mirror of
https://github.com/MidnightCommander/mc
synced 2024-12-23 12:56:51 +03:00
0a7899709b
Mostly \file and \brief tag added. Signed-off-by: Mikhail S. Pobolovets <styx.mp@gmail.com>
2029 lines
51 KiB
C
2029 lines
51 KiB
C
/* Virtual File System: FTP file system.
|
|
Copyright (C) 1995, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
|
|
2006, 2007 Free Software Foundation, Inc.
|
|
|
|
Written by: 1995 Ching Hui
|
|
1995 Jakub Jelinek
|
|
1995, 1996, 1997 Miguel de Icaza
|
|
1997 Norbert Warmuth
|
|
1998 Pavel Machek
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Library General Public License
|
|
as published by the Free Software Foundation; either version 2 of
|
|
the License, or (at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Library General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Library General Public
|
|
License along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. */
|
|
|
|
/**
|
|
* \file
|
|
* \brief Source: Virtual File System: FTP file system
|
|
* \author Ching Hui
|
|
* \author Jakub Jelinek
|
|
* \author Miguel de Icaza
|
|
* \author Norbert Warmuth
|
|
* \author Pavel Machek
|
|
* \date 1995, 1997, 1998
|
|
*
|
|
* \todo
|
|
- make it more robust - all the connects etc. should handle EADDRINUSE and
|
|
ERETRY (have I spelled these names correctly?)
|
|
- make the user able to flush a connection - all the caches will get empty
|
|
etc., (tarfs as well), we should give there a user selectable timeout
|
|
and assign a key sequence.
|
|
- use hash table instead of linklist to cache ftpfs directory.
|
|
|
|
What to do with this?
|
|
|
|
|
|
* NOTE: Usage of tildes is deprecated, consider:
|
|
* cd /#ftp:pavel@hobit
|
|
* cd ~
|
|
* And now: what do I want to do? Do I want to go to /home/pavel or to
|
|
* /#ftp:hobit/home/pavel? I think first has better sense...
|
|
*
|
|
{
|
|
int f = !strcmp( remote_path, "/~" );
|
|
if (f || !strncmp( remote_path, "/~/", 3 )) {
|
|
char *s;
|
|
s = concat_dir_and_file( qhome (*bucket), remote_path +3-f );
|
|
g_free (remote_path);
|
|
remote_path = s;
|
|
}
|
|
}
|
|
|
|
|
|
*/
|
|
|
|
/* \todo Fix: Namespace pollution: horrible */
|
|
|
|
#include <config.h>
|
|
#include <sys/types.h> /* POSIX-required by sys/socket.h and netdb.h */
|
|
#include <netdb.h> /* struct hostent */
|
|
#include <sys/socket.h> /* AF_INET */
|
|
#include <netinet/in.h> /* struct in_addr */
|
|
#ifdef HAVE_ARPA_INET_H
|
|
#include <arpa/inet.h>
|
|
#endif
|
|
#include <arpa/ftp.h>
|
|
#include <arpa/telnet.h>
|
|
#include <sys/param.h>
|
|
#include <errno.h>
|
|
#include <ctype.h>
|
|
|
|
#include "../src/global.h"
|
|
#include "../src/tty.h" /* enable/disable interrupt key */
|
|
#include "../src/wtools.h" /* message() */
|
|
#include "../src/main.h" /* print_vfs_message */
|
|
#include "../src/history.h"
|
|
#include "utilvfs.h"
|
|
#include "xdirentry.h"
|
|
#include "vfs.h"
|
|
#include "vfs-impl.h"
|
|
#include "gc.h" /* vfs_stamp_create */
|
|
#include "tcputil.h"
|
|
#include "../src/setup.h" /* for load_anon_passwd */
|
|
#include "ftpfs.h"
|
|
#ifndef MAXHOSTNAMELEN
|
|
# define MAXHOSTNAMELEN 64
|
|
#endif
|
|
|
|
#define UPLOAD_ZERO_LENGTH_FILE
|
|
#define SUP super->u.ftp
|
|
#define FH_SOCK fh->u.ftp.sock
|
|
|
|
#ifndef INADDR_NONE
|
|
#define INADDR_NONE 0xffffffff
|
|
#endif
|
|
|
|
#define RFC_AUTODETECT 0
|
|
#define RFC_DARING 1
|
|
#define RFC_STRICT 2
|
|
|
|
#ifndef HAVE_SOCKLEN_T
|
|
typedef int socklen_t;
|
|
#endif
|
|
|
|
static int ftpfs_errno;
|
|
static int code;
|
|
|
|
/* Delay to retry a connection */
|
|
int ftpfs_retry_seconds = 30;
|
|
|
|
/* Method to use to connect to ftp sites */
|
|
int ftpfs_use_passive_connections = 1;
|
|
int ftpfs_use_passive_connections_over_proxy = 0;
|
|
|
|
/* Method used to get directory listings:
|
|
* 1: try 'LIST -la <path>', if it fails
|
|
* fall back to CWD <path>; LIST
|
|
* 0: always use CWD <path>; LIST
|
|
*/
|
|
int ftpfs_use_unix_list_options = 1;
|
|
|
|
/* First "CWD <path>", then "LIST -la ." */
|
|
int ftpfs_first_cd_then_ls = 1;
|
|
|
|
/* Use the ~/.netrc */
|
|
int use_netrc = 1;
|
|
|
|
/* Anonymous setup */
|
|
char *ftpfs_anonymous_passwd = NULL;
|
|
int ftpfs_directory_timeout = 900;
|
|
|
|
/* Proxy host */
|
|
char *ftpfs_proxy_host = NULL;
|
|
|
|
/* wether we have to use proxy by default? */
|
|
int ftpfs_always_use_proxy;
|
|
|
|
#ifdef FIXME_LATER_ALIGATOR
|
|
static struct linklist *connections_list;
|
|
#endif
|
|
|
|
/* ftpfs_command wait_flag: */
|
|
#define NONE 0x00
|
|
#define WAIT_REPLY 0x01
|
|
#define WANT_STRING 0x02
|
|
static char reply_str [80];
|
|
|
|
static struct vfs_class vfs_ftpfs_ops;
|
|
|
|
/* char *ftpfs_translate_path (struct ftpfs_connection *bucket, char *remote_path)
|
|
Translate a Unix path, i.e. MC's internal path representation (e.g.
|
|
/somedir/somefile) to a path valid for the remote server. Every path
|
|
transfered to the remote server has to be mangled by this function
|
|
right prior to sending it.
|
|
Currently only Amiga ftp servers are handled in a special manner.
|
|
|
|
When the remote server is an amiga:
|
|
a) strip leading slash if necesarry
|
|
b) replace first occurance of ":/" with ":"
|
|
c) strip trailing "/."
|
|
*/
|
|
|
|
static char *ftpfs_get_current_directory (struct vfs_class *me, struct vfs_s_super *super);
|
|
static int ftpfs_chdir_internal (struct vfs_class *me, struct vfs_s_super *super, const char *remote_path);
|
|
static int ftpfs_command (struct vfs_class *me, struct vfs_s_super *super, int wait_reply, const char *fmt, ...)
|
|
__attribute__ ((format (__printf__, 4, 5)));
|
|
static int ftpfs_open_socket (struct vfs_class *me, struct vfs_s_super *super);
|
|
static int ftpfs_login_server (struct vfs_class *me, struct vfs_s_super *super, const char *netrcpass);
|
|
static int ftpfs_netrc_lookup (const char *host, char **login, char **pass);
|
|
|
|
static char *
|
|
ftpfs_translate_path (struct vfs_class *me, struct vfs_s_super *super, const char *remote_path)
|
|
{
|
|
if (!SUP.remote_is_amiga)
|
|
return g_strdup (remote_path);
|
|
else {
|
|
char *ret, *p;
|
|
|
|
if (MEDATA->logfile) {
|
|
fprintf (MEDATA->logfile, "MC -- ftpfs_translate_path: %s\n", remote_path);
|
|
fflush (MEDATA->logfile);
|
|
}
|
|
|
|
/* strip leading slash(es) */
|
|
while (*remote_path == '/')
|
|
remote_path++;
|
|
|
|
/*
|
|
* Don't change "/" into "", e.g. "CWD " would be
|
|
* invalid.
|
|
*/
|
|
if (*remote_path == '\0')
|
|
return g_strdup (".");
|
|
|
|
ret = g_strdup (remote_path);
|
|
|
|
/* replace first occurance of ":/" with ":" */
|
|
if ((p = strchr (ret, ':')) && *(p + 1) == '/')
|
|
strcpy (p + 1, p + 2);
|
|
|
|
/* strip trailing "/." */
|
|
if ((p = strrchr (ret, '/')) && *(p + 1) == '.' && *(p + 2) == '\0')
|
|
*p = '\0';
|
|
return ret;
|
|
}
|
|
}
|
|
|
|
/* Extract the hostname and username from the path */
|
|
|
|
/*
|
|
* path is in the form: [user@]hostname:port/remote-dir, e.g.:
|
|
* ftp://sunsite.unc.edu/pub/linux
|
|
* ftp://miguel@sphinx.nuclecu.unam.mx/c/nc
|
|
* ftp://tsx-11.mit.edu:8192/
|
|
* ftp://joe@foo.edu:11321/private
|
|
* If the user is empty, e.g. ftp://@roxanne/private, then your login name
|
|
* is supplied.
|
|
*
|
|
*/
|
|
|
|
#define FTP_COMMAND_PORT 21
|
|
|
|
static void
|
|
ftpfs_split_url(char *path, char **host, char **user, int *port, char **pass)
|
|
{
|
|
char *p;
|
|
|
|
p = vfs_split_url (path, host, user, port, pass, FTP_COMMAND_PORT,
|
|
URL_ALLOW_ANON);
|
|
|
|
if (!*user) {
|
|
/* Look up user and password in netrc */
|
|
if (use_netrc)
|
|
ftpfs_netrc_lookup (*host, user, pass);
|
|
if (!*user)
|
|
*user = g_strdup ("anonymous");
|
|
}
|
|
|
|
/* Look up password in netrc for known user */
|
|
if (use_netrc && *user && pass && !*pass) {
|
|
char *new_user;
|
|
|
|
ftpfs_netrc_lookup (*host, &new_user, pass);
|
|
|
|
/* If user is different, remove password */
|
|
if (new_user && strcmp (*user, new_user)) {
|
|
g_free (*pass);
|
|
*pass = NULL;
|
|
}
|
|
|
|
g_free (new_user);
|
|
}
|
|
|
|
g_free (p);
|
|
}
|
|
|
|
/* Returns a reply code, check /usr/include/arpa/ftp.h for possible values */
|
|
static int
|
|
ftpfs_get_reply (struct vfs_class *me, int sock, char *string_buf, int string_len)
|
|
{
|
|
char answer[BUF_1K];
|
|
int i;
|
|
|
|
for (;;) {
|
|
if (!vfs_s_get_line (me, sock, answer, sizeof (answer), '\n')){
|
|
if (string_buf)
|
|
*string_buf = 0;
|
|
code = 421;
|
|
return 4;
|
|
}
|
|
switch (sscanf(answer, "%d", &code)){
|
|
case 0:
|
|
if (string_buf)
|
|
g_strlcpy (string_buf, answer, string_len);
|
|
code = 500;
|
|
return 5;
|
|
case 1:
|
|
if (answer[3] == '-') {
|
|
while (1) {
|
|
if (!vfs_s_get_line (me, sock, answer, sizeof(answer), '\n')){
|
|
if (string_buf)
|
|
*string_buf = 0;
|
|
code = 421;
|
|
return 4;
|
|
}
|
|
if ((sscanf (answer, "%d", &i) > 0) &&
|
|
(code == i) && (answer[3] == ' '))
|
|
break;
|
|
}
|
|
}
|
|
if (string_buf)
|
|
g_strlcpy (string_buf, answer, string_len);
|
|
return code / 100;
|
|
}
|
|
}
|
|
}
|
|
|
|
static int
|
|
ftpfs_reconnect (struct vfs_class *me, struct vfs_s_super *super)
|
|
{
|
|
int sock = ftpfs_open_socket (me, super);
|
|
if (sock != -1){
|
|
char *cwdir = SUP.cwdir;
|
|
close (SUP.sock);
|
|
SUP.sock = sock;
|
|
SUP.cwdir = NULL;
|
|
if (ftpfs_login_server (me, super, SUP.password)){
|
|
if (!cwdir)
|
|
return 1;
|
|
sock = ftpfs_chdir_internal (me, super, cwdir);
|
|
g_free (cwdir);
|
|
return sock == COMPLETE;
|
|
}
|
|
SUP.cwdir = cwdir;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
ftpfs_command (struct vfs_class *me, struct vfs_s_super *super, int wait_reply, const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
char *cmdstr;
|
|
int status, cmdlen;
|
|
static int retry = 0;
|
|
static int level = 0; /* ftpfs_login_server() use ftpfs_command() */
|
|
|
|
va_start (ap, fmt);
|
|
cmdstr = g_strdup_vprintf (fmt, ap);
|
|
va_end (ap);
|
|
|
|
cmdlen = strlen (cmdstr);
|
|
cmdstr = g_realloc (cmdstr, cmdlen + 3);
|
|
strcpy (cmdstr + cmdlen, "\r\n");
|
|
cmdlen += 2;
|
|
|
|
if (MEDATA->logfile) {
|
|
if (strncmp (cmdstr, "PASS ", 5) == 0) {
|
|
fputs ("PASS <Password not logged>\r\n", MEDATA->logfile);
|
|
} else
|
|
fwrite (cmdstr, cmdlen, 1, MEDATA->logfile);
|
|
|
|
fflush (MEDATA->logfile);
|
|
}
|
|
|
|
got_sigpipe = 0;
|
|
enable_interrupt_key ();
|
|
status = write (SUP.sock, cmdstr, cmdlen);
|
|
|
|
if (status < 0) {
|
|
code = 421;
|
|
|
|
if (errno == EPIPE) { /* Remote server has closed connection */
|
|
if (level == 0) {
|
|
level = 1;
|
|
status = ftpfs_reconnect (me, super);
|
|
level = 0;
|
|
if (status && (write (SUP.sock, cmdstr, cmdlen) > 0)) {
|
|
goto ok;
|
|
}
|
|
|
|
}
|
|
got_sigpipe = 1;
|
|
}
|
|
g_free (cmdstr);
|
|
disable_interrupt_key ();
|
|
return TRANSIENT;
|
|
}
|
|
retry = 0;
|
|
ok:
|
|
disable_interrupt_key ();
|
|
|
|
if (wait_reply)
|
|
{
|
|
status = ftpfs_get_reply (me, SUP.sock,
|
|
(wait_reply & WANT_STRING) ? reply_str : NULL,
|
|
sizeof (reply_str) - 1);
|
|
if ((wait_reply & WANT_STRING) && !retry && !level && code == 421)
|
|
{
|
|
retry = 1;
|
|
level = 1;
|
|
status = ftpfs_reconnect (me, super);
|
|
level = 0;
|
|
if (status && (write (SUP.sock, cmdstr, cmdlen) > 0)) {
|
|
goto ok;
|
|
}
|
|
}
|
|
retry = 0;
|
|
g_free (cmdstr);
|
|
return status;
|
|
}
|
|
g_free (cmdstr);
|
|
return COMPLETE;
|
|
}
|
|
|
|
static void
|
|
ftpfs_free_archive (struct vfs_class *me, struct vfs_s_super *super)
|
|
{
|
|
if (SUP.sock != -1){
|
|
print_vfs_message (_("ftpfs: Disconnecting from %s"), SUP.host);
|
|
ftpfs_command(me, super, NONE, "QUIT");
|
|
close(SUP.sock);
|
|
}
|
|
g_free (SUP.host);
|
|
g_free (SUP.user);
|
|
g_free (SUP.cwdir);
|
|
g_free (SUP.password);
|
|
}
|
|
|
|
/* some defines only used by ftpfs_changetype */
|
|
/* These two are valid values for the second parameter */
|
|
#define TYPE_ASCII 0
|
|
#define TYPE_BINARY 1
|
|
|
|
/* This one is only used to initialize bucket->isbinary, don't use it as
|
|
second parameter to ftpfs_changetype. */
|
|
#define TYPE_UNKNOWN -1
|
|
|
|
static int
|
|
ftpfs_changetype (struct vfs_class *me, struct vfs_s_super *super, int binary)
|
|
{
|
|
if (binary != SUP.isbinary) {
|
|
if (ftpfs_command (me, super, WAIT_REPLY, "TYPE %c", binary ? 'I' : 'A') != COMPLETE)
|
|
ERRNOR (EIO, -1);
|
|
SUP.isbinary = binary;
|
|
}
|
|
return binary;
|
|
}
|
|
|
|
/* This routine logs the user in */
|
|
static int
|
|
ftpfs_login_server (struct vfs_class *me, struct vfs_s_super *super,
|
|
const char *netrcpass)
|
|
{
|
|
char *pass;
|
|
char *op;
|
|
char *name; /* login user name */
|
|
int anon = 0;
|
|
char reply_string[BUF_MEDIUM];
|
|
|
|
SUP.isbinary = TYPE_UNKNOWN;
|
|
|
|
if (SUP.password) /* explicit password */
|
|
op = g_strdup (SUP.password);
|
|
else if (netrcpass) /* password from netrc */
|
|
op = g_strdup (netrcpass);
|
|
else if (!strcmp (SUP.user, "anonymous") || !strcmp (SUP.user, "ftp")) {
|
|
if (!ftpfs_anonymous_passwd) /* default anonymous password */
|
|
ftpfs_init_passwd ();
|
|
op = g_strdup (ftpfs_anonymous_passwd);
|
|
anon = 1;
|
|
} else { /* ask user */
|
|
char *p;
|
|
|
|
p = g_strconcat (_(" FTP: Password required for "), SUP.user, " ",
|
|
NULL);
|
|
op = vfs_get_password (p);
|
|
g_free (p);
|
|
if (op == NULL)
|
|
ERRNOR (EPERM, 0);
|
|
SUP.password = g_strdup (op);
|
|
}
|
|
|
|
if (!anon || MEDATA->logfile)
|
|
pass = op;
|
|
else {
|
|
pass = g_strconcat ("-", op, (char *) NULL);
|
|
wipe_password (op);
|
|
}
|
|
|
|
/* Proxy server accepts: username@host-we-want-to-connect */
|
|
if (SUP.proxy) {
|
|
name =
|
|
g_strconcat (SUP.user, "@",
|
|
SUP.host[0] == '!' ? SUP.host + 1 : SUP.host,
|
|
NULL);
|
|
} else
|
|
name = g_strdup (SUP.user);
|
|
|
|
if (ftpfs_get_reply
|
|
(me, SUP.sock, reply_string,
|
|
sizeof (reply_string) - 1) == COMPLETE) {
|
|
g_strup (reply_string);
|
|
SUP.remote_is_amiga = strstr (reply_string, "AMIGA") != 0;
|
|
if (MEDATA->logfile) {
|
|
fprintf (MEDATA->logfile, "MC -- remote_is_amiga = %d\n",
|
|
SUP.remote_is_amiga);
|
|
fflush (MEDATA->logfile);
|
|
}
|
|
|
|
print_vfs_message (_("ftpfs: sending login name"));
|
|
|
|
switch (ftpfs_command (me, super, WAIT_REPLY, "USER %s", name)) {
|
|
case CONTINUE:
|
|
print_vfs_message (_("ftpfs: sending user password"));
|
|
code = ftpfs_command (me, super, WAIT_REPLY, "PASS %s", pass);
|
|
if (code == CONTINUE) {
|
|
char *p;
|
|
|
|
p = g_strdup_printf (_
|
|
("FTP: Account required for user %s"),
|
|
SUP.user);
|
|
op = input_dialog (p, _("Account:"), MC_HISTORY_FTPFS_ACCOUNT, "");
|
|
g_free (p);
|
|
if (op == NULL)
|
|
ERRNOR (EPERM, 0);
|
|
print_vfs_message (_("ftpfs: sending user account"));
|
|
code =
|
|
ftpfs_command (me, super, WAIT_REPLY, "ACCT %s", op);
|
|
g_free (op);
|
|
}
|
|
if (code != COMPLETE)
|
|
break;
|
|
/* fall through */
|
|
|
|
case COMPLETE:
|
|
print_vfs_message (_("ftpfs: logged in"));
|
|
wipe_password (pass);
|
|
g_free (name);
|
|
return 1;
|
|
|
|
default:
|
|
SUP.failed_on_login = 1;
|
|
if (SUP.password)
|
|
wipe_password (SUP.password);
|
|
SUP.password = 0;
|
|
|
|
goto login_fail;
|
|
}
|
|
}
|
|
message (D_ERROR, MSG_ERROR, _("ftpfs: Login incorrect for user %s "),
|
|
SUP.user);
|
|
login_fail:
|
|
wipe_password (pass);
|
|
g_free (name);
|
|
ERRNOR (EPERM, 0);
|
|
}
|
|
|
|
static struct no_proxy_entry {
|
|
char *domain;
|
|
void *next;
|
|
} *no_proxy;
|
|
|
|
static void
|
|
ftpfs_load_no_proxy_list (void)
|
|
{
|
|
/* FixMe: shouldn't be hardcoded!!! */
|
|
char s[BUF_LARGE]; /* provide for BUF_LARGE characters */
|
|
struct no_proxy_entry *np, *current = 0;
|
|
FILE *npf;
|
|
int c;
|
|
char *p;
|
|
static char *mc_file;
|
|
|
|
if (mc_file)
|
|
return;
|
|
|
|
mc_file = concat_dir_and_file (mc_home, "mc.no_proxy");
|
|
if (exist_file (mc_file) &&
|
|
(npf = fopen (mc_file, "r"))) {
|
|
while (fgets (s, sizeof (s), npf)) {
|
|
if (!(p = strchr (s, '\n'))) { /* skip bogus entries */
|
|
while ((c = fgetc (npf)) != EOF && c != '\n')
|
|
;
|
|
continue;
|
|
}
|
|
|
|
if (p == s)
|
|
continue;
|
|
|
|
*p = '\0';
|
|
|
|
np = g_new (struct no_proxy_entry, 1);
|
|
np->domain = g_strdup (s);
|
|
np->next = NULL;
|
|
if (no_proxy)
|
|
current->next = np;
|
|
else
|
|
no_proxy = np;
|
|
current = np;
|
|
}
|
|
|
|
fclose (npf);
|
|
}
|
|
g_free (mc_file);
|
|
}
|
|
|
|
/* Return 1 if FTP proxy should be used for this host, 0 otherwise */
|
|
static int
|
|
ftpfs_check_proxy (const char *host)
|
|
{
|
|
struct no_proxy_entry *npe;
|
|
|
|
if (!ftpfs_proxy_host || !*ftpfs_proxy_host || !host || !*host)
|
|
return 0; /* sanity check */
|
|
|
|
if (*host == '!')
|
|
return 1;
|
|
|
|
if (!ftpfs_always_use_proxy)
|
|
return 0;
|
|
|
|
if (!strchr (host, '.'))
|
|
return 0;
|
|
|
|
ftpfs_load_no_proxy_list ();
|
|
for (npe = no_proxy; npe; npe=npe->next) {
|
|
char *domain = npe->domain;
|
|
|
|
if (domain[0] == '.') {
|
|
int ld = strlen (domain);
|
|
int lh = strlen (host);
|
|
|
|
while (ld && lh && host[lh - 1] == domain[ld - 1]) {
|
|
ld--;
|
|
lh--;
|
|
}
|
|
|
|
if (!ld)
|
|
return 0;
|
|
} else
|
|
if (!g_strcasecmp (host, domain))
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
static void
|
|
ftpfs_get_proxy_host_and_port (const char *proxy, char **host, int *port)
|
|
{
|
|
char *user, *dir;
|
|
|
|
dir =
|
|
vfs_split_url (proxy, host, &user, port, 0, FTP_COMMAND_PORT,
|
|
URL_ALLOW_ANON);
|
|
g_free (user);
|
|
g_free (dir);
|
|
}
|
|
|
|
static int
|
|
ftpfs_open_socket (struct vfs_class *me, struct vfs_s_super *super)
|
|
{
|
|
struct sockaddr_in server_address;
|
|
struct hostent *hp;
|
|
int my_socket;
|
|
char *host;
|
|
int port = SUP.port;
|
|
int free_host = 0;
|
|
|
|
(void) me;
|
|
|
|
/* Use a proxy host? */
|
|
host = SUP.host;
|
|
|
|
if (!host || !*host){
|
|
print_vfs_message (_("ftpfs: Invalid host name."));
|
|
ftpfs_errno = EINVAL;
|
|
return -1;
|
|
}
|
|
|
|
/* Hosts to connect to that start with a ! should use proxy */
|
|
if (SUP.proxy){
|
|
ftpfs_get_proxy_host_and_port (ftpfs_proxy_host, &host, &port);
|
|
free_host = 1;
|
|
}
|
|
|
|
enable_interrupt_key(); /* clear the interrupt flag */
|
|
|
|
/* Get host address */
|
|
memset ((char *) &server_address, 0, sizeof (server_address));
|
|
server_address.sin_family = AF_INET;
|
|
server_address.sin_addr.s_addr = inet_addr (host);
|
|
if (server_address.sin_addr.s_addr == INADDR_NONE) {
|
|
hp = gethostbyname (host);
|
|
if (hp == NULL){
|
|
disable_interrupt_key();
|
|
print_vfs_message (_("ftpfs: Invalid host address."));
|
|
ftpfs_errno = EINVAL;
|
|
if (free_host)
|
|
g_free (host);
|
|
return -1;
|
|
}
|
|
server_address.sin_family = hp->h_addrtype;
|
|
|
|
/* We copy only 4 bytes, we cannot trust hp->h_length, as it comes from the DNS */
|
|
memcpy ((char *) &server_address.sin_addr, (char *) hp->h_addr, 4);
|
|
}
|
|
|
|
server_address.sin_port = htons (port);
|
|
|
|
/* Connect */
|
|
if ((my_socket = socket (AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
disable_interrupt_key();
|
|
ftpfs_errno = errno;
|
|
if (free_host)
|
|
g_free (host);
|
|
return -1;
|
|
}
|
|
|
|
print_vfs_message (_("ftpfs: making connection to %s"), host);
|
|
if (free_host)
|
|
g_free (host);
|
|
|
|
if (connect (my_socket, (struct sockaddr *) &server_address,
|
|
sizeof (server_address)) < 0){
|
|
ftpfs_errno = errno;
|
|
if (errno == EINTR && got_interrupt ())
|
|
print_vfs_message (_("ftpfs: connection interrupted by user"));
|
|
else
|
|
print_vfs_message (_("ftpfs: connection to server failed: %s"),
|
|
unix_error_string(errno));
|
|
disable_interrupt_key();
|
|
close (my_socket);
|
|
return -1;
|
|
}
|
|
disable_interrupt_key();
|
|
return my_socket;
|
|
}
|
|
|
|
static int
|
|
ftpfs_open_archive_int (struct vfs_class *me, struct vfs_s_super *super)
|
|
{
|
|
int retry_seconds, count_down;
|
|
|
|
/* We do not want to use the passive if we are using proxies */
|
|
if (SUP.proxy)
|
|
SUP.use_passive_connection = ftpfs_use_passive_connections_over_proxy;
|
|
|
|
retry_seconds = 0;
|
|
do {
|
|
SUP.failed_on_login = 0;
|
|
|
|
SUP.sock = ftpfs_open_socket (me, super);
|
|
if (SUP.sock == -1)
|
|
return -1;
|
|
|
|
if (ftpfs_login_server (me, super, NULL)) {
|
|
/* Logged in, no need to retry the connection */
|
|
break;
|
|
} else {
|
|
if (SUP.failed_on_login){
|
|
/* Close only the socket descriptor */
|
|
close (SUP.sock);
|
|
} else {
|
|
return -1;
|
|
}
|
|
if (ftpfs_retry_seconds){
|
|
retry_seconds = ftpfs_retry_seconds;
|
|
enable_interrupt_key ();
|
|
for (count_down = retry_seconds; count_down; count_down--){
|
|
print_vfs_message (_("Waiting to retry... %d (Control-C to cancel)"), count_down);
|
|
sleep (1);
|
|
if (got_interrupt ()){
|
|
/* ftpfs_errno = E; */
|
|
disable_interrupt_key ();
|
|
return 0;
|
|
}
|
|
}
|
|
disable_interrupt_key ();
|
|
}
|
|
}
|
|
} while (retry_seconds);
|
|
|
|
SUP.cwdir = ftpfs_get_current_directory (me, super);
|
|
if (!SUP.cwdir)
|
|
SUP.cwdir = g_strdup (PATH_SEP_STR);
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
ftpfs_open_archive (struct vfs_class *me, struct vfs_s_super *super,
|
|
const char *archive_name, char *op)
|
|
{
|
|
char *host, *user, *password;
|
|
int port;
|
|
|
|
(void) archive_name;
|
|
|
|
ftpfs_split_url (strchr (op, ':') + 1, &host, &user, &port, &password);
|
|
|
|
SUP.host = host;
|
|
SUP.user = user;
|
|
SUP.port = port;
|
|
SUP.cwdir = NULL;
|
|
SUP.proxy = 0;
|
|
if (ftpfs_check_proxy (host))
|
|
SUP.proxy = ftpfs_proxy_host;
|
|
SUP.password = password;
|
|
SUP.use_passive_connection = ftpfs_use_passive_connections;
|
|
SUP.strict = ftpfs_use_unix_list_options ? RFC_AUTODETECT : RFC_STRICT;
|
|
SUP.isbinary = TYPE_UNKNOWN;
|
|
SUP.remote_is_amiga = 0;
|
|
super->name = g_strdup ("/");
|
|
super->root =
|
|
vfs_s_new_inode (me, super,
|
|
vfs_s_default_stat (me, S_IFDIR | 0755));
|
|
|
|
return ftpfs_open_archive_int (me, super);
|
|
}
|
|
|
|
static int
|
|
ftpfs_archive_same (struct vfs_class *me, struct vfs_s_super *super,
|
|
const char *archive_name, char *op, void *cookie)
|
|
{
|
|
char *host, *user;
|
|
int port;
|
|
|
|
(void) me;
|
|
(void) archive_name;
|
|
(void) cookie;
|
|
|
|
ftpfs_split_url (strchr (op, ':') + 1, &host, &user, &port, 0);
|
|
|
|
port = ((strcmp (host, SUP.host) == 0)
|
|
&& (strcmp (user, SUP.user) == 0) && (port == SUP.port));
|
|
|
|
g_free (host);
|
|
g_free (user);
|
|
|
|
return port;
|
|
}
|
|
|
|
/* The returned directory should always contain a trailing slash */
|
|
static char *
|
|
ftpfs_get_current_directory (struct vfs_class *me, struct vfs_s_super *super)
|
|
{
|
|
char buf[BUF_8K], *bufp, *bufq;
|
|
|
|
if (ftpfs_command (me, super, NONE, "PWD") == COMPLETE &&
|
|
ftpfs_get_reply(me, SUP.sock, buf, sizeof(buf)) == COMPLETE) {
|
|
bufp = NULL;
|
|
for (bufq = buf; *bufq; bufq++)
|
|
if (*bufq == '"') {
|
|
if (!bufp) {
|
|
bufp = bufq + 1;
|
|
} else {
|
|
*bufq = 0;
|
|
if (*bufp) {
|
|
if (*(bufq - 1) != '/') {
|
|
*bufq++ = '/';
|
|
*bufq = 0;
|
|
}
|
|
if (*bufp == '/')
|
|
return g_strdup (bufp);
|
|
else {
|
|
/* If the remote server is an Amiga a leading slash
|
|
might be missing. MC needs it because it is used
|
|
as separator between hostname and path internally. */
|
|
return g_strconcat( "/", bufp, NULL);
|
|
}
|
|
} else {
|
|
ftpfs_errno = EIO;
|
|
return NULL;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
ftpfs_errno = EIO;
|
|
return NULL;
|
|
}
|
|
|
|
|
|
/* Setup Passive ftp connection, we use it for source routed connections */
|
|
static int
|
|
ftpfs_setup_passive (struct vfs_class *me, struct vfs_s_super *super, int my_socket, struct sockaddr_in *sa)
|
|
{
|
|
int xa, xb, xc, xd, xe, xf;
|
|
char n [6];
|
|
char *c;
|
|
|
|
if (ftpfs_command (me, super, WAIT_REPLY | WANT_STRING, "PASV") != COMPLETE)
|
|
return 0;
|
|
|
|
/* Parse remote parameters */
|
|
for (c = reply_str + 4; (*c) && (!isdigit ((unsigned char) *c)); c++)
|
|
;
|
|
if (!*c)
|
|
return 0;
|
|
if (!isdigit ((unsigned char) *c))
|
|
return 0;
|
|
if (sscanf (c, "%d,%d,%d,%d,%d,%d", &xa, &xb, &xc, &xd, &xe, &xf) != 6)
|
|
return 0;
|
|
n [0] = (unsigned char) xa;
|
|
n [1] = (unsigned char) xb;
|
|
n [2] = (unsigned char) xc;
|
|
n [3] = (unsigned char) xd;
|
|
n [4] = (unsigned char) xe;
|
|
n [5] = (unsigned char) xf;
|
|
|
|
memcpy (&(sa->sin_addr.s_addr), (void *)n, 4);
|
|
memcpy (&(sa->sin_port), (void *)&n[4], 2);
|
|
if (connect (my_socket, (struct sockaddr *) sa, sizeof (struct sockaddr_in)) < 0)
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
static int
|
|
ftpfs_initconn (struct vfs_class *me, struct vfs_s_super *super)
|
|
{
|
|
struct sockaddr_in data_addr;
|
|
int data;
|
|
socklen_t len = sizeof(data_addr);
|
|
struct protoent *pe;
|
|
|
|
pe = getprotobyname ("tcp");
|
|
if (pe == NULL)
|
|
ERRNOR (EIO, -1);
|
|
again:
|
|
if (getsockname (SUP.sock, (struct sockaddr *) &data_addr, &len) == -1)
|
|
ERRNOR (EIO, -1);
|
|
data_addr.sin_port = 0;
|
|
|
|
data = socket (AF_INET, SOCK_STREAM, pe->p_proto);
|
|
if (data < 0)
|
|
ERRNOR (EIO, -1);
|
|
|
|
if (SUP.use_passive_connection) {
|
|
if (ftpfs_setup_passive (me, super, data, &data_addr))
|
|
return data;
|
|
|
|
SUP.use_passive_connection = 0;
|
|
print_vfs_message (_("ftpfs: could not setup passive mode"));
|
|
|
|
/* data or data_addr may be damaged by ftpfs_setup_passive */
|
|
close (data);
|
|
goto again;
|
|
}
|
|
|
|
/* If passive setup fails, fallback to active connections */
|
|
/* Active FTP connection */
|
|
if ((bind (data, (struct sockaddr *)&data_addr, len) == 0) &&
|
|
(getsockname (data, (struct sockaddr *) &data_addr, &len) == 0) &&
|
|
(listen (data, 1) == 0))
|
|
{
|
|
unsigned char *a = (unsigned char *)&data_addr.sin_addr;
|
|
unsigned char *p = (unsigned char *)&data_addr.sin_port;
|
|
|
|
if (ftpfs_command (me, super, WAIT_REPLY, "PORT %d,%d,%d,%d,%d,%d", a[0], a[1],
|
|
a[2], a[3], p[0], p[1]) == COMPLETE)
|
|
return data;
|
|
}
|
|
close (data);
|
|
ftpfs_errno = EIO;
|
|
return -1;
|
|
}
|
|
|
|
static int
|
|
ftpfs_open_data_connection (struct vfs_class *me, struct vfs_s_super *super, const char *cmd,
|
|
const char *remote, int isbinary, int reget)
|
|
{
|
|
struct sockaddr_in from;
|
|
int s, j, data;
|
|
socklen_t fromlen = sizeof(from);
|
|
|
|
if ((s = ftpfs_initconn (me, super)) == -1)
|
|
return -1;
|
|
if (ftpfs_changetype (me, super, isbinary) == -1)
|
|
return -1;
|
|
if (reget > 0){
|
|
j = ftpfs_command (me, super, WAIT_REPLY, "REST %d", reget);
|
|
if (j != CONTINUE)
|
|
return -1;
|
|
}
|
|
if (remote) {
|
|
char *remote_path = ftpfs_translate_path (me, super, remote);
|
|
j = ftpfs_command (me, super, WAIT_REPLY, "%s /%s", cmd,
|
|
/* WarFtpD can't STORE //filename */
|
|
(*remote_path == '/') ? remote_path + 1 : remote_path);
|
|
g_free (remote_path);
|
|
} else
|
|
j = ftpfs_command (me, super, WAIT_REPLY, "%s", cmd);
|
|
if (j != PRELIM)
|
|
ERRNOR (EPERM, -1);
|
|
enable_interrupt_key();
|
|
if (SUP.use_passive_connection)
|
|
data = s;
|
|
else {
|
|
data = accept (s, (struct sockaddr *)&from, &fromlen);
|
|
if (data < 0) {
|
|
ftpfs_errno = errno;
|
|
close (s);
|
|
return -1;
|
|
}
|
|
close (s);
|
|
}
|
|
disable_interrupt_key();
|
|
return data;
|
|
}
|
|
|
|
#define ABORT_TIMEOUT 5
|
|
static void
|
|
ftpfs_linear_abort (struct vfs_class *me, struct vfs_s_fh *fh)
|
|
{
|
|
struct vfs_s_super *super = FH_SUPER;
|
|
static unsigned char const ipbuf[3] = { IAC, IP, IAC };
|
|
fd_set mask;
|
|
char buf[1024];
|
|
int dsock = FH_SOCK;
|
|
FH_SOCK = -1;
|
|
SUP.ctl_connection_busy = 0;
|
|
|
|
print_vfs_message (_("ftpfs: aborting transfer."));
|
|
if (send (SUP.sock, ipbuf, sizeof (ipbuf), MSG_OOB) != sizeof (ipbuf)) {
|
|
print_vfs_message (_("ftpfs: abort error: %s"),
|
|
unix_error_string (errno));
|
|
if (dsock != -1)
|
|
close (dsock);
|
|
return;
|
|
}
|
|
|
|
if (ftpfs_command (me, super, NONE, "%cABOR", DM) != COMPLETE) {
|
|
print_vfs_message (_("ftpfs: abort failed"));
|
|
if (dsock != -1)
|
|
close (dsock);
|
|
return;
|
|
}
|
|
if (dsock != -1) {
|
|
FD_ZERO (&mask);
|
|
FD_SET (dsock, &mask);
|
|
if (select (dsock + 1, &mask, NULL, NULL, NULL) > 0) {
|
|
struct timeval start_tim, tim;
|
|
gettimeofday (&start_tim, NULL);
|
|
/* flush the remaining data */
|
|
while (read (dsock, buf, sizeof (buf)) > 0) {
|
|
gettimeofday (&tim, NULL);
|
|
if (tim.tv_sec > start_tim.tv_sec + ABORT_TIMEOUT) {
|
|
/* server keeps sending, drop the connection and ftpfs_reconnect */
|
|
close (dsock);
|
|
ftpfs_reconnect (me, super);
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
close (dsock);
|
|
}
|
|
if ((ftpfs_get_reply (me, SUP.sock, NULL, 0) == TRANSIENT) && (code == 426))
|
|
ftpfs_get_reply (me, SUP.sock, NULL, 0);
|
|
}
|
|
|
|
#if 0
|
|
static void
|
|
resolve_symlink_without_ls_options(struct vfs_class *me, struct vfs_s_super *super, struct vfs_s_inode *dir)
|
|
{
|
|
struct linklist *flist;
|
|
struct direntry *fe, *fel;
|
|
char tmp[MC_MAXPATHLEN];
|
|
int depth;
|
|
|
|
dir->symlink_status = FTPFS_RESOLVING_SYMLINKS;
|
|
for (flist = dir->file_list->next; flist != dir->file_list; flist = flist->next) {
|
|
/* flist->data->l_stat is alread initialized with 0 */
|
|
fel = flist->data;
|
|
if (S_ISLNK(fel->s.st_mode) && fel->linkname) {
|
|
if (fel->linkname[0] == '/') {
|
|
if (strlen (fel->linkname) >= MC_MAXPATHLEN)
|
|
continue;
|
|
strcpy (tmp, fel->linkname);
|
|
} else {
|
|
if ((strlen (dir->remote_path) + strlen (fel->linkname)) >= MC_MAXPATHLEN)
|
|
continue;
|
|
strcpy (tmp, dir->remote_path);
|
|
if (tmp[1] != '\0')
|
|
strcat (tmp, "/");
|
|
strcat (tmp + 1, fel->linkname);
|
|
}
|
|
for ( depth = 0; depth < 100; depth++) { /* depth protects against recursive symbolic links */
|
|
canonicalize_pathname (tmp);
|
|
fe = _get_file_entry(bucket, tmp, 0, 0);
|
|
if (fe) {
|
|
if (S_ISLNK (fe->s.st_mode) && fe->l_stat == 0) {
|
|
/* Symlink points to link which isn't resolved, yet. */
|
|
if (fe->linkname[0] == '/') {
|
|
if (strlen (fe->linkname) >= MC_MAXPATHLEN)
|
|
break;
|
|
strcpy (tmp, fe->linkname);
|
|
} else {
|
|
/* at this point tmp looks always like this
|
|
/directory/filename, i.e. no need to check
|
|
strrchr's return value */
|
|
*(strrchr (tmp, '/') + 1) = '\0'; /* dirname */
|
|
if ((strlen (tmp) + strlen (fe->linkname)) >= MC_MAXPATHLEN)
|
|
break;
|
|
strcat (tmp, fe->linkname);
|
|
}
|
|
continue;
|
|
} else {
|
|
fel->l_stat = g_new (struct stat, 1);
|
|
if ( S_ISLNK (fe->s.st_mode))
|
|
*fel->l_stat = *fe->l_stat;
|
|
else
|
|
*fel->l_stat = fe->s;
|
|
(*fel->l_stat).st_ino = bucket->__inode_counter++;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
dir->symlink_status = FTPFS_RESOLVED_SYMLINKS;
|
|
}
|
|
|
|
static void
|
|
resolve_symlink_with_ls_options(struct vfs_class *me, struct vfs_s_super *super, struct vfs_s_inode *dir)
|
|
{
|
|
char buffer[2048] = "", *filename;
|
|
int sock;
|
|
FILE *fp;
|
|
struct stat s;
|
|
struct linklist *flist;
|
|
struct direntry *fe;
|
|
int switch_method = 0;
|
|
|
|
dir->symlink_status = FTPFS_RESOLVED_SYMLINKS;
|
|
if (strchr (dir->remote_path, ' ')) {
|
|
if (ftpfs_chdir_internal (bucket, dir->remote_path) != COMPLETE) {
|
|
print_vfs_message(_("ftpfs: CWD failed."));
|
|
return;
|
|
}
|
|
sock = ftpfs_open_data_connection (bucket, "LIST -lLa", ".", TYPE_ASCII, 0);
|
|
}
|
|
else
|
|
sock = ftpfs_open_data_connection (bucket, "LIST -lLa",
|
|
dir->remote_path, TYPE_ASCII, 0);
|
|
|
|
if (sock == -1) {
|
|
print_vfs_message(_("ftpfs: couldn't resolve symlink"));
|
|
return;
|
|
}
|
|
|
|
fp = fdopen(sock, "r");
|
|
if (fp == NULL) {
|
|
close(sock);
|
|
print_vfs_message(_("ftpfs: couldn't resolve symlink"));
|
|
return;
|
|
}
|
|
enable_interrupt_key();
|
|
flist = dir->file_list->next;
|
|
while (1) {
|
|
do {
|
|
if (flist == dir->file_list)
|
|
goto done;
|
|
fe = flist->data;
|
|
flist = flist->next;
|
|
} while (!S_ISLNK(fe->s.st_mode));
|
|
while (1) {
|
|
if (fgets (buffer, sizeof (buffer), fp) == NULL)
|
|
goto done;
|
|
if (MEDATA->logfile){
|
|
fputs (buffer, MEDATA->logfile);
|
|
fflush (MEDATA->logfile);
|
|
}
|
|
vfs_die("This code should be commented out\n");
|
|
if (vfs_parse_ls_lga (buffer, &s, &filename, NULL)) {
|
|
int r = strcmp(fe->name, filename);
|
|
g_free(filename);
|
|
if (r == 0) {
|
|
if (S_ISLNK (s.st_mode)) {
|
|
/* This server doesn't understand LIST -lLa */
|
|
switch_method = 1;
|
|
goto done;
|
|
}
|
|
fe->l_stat = g_new (struct stat, 1);
|
|
if (fe->l_stat == NULL)
|
|
goto done;
|
|
*fe->l_stat = s;
|
|
(*fe->l_stat).st_ino = bucket->__inode_counter++;
|
|
break;
|
|
}
|
|
if (r < 0)
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
done:
|
|
while (fgets(buffer, sizeof(buffer), fp) != NULL);
|
|
disable_interrupt_key();
|
|
fclose(fp);
|
|
ftpfs_get_reply(me, SUP.sock, NULL, 0);
|
|
}
|
|
|
|
static void
|
|
resolve_symlink(struct vfs_class *me, struct vfs_s_super *super, struct vfs_s_inode *dir)
|
|
{
|
|
print_vfs_message(_("Resolving symlink..."));
|
|
|
|
if (SUP.strict_rfc959_list_cmd)
|
|
resolve_symlink_without_ls_options(me, super, dir);
|
|
else
|
|
resolve_symlink_with_ls_options(me, super, dir);
|
|
}
|
|
#endif
|
|
|
|
static int
|
|
ftpfs_dir_load (struct vfs_class *me, struct vfs_s_inode *dir, char *remote_path)
|
|
{
|
|
struct vfs_s_entry *ent;
|
|
struct vfs_s_super *super = dir->super;
|
|
int sock, num_entries = 0;
|
|
char buffer[BUF_8K];
|
|
int cd_first;
|
|
|
|
cd_first = ftpfs_first_cd_then_ls || (SUP.strict == RFC_STRICT)
|
|
|| (strchr (remote_path, ' ') != NULL);
|
|
|
|
again:
|
|
print_vfs_message (_("ftpfs: Reading FTP directory %s... %s%s"),
|
|
remote_path,
|
|
SUP.strict ==
|
|
RFC_STRICT ? _("(strict rfc959)") : "",
|
|
cd_first ? _("(chdir first)") : "");
|
|
|
|
if (cd_first) {
|
|
if (ftpfs_chdir_internal (me, super, remote_path) != COMPLETE) {
|
|
ftpfs_errno = ENOENT;
|
|
print_vfs_message (_("ftpfs: CWD failed."));
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
gettimeofday (&dir->timestamp, NULL);
|
|
dir->timestamp.tv_sec += ftpfs_directory_timeout;
|
|
|
|
if (SUP.strict == RFC_STRICT)
|
|
sock = ftpfs_open_data_connection (me, super, "LIST", 0, TYPE_ASCII, 0);
|
|
else if (cd_first)
|
|
/* Dirty hack to avoid autoprepending / to . */
|
|
/* Wu-ftpd produces strange output for '/' if 'LIST -la .' used */
|
|
sock =
|
|
ftpfs_open_data_connection (me, super, "LIST -la", 0, TYPE_ASCII, 0);
|
|
else {
|
|
/* Trailing "/." is necessary if remote_path is a symlink */
|
|
char *path = concat_dir_and_file (remote_path, ".");
|
|
sock =
|
|
ftpfs_open_data_connection (me, super, "LIST -la", path, TYPE_ASCII,
|
|
0);
|
|
g_free (path);
|
|
}
|
|
|
|
if (sock == -1)
|
|
goto fallback;
|
|
|
|
/* Clear the interrupt flag */
|
|
enable_interrupt_key ();
|
|
|
|
while (1) {
|
|
int i;
|
|
int res =
|
|
vfs_s_get_line_interruptible (me, buffer, sizeof (buffer),
|
|
sock);
|
|
if (!res)
|
|
break;
|
|
|
|
if (res == EINTR) {
|
|
me->verrno = ECONNRESET;
|
|
close (sock);
|
|
disable_interrupt_key ();
|
|
ftpfs_get_reply (me, SUP.sock, NULL, 0);
|
|
print_vfs_message (_("%s: failure"), me->name);
|
|
return -1;
|
|
}
|
|
|
|
if (MEDATA->logfile) {
|
|
fputs (buffer, MEDATA->logfile);
|
|
fputs ("\n", MEDATA->logfile);
|
|
fflush (MEDATA->logfile);
|
|
}
|
|
|
|
ent = vfs_s_generate_entry (me, NULL, dir, 0);
|
|
i = ent->ino->st.st_nlink;
|
|
if (!vfs_parse_ls_lga
|
|
(buffer, &ent->ino->st, &ent->name, &ent->ino->linkname)) {
|
|
vfs_s_free_entry (me, ent);
|
|
continue;
|
|
}
|
|
ent->ino->st.st_nlink = i; /* Ouch, we need to preserve our counts :-( */
|
|
num_entries++;
|
|
vfs_s_insert_entry (me, dir, ent);
|
|
}
|
|
|
|
close (sock);
|
|
me->verrno = E_REMOTE;
|
|
if ((ftpfs_get_reply (me, SUP.sock, NULL, 0) != COMPLETE))
|
|
goto fallback;
|
|
|
|
if (num_entries == 0 && cd_first == 0) {
|
|
/* The LIST command may produce an empty output. In such scenario
|
|
it is not clear whether this is caused by `remote_path' being
|
|
a non-existent path or for some other reason (listing emtpy
|
|
directory without the -a option, non-readable directory, etc.).
|
|
|
|
Since `dir_load' is a crucial method, when it comes to determine
|
|
whether a given path is a _directory_, the code must try its best
|
|
to determine the type of `remote_path'. The only reliable way to
|
|
achieve this is trough issuing a CWD command. */
|
|
|
|
cd_first = 1;
|
|
goto again;
|
|
}
|
|
|
|
if (SUP.strict == RFC_AUTODETECT)
|
|
SUP.strict = RFC_DARING;
|
|
|
|
print_vfs_message (_("%s: done."), me->name);
|
|
return 0;
|
|
|
|
fallback:
|
|
if (SUP.strict == RFC_AUTODETECT) {
|
|
/* It's our first attempt to get a directory listing from this
|
|
server (UNIX style LIST command) */
|
|
SUP.strict = RFC_STRICT;
|
|
/* I hate goto, but recursive call needs another 8K on stack */
|
|
/* return ftpfs_dir_load (me, dir, remote_path); */
|
|
cd_first = 1;
|
|
goto again;
|
|
}
|
|
print_vfs_message (_("ftpfs: failed; nowhere to fallback to"));
|
|
ERRNOR (EACCES, -1);
|
|
}
|
|
|
|
static int
|
|
ftpfs_file_store (struct vfs_class *me, struct vfs_s_fh *fh, char *name,
|
|
char *localname)
|
|
{
|
|
int h, sock, n_read, n_written;
|
|
off_t n_stored;
|
|
#ifdef HAVE_STRUCT_LINGER_L_LINGER
|
|
struct linger li;
|
|
#else
|
|
int flag_one = 1;
|
|
#endif
|
|
char buffer[8192];
|
|
struct stat s;
|
|
char *w_buf;
|
|
struct vfs_s_super *super = FH_SUPER;
|
|
|
|
h = open (localname, O_RDONLY);
|
|
if (h == -1)
|
|
ERRNOR (EIO, -1);
|
|
sock =
|
|
ftpfs_open_data_connection (me, super,
|
|
fh->u.ftp.append ? "APPE" : "STOR", name,
|
|
TYPE_BINARY, 0);
|
|
if (sock < 0 || fstat (h, &s) == -1) {
|
|
close (h);
|
|
return -1;
|
|
}
|
|
#ifdef HAVE_STRUCT_LINGER_L_LINGER
|
|
li.l_onoff = 1;
|
|
li.l_linger = 120;
|
|
setsockopt (sock, SOL_SOCKET, SO_LINGER, (char *) &li, sizeof (li));
|
|
#else
|
|
setsockopt (sock, SOL_SOCKET, SO_LINGER, &flag_one, sizeof (flag_one));
|
|
#endif
|
|
n_stored = 0;
|
|
|
|
enable_interrupt_key ();
|
|
while (1) {
|
|
while ((n_read = read (h, buffer, sizeof (buffer))) == -1) {
|
|
if (errno == EINTR) {
|
|
if (got_interrupt ()) {
|
|
ftpfs_errno = EINTR;
|
|
goto error_return;
|
|
} else
|
|
continue;
|
|
}
|
|
ftpfs_errno = errno;
|
|
goto error_return;
|
|
}
|
|
if (n_read == 0)
|
|
break;
|
|
n_stored += n_read;
|
|
w_buf = buffer;
|
|
while ((n_written = write (sock, w_buf, n_read)) != n_read) {
|
|
if (n_written == -1) {
|
|
if (errno == EINTR && !got_interrupt ()) {
|
|
continue;
|
|
}
|
|
ftpfs_errno = errno;
|
|
goto error_return;
|
|
}
|
|
w_buf += n_written;
|
|
n_read -= n_written;
|
|
}
|
|
print_vfs_message (_("ftpfs: storing file %lu (%lu)"),
|
|
(unsigned long) n_stored, (unsigned long) s.st_size);
|
|
}
|
|
disable_interrupt_key ();
|
|
close (sock);
|
|
close (h);
|
|
if (ftpfs_get_reply (me, SUP.sock, NULL, 0) != COMPLETE)
|
|
ERRNOR (EIO, -1);
|
|
return 0;
|
|
error_return:
|
|
disable_interrupt_key ();
|
|
close (sock);
|
|
close (h);
|
|
ftpfs_get_reply (me, SUP.sock, NULL, 0);
|
|
return -1;
|
|
}
|
|
|
|
static int
|
|
ftpfs_linear_start (struct vfs_class *me, struct vfs_s_fh *fh, off_t offset)
|
|
{
|
|
char *name = vfs_s_fullpath (me, fh->ino);
|
|
|
|
if (!name)
|
|
return 0;
|
|
FH_SOCK = ftpfs_open_data_connection(me, FH_SUPER, "RETR", name, TYPE_BINARY, offset);
|
|
g_free (name);
|
|
if (FH_SOCK == -1)
|
|
ERRNOR (EACCES, 0);
|
|
fh->linear = LS_LINEAR_OPEN;
|
|
FH_SUPER->u.ftp.ctl_connection_busy = 1;
|
|
fh->u.ftp.append = 0;
|
|
return 1;
|
|
}
|
|
|
|
static int
|
|
ftpfs_linear_read (struct vfs_class *me, struct vfs_s_fh *fh, void *buf, int len)
|
|
{
|
|
int n;
|
|
struct vfs_s_super *super = FH_SUPER;
|
|
|
|
while ((n = read (FH_SOCK, buf, len))<0) {
|
|
if ((errno == EINTR) && !got_interrupt())
|
|
continue;
|
|
break;
|
|
}
|
|
|
|
if (n<0)
|
|
ftpfs_linear_abort(me, fh);
|
|
|
|
if (!n) {
|
|
SUP.ctl_connection_busy = 0;
|
|
close (FH_SOCK);
|
|
FH_SOCK = -1;
|
|
if ((ftpfs_get_reply (me, SUP.sock, NULL, 0) != COMPLETE))
|
|
ERRNOR (E_REMOTE, -1);
|
|
return 0;
|
|
}
|
|
ERRNOR (errno, n);
|
|
}
|
|
|
|
static void
|
|
ftpfs_linear_close (struct vfs_class *me, struct vfs_s_fh *fh)
|
|
{
|
|
if (FH_SOCK != -1)
|
|
ftpfs_linear_abort(me, fh);
|
|
}
|
|
|
|
static int ftpfs_ctl (void *fh, int ctlop, void *arg)
|
|
{
|
|
(void) arg;
|
|
|
|
switch (ctlop) {
|
|
case VFS_CTL_IS_NOTREADY:
|
|
{
|
|
int v;
|
|
|
|
if (!FH->linear)
|
|
vfs_die ("You may not do this");
|
|
if (FH->linear == LS_LINEAR_CLOSED || FH->linear == LS_LINEAR_PREOPEN)
|
|
return 0;
|
|
|
|
v = vfs_s_select_on_two (FH->u.ftp.sock, 0);
|
|
if (((v < 0) && (errno == EINTR)) || v == 0)
|
|
return 1;
|
|
return 0;
|
|
}
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
static int
|
|
ftpfs_send_command(struct vfs_class *me, const char *filename, const char *cmd, int flags)
|
|
{
|
|
const char *rpath;
|
|
char *p, *mpath = g_strdup(filename);
|
|
struct vfs_s_super *super;
|
|
int r;
|
|
int flush_directory_cache = (flags & OPT_FLUSH);
|
|
|
|
if (!(rpath = vfs_s_get_path_mangle(me, mpath, &super, 0))) {
|
|
g_free(mpath);
|
|
return -1;
|
|
}
|
|
p = ftpfs_translate_path (me, super, rpath);
|
|
r = ftpfs_command (me, super, WAIT_REPLY, cmd, p);
|
|
g_free (p);
|
|
vfs_stamp_create (&vfs_ftpfs_ops, super);
|
|
if (flags & OPT_IGNORE_ERROR)
|
|
r = COMPLETE;
|
|
if (r != COMPLETE) {
|
|
me->verrno = EPERM;
|
|
g_free (mpath);
|
|
return -1;
|
|
}
|
|
if (flush_directory_cache)
|
|
vfs_s_invalidate(me, super);
|
|
g_free(mpath);
|
|
return 0;
|
|
}
|
|
|
|
/* This routine is called as the last step in load_setup */
|
|
void
|
|
ftpfs_init_passwd(void)
|
|
{
|
|
ftpfs_anonymous_passwd = load_anon_passwd ();
|
|
if (ftpfs_anonymous_passwd)
|
|
return;
|
|
|
|
/* If there is no anonymous ftp password specified
|
|
* then we'll just use anonymous@
|
|
* We don't send any other thing because:
|
|
* - We want to remain anonymous
|
|
* - We want to stop SPAM
|
|
* - We don't want to let ftp sites to discriminate by the user,
|
|
* host or country.
|
|
*/
|
|
ftpfs_anonymous_passwd = g_strdup ("anonymous@");
|
|
}
|
|
|
|
static int ftpfs_chmod (struct vfs_class *me, const char *path, int mode)
|
|
{
|
|
char buf[BUF_SMALL];
|
|
|
|
g_snprintf(buf, sizeof(buf), "SITE CHMOD %4.4o /%%s", mode & 07777);
|
|
return ftpfs_send_command(me, path, buf, OPT_FLUSH);
|
|
}
|
|
|
|
static int ftpfs_chown (struct vfs_class *me, const char *path, int owner, int group)
|
|
{
|
|
#if 0
|
|
ftpfs_errno = EPERM;
|
|
return -1;
|
|
#else
|
|
/* Everyone knows it is not possible to chown remotely, so why bother them.
|
|
If someone's root, then copy/move will always try to chown it... */
|
|
(void) me;
|
|
(void) path;
|
|
(void) owner;
|
|
(void) group;
|
|
return 0;
|
|
#endif
|
|
}
|
|
|
|
static int ftpfs_unlink (struct vfs_class *me, const char *path)
|
|
{
|
|
return ftpfs_send_command(me, path, "DELE /%s", OPT_FLUSH);
|
|
}
|
|
|
|
/* Return 1 if path is the same directory as the one we are in now */
|
|
static int
|
|
ftpfs_is_same_dir (struct vfs_class *me, struct vfs_s_super *super, const char *path)
|
|
{
|
|
(void) me;
|
|
|
|
if (!SUP.cwdir)
|
|
return 0;
|
|
if (strcmp (path, SUP.cwdir) == 0)
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
ftpfs_chdir_internal (struct vfs_class *me, struct vfs_s_super *super, const char *remote_path)
|
|
{
|
|
int r;
|
|
char *p;
|
|
|
|
if (!SUP.cwd_deferred && ftpfs_is_same_dir (me, super, remote_path))
|
|
return COMPLETE;
|
|
|
|
p = ftpfs_translate_path (me, super, remote_path);
|
|
r = ftpfs_command (me, super, WAIT_REPLY, "CWD /%s", p);
|
|
g_free (p);
|
|
|
|
if (r != COMPLETE) {
|
|
ftpfs_errno = EIO;
|
|
} else {
|
|
g_free(SUP.cwdir);
|
|
SUP.cwdir = g_strdup (remote_path);
|
|
SUP.cwd_deferred = 0;
|
|
}
|
|
return r;
|
|
}
|
|
|
|
static int ftpfs_rename (struct vfs_class *me, const char *path1, const char *path2)
|
|
{
|
|
ftpfs_send_command(me, path1, "RNFR /%s", OPT_FLUSH);
|
|
return ftpfs_send_command(me, path2, "RNTO /%s", OPT_FLUSH);
|
|
}
|
|
|
|
static int ftpfs_mkdir (struct vfs_class *me, const char *path, mode_t mode)
|
|
{
|
|
(void) mode; /* FIXME: should be used */
|
|
|
|
return ftpfs_send_command(me, path, "MKD /%s", OPT_FLUSH);
|
|
}
|
|
|
|
static int ftpfs_rmdir (struct vfs_class *me, const char *path)
|
|
{
|
|
return ftpfs_send_command(me, path, "RMD /%s", OPT_FLUSH);
|
|
}
|
|
|
|
static int
|
|
ftpfs_fh_open (struct vfs_class *me, struct vfs_s_fh *fh, int flags,
|
|
int mode)
|
|
{
|
|
(void) mode;
|
|
|
|
fh->u.ftp.append = 0;
|
|
/* File will be written only, so no need to retrieve it from ftp server */
|
|
if (((flags & O_WRONLY) == O_WRONLY) && !(flags & (O_RDONLY | O_RDWR))) {
|
|
#ifdef HAVE_STRUCT_LINGER_L_LINGER
|
|
struct linger li;
|
|
#else
|
|
int li = 1;
|
|
#endif
|
|
char *name;
|
|
|
|
/* ftpfs_linear_start() called, so data will be written
|
|
* to local temporary file and stored to ftp server
|
|
* by vfs_s_close later
|
|
*/
|
|
if (FH_SUPER->u.ftp.ctl_connection_busy) {
|
|
if (!fh->ino->localname) {
|
|
int handle = vfs_mkstemps (&fh->ino->localname, me->name,
|
|
fh->ino->ent->name);
|
|
if (handle == -1)
|
|
return -1;
|
|
close (handle);
|
|
fh->u.ftp.append = flags & O_APPEND;
|
|
}
|
|
return 0;
|
|
}
|
|
name = vfs_s_fullpath (me, fh->ino);
|
|
if (!name)
|
|
return -1;
|
|
fh->handle =
|
|
ftpfs_open_data_connection (me, fh->ino->super,
|
|
(flags & O_APPEND) ? "APPE" :
|
|
"STOR", name, TYPE_BINARY, 0);
|
|
g_free (name);
|
|
|
|
if (fh->handle < 0)
|
|
return -1;
|
|
#ifdef HAVE_STRUCT_LINGER_L_LINGER
|
|
li.l_onoff = 1;
|
|
li.l_linger = 120;
|
|
#endif
|
|
setsockopt (fh->handle, SOL_SOCKET, SO_LINGER, &li, sizeof (li));
|
|
|
|
if (fh->ino->localname) {
|
|
unlink (fh->ino->localname);
|
|
g_free (fh->ino->localname);
|
|
fh->ino->localname = NULL;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
if (!fh->ino->localname)
|
|
if (vfs_s_retrieve_file (me, fh->ino) == -1)
|
|
return -1;
|
|
if (!fh->ino->localname)
|
|
vfs_die ("retrieve_file failed to fill in localname");
|
|
return 0;
|
|
}
|
|
|
|
static int ftpfs_fh_close (struct vfs_class *me, struct vfs_s_fh *fh)
|
|
{
|
|
if (fh->handle != -1 && !fh->ino->localname){
|
|
close (fh->handle);
|
|
fh->handle = -1;
|
|
/* File is stored to destination already, so
|
|
* we prevent MEDATA->ftpfs_file_store() call from vfs_s_close ()
|
|
*/
|
|
fh->changed = 0;
|
|
if (ftpfs_get_reply (me, fh->ino->SUP.sock, NULL, 0) != COMPLETE)
|
|
ERRNOR (EIO, -1);
|
|
vfs_s_invalidate (me, FH_SUPER);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
ftpfs_done (struct vfs_class *me)
|
|
{
|
|
struct no_proxy_entry *np;
|
|
|
|
(void) me;
|
|
|
|
while (no_proxy) {
|
|
np = no_proxy->next;
|
|
g_free (no_proxy->domain);
|
|
g_free (no_proxy);
|
|
no_proxy = np;
|
|
}
|
|
g_free (ftpfs_anonymous_passwd);
|
|
g_free (ftpfs_proxy_host);
|
|
}
|
|
|
|
static void
|
|
ftpfs_fill_names (struct vfs_class *me, fill_names_f func)
|
|
{
|
|
struct vfs_s_super *super = MEDATA->supers;
|
|
char *name;
|
|
|
|
while (super){
|
|
name = g_strconcat ("/#ftp:", SUP.user, "@", SUP.host, "/", SUP.cwdir, (char *) NULL);
|
|
(*func)(name);
|
|
g_free (name);
|
|
super = super->next;
|
|
}
|
|
}
|
|
|
|
static char buffer[BUF_MEDIUM];
|
|
static char *netrc;
|
|
static const char *netrcp;
|
|
|
|
/* This should match the keywords[] array below */
|
|
typedef enum {
|
|
NETRC_NONE = 0,
|
|
NETRC_DEFAULT,
|
|
NETRC_MACHINE,
|
|
NETRC_LOGIN,
|
|
NETRC_PASSWORD,
|
|
NETRC_PASSWD,
|
|
NETRC_ACCOUNT,
|
|
NETRC_MACDEF,
|
|
NETRC_UNKNOWN
|
|
} keyword_t;
|
|
|
|
static keyword_t ftpfs_netrc_next (void)
|
|
{
|
|
char *p;
|
|
keyword_t i;
|
|
static const char *const keywords[] = { "default", "machine",
|
|
"login", "password", "passwd", "account", "macdef", NULL
|
|
};
|
|
|
|
|
|
while (1) {
|
|
netrcp = skip_separators (netrcp);
|
|
if (*netrcp != '\n')
|
|
break;
|
|
netrcp++;
|
|
}
|
|
if (!*netrcp)
|
|
return NETRC_NONE;
|
|
p = buffer;
|
|
if (*netrcp == '"') {
|
|
for (netrcp++; *netrcp != '"' && *netrcp; netrcp++) {
|
|
if (*netrcp == '\\')
|
|
netrcp++;
|
|
*p++ = *netrcp;
|
|
}
|
|
} else {
|
|
for (; *netrcp != '\n' && *netrcp != '\t' && *netrcp != ' ' &&
|
|
*netrcp != ',' && *netrcp; netrcp++) {
|
|
if (*netrcp == '\\')
|
|
netrcp++;
|
|
*p++ = *netrcp;
|
|
}
|
|
}
|
|
*p = 0;
|
|
if (!*buffer)
|
|
return NETRC_NONE;
|
|
|
|
i = NETRC_DEFAULT;
|
|
while (keywords[i - 1]) {
|
|
if (!strcmp (keywords[i - 1], buffer))
|
|
return i;
|
|
|
|
i++;
|
|
}
|
|
|
|
return NETRC_UNKNOWN;
|
|
}
|
|
|
|
static int ftpfs_netrc_bad_mode (const char *netrcname)
|
|
{
|
|
static int be_angry = 1;
|
|
struct stat mystat;
|
|
|
|
if (stat (netrcname, &mystat) >= 0 && (mystat.st_mode & 077)) {
|
|
if (be_angry) {
|
|
message (D_ERROR, MSG_ERROR,
|
|
_("~/.netrc file has incorrect mode.\n"
|
|
"Remove password or correct mode."));
|
|
be_angry = 0;
|
|
}
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/* Scan .netrc until we find matching "machine" or "default"
|
|
* domain is used for additional matching
|
|
* No search is done after "default" in compliance with "man netrc"
|
|
* Return 0 if found, -1 otherwise */
|
|
static int ftpfs_find_machine (const char *host, const char *domain)
|
|
{
|
|
keyword_t keyword;
|
|
|
|
while ((keyword = ftpfs_netrc_next ()) != NETRC_NONE) {
|
|
if (keyword == NETRC_DEFAULT)
|
|
return 0;
|
|
|
|
if (keyword == NETRC_MACDEF) {
|
|
/* Scan for an empty line, which concludes "macdef" */
|
|
do {
|
|
while (*netrcp && *netrcp != '\n')
|
|
netrcp++;
|
|
if (*netrcp != '\n')
|
|
break;
|
|
netrcp++;
|
|
} while (*netrcp && *netrcp != '\n');
|
|
continue;
|
|
}
|
|
|
|
if (keyword != NETRC_MACHINE)
|
|
continue;
|
|
|
|
/* Take machine name */
|
|
if (ftpfs_netrc_next () == NETRC_NONE)
|
|
break;
|
|
|
|
if (g_strcasecmp (host, buffer)) {
|
|
/* Try adding our domain to short names in .netrc */
|
|
const char *host_domain = strchr (host, '.');
|
|
if (!host_domain)
|
|
continue;
|
|
|
|
/* Compare domain part */
|
|
if (g_strcasecmp (host_domain, domain))
|
|
continue;
|
|
|
|
/* Compare local part */
|
|
if (g_strncasecmp (host, buffer, host_domain - host))
|
|
continue;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* end of .netrc */
|
|
return -1;
|
|
}
|
|
|
|
/* Extract login and password from .netrc for the host.
|
|
* pass may be NULL.
|
|
* Returns 0 for success, -1 for error */
|
|
static int ftpfs_netrc_lookup (const char *host, char **login, char **pass)
|
|
{
|
|
char *netrcname;
|
|
char *tmp_pass = NULL;
|
|
char hostname[MAXHOSTNAMELEN];
|
|
const char *domain;
|
|
keyword_t keyword;
|
|
static struct rupcache {
|
|
struct rupcache *next;
|
|
char *host;
|
|
char *login;
|
|
char *pass;
|
|
} *rup_cache = NULL, *rupp;
|
|
|
|
/* Initialize *login and *pass */
|
|
if (!login)
|
|
return 0;
|
|
*login = NULL;
|
|
if (pass)
|
|
*pass = NULL;
|
|
|
|
/* Look up in the cache first */
|
|
for (rupp = rup_cache; rupp != NULL; rupp = rupp->next) {
|
|
if (!strcmp (host, rupp->host)) {
|
|
if (rupp->login)
|
|
*login = g_strdup (rupp->login);
|
|
if (pass && rupp->pass)
|
|
*pass = g_strdup (rupp->pass);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
/* Load current .netrc */
|
|
netrcname = concat_dir_and_file (home_dir, ".netrc");
|
|
netrcp = netrc = load_file (netrcname);
|
|
if (netrc == NULL) {
|
|
g_free (netrcname);
|
|
return 0;
|
|
}
|
|
|
|
/* Find our own domain name */
|
|
if (gethostname (hostname, sizeof (hostname)) < 0)
|
|
*hostname = 0;
|
|
if (!(domain = strchr (hostname, '.')))
|
|
domain = "";
|
|
|
|
/* Scan for "default" and matching "machine" keywords */
|
|
ftpfs_find_machine (host, domain);
|
|
|
|
/* Scan for keywords following "default" and "machine" */
|
|
while (1) {
|
|
int need_break = 0;
|
|
keyword = ftpfs_netrc_next ();
|
|
|
|
switch (keyword) {
|
|
case NETRC_LOGIN:
|
|
if (ftpfs_netrc_next () == NETRC_NONE) {
|
|
need_break = 1;
|
|
break;
|
|
}
|
|
|
|
/* We have another name already - should not happen */
|
|
if (*login) {
|
|
need_break = 1;
|
|
break;
|
|
}
|
|
|
|
/* We have login name now */
|
|
*login = g_strdup (buffer);
|
|
break;
|
|
|
|
case NETRC_PASSWORD:
|
|
case NETRC_PASSWD:
|
|
if (ftpfs_netrc_next () == NETRC_NONE) {
|
|
need_break = 1;
|
|
break;
|
|
}
|
|
|
|
/* Ignore unsafe passwords */
|
|
if (strcmp (*login, "anonymous") && strcmp (*login, "ftp")
|
|
&& ftpfs_netrc_bad_mode (netrcname)) {
|
|
need_break = 1;
|
|
break;
|
|
}
|
|
|
|
/* Remember password. pass may be NULL, so use tmp_pass */
|
|
if (tmp_pass == NULL)
|
|
tmp_pass = g_strdup (buffer);
|
|
break;
|
|
|
|
case NETRC_ACCOUNT:
|
|
/* "account" is followed by a token which we ignore */
|
|
if (ftpfs_netrc_next () == NETRC_NONE) {
|
|
need_break = 1;
|
|
break;
|
|
}
|
|
|
|
/* Ignore account, but warn user anyways */
|
|
ftpfs_netrc_bad_mode (netrcname);
|
|
break;
|
|
|
|
default:
|
|
/* Unexpected keyword or end of file */
|
|
need_break = 1;
|
|
break;
|
|
}
|
|
|
|
if (need_break)
|
|
break;
|
|
}
|
|
|
|
g_free (netrc);
|
|
g_free (netrcname);
|
|
|
|
rupp = g_new (struct rupcache, 1);
|
|
rupp->host = g_strdup (host);
|
|
rupp->login = rupp->pass = 0;
|
|
|
|
if (*login != NULL) {
|
|
rupp->login = g_strdup (*login);
|
|
}
|
|
if (tmp_pass != NULL)
|
|
rupp->pass = g_strdup (tmp_pass);
|
|
rupp->next = rup_cache;
|
|
rup_cache = rupp;
|
|
|
|
if (pass)
|
|
*pass = tmp_pass;
|
|
|
|
return 0;
|
|
}
|
|
|
|
void
|
|
init_ftpfs (void)
|
|
{
|
|
static struct vfs_s_subclass ftpfs_subclass;
|
|
|
|
ftpfs_subclass.flags = VFS_S_REMOTE;
|
|
ftpfs_subclass.archive_same = ftpfs_archive_same;
|
|
ftpfs_subclass.open_archive = ftpfs_open_archive;
|
|
ftpfs_subclass.free_archive = ftpfs_free_archive;
|
|
ftpfs_subclass.fh_open = ftpfs_fh_open;
|
|
ftpfs_subclass.fh_close = ftpfs_fh_close;
|
|
ftpfs_subclass.dir_load = ftpfs_dir_load;
|
|
ftpfs_subclass.file_store = ftpfs_file_store;
|
|
ftpfs_subclass.linear_start = ftpfs_linear_start;
|
|
ftpfs_subclass.linear_read = ftpfs_linear_read;
|
|
ftpfs_subclass.linear_close = ftpfs_linear_close;
|
|
|
|
vfs_s_init_class (&vfs_ftpfs_ops, &ftpfs_subclass);
|
|
vfs_ftpfs_ops.name = "ftpfs";
|
|
vfs_ftpfs_ops.flags = VFSF_NOLINKS;
|
|
vfs_ftpfs_ops.prefix = "ftp:";
|
|
vfs_ftpfs_ops.done = &ftpfs_done;
|
|
vfs_ftpfs_ops.fill_names = ftpfs_fill_names;
|
|
vfs_ftpfs_ops.chmod = ftpfs_chmod;
|
|
vfs_ftpfs_ops.chown = ftpfs_chown;
|
|
vfs_ftpfs_ops.unlink = ftpfs_unlink;
|
|
vfs_ftpfs_ops.rename = ftpfs_rename;
|
|
vfs_ftpfs_ops.mkdir = ftpfs_mkdir;
|
|
vfs_ftpfs_ops.rmdir = ftpfs_rmdir;
|
|
vfs_ftpfs_ops.ctl = ftpfs_ctl;
|
|
vfs_register_class (&vfs_ftpfs_ops);
|
|
}
|