regex: %s", errbuf);
1583 if (regexec(®, path, 1, match, 0) == REG_NOMATCH)
1584 EC_FAIL_LOG("getvolbypath(\"%s\"): no volume for path", path);
1586 if (match[0].rm_eo - match[0].rm_so > MAXPATHLEN)
1587 EC_FAIL_LOG("getvolbypath(\"%s\"): path too long", path);
1590 strncpy(tmpbuf, path + match[0].rm_so, match[0].rm_eo - match[0].rm_so);
1591 tmpbuf[match[0].rm_eo - match[0].rm_so] = 0;
1593 LOG(log_debug, logtype_afpd, "getvolbypath: basedir regex: '%s', basedir match: \"%s\"",
1596 strlcat(tmpbuf, "/", MAXPATHLEN);
1599 p = path + strlen(basedir);
1602 EC_NULL_LOG( user = strdup(p) );
1604 if ((prw = strchr(user, '/')))
1609 strlcat(tmpbuf, user, MAXPATHLEN);
1610 if (getpwnam(user) == NULL) {
1613 if ((tuser = getuserbypath(tmpbuf)) != NULL) {
1615 user = strdup(tuser);
1618 strlcpy(obj->username, user, MAXUSERLEN);
1619 strlcat(tmpbuf, "/", MAXPATHLEN);
1622 if ((subpathconfig = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "path", NULL))) {
1624 if (!subpath || strncmp(subpathconfig, subpath, strlen(subpathconfig)) != 0) {
1628 strlcat(tmpbuf, subpathconfig, MAXPATHLEN);
1629 strlcat(tmpbuf, "/", MAXPATHLEN);
1634 if (volxlate(obj, volpath, sizeof(volpath) - 1, tmpbuf, pw, NULL, NULL) == NULL)
1637 EC_NULL( realvolpath = realpath_safe(volpath) );
1638 EC_NULL( pw = getpwnam(user) );
1640 LOG(log_debug, logtype_afpd, "getvolbypath(\"%s\"): user: %s, homedir: %s => realvolpath: \"%s\"",
1641 path, user, pw->pw_dir, realvolpath);
1643 /* do variable substitution for volume name */
1644 p = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "home name", "$u's home");
1645 if (strstr(p, "$u") == NULL)
1647 strlcpy(tmpbuf, p, AFPVOL_U8MNAMELEN);
1648 EC_NULL_LOG( volxlate(obj, volname, sizeof(volname) - 1, tmpbuf, pw, realvolpath, NULL) );
1650 const char *preset, *default_preset;
1651 default_preset = iniparser_getstring(obj->iniconfig, INISEC_GLOBAL, "vol preset", NULL);
1652 preset = iniparser_getstring(obj->iniconfig, INISEC_HOMES, "vol preset", NULL);
1654 vol = creatvol(obj, pw, INISEC_HOMES, volname, realvolpath, preset ? preset : default_preset ? default_preset : NULL);
1666 struct vol *getvolbyname(const char *name)
1668 struct vol *vol = NULL;
1671 for (tmp = Volumes; tmp; tmp = tmp->v_next) {
1672 if (strncmp(name, tmp->v_configname, strlen(tmp->v_configname)) == 0) {
1682 * Initialize an AFPObj and options from ini config file
1684 int afp_config_parse(AFPObj *AFPObj, char *processname)
1688 struct afp_options *options = &AFPObj->options;
1694 if (processname != NULL)
1695 set_processname(processname);
1697 AFPObj->afp_version = 11;
1698 options->configfile = AFPObj->cmdlineconfigfile ? strdup(AFPObj->cmdlineconfigfile) : strdup(_PATH_CONFDIR "afp.conf");
1699 options->sigconffile = strdup(_PATH_STATEDIR "afp_signature.conf");
1700 options->uuidconf = strdup(_PATH_STATEDIR "afp_voluuid.conf");
1701 #ifdef HAVE_TRACKER_SPARQL
1702 options->slmod_path = strdup(_PATH_AFPDUAMPATH "slmod_sparql.so");
1704 #ifdef HAVE_TRACKER_RDF
1705 options->slmod_path = strdup(_PATH_AFPDUAMPATH "slmod_rdf.so");
1707 options->flags = OPTION_UUID | AFPObj->cmdlineflags;
1709 if ((config = iniparser_load(AFPObj->options.configfile)) == NULL)
1711 AFPObj->iniconfig = config;
1714 options->logconfig = iniparser_getstrdup(config, INISEC_GLOBAL, "log level", "default:note");
1715 options->logfile = iniparser_getstrdup(config, INISEC_GLOBAL, "log file", NULL);
1717 setuplog(options->logconfig, options->logfile);
1719 /* "server options" boolean options */
1720 if (!iniparser_getboolean(config, INISEC_GLOBAL, "zeroconf", 1))
1721 options->flags |= OPTION_NOZEROCONF;
1722 if (iniparser_getboolean(config, INISEC_GLOBAL, "advertise ssh", 0))
1723 options->flags |= OPTION_ANNOUNCESSH;
1724 if (iniparser_getboolean(config, INISEC_GLOBAL, "close vol", 0))
1725 options->flags |= OPTION_CLOSEVOL;
1726 if (!iniparser_getboolean(config, INISEC_GLOBAL, "client polling", 0))
1727 options->flags |= OPTION_SERVERNOTIF;
1728 if (!iniparser_getboolean(config, INISEC_GLOBAL, "use sendfile", 1))
1729 options->flags |= OPTION_NOSENDFILE;
1730 if (iniparser_getboolean(config, INISEC_GLOBAL, "solaris share reservations", 1))
1731 options->flags |= OPTION_SHARE_RESERV;
1732 if (iniparser_getboolean(config, INISEC_GLOBAL, "afpstats", 0))
1733 options->flags |= OPTION_DBUS_AFPSTATS;
1734 if (iniparser_getboolean(config, INISEC_GLOBAL, "afp read locks", 0))
1735 options->flags |= OPTION_AFP_READ_LOCK;
1736 if (iniparser_getboolean(config, INISEC_GLOBAL, "spotlight", 0))
1737 options->flags |= OPTION_SPOTLIGHT_VOL;
1738 if (!iniparser_getboolean(config, INISEC_GLOBAL, "save password", 1))
1739 options->passwdbits |= PASSWD_NOSAVE;
1740 if (iniparser_getboolean(config, INISEC_GLOBAL, "set password", 0))
1741 options->passwdbits |= PASSWD_SET;
1743 /* figure out options w values */
1744 options->loginmesg = iniparser_getstrdup(config, INISEC_GLOBAL, "login message", NULL);
1745 options->guest = iniparser_getstrdup(config, INISEC_GLOBAL, "guest account", "nobody");
1746 options->extmapfile = iniparser_getstrdup(config, INISEC_GLOBAL, "extmap file", _PATH_CONFDIR "extmap.conf");
1747 options->passwdfile = iniparser_getstrdup(config, INISEC_GLOBAL, "passwd file", _PATH_AFPDPWFILE);
1748 options->uampath = iniparser_getstrdup(config, INISEC_GLOBAL, "uam path", _PATH_AFPDUAMPATH);
1749 options->uamlist = iniparser_getstrdup(config, INISEC_GLOBAL, "uam list", "uams_dhx.so uams_dhx2.so");
1750 options->port = iniparser_getstrdup(config, INISEC_GLOBAL, "afp port", "548");
1751 options->signatureopt = iniparser_getstrdup(config, INISEC_GLOBAL, "signature", "");
1752 options->k5service = iniparser_getstrdup(config, INISEC_GLOBAL, "k5 service", NULL);
1753 options->k5realm = iniparser_getstrdup(config, INISEC_GLOBAL, "k5 realm", NULL);
1754 options->listen = iniparser_getstrdup(config, INISEC_GLOBAL, "afp listen", NULL);
1755 options->interfaces = iniparser_getstrdup(config, INISEC_GLOBAL, "afp interfaces", NULL);
1756 options->ntdomain = iniparser_getstrdup(config, INISEC_GLOBAL, "nt domain", NULL);
1757 options->addomain = iniparser_getstrdup(config, INISEC_GLOBAL, "ad domain", NULL);
1758 options->ntseparator = iniparser_getstrdup(config, INISEC_GLOBAL, "nt separator", NULL);
1759 options->mimicmodel = iniparser_getstrdup(config, INISEC_GLOBAL, "mimic model", NULL);
1760 options->adminauthuser = iniparser_getstrdup(config, INISEC_GLOBAL, "admin auth user",NULL);
1761 options->connections = iniparser_getint (config, INISEC_GLOBAL, "max connections",200);
1762 options->passwdminlen = iniparser_getint (config, INISEC_GLOBAL, "passwd minlen", 0);
1763 options->tickleval = iniparser_getint (config, INISEC_GLOBAL, "tickleval", 30);
1764 options->timeout = iniparser_getint (config, INISEC_GLOBAL, "timeout", 4);
1765 options->dsireadbuf = iniparser_getint (config, INISEC_GLOBAL, "dsireadbuf", 12);
1766 options->server_quantum = iniparser_getint (config, INISEC_GLOBAL, "server quantum", DSI_SERVQUANT_DEF);
1767 options->volnamelen = iniparser_getint (config, INISEC_GLOBAL, "volnamelen", 80);
1768 options->dircachesize = iniparser_getint (config, INISEC_GLOBAL, "dircachesize", DEFAULT_MAX_DIRCACHE_SIZE);
1769 options->tcp_sndbuf = iniparser_getint (config, INISEC_GLOBAL, "tcpsndbuf", 0);
1770 options->tcp_rcvbuf = iniparser_getint (config, INISEC_GLOBAL, "tcprcvbuf", 0);
1771 options->fce_fmodwait = iniparser_getint (config, INISEC_GLOBAL, "fce holdfmod", 60);
1772 options->sleep = iniparser_getint (config, INISEC_GLOBAL, "sleep time", 10);
1773 options->disconnected = iniparser_getint (config, INISEC_GLOBAL, "disconnect time",24);
1775 p = iniparser_getstring(config, INISEC_GLOBAL, "map acls", "rights");
1776 if (STRCMP(p, ==, "rights"))
1777 options->flags |= OPTION_ACL2MACCESS;
1778 else if (STRCMP(p, ==, "mode"))
1779 options->flags |= OPTION_ACL2MODE | OPTION_ACL2MACCESS;
1781 if (STRCMP(p, !=, "none")) {
1782 LOG(log_error, logtype_afpd, "bad ACL mapping option: %s, defaulting to 'rights'", p);
1783 options->flags |= OPTION_ACL2MACCESS;
1787 if ((p = iniparser_getstring(config, INISEC_GLOBAL, "hostname", NULL))) {
1788 EC_NULL_LOG( options->hostname = strdup(p) );
1790 if (gethostname(val, sizeof(val)) < 0 ) {
1791 perror( "gethostname" );
1794 if ((q = strchr(val, '.')))
1796 options->hostname = strdup(val);
1799 if ((p = iniparser_getstring(config, INISEC_GLOBAL, "k5 keytab", NULL))) {
1800 EC_NULL_LOG( options->k5keytab = malloc(strlen(p) + 14) );
1801 snprintf(options->k5keytab, strlen(p) + 14, "KRB5_KTNAME=%s", p);
1802 putenv(options->k5keytab);
1806 if ((p = iniparser_getstring(config, INISEC_GLOBAL, "admin group", NULL))) {
1807 struct group *gr = getgrnam(p);
1809 options->admingid = gr->gr_gid;
1811 #endif /* ADMIN_GRP */
1813 q = iniparser_getstrdup(config, INISEC_GLOBAL, "cnid server", "localhost:4700");
1814 r = strrchr(q, ':');
1817 options->Cnid_srv = strdup(q);
1819 options->Cnid_port = strdup(r + 1);
1821 options->Cnid_port = strdup("4700");
1822 LOG(log_debug, logtype_afpd, "CNID Server: %s:%s", options->Cnid_srv, options->Cnid_port);
1826 if ((q = iniparser_getstrdup(config, INISEC_GLOBAL, "fqdn", NULL))) {
1827 /* do a little checking for the domain name. */
1831 if (gethostbyname(q)) {
1834 EC_NULL_LOG( options->fqdn = strdup(q) );
1836 LOG(log_error, logtype_afpd, "error parsing -fqdn, gethostbyname failed for: %s", q);
1841 /* Charset Options */
1843 /* unix charset is in [G] only */
1844 if (!(p = iniparser_getstring(config, INISEC_GLOBAL, "unix charset", NULL))) {
1845 options->unixcodepage = strdup("UTF8");
1846 set_charset_name(CH_UNIX, "UTF8");
1848 if (strcasecmp(p, "LOCALE") == 0) {
1849 #if defined(CODESET)
1850 setlocale(LC_ALL, "");
1851 p = nl_langinfo(CODESET);
1852 LOG(log_debug, logtype_afpd, "Locale charset is '%s'", p);
1853 #else /* system doesn't have LOCALE support */
1854 LOG(log_warning, logtype_afpd, "system doesn't have LOCALE support");
1858 if (strcasecmp(p, "UTF-8") == 0) {
1861 options->unixcodepage = strdup(p);
1862 set_charset_name(CH_UNIX, p);
1864 options->unixcharset = CH_UNIX;
1865 LOG(log_debug, logtype_afpd, "Global unix charset is %s", options->unixcodepage);
1867 /* vol charset is in [G] and [V] */
1868 if (!(p = iniparser_getstring(config, INISEC_GLOBAL, "vol charset", NULL))) {
1869 options->volcodepage = strdup(options->unixcodepage);
1871 if (strcasecmp(p, "UTF-8") == 0) {
1874 options->volcodepage = strdup(p);
1876 LOG(log_debug, logtype_afpd, "Global vol charset is %s", options->volcodepage);
1878 /* mac charset is in [G] and [V] */
1879 if (!(p = iniparser_getstring(config, INISEC_GLOBAL, "mac charset", NULL))) {
1880 options->maccodepage = strdup("MAC_ROMAN");
1881 set_charset_name(CH_MAC, "MAC_ROMAN");
1883 if (strncasecmp(p, "MAC", 3) != 0) {
1884 LOG(log_warning, logtype_afpd, "Is '%s' really mac charset? ", p);
1886 options->maccodepage = strdup(p);
1887 set_charset_name(CH_MAC, p);
1889 options->maccharset = CH_MAC;
1890 LOG(log_debug, logtype_afpd, "Global mac charset is %s", options->maccodepage);
1892 if (readextmap(options->extmapfile) != 0) {
1893 LOG(log_error, logtype_afpd, "Couldn't load extension -> type/creator mappings file \"%s\"",
1894 options->extmapfile);
1897 /* Check for sane values */
1898 if (options->tickleval <= 0)
1899 options->tickleval = 30;
1900 options->disconnected *= 3600 / options->tickleval;
1901 options->sleep *= 3600 / options->tickleval;
1902 if (options->timeout <= 0)
1903 options->timeout = 4;
1904 if (options->sleep <= 4)
1905 options->disconnected = options->sleep = 4;
1906 if (options->dsireadbuf < 6)
1907 options->dsireadbuf = 6;
1908 if (options->volnamelen < 8)
1909 options->volnamelen = 8; /* max mangled volname "???#FFFF" */
1910 if (options->volnamelen > 255)
1911 options->volnamelen = 255; /* AFP3 spec */
1917 #define CONFIG_ARG_FREE(a) do { \
1922 /* get rid of any allocated afp_option buffers. */
1923 void afp_config_free(AFPObj *obj)
1925 if (obj->options.configfile)
1926 CONFIG_ARG_FREE(obj->options.configfile);
1927 if (obj->options.sigconffile)
1928 CONFIG_ARG_FREE(obj->options.sigconffile);
1929 if (obj->options.uuidconf)
1930 CONFIG_ARG_FREE(obj->options.uuidconf);
1931 if (obj->options.logconfig)
1932 CONFIG_ARG_FREE(obj->options.logconfig);
1933 if (obj->options.logfile)
1934 CONFIG_ARG_FREE(obj->options.logfile);
1935 if (obj->options.loginmesg)
1936 CONFIG_ARG_FREE(obj->options.loginmesg);
1937 if (obj->options.guest)
1938 CONFIG_ARG_FREE(obj->options.guest);
1939 if (obj->options.extmapfile)
1940 CONFIG_ARG_FREE(obj->options.extmapfile);
1941 if (obj->options.passwdfile)
1942 CONFIG_ARG_FREE(obj->options.passwdfile);
1943 if (obj->options.uampath)
1944 CONFIG_ARG_FREE(obj->options.uampath);
1945 if (obj->options.uamlist)
1946 CONFIG_ARG_FREE(obj->options.uamlist);
1947 if (obj->options.port)
1948 CONFIG_ARG_FREE(obj->options.port);
1949 if (obj->options.signatureopt)
1950 CONFIG_ARG_FREE(obj->options.signatureopt);
1951 if (obj->options.k5service)
1952 CONFIG_ARG_FREE(obj->options.k5service);
1953 if (obj->options.k5realm)
1954 CONFIG_ARG_FREE(obj->options.k5realm);
1955 if (obj->options.listen)
1956 CONFIG_ARG_FREE(obj->options.listen);
1957 if (obj->options.interfaces)
1958 CONFIG_ARG_FREE(obj->options.interfaces);
1959 if (obj->options.ntdomain)
1960 CONFIG_ARG_FREE(obj->options.ntdomain);
1961 if (obj->options.addomain)
1962 CONFIG_ARG_FREE(obj->options.addomain);
1963 if (obj->options.ntseparator)
1964 CONFIG_ARG_FREE(obj->options.ntseparator);
1965 if (obj->options.mimicmodel)
1966 CONFIG_ARG_FREE(obj->options.mimicmodel);
1967 if (obj->options.adminauthuser)
1968 CONFIG_ARG_FREE(obj->options.adminauthuser);
1969 if (obj->options.hostname)
1970 CONFIG_ARG_FREE(obj->options.hostname);
1971 if (obj->options.k5keytab)
1972 CONFIG_ARG_FREE(obj->options.k5keytab);
1973 if (obj->options.Cnid_srv)
1974 CONFIG_ARG_FREE(obj->options.Cnid_srv);
1975 if (obj->options.Cnid_port)
1976 CONFIG_ARG_FREE(obj->options.Cnid_port);
1977 if (obj->options.fqdn)
1978 CONFIG_ARG_FREE(obj->options.fqdn);
1979 if (obj->options.slmod_path)
1980 CONFIG_ARG_FREE(obj->options.slmod_path);
1982 if (obj->options.unixcodepage)
1983 CONFIG_ARG_FREE(obj->options.unixcodepage);
1984 if (obj->options.maccodepage)
1985 CONFIG_ARG_FREE(obj->options.maccodepage);
1986 if (obj->options.volcodepage)
1987 CONFIG_ARG_FREE(obj->options.volcodepage);
1989 obj->options.flags = 0;
1990 obj->options.passwdbits = 0;
1992 /* Free everything called from afp_config_parse() */
1994 iniparser_freedict(obj->iniconfig);
1995 free_charset_names();