mirror of
https://github.com/MidnightCommander/mc
synced 2024-12-23 12:56:51 +03:00
d32e4e77e6
* src/user.c (user_menu_cmd): Allow national characters as hotkeys. Don't dump core when the menu file contains only empty lines * src/view.c (search, block_search): Use the correct column for the percent display while searching. Fri Jun 18 11:49:05 1999 Norbert Warmuth <nwarmuth@privat.circular.de> * vfs/ftpfs.c (resolve_symlink_with_ls_options): Some ftp servers don't make a difference between "LIST -la" and "LIST -lLa". If we find such a server don't use -lLa when resolving symbolic links.
2090 lines
52 KiB
C
2090 lines
52 KiB
C
/* Virtual File System: FTP file system.
|
|
Copyright (C) 1995 The Free Software Foundation
|
|
|
|
Written by: 1995 Ching Hui
|
|
1995 Jakub Jelinek
|
|
1995, 1996, 1997 Miguel de Icaza
|
|
1997 Norbert Warmuth
|
|
1998 Pavel Machek
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Library General Public License
|
|
as published by the Free Software Foundation; either version 2 of
|
|
the License, or (at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Library General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Library General Public
|
|
License along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
|
|
|
|
/* FTPfs TODO:
|
|
|
|
- make it more robust - all the connects etc. should handle EADDRINUSE and
|
|
ERETRY (have I spelled these names correctly?)
|
|
- make the user able to flush a connection - all the caches will get empty
|
|
etc., (tarfs as well), we should give there a user selectable timeout
|
|
and assign a key sequence.
|
|
- use hash table instead of linklist to cache ftpfs directory.
|
|
*/
|
|
|
|
/* Namespace pollution: horrible */
|
|
|
|
#include <config.h>
|
|
#include <stdio.h>
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <stdlib.h>
|
|
#include <sys/types.h>
|
|
#include <stdarg.h>
|
|
#include <fcntl.h>
|
|
#include <pwd.h>
|
|
#include <ctype.h> /* For isdigit */
|
|
#ifdef SCO_FLAVOR
|
|
# include <sys/timeb.h> /* alex: for struct timeb definition */
|
|
#endif /* SCO_FLAVOR */
|
|
#include <time.h>
|
|
#include <sys/types.h>
|
|
#if defined(HAVE_UNISTD_H)
|
|
#include <unistd.h>
|
|
#endif
|
|
#if HAVE_SYS_SELECT_H
|
|
# include <sys/select.h>
|
|
#endif
|
|
|
|
#include "../src/setup.h"
|
|
|
|
#include <netdb.h> /* struct hostent */
|
|
#include <sys/socket.h> /* AF_INET */
|
|
#include <netinet/in.h> /* struct in_addr */
|
|
#ifdef HAVE_SETSOCKOPT
|
|
# include <netinet/ip.h> /* IP options */
|
|
#endif
|
|
#include <arpa/inet.h>
|
|
#include <arpa/ftp.h>
|
|
#include <arpa/telnet.h>
|
|
#ifndef SCO_FLAVOR
|
|
# include <sys/time.h> /* alex: this redefines struct timeval */
|
|
#endif /* SCO_FLAVOR */
|
|
#include <sys/param.h>
|
|
|
|
#ifdef USE_TERMNET
|
|
#include <termnet.h>
|
|
#endif
|
|
|
|
#include "utilvfs.h"
|
|
|
|
#include "vfs.h"
|
|
#include "tcputil.h"
|
|
#include "../src/dialog.h"
|
|
#include "container.h"
|
|
#include "ftpfs.h"
|
|
#ifndef MAXHOSTNAMELEN
|
|
# define MAXHOSTNAMELEN 64
|
|
#endif
|
|
|
|
#define ERRNOR(x,y) do { my_errno = x; return y; } while(0)
|
|
#define UPLOAD_ZERO_LENGTH_FILE
|
|
|
|
static int my_errno;
|
|
static int code;
|
|
|
|
/* Delay to retry a connection */
|
|
int ftpfs_retry_seconds = 30;
|
|
|
|
/* Method to use to connect to ftp sites */
|
|
int ftpfs_use_passive_connections = 1;
|
|
|
|
/* Method used to get directory listings:
|
|
* 1: try 'LIST -la <path>', if it fails
|
|
* fall back to CWD <path>; LIST
|
|
* 0: always use CWD <path>; LIST
|
|
*/
|
|
int ftpfs_use_unix_list_options = 1;
|
|
|
|
/* First "CWD <path>", then "LIST -la ." */
|
|
int ftpfs_first_cd_then_ls;
|
|
|
|
/* Use the ~/.netrc */
|
|
int use_netrc = 1;
|
|
|
|
extern char *home_dir;
|
|
|
|
/* Anonymous setup */
|
|
char *ftpfs_anonymous_passwd = 0;
|
|
int ftpfs_directory_timeout;
|
|
|
|
/* Proxy host */
|
|
char *ftpfs_proxy_host = 0;
|
|
|
|
/* wether we have to use proxy by default? */
|
|
int ftpfs_always_use_proxy;
|
|
|
|
/* source routing host */
|
|
extern int source_route;
|
|
|
|
/* Where we store the transactions */
|
|
static FILE *logfile = NULL;
|
|
|
|
/* If true, the directory cache is forced to reload */
|
|
static int force_expiration = 0;
|
|
|
|
static struct linklist *connections_list;
|
|
|
|
/* command wait_flag: */
|
|
#define NONE 0x00
|
|
#define WAIT_REPLY 0x01
|
|
#define WANT_STRING 0x02
|
|
static char reply_str [80];
|
|
|
|
static struct direntry *_get_file_entry (struct connection *bucket,
|
|
char *file_name, int op, int flags);
|
|
|
|
static char *ftpfs_get_current_directory (struct connection *bucket);
|
|
static int ftpfs_chdir_internal (struct connection *bucket,
|
|
char *remote_path);
|
|
static void free_bucket (void *data);
|
|
static void connection_destructor (void *data);
|
|
static void flush_all_directory (struct connection *bucket);
|
|
static int get_line (int sock, char *buf, int buf_len,
|
|
char term);
|
|
static char *get_path (struct connection **bucket,
|
|
char *path);
|
|
|
|
/* char *translate_path (struct ftpfs_connection *bucket, char *remote_path)
|
|
Translate a Unix path, i.e. MC's internal path representation (e.g.
|
|
/somedir/somefile) to a path valid for the remote server. Every path
|
|
transfered to the remote server has to be mangled by this function
|
|
right prior to sending it.
|
|
Currently only Amiga ftp servers are handled in a special manner.
|
|
|
|
When the remote server is an amiga:
|
|
a) strip leading slash if necesarry
|
|
b) replace first occurance of ":/" with ":"
|
|
c) strip trailing "/."
|
|
*/
|
|
|
|
static char *
|
|
translate_path (struct connection *bucket, char *remote_path)
|
|
{
|
|
char *p;
|
|
static char buf[255]; /* No one ever needs more ;-).
|
|
Actually I consider this static a bug
|
|
-- Norbert */
|
|
|
|
if (!bucket->remote_is_amiga || strlen (remote_path) >= sizeof (buf) - 1)
|
|
return remote_path;
|
|
else {
|
|
if (logfile) {
|
|
fprintf (logfile, "MC -- translate_path: %s\n", remote_path);
|
|
fflush (logfile);
|
|
}
|
|
|
|
if (*remote_path == '/' && remote_path[1] == '\0')
|
|
return "."; /* Don't change "/" into "", e.g. "CWD " would be
|
|
invalid. */
|
|
|
|
/* strip leading slash */
|
|
if (*remote_path == '/')
|
|
strcpy (buf, remote_path + 1);
|
|
else
|
|
strcpy (buf, remote_path);
|
|
|
|
/* replace first occurance of ":/" with ":" */
|
|
if ((p = strchr (buf, ':')) && *(p + 1) == '/')
|
|
strcpy (p + 1, p + 2);
|
|
|
|
/* strip trailing "/." */
|
|
if ((p = strrchr (buf, '/')) && *(p + 1) == '.' && *(p + 2) == '\0')
|
|
*p = '\0';
|
|
return buf;
|
|
}
|
|
}
|
|
|
|
/* Extract the hostname and username from the path */
|
|
|
|
/*
|
|
* path is in the form: [user@]hostname:port/remote-dir, e.g.:
|
|
* ftp://sunsite.unc.edu/pub/linux
|
|
* ftp://miguel@sphinx.nuclecu.unam.mx/c/nc
|
|
* ftp://tsx-11.mit.edu:8192/
|
|
* ftp://joe@foo.edu:11321/private
|
|
* If the user is empty, e.g. ftp://@roxanne/private, then your login name
|
|
* is supplied.
|
|
*
|
|
*/
|
|
|
|
static char *
|
|
my_get_host_and_username (char *path, char **host, char **user, int *port, char **pass)
|
|
{
|
|
return vfs_split_url (path, host, user, port, pass, 21, URL_DEFAULTANON);
|
|
}
|
|
|
|
/* Returns a reply code, check /usr/include/arpa/ftp.h for possible values */
|
|
static int
|
|
get_reply (int sock, char *string_buf, int string_len)
|
|
{
|
|
char answer[1024];
|
|
int i;
|
|
|
|
for (;;) {
|
|
if (!get_line (sock, answer, sizeof (answer), '\n')){
|
|
if (string_buf)
|
|
*string_buf = 0;
|
|
code = 421;
|
|
return 4;
|
|
}
|
|
switch (sscanf(answer, "%d", &code)){
|
|
case 0:
|
|
if (string_buf) {
|
|
strncpy (string_buf, answer, string_len - 1);
|
|
*(string_buf + string_len - 1) = 0;
|
|
}
|
|
code = 500;
|
|
return 5;
|
|
case 1:
|
|
if (answer[3] == '-') {
|
|
while (1) {
|
|
if (!get_line (sock, answer, sizeof(answer), '\n')){
|
|
if (string_buf)
|
|
*string_buf = 0;
|
|
code = 421;
|
|
return 4;
|
|
}
|
|
if ((sscanf (answer, "%d", &i) > 0) &&
|
|
(code == i) && (answer[3] == ' '))
|
|
break;
|
|
}
|
|
}
|
|
if (string_buf){
|
|
strncpy (string_buf, answer, string_len - 1);
|
|
*(string_buf + string_len - 1) = 0;
|
|
}
|
|
return code / 100;
|
|
}
|
|
}
|
|
}
|
|
|
|
static int
|
|
command (struct connection *bucket, int wait_reply, char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
char *str, *fmt_str;
|
|
int status;
|
|
int sock = qsock (bucket);
|
|
|
|
va_start (ap, fmt);
|
|
|
|
fmt_str = g_strdup_vprintf (fmt, ap);
|
|
va_end (ap);
|
|
|
|
str = g_strconcat (fmt_str, "\r\n", NULL);
|
|
g_free (fmt_str);
|
|
|
|
if (logfile){
|
|
if (strncmp (str, "PASS ", 5) == 0){
|
|
char *tmp = "PASS <Password not logged>\r\n";
|
|
|
|
fwrite (tmp, strlen (tmp), 1, logfile);
|
|
} else
|
|
fwrite (str, strlen (str), 1, logfile);
|
|
|
|
fflush (logfile);
|
|
}
|
|
|
|
got_sigpipe = 0;
|
|
enable_interrupt_key ();
|
|
status = write (sock, str, strlen (str));
|
|
g_free (str);
|
|
|
|
if (status < 0){
|
|
code = 421;
|
|
|
|
if (errno == EPIPE){
|
|
got_sigpipe = 1;
|
|
}
|
|
disable_interrupt_key ();
|
|
return TRANSIENT;
|
|
}
|
|
disable_interrupt_key ();
|
|
|
|
if (wait_reply)
|
|
return get_reply (sock, (wait_reply & WANT_STRING) ? reply_str : NULL, sizeof (reply_str)-1);
|
|
return COMPLETE;
|
|
}
|
|
|
|
static void
|
|
connection_close (void *data)
|
|
{
|
|
struct connection *bucket = data;
|
|
|
|
if (qsock (bucket) != -1){
|
|
print_vfs_message (_("ftpfs: Disconnecting from %s"), qhost (bucket));
|
|
command(bucket, NONE, "QUIT");
|
|
close(qsock(bucket));
|
|
}
|
|
}
|
|
|
|
/* some defines only used by changetype */
|
|
/* These two are valid values for the second parameter */
|
|
#define TYPE_ASCII 0
|
|
#define TYPE_BINARY 1
|
|
|
|
/* This one is only used to initialize bucket->isbinary, don't use it as
|
|
second parameter to changetype. */
|
|
#define TYPE_UNKNOWN -1
|
|
|
|
static int
|
|
changetype (struct connection *bucket, int binary)
|
|
{
|
|
if (binary != bucket->isbinary) {
|
|
if (command (bucket, WAIT_REPLY, "TYPE %c", binary ? 'I' : 'A') != COMPLETE)
|
|
ERRNOR (EIO, -1);
|
|
bucket->isbinary = binary;
|
|
}
|
|
return binary;
|
|
}
|
|
|
|
/* This routine logs the user in */
|
|
static int
|
|
login_server (struct connection *bucket, char *netrcpass)
|
|
{
|
|
#if defined(HSC_PROXY)
|
|
char *proxypass, *proxyname;
|
|
#endif
|
|
char *pass;
|
|
char *op;
|
|
char *name; /* login user name */
|
|
int anon = 0;
|
|
char reply_string[255];
|
|
|
|
bucket->isbinary = TYPE_UNKNOWN;
|
|
if (netrcpass)
|
|
op = g_strdup (netrcpass);
|
|
else {
|
|
if (!strcmp (quser (bucket), "anonymous") ||
|
|
!strcmp (quser (bucket), "ftp")) {
|
|
op = g_strdup (ftpfs_anonymous_passwd);
|
|
anon = 1;
|
|
} else {
|
|
char *p;
|
|
|
|
if (!bucket->password){
|
|
p = g_strconcat (_(" FTP: Password required for "), quser (bucket),
|
|
" ", NULL);
|
|
op = vfs_get_password (p);
|
|
g_free (p);
|
|
if (op == NULL)
|
|
ERRNOR (EPERM, 0);
|
|
bucket->password = g_strdup (op);
|
|
} else
|
|
op = g_strdup (bucket->password);
|
|
}
|
|
}
|
|
|
|
if (!anon || logfile)
|
|
pass = g_strdup (op);
|
|
else
|
|
pass = g_strconcat ("-", op, NULL);
|
|
wipe_password (op);
|
|
|
|
|
|
/* Proxy server accepts: username@host-we-want-to-connect*/
|
|
if (qproxy (bucket)){
|
|
#if defined(HSC_PROXY)
|
|
char *p, *host;
|
|
int port;
|
|
p = my_get_host_and_username (ftpfs_proxy_host, &host, &proxyname,
|
|
&port, &proxypass);
|
|
if (p)
|
|
g_free (p);
|
|
|
|
g_free (host);
|
|
if (proxypass)
|
|
wipe_password (proxypass);
|
|
p = g_strconcat (_(" Proxy: Password required for "), proxyname, " ",
|
|
NULL);
|
|
proxypass = vfs_get_password (p);
|
|
g_free (p);
|
|
if (proxypass == NULL) {
|
|
wipe_password (pass);
|
|
g_free (proxyname);
|
|
ERRNOR (EPERM, 0);
|
|
}
|
|
name = g_strdup (quser (bucket));
|
|
#else
|
|
name = g_strconcat (quser (bucket), "@",
|
|
qhost (bucket)[0] == '!' ? qhost (bucket)+1 : qhost (bucket), NULL);
|
|
#endif
|
|
} else
|
|
name = g_strdup (quser (bucket));
|
|
|
|
if (get_reply (qsock(bucket), reply_string, sizeof (reply_string) - 1) == COMPLETE) {
|
|
g_strup (reply_string);
|
|
bucket->remote_is_amiga = strstr (reply_string, "AMIGA") != 0;
|
|
if (logfile) {
|
|
fprintf (logfile, "MC -- remote_is_amiga = %d\n", bucket->remote_is_amiga);
|
|
fflush (logfile);
|
|
}
|
|
#if defined(HSC_PROXY)
|
|
if (qproxy (bucket)){
|
|
print_vfs_message (_("ftpfs: sending proxy login name"));
|
|
if (command (bucket, 1, "USER %s", proxyname) != CONTINUE)
|
|
goto proxyfail;
|
|
|
|
print_vfs_message (_("ftpfs: sending proxy user password"));
|
|
if (command (bucket, 1, "PASS %s", proxypass) != COMPLETE)
|
|
goto proxyfail;
|
|
|
|
print_vfs_message (_("ftpfs: proxy authentication succeeded"));
|
|
if (command (bucket, 1, "SITE %s", qhost (bucket)+1) != COMPLETE)
|
|
goto proxyfail;
|
|
|
|
print_vfs_message (_("ftpfs: connected to %s"), qhost (bucket)+1);
|
|
if (0) {
|
|
proxyfail:
|
|
bucket->failed_on_login = 1;
|
|
/* my_errno = E; */
|
|
if (proxypass)
|
|
wipe_password (proxypass);
|
|
wipe_password (pass);
|
|
g_free (proxyname);
|
|
g_free (name);
|
|
ERRNOR (EPERM, 0);
|
|
}
|
|
if (proxypass)
|
|
wipe_password (proxypass);
|
|
g_free (proxyname);
|
|
}
|
|
#endif
|
|
print_vfs_message (_("ftpfs: sending login name"));
|
|
code = command (bucket, WAIT_REPLY, "USER %s", name);
|
|
|
|
switch (code){
|
|
case CONTINUE:
|
|
print_vfs_message (_("ftpfs: sending user password"));
|
|
if (command (bucket, WAIT_REPLY, "PASS %s", pass) != COMPLETE)
|
|
break;
|
|
|
|
case COMPLETE:
|
|
print_vfs_message (_("ftpfs: logged in"));
|
|
wipe_password (pass);
|
|
g_free (name);
|
|
return 1;
|
|
|
|
default:
|
|
bucket->failed_on_login = 1;
|
|
/* my_errno = E; */
|
|
if (bucket->password)
|
|
wipe_password (bucket->password);
|
|
bucket->password = 0;
|
|
|
|
goto login_fail;
|
|
}
|
|
}
|
|
print_vfs_message (_("ftpfs: Login incorrect for user %s "), quser (bucket));
|
|
login_fail:
|
|
wipe_password (pass);
|
|
g_free (name);
|
|
ERRNOR (EPERM, 0);
|
|
}
|
|
|
|
#ifdef HAVE_SETSOCKOPT
|
|
static void
|
|
setup_source_route (int socket, int dest)
|
|
{
|
|
char buffer [20];
|
|
char *ptr = buffer;
|
|
|
|
if (!source_route)
|
|
return;
|
|
bzero (buffer, sizeof (buffer));
|
|
*ptr++ = IPOPT_LSRR;
|
|
*ptr++ = 3 + 8;
|
|
*ptr++ = 4; /* pointer */
|
|
|
|
/* First hop */
|
|
bcopy ((char *) &source_route, ptr, sizeof (int));
|
|
ptr += 4;
|
|
|
|
/* Second hop (ie, final destination) */
|
|
bcopy ((char *) &dest, ptr, sizeof (int));
|
|
ptr += 4;
|
|
while ((ptr - buffer) & 3)
|
|
ptr++;
|
|
if (setsockopt (socket, IPPROTO_IP, IP_OPTIONS,
|
|
buffer, ptr - buffer) < 0)
|
|
message_2s (1, MSG_ERROR, _(" Could not set source routing (%s)"), unix_error_string (errno));
|
|
}
|
|
#else
|
|
#define setup_source_route(x,y)
|
|
#endif
|
|
|
|
static struct no_proxy_entry {
|
|
char *domain;
|
|
void *next;
|
|
} *no_proxy;
|
|
|
|
static void
|
|
load_no_proxy_list ()
|
|
{
|
|
/* FixMe: shouldn't be hardcoded!!! */
|
|
char s[BUF_LARGE]; /* provide for BUF_LARGE characters */
|
|
struct no_proxy_entry *np, *current = 0;
|
|
FILE *npf;
|
|
int c;
|
|
char *p, *mc_file;
|
|
static int loaded;
|
|
|
|
if (loaded)
|
|
return;
|
|
|
|
mc_file = concat_dir_and_file (mc_home, "mc.no_proxy");
|
|
if (exist_file (mc_file) &&
|
|
(npf = fopen (mc_file, "r"))) {
|
|
while (fgets (s, sizeof(s), npf) || !(feof (npf) || ferror (npf))) {
|
|
if (!(p = strchr (s, '\n'))) { /* skip bogus entries */
|
|
while ((c = fgetc (npf)) != EOF && c != '\n')
|
|
;
|
|
continue;
|
|
}
|
|
|
|
if (p == s)
|
|
continue;
|
|
|
|
*p = '\0';
|
|
|
|
np = g_new (struct no_proxy_entry, 1);
|
|
np->domain = g_strdup (s);
|
|
np->next = NULL;
|
|
if (no_proxy)
|
|
current->next = np;
|
|
else
|
|
no_proxy = np;
|
|
current = np;
|
|
}
|
|
|
|
fclose (npf);
|
|
loaded = 1;
|
|
}
|
|
g_free (mc_file);
|
|
}
|
|
|
|
static int
|
|
ftpfs_check_proxy (char *host)
|
|
{
|
|
struct no_proxy_entry *npe;
|
|
|
|
if (!ftpfs_proxy_host || !*ftpfs_proxy_host || !host || !*host)
|
|
return 0; /* sanity check */
|
|
|
|
if (*host == '!')
|
|
return 1;
|
|
|
|
if (!ftpfs_always_use_proxy)
|
|
return 0;
|
|
|
|
if (!strchr (host, '.'))
|
|
return 0;
|
|
|
|
load_no_proxy_list ();
|
|
for (npe = no_proxy; npe; npe=npe->next) {
|
|
char *domain = npe->domain;
|
|
|
|
if (domain[0] == '.') {
|
|
int ld = strlen (domain);
|
|
int lh = strlen (host);
|
|
|
|
while (ld && lh && host[lh - 1] == domain[ld - 1]) {
|
|
ld--;
|
|
lh--;
|
|
}
|
|
|
|
if (!ld)
|
|
return 0;
|
|
} else
|
|
if (!g_strcasecmp (host, domain))
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
static void
|
|
ftpfs_get_proxy_host_and_port (char *proxy, char **host, int *port)
|
|
{
|
|
char *user, *pass, *dir;
|
|
|
|
#if defined(HSC_PROXY)
|
|
#define PORT 9875
|
|
#else
|
|
#define PORT 21
|
|
#endif
|
|
dir = vfs_split_url (proxy, host, &user, port, &pass, PORT, URL_DEFAULTANON);
|
|
|
|
g_free (user);
|
|
if (pass)
|
|
wipe_password (pass);
|
|
if (dir)
|
|
g_free (dir);
|
|
}
|
|
|
|
static int
|
|
ftpfs_open_socket (struct connection *bucket)
|
|
{
|
|
struct sockaddr_in server_address;
|
|
struct hostent *hp;
|
|
int my_socket;
|
|
char *host;
|
|
int port;
|
|
int free_host = 0;
|
|
|
|
/* Use a proxy host? */
|
|
host = qhost (bucket);
|
|
|
|
if (!host || !*host){
|
|
print_vfs_message (_("ftpfs: Invalid host name."));
|
|
my_errno = EINVAL;
|
|
return -1;
|
|
}
|
|
|
|
/* Hosts to connect to that start with a ! should use proxy */
|
|
if (qproxy (bucket)){
|
|
ftpfs_get_proxy_host_and_port (ftpfs_proxy_host, &host, &port);
|
|
free_host = 1;
|
|
}
|
|
|
|
/* Get host address */
|
|
bzero ((char *) &server_address, sizeof (server_address));
|
|
server_address.sin_family = AF_INET;
|
|
server_address.sin_addr.s_addr = inet_addr (host);
|
|
if (server_address.sin_addr.s_addr != -1)
|
|
server_address.sin_family = AF_INET;
|
|
else {
|
|
hp = gethostbyname (host);
|
|
if (hp == NULL){
|
|
print_vfs_message (_("ftpfs: Invalid host address."));
|
|
my_errno = EINVAL;
|
|
if (free_host)
|
|
g_free (host);
|
|
return -1;
|
|
}
|
|
server_address.sin_family = hp->h_addrtype;
|
|
|
|
/* We copy only 4 bytes, we can not trust hp->h_length, as it comes from the DNS */
|
|
bcopy ((char *) hp->h_addr, (char *) &server_address.sin_addr, 4);
|
|
}
|
|
|
|
#define THE_PORT qproxy(bucket) ? port : qport (bucket)
|
|
|
|
server_address.sin_port = htons (THE_PORT);
|
|
|
|
/* Connect */
|
|
if ((my_socket = socket (AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
my_errno = errno;
|
|
if (free_host)
|
|
g_free (host);
|
|
return -1;
|
|
}
|
|
setup_source_route (my_socket, server_address.sin_addr.s_addr);
|
|
|
|
print_vfs_message (_("ftpfs: making connection to %s"), host);
|
|
if (free_host)
|
|
g_free (host);
|
|
|
|
enable_interrupt_key (); /* clear the interrupt flag */
|
|
|
|
if (connect (my_socket, (struct sockaddr *) &server_address,
|
|
sizeof (server_address)) < 0){
|
|
my_errno = errno;
|
|
if (errno == EINTR && got_interrupt ())
|
|
print_vfs_message (_("ftpfs: connection interrupted by user"));
|
|
else
|
|
print_vfs_message (_("ftpfs: connection to server failed: %s"),
|
|
unix_error_string(errno));
|
|
disable_interrupt_key();
|
|
close (my_socket);
|
|
return -1;
|
|
}
|
|
disable_interrupt_key();
|
|
return my_socket;
|
|
}
|
|
|
|
static struct connection *
|
|
open_command_connection (char *host, char *user, int port, char *netrcpass)
|
|
{
|
|
struct connection *bucket;
|
|
int retry_seconds, count_down;
|
|
|
|
bucket = g_new (struct connection, 1);
|
|
|
|
if (bucket == NULL)
|
|
ERRNOR (ENOMEM, NULL);
|
|
#ifdef HAVE_MAD
|
|
{
|
|
extern void *watch_free_pointer;
|
|
|
|
if (!watch_free_pointer)
|
|
watch_free_pointer = host;
|
|
}
|
|
#endif
|
|
qhost (bucket) = g_strdup (host);
|
|
quser (bucket) = g_strdup (user);
|
|
qcdir (bucket) = NULL;
|
|
qport (bucket) = port;
|
|
qlock (bucket) = 0;
|
|
qhome (bucket) = NULL;
|
|
qproxy (bucket)= 0;
|
|
qupdir (bucket)= 0;
|
|
qdcache (bucket)=0;
|
|
bucket->__inode_counter = 0;
|
|
bucket->lock = 0;
|
|
bucket->use_proxy = ftpfs_check_proxy (host);
|
|
bucket->password = 0;
|
|
bucket->use_passive_connection = ftpfs_use_passive_connections | source_route;
|
|
bucket->use_source_route = source_route;
|
|
bucket->strict_rfc959_list_cmd = !ftpfs_use_unix_list_options;
|
|
bucket->isbinary = TYPE_UNKNOWN;
|
|
bucket->remote_is_amiga = 0;
|
|
|
|
/* We do not want to use the passive if we are using proxies */
|
|
if (bucket->use_proxy)
|
|
bucket->use_passive_connection = 0;
|
|
|
|
if ((qdcache (bucket) = linklist_init ()) == NULL) {
|
|
my_errno = ENOMEM;
|
|
g_free (qhost (bucket));
|
|
g_free (quser (bucket));
|
|
g_free (bucket);
|
|
return NULL;
|
|
}
|
|
|
|
retry_seconds = 0;
|
|
do {
|
|
bucket->failed_on_login = 0;
|
|
|
|
qsock (bucket) = ftpfs_open_socket (bucket);
|
|
if (qsock (bucket) == -1) {
|
|
free_bucket (bucket);
|
|
return NULL;
|
|
}
|
|
|
|
if (login_server (bucket, netrcpass)) {
|
|
/* Logged in, no need to retry the connection */
|
|
break;
|
|
} else {
|
|
if (bucket->failed_on_login){
|
|
/* Close only the socket descriptor */
|
|
close (qsock (bucket));
|
|
} else {
|
|
connection_destructor (bucket);
|
|
return NULL;
|
|
}
|
|
if (ftpfs_retry_seconds){
|
|
retry_seconds = ftpfs_retry_seconds;
|
|
enable_interrupt_key ();
|
|
for (count_down = retry_seconds; count_down; count_down--){
|
|
print_vfs_message (_("Waiting to retry... %d (Control-C to cancel)"), count_down);
|
|
sleep (1);
|
|
if (got_interrupt ()){
|
|
/* my_errno = E; */
|
|
disable_interrupt_key ();
|
|
free_bucket (bucket);
|
|
return NULL;
|
|
}
|
|
}
|
|
disable_interrupt_key ();
|
|
}
|
|
}
|
|
} while (retry_seconds);
|
|
|
|
qhome (bucket) = ftpfs_get_current_directory (bucket);
|
|
if (!qhome (bucket))
|
|
qhome (bucket) = g_strdup (PATH_SEP_STR);
|
|
qupdir (bucket) = g_strdup (PATH_SEP_STR); /* FIXME: I changed behavior to ignore last_current_dir */
|
|
return bucket;
|
|
}
|
|
|
|
static int
|
|
is_connection_closed (struct connection *bucket)
|
|
{
|
|
fd_set rset;
|
|
struct timeval t;
|
|
|
|
if (got_sigpipe){
|
|
return 1;
|
|
}
|
|
t.tv_sec = 0;
|
|
t.tv_usec = 0;
|
|
FD_ZERO (&rset);
|
|
FD_SET (qsock (bucket), &rset);
|
|
while (1) {
|
|
if (select (qsock (bucket) + 1, &rset, NULL, NULL, &t) < 0)
|
|
if (errno != EINTR)
|
|
return 1;
|
|
return 0;
|
|
#if 0
|
|
if (FD_ISSET (qsock(bucket), &rset)) {
|
|
n = read (qsock(bucket), &read_ahead, sizeof (read_ahead));
|
|
if (n <= 0)
|
|
return 1;
|
|
} else
|
|
#endif
|
|
}
|
|
}
|
|
|
|
/* This routine keeps track of open connections */
|
|
/* Returns a connected socket to host */
|
|
static struct connection *
|
|
open_link (char *host, char *user, int port, char *netrcpass)
|
|
{
|
|
int sock;
|
|
struct connection *bucket;
|
|
struct linklist *lptr;
|
|
|
|
for (lptr = connections_list->next;
|
|
lptr != connections_list; lptr = lptr->next) {
|
|
bucket = lptr->data;
|
|
if ((strcmp (host, qhost (bucket)) == 0) &&
|
|
(strcmp (user, quser (bucket)) == 0) &&
|
|
(port == qport (bucket))) {
|
|
|
|
/* check the connection is closed or not, just hack */
|
|
if (is_connection_closed (bucket)) {
|
|
flush_all_directory (bucket);
|
|
sock = ftpfs_open_socket (bucket);
|
|
if (sock != -1) {
|
|
close (qsock (bucket));
|
|
qsock (bucket) = sock;
|
|
if (login_server (bucket, netrcpass))
|
|
return bucket;
|
|
}
|
|
|
|
/* connection refused */
|
|
lptr->prev->next = lptr->next;
|
|
lptr->next->prev = lptr->prev;
|
|
connection_destructor (bucket);
|
|
return NULL;
|
|
}
|
|
return bucket;
|
|
}
|
|
}
|
|
bucket = open_command_connection (host, user, port, netrcpass);
|
|
if (bucket == NULL)
|
|
return NULL;
|
|
if (!linklist_insert (connections_list, bucket)) {
|
|
my_errno = ENOMEM;
|
|
connection_destructor (bucket);
|
|
return NULL;
|
|
}
|
|
return bucket;
|
|
}
|
|
|
|
/* The returned directory should always contain a trailing slash */
|
|
static char *
|
|
ftpfs_get_current_directory (struct connection *bucket)
|
|
{
|
|
char buf[4096], *bufp, *bufq;
|
|
|
|
if (command (bucket, NONE, "PWD") == COMPLETE &&
|
|
get_reply(qsock(bucket), buf, sizeof(buf)) == COMPLETE) {
|
|
bufp = NULL;
|
|
for (bufq = buf; *bufq; bufq++)
|
|
if (*bufq == '"') {
|
|
if (!bufp) {
|
|
bufp = bufq + 1;
|
|
} else {
|
|
*bufq = 0;
|
|
if (*bufp) {
|
|
if (*(bufq - 1) != '/') {
|
|
*bufq++ = '/';
|
|
*bufq = 0;
|
|
}
|
|
if (*bufp == '/')
|
|
return g_strdup (bufp);
|
|
else {
|
|
/* If the remote server is an Amiga a leading slash
|
|
might be missing. MC needs it because it is used
|
|
as seperator between hostname and path internally. */
|
|
return g_strconcat( "/", bufp, 0);
|
|
}
|
|
} else {
|
|
my_errno = EIO;
|
|
return NULL;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
my_errno = EIO;
|
|
return NULL;
|
|
}
|
|
|
|
|
|
/* Setup Passive ftp connection, we use it for source routed connections */
|
|
static int
|
|
setup_passive (int my_socket, struct connection *bucket, struct sockaddr_in *sa)
|
|
{
|
|
int xa, xb, xc, xd, xe, xf;
|
|
char n [6];
|
|
char *c = reply_str;
|
|
|
|
if (command (bucket, WAIT_REPLY | WANT_STRING, "PASV") != COMPLETE)
|
|
return 0;
|
|
|
|
/* Parse remote parameters */
|
|
for (c = reply_str + 4; (*c) && (!isdigit (*c)); c++)
|
|
;
|
|
if (!*c)
|
|
return 0;
|
|
if (!isdigit (*c))
|
|
return 0;
|
|
if (sscanf (c, "%d,%d,%d,%d,%d,%d", &xa, &xb, &xc, &xd, &xe, &xf) != 6)
|
|
return 0;
|
|
n [0] = (unsigned char) xa;
|
|
n [1] = (unsigned char) xb;
|
|
n [2] = (unsigned char) xc;
|
|
n [3] = (unsigned char) xd;
|
|
n [4] = (unsigned char) xe;
|
|
n [5] = (unsigned char) xf;
|
|
|
|
bcopy ((void *)n, &(sa->sin_addr.s_addr), 4);
|
|
bcopy ((void *)&n[4], &(sa->sin_port), 2);
|
|
setup_source_route (my_socket, sa->sin_addr.s_addr);
|
|
if (connect (my_socket, (struct sockaddr *) sa, sizeof (struct sockaddr_in)) < 0)
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
static int
|
|
initconn (struct connection *bucket)
|
|
{
|
|
struct sockaddr_in data_addr;
|
|
int data, len = sizeof(data_addr);
|
|
struct protoent *pe;
|
|
|
|
getsockname(qsock(bucket), (struct sockaddr *) &data_addr, &len);
|
|
data_addr.sin_port = 0;
|
|
|
|
pe = getprotobyname("tcp");
|
|
if (pe == NULL)
|
|
ERRNOR (EIO, -1);
|
|
data = socket (AF_INET, SOCK_STREAM, pe->p_proto);
|
|
if (data < 0)
|
|
ERRNOR (EIO, -1);
|
|
|
|
#ifdef ORIGINAL_CONNECT_CODE
|
|
if (bucket->use_source_route){
|
|
int c;
|
|
|
|
if ((c = setup_passive (data, bucket, &data_addr)))
|
|
return data;
|
|
print_vfs_message(_("ftpfs: could not setup passive mode for source routing"));
|
|
bucket->use_source_route = 0;
|
|
}
|
|
#else
|
|
if (bucket->use_passive_connection){
|
|
if ((bucket->use_passive_connection = setup_passive (data, bucket, &data_addr)))
|
|
return data;
|
|
|
|
bucket->use_source_route = 0;
|
|
bucket->use_passive_connection = 0;
|
|
print_vfs_message (_("ftpfs: could not setup passive mode"));
|
|
}
|
|
#endif
|
|
/* If passive setup fails, fallback to active connections */
|
|
/* Active FTP connection */
|
|
if (bind (data, (struct sockaddr *)&data_addr, len) < 0)
|
|
goto error_return;
|
|
getsockname(data, (struct sockaddr *) &data_addr, &len);
|
|
if (listen (data, 1) < 0)
|
|
goto error_return;
|
|
{
|
|
unsigned char *a = (unsigned char *)&data_addr.sin_addr;
|
|
unsigned char *p = (unsigned char *)&data_addr.sin_port;
|
|
|
|
if (command (bucket, WAIT_REPLY, "PORT %d,%d,%d,%d,%d,%d", a[0], a[1],
|
|
a[2], a[3], p[0], p[1]) != COMPLETE)
|
|
goto error_return;
|
|
}
|
|
return data;
|
|
error_return:
|
|
close(data);
|
|
my_errno = EIO;
|
|
return -1;
|
|
}
|
|
|
|
static int
|
|
open_data_connection (struct connection *bucket, char *cmd, char *remote,
|
|
int isbinary, int reget)
|
|
{
|
|
struct sockaddr_in from;
|
|
int s, j, data, fromlen = sizeof(from);
|
|
|
|
if ((s = initconn (bucket)) == -1)
|
|
return -1;
|
|
if (changetype (bucket, isbinary) == -1)
|
|
return -1;
|
|
if (reget > 0){
|
|
j = command (bucket, WAIT_REPLY, "REST %d", reget);
|
|
if (j != CONTINUE)
|
|
return -1;
|
|
}
|
|
if (remote)
|
|
j = command (bucket, WAIT_REPLY, "%s %s", cmd,
|
|
translate_path (bucket, remote));
|
|
else
|
|
j = command (bucket, WAIT_REPLY, "%s", cmd);
|
|
if (j != PRELIM)
|
|
ERRNOR (EPERM, -1);
|
|
enable_interrupt_key();
|
|
if (bucket->use_passive_connection)
|
|
data = s;
|
|
else {
|
|
data = accept (s, (struct sockaddr *)&from, &fromlen);
|
|
if (data < 0) {
|
|
my_errno = errno;
|
|
close(s);
|
|
return -1;
|
|
}
|
|
close(s);
|
|
}
|
|
disable_interrupt_key();
|
|
return data;
|
|
}
|
|
|
|
static void
|
|
my_abort (struct connection *bucket, int dsock)
|
|
{
|
|
static unsigned char ipbuf[3] = { IAC, IP, IAC };
|
|
fd_set mask;
|
|
char buf[1024];
|
|
|
|
print_vfs_message(_("ftpfs: aborting transfer."));
|
|
if (send(qsock(bucket), ipbuf, sizeof(ipbuf), MSG_OOB) != sizeof(ipbuf)) {
|
|
print_vfs_message(_("ftpfs: abort error: %s"), unix_error_string(errno));
|
|
return;
|
|
}
|
|
|
|
if (command(bucket, NONE, "%cABOR", DM) != COMPLETE){
|
|
print_vfs_message (_("ftpfs: abort failed"));
|
|
return;
|
|
}
|
|
if (dsock != -1) {
|
|
FD_ZERO(&mask);
|
|
FD_SET(dsock, &mask);
|
|
if (select(dsock + 1, &mask, NULL, NULL, NULL) > 0)
|
|
while (read(dsock, buf, sizeof(buf)) > 0);
|
|
}
|
|
if ((get_reply(qsock(bucket), NULL, 0) == TRANSIENT) && (code == 426))
|
|
get_reply(qsock(bucket), NULL, 0);
|
|
}
|
|
|
|
static void
|
|
resolve_symlink_without_ls_options(struct connection *bucket, struct dir *dir)
|
|
{
|
|
struct linklist *flist;
|
|
struct direntry *fe, *fel;
|
|
char tmp[MC_MAXPATHLEN];
|
|
|
|
dir->symlink_status = FTPFS_RESOLVING_SYMLINKS;
|
|
for (flist = dir->file_list->next; flist != dir->file_list; flist = flist->next) {
|
|
/* flist->data->l_stat is alread initialized with 0 */
|
|
fel = flist->data;
|
|
if (S_ISLNK(fel->s.st_mode)) {
|
|
if (fel->linkname[0] == '/') {
|
|
if (strlen (fel->linkname) >= MC_MAXPATHLEN)
|
|
continue;
|
|
strcpy (tmp, fel->linkname);
|
|
} else {
|
|
if ((strlen (dir->remote_path) + strlen (fel->linkname)) >= MC_MAXPATHLEN)
|
|
continue;
|
|
strcpy (tmp, dir->remote_path);
|
|
if (tmp[1] != '\0')
|
|
strcat (tmp, "/");
|
|
strcat (tmp + 1, fel->linkname);
|
|
}
|
|
for ( ;; ) {
|
|
canonicalize_pathname (tmp);
|
|
fe = _get_file_entry(bucket, tmp, 0, 0);
|
|
if (fe) {
|
|
if (S_ISLNK (fe->s.st_mode) && fe->l_stat == 0) {
|
|
/* Symlink points to link which isn't resolved, yet. */
|
|
if (fe->linkname[0] == '/') {
|
|
if (strlen (fe->linkname) >= MC_MAXPATHLEN)
|
|
break;
|
|
strcpy (tmp, fe->linkname);
|
|
} else {
|
|
/* at this point tmp looks always like this
|
|
/directory/filename, i.e. no need to check
|
|
strrchr's return value */
|
|
*(strrchr (tmp, '/') + 1) = '\0'; /* dirname */
|
|
if ((strlen (tmp) + strlen (fe->linkname)) >= MC_MAXPATHLEN)
|
|
break;
|
|
strcat (tmp, fe->linkname);
|
|
}
|
|
continue;
|
|
} else {
|
|
fel->l_stat = g_new (struct stat, 1);
|
|
if ( S_ISLNK (fe->s.st_mode))
|
|
*fel->l_stat = *fe->l_stat;
|
|
else
|
|
*fel->l_stat = fe->s;
|
|
(*fel->l_stat).st_ino = bucket->__inode_counter++;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
dir->symlink_status = FTPFS_RESOLVED_SYMLINKS;
|
|
}
|
|
|
|
static void
|
|
resolve_symlink_with_ls_options(struct connection *bucket, struct dir *dir)
|
|
{
|
|
char buffer[2048] = "", *filename;
|
|
int sock;
|
|
FILE *fp;
|
|
struct stat s;
|
|
struct linklist *flist;
|
|
struct direntry *fe;
|
|
int switch_method = 0;
|
|
|
|
dir->symlink_status = FTPFS_RESOLVED_SYMLINKS;
|
|
if (strchr (dir->remote_path, ' ')) {
|
|
if (ftpfs_chdir_internal (bucket, dir->remote_path) != COMPLETE) {
|
|
print_vfs_message(_("ftpfs: CWD failed."));
|
|
return;
|
|
}
|
|
sock = open_data_connection (bucket, "LIST -lLa", ".", TYPE_ASCII, 0);
|
|
}
|
|
else
|
|
sock = open_data_connection (bucket, "LIST -lLa",
|
|
dir->remote_path, TYPE_ASCII, 0);
|
|
|
|
if (sock == -1) {
|
|
print_vfs_message(_("ftpfs: couldn't resolve symlink"));
|
|
return;
|
|
}
|
|
|
|
fp = fdopen(sock, "r");
|
|
if (fp == NULL) {
|
|
close(sock);
|
|
print_vfs_message(_("ftpfs: couldn't resolve symlink"));
|
|
return;
|
|
}
|
|
enable_interrupt_key();
|
|
flist = dir->file_list->next;
|
|
while (1) {
|
|
do {
|
|
if (flist == dir->file_list)
|
|
goto done;
|
|
fe = flist->data;
|
|
flist = flist->next;
|
|
} while (!S_ISLNK(fe->s.st_mode));
|
|
while (1) {
|
|
if (fgets (buffer, sizeof (buffer), fp) == NULL)
|
|
goto done;
|
|
if (logfile){
|
|
fputs (buffer, logfile);
|
|
fflush (logfile);
|
|
}
|
|
if (vfs_parse_ls_lga (buffer, &s, &filename, NULL)) {
|
|
int r = strcmp(fe->name, filename);
|
|
g_free(filename);
|
|
if (r == 0) {
|
|
if (S_ISLNK (s.st_mode)) {
|
|
/* This server doesn't understand LIST -lLa */
|
|
switch_method = 1;
|
|
goto done;
|
|
}
|
|
fe->l_stat = g_new (struct stat, 1);
|
|
if (fe->l_stat == NULL)
|
|
goto done;
|
|
*fe->l_stat = s;
|
|
(*fe->l_stat).st_ino = bucket->__inode_counter++;
|
|
break;
|
|
}
|
|
if (r < 0)
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
done:
|
|
while (fgets(buffer, sizeof(buffer), fp) != NULL);
|
|
disable_interrupt_key();
|
|
fclose(fp);
|
|
get_reply(qsock(bucket), NULL, 0);
|
|
if (switch_method) {
|
|
bucket->strict_rfc959_list_cmd = 1;
|
|
resolve_symlink_without_ls_options(bucket, dir);
|
|
}
|
|
}
|
|
|
|
static void
|
|
resolve_symlink(struct connection *bucket, struct dir *dir)
|
|
{
|
|
print_vfs_message(_("Resolving symlink..."));
|
|
|
|
if (bucket->strict_rfc959_list_cmd)
|
|
resolve_symlink_without_ls_options(bucket, dir);
|
|
else
|
|
resolve_symlink_with_ls_options(bucket, dir);
|
|
}
|
|
|
|
|
|
#define X "ftp"
|
|
#define X_myname "/#ftp:"
|
|
#define vfs_X_ops vfs_ftpfs_ops
|
|
#define X_fill_names ftpfs_fill_names
|
|
#define X_hint_reread ftpfs_hint_reread
|
|
#define X_flushdir ftpfs_flushdir
|
|
#define X_done ftpfs_done
|
|
#include "shared_ftp_fish.c"
|
|
|
|
static char*
|
|
get_path (struct connection **bucket, char *path)
|
|
{
|
|
return s_get_path (bucket, path, "/#ftp:");
|
|
}
|
|
|
|
/* Inserts an entry for "." (and "..") into the linked list. Ignore any
|
|
errors because "." isn't important (as fas as you don't try to save a
|
|
file in the root dir of the ftp server).
|
|
Actually the dot is needed when stating the root directory, e.g.
|
|
mc_stat ("/ftp#localhost", &buf). Down the call tree _get_file_entry
|
|
gets called with filename = "/" which will be transformed into "."
|
|
before searching for a fileentry. Whithout "." in the linked list
|
|
this search fails. -- Norbert. */
|
|
static void
|
|
insert_dots (struct linklist *file_list, struct connection *bucket)
|
|
{
|
|
struct direntry *fe;
|
|
int i;
|
|
char buffer[][58] = {
|
|
"drwxrwxrwx 1 0 0 1024 Jan 1 1970 .",
|
|
"drwxrwxrwx 1 0 0 1024 Jan 1 1970 .."
|
|
};
|
|
|
|
for (i = 0; i < 2; i++ ) {
|
|
fe = malloc(sizeof(struct direntry));
|
|
if (fe == NULL)
|
|
return;
|
|
if (vfs_parse_ls_lga (buffer[i], &fe->s, &fe->name, &fe->linkname)) {
|
|
fe->freshly_created = 0;
|
|
fe->count = 1;
|
|
fe->local_filename = fe->remote_filename = NULL;
|
|
fe->l_stat = NULL;
|
|
fe->bucket = bucket;
|
|
(fe->s).st_ino = bucket->__inode_counter++;
|
|
|
|
if (!linklist_insert(file_list, fe))
|
|
free(fe);
|
|
} else
|
|
free (fe);
|
|
}
|
|
}
|
|
|
|
static struct dir *
|
|
retrieve_dir(struct connection *bucket, char *remote_path, int resolve_symlinks)
|
|
{
|
|
#ifdef OLD_READ
|
|
FILE *fp;
|
|
#endif
|
|
int sock, has_symlinks;
|
|
struct linklist *file_list, *p;
|
|
struct direntry *fe;
|
|
char buffer[8192];
|
|
struct dir *dcache;
|
|
int got_intr = 0;
|
|
int dot_found = 0;
|
|
int has_spaces = (strchr (remote_path, ' ') != NULL);
|
|
|
|
canonicalize_pathname (remote_path);
|
|
for (p = qdcache(bucket)->next;p != qdcache(bucket);
|
|
p = p->next) {
|
|
dcache = p->data;
|
|
if (strcmp(dcache->remote_path, remote_path) == 0) {
|
|
struct timeval tim;
|
|
|
|
gettimeofday(&tim, NULL);
|
|
if (((tim.tv_sec < dcache->timestamp.tv_sec) && !force_expiration)
|
|
|| dcache->symlink_status == FTPFS_RESOLVING_SYMLINKS) {
|
|
if (resolve_symlinks && dcache->symlink_status == FTPFS_UNRESOLVED_SYMLINKS)
|
|
resolve_symlink(bucket, dcache);
|
|
return dcache;
|
|
} else {
|
|
force_expiration = 0;
|
|
p->next->prev = p->prev;
|
|
p->prev->next = p->next;
|
|
dir_destructor(dcache);
|
|
g_free (p);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
has_symlinks = 0;
|
|
if (bucket->strict_rfc959_list_cmd)
|
|
print_vfs_message(_("ftpfs: Reading FTP directory %s... (don't use UNIX ls options)"), remote_path);
|
|
else
|
|
print_vfs_message(_("ftpfs: Reading FTP directory %s..."), remote_path);
|
|
if (has_spaces || bucket->strict_rfc959_list_cmd || ftpfs_first_cd_then_ls) {
|
|
if (ftpfs_chdir_internal (bucket, remote_path) != COMPLETE) {
|
|
my_errno = ENOENT;
|
|
print_vfs_message(_("ftpfs: CWD failed."));
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
file_list = linklist_init();
|
|
if (file_list == NULL)
|
|
ERRNOR (ENOMEM, NULL);
|
|
dcache = g_new (struct dir, 1);
|
|
if (dcache == NULL) {
|
|
my_errno = ENOMEM;
|
|
linklist_destroy(file_list, NULL);
|
|
print_vfs_message(_("ftpfs: FAIL"));
|
|
return NULL;
|
|
}
|
|
gettimeofday(&dcache->timestamp, NULL);
|
|
dcache->timestamp.tv_sec += ftpfs_directory_timeout;
|
|
dcache->file_list = file_list;
|
|
dcache->remote_path = g_strdup(remote_path);
|
|
dcache->count = 1;
|
|
dcache->symlink_status = FTPFS_NO_SYMLINKS;
|
|
|
|
if (bucket->strict_rfc959_list_cmd == 1)
|
|
sock = open_data_connection (bucket, "LIST", 0, TYPE_ASCII, 0);
|
|
else if (has_spaces || ftpfs_first_cd_then_ls)
|
|
sock = open_data_connection (bucket, "LIST -la", ".", TYPE_ASCII, 0);
|
|
else {
|
|
/* Trailing "/." is necessary if remote_path is a symlink
|
|
but don't generate "//." */
|
|
char *path = g_strconcat (remote_path,
|
|
remote_path[1] == '\0' ? "" : PATH_SEP_STR,
|
|
".", (char *) 0);
|
|
|
|
sock = open_data_connection (bucket, "LIST -la", path, TYPE_ASCII, 0);
|
|
g_free (path);
|
|
}
|
|
|
|
if (sock == -1)
|
|
goto fallback;
|
|
|
|
#ifdef OLD_READ
|
|
#define close_this_sock(x,y) fclose (x)
|
|
fp = fdopen(sock, "r");
|
|
if (fp == NULL) {
|
|
my_errno = errno;
|
|
close(sock);
|
|
goto error_2;
|
|
}
|
|
#else
|
|
#define close_this_sock(x,y) close (y)
|
|
#endif
|
|
|
|
/* Clear the interrupt flag */
|
|
enable_interrupt_key ();
|
|
|
|
errno = 0;
|
|
#ifdef OLD_READ
|
|
while (fgets (buffer, sizeof (buffer), fp) != NULL) {
|
|
if (got_intr = got_interrupt ())
|
|
break;
|
|
#else
|
|
while ((got_intr = get_line_interruptible (buffer, sizeof (buffer), sock)) != EINTR){
|
|
#endif
|
|
int eof = got_intr == 0;
|
|
|
|
if (logfile){
|
|
fputs (buffer, logfile);
|
|
fputs ("\n", logfile);
|
|
fflush (logfile);
|
|
}
|
|
if (buffer [0] == 0 && eof)
|
|
break;
|
|
fe = g_new (struct direntry, 1);
|
|
fe->freshly_created = 0;
|
|
fe->local_filename = NULL;
|
|
if (fe == NULL) {
|
|
my_errno = ENOMEM;
|
|
goto error_1;
|
|
}
|
|
if (vfs_parse_ls_lga (buffer, &fe->s, &fe->name, &fe->linkname)) {
|
|
if (strcmp (fe->name, ".") == 0)
|
|
dot_found = 1;
|
|
fe->count = 1;
|
|
fe->local_filename = fe->remote_filename = NULL;
|
|
fe->l_stat = NULL;
|
|
fe->bucket = bucket;
|
|
(fe->s).st_ino = bucket->__inode_counter++;
|
|
if (S_ISLNK(fe->s.st_mode))
|
|
has_symlinks = 1;
|
|
|
|
if (!linklist_insert(file_list, fe)) {
|
|
g_free(fe);
|
|
my_errno = ENOMEM;
|
|
goto error_1;
|
|
}
|
|
}
|
|
else
|
|
g_free(fe);
|
|
if (eof)
|
|
break;
|
|
}
|
|
if (got_intr){
|
|
disable_interrupt_key();
|
|
print_vfs_message(_("ftpfs: reading FTP directory interrupt by user"));
|
|
#ifdef OLD_READ
|
|
my_abort(bucket, fileno(fp));
|
|
#else
|
|
my_abort(bucket, sock);
|
|
#endif
|
|
close_this_sock(fp, sock);
|
|
my_errno = EINTR;
|
|
goto error_3;
|
|
}
|
|
close_this_sock(fp, sock);
|
|
disable_interrupt_key();
|
|
if ((get_reply (qsock (bucket), NULL, 0) != COMPLETE) ||
|
|
(file_list->next == file_list))
|
|
goto fallback;
|
|
|
|
ok:
|
|
if (!dot_found)
|
|
insert_dots (file_list, bucket);
|
|
|
|
if (!linklist_insert(qdcache(bucket), dcache)) {
|
|
my_errno = ENOMEM;
|
|
goto error_3;
|
|
}
|
|
if (has_symlinks) {
|
|
if (resolve_symlinks)
|
|
resolve_symlink(bucket, dcache);
|
|
else
|
|
dcache->symlink_status = FTPFS_UNRESOLVED_SYMLINKS;
|
|
}
|
|
print_vfs_message(_("ftpfs: got listing"));
|
|
return dcache;
|
|
error_1:
|
|
disable_interrupt_key();
|
|
close_this_sock(fp, sock);
|
|
#ifdef OLD_READ
|
|
error_2:
|
|
#endif
|
|
get_reply(qsock(bucket), NULL, 0);
|
|
error_3:
|
|
g_free(dcache->remote_path);
|
|
g_free(dcache);
|
|
linklist_destroy(file_list, direntry_destructor);
|
|
print_vfs_message(_("ftpfs: failed"));
|
|
return NULL;
|
|
|
|
fallback:
|
|
if (bucket->__inode_counter == 0 && (!bucket->strict_rfc959_list_cmd)) {
|
|
/* It's our first attempt to get a directory listing from this
|
|
server (UNIX style LIST command) */
|
|
bucket->strict_rfc959_list_cmd = 1;
|
|
g_free(dcache->remote_path);
|
|
g_free(dcache);
|
|
linklist_destroy(file_list, direntry_destructor);
|
|
return retrieve_dir (bucket, remote_path, resolve_symlinks);
|
|
}
|
|
|
|
/* Ok, maybe the directory exists but the remote server doesn't
|
|
list "." and "..".
|
|
Check whether the directory exists:
|
|
*/
|
|
if (has_spaces || bucket->strict_rfc959_list_cmd ||
|
|
ftpfs_first_cd_then_ls) /* CWD has been already performed, i.e.
|
|
we know that remote_path exists */
|
|
goto ok;
|
|
else {
|
|
if (bucket->remote_is_amiga) {
|
|
/* The Amiga ftp server needs extra processing because it
|
|
always gets relative pathes instead of absolute pathes
|
|
like anyone else */
|
|
char *p = ftpfs_get_current_directory (bucket);
|
|
|
|
if (ftpfs_chdir_internal (bucket, remote_path) == COMPLETE) {
|
|
ftpfs_chdir_internal (bucket, p);
|
|
g_free (p);
|
|
goto ok;
|
|
}
|
|
} else {
|
|
if (ftpfs_chdir_internal (bucket, remote_path) == COMPLETE)
|
|
goto ok;
|
|
}
|
|
}
|
|
|
|
my_errno = EACCES;
|
|
g_free(dcache->remote_path);
|
|
g_free(dcache);
|
|
linklist_destroy(file_list, direntry_destructor);
|
|
print_vfs_message(_("ftpfs: failed; nowhere to fallback to"));
|
|
return NULL;
|
|
}
|
|
|
|
static int
|
|
store_file(struct direntry *fe)
|
|
{
|
|
int local_handle, sock, n, total;
|
|
#ifdef HAVE_STRUCT_LINGER
|
|
struct linger li;
|
|
#else
|
|
int flag_one = 1;
|
|
#endif
|
|
char buffer[8192];
|
|
struct stat s;
|
|
|
|
local_handle = open(fe->local_filename, O_RDONLY);
|
|
unlink (fe->local_filename);
|
|
if (local_handle == -1)
|
|
ERRNOR (EIO, 0);
|
|
fstat(local_handle, &s);
|
|
sock = open_data_connection(fe->bucket, "STOR", fe->remote_filename, TYPE_BINARY, 0);
|
|
if (sock < 0) {
|
|
close(local_handle);
|
|
return 0;
|
|
}
|
|
#ifdef HAVE_STRUCT_LINGER
|
|
li.l_onoff = 1;
|
|
li.l_linger = 120;
|
|
setsockopt(sock, SOL_SOCKET, SO_LINGER, (char *) &li, sizeof(li));
|
|
#else
|
|
setsockopt(sock, SOL_SOCKET, SO_LINGER, &flag_one, sizeof (flag_one));
|
|
#endif
|
|
total = 0;
|
|
|
|
enable_interrupt_key();
|
|
while (1) {
|
|
while ((n = read(local_handle, buffer, sizeof(buffer))) < 0) {
|
|
if (errno == EINTR) {
|
|
if (got_interrupt()) {
|
|
my_errno = EINTR;
|
|
goto error_return;
|
|
}
|
|
else
|
|
continue;
|
|
}
|
|
my_errno = errno;
|
|
goto error_return;
|
|
}
|
|
if (n == 0)
|
|
break;
|
|
while (write(sock, buffer, n) < 0) {
|
|
if (errno == EINTR) {
|
|
if (got_interrupt()) {
|
|
my_errno = EINTR;
|
|
goto error_return;
|
|
}
|
|
else
|
|
continue;
|
|
}
|
|
my_errno = errno;
|
|
goto error_return;
|
|
}
|
|
total += n;
|
|
print_vfs_message(_("ftpfs: storing file %d (%d)"),
|
|
total, s.st_size);
|
|
}
|
|
disable_interrupt_key();
|
|
close(sock);
|
|
close(local_handle);
|
|
if (get_reply (qsock (fe->bucket), NULL, 0) != COMPLETE)
|
|
ERRNOR (EIO, 0);
|
|
return 1;
|
|
error_return:
|
|
disable_interrupt_key();
|
|
close(sock);
|
|
close(local_handle);
|
|
get_reply(qsock(fe->bucket), NULL, 0);
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
linear_start(struct direntry *fe, int offset)
|
|
{
|
|
fe->local_stat.st_mtime = 0;
|
|
fe->data_sock = open_data_connection(fe->bucket, "RETR", fe->remote_filename, TYPE_BINARY, offset);
|
|
if (fe->data_sock == -1)
|
|
ERRNOR (EACCES, 0);
|
|
fe->linear_state = LS_LINEAR_OPEN;
|
|
return 1;
|
|
}
|
|
|
|
static void
|
|
linear_abort (struct direntry *fe)
|
|
{
|
|
my_abort(fe->bucket, fe->data_sock);
|
|
fe->data_sock = -1;
|
|
}
|
|
|
|
static int
|
|
linear_read (struct direntry *fe, void *buf, int len)
|
|
{
|
|
int n;
|
|
while ((n = read (fe->data_sock, buf, len))<0) {
|
|
if ((errno == EINTR) && !got_interrupt())
|
|
continue;
|
|
break;
|
|
}
|
|
|
|
if (n<0)
|
|
linear_abort(fe);
|
|
|
|
if (!n) {
|
|
if ((get_reply (qsock (fe->bucket), NULL, 0) != COMPLETE)) {
|
|
my_errno = EIO;
|
|
n=-1;
|
|
}
|
|
close (fe->data_sock);
|
|
fe->data_sock = -1;
|
|
}
|
|
ERRNOR (errno, n);
|
|
}
|
|
|
|
static void
|
|
linear_close (struct direntry *fe)
|
|
{
|
|
if (fe->data_sock != -1)
|
|
linear_abort(fe);
|
|
}
|
|
|
|
int ftpfs_ctl (void *data, int ctlop, int arg)
|
|
{
|
|
struct filp *fp = data;
|
|
switch (ctlop) {
|
|
case MCCTL_IS_NOTREADY:
|
|
{
|
|
int v;
|
|
|
|
if (!fp->fe->linear_state)
|
|
vfs_die ("You may not do this");
|
|
if (fp->fe->linear_state == LS_LINEAR_CLOSED)
|
|
return 0;
|
|
|
|
v = select_on_two (fp->fe->data_sock, 0);
|
|
if (((v < 0) && (errno == EINTR)) || v == 0)
|
|
return 1;
|
|
return 0;
|
|
}
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
static int
|
|
send_ftp_command(char *filename, char *cmd, int flags)
|
|
{
|
|
char *remote_path, *p;
|
|
struct connection *bucket;
|
|
int r;
|
|
int flush_directory_cache = (flags & OPT_FLUSH) && (normal_flush > 0);
|
|
|
|
if (!(remote_path = get_path(&bucket, filename)))
|
|
return -1;
|
|
p = translate_path (bucket, remote_path);
|
|
r = command (bucket, WAIT_REPLY, cmd, p);
|
|
g_free(remote_path);
|
|
vfs_add_noncurrent_stamps (&vfs_ftpfs_ops, (vfsid) bucket, NULL);
|
|
if (flags & OPT_IGNORE_ERROR)
|
|
r = COMPLETE;
|
|
if (r != COMPLETE)
|
|
ERRNOR (EPERM, -1);
|
|
if (flush_directory_cache)
|
|
flush_all_directory(bucket);
|
|
return 0;
|
|
}
|
|
|
|
/* This routine is called as the last step in load_setup */
|
|
void
|
|
ftpfs_init_passwd(void)
|
|
{
|
|
struct passwd *passwd_info;
|
|
char *p, hostname[MAXHOSTNAMELEN];
|
|
struct hostent *hp;
|
|
|
|
ftpfs_anonymous_passwd = load_anon_passwd ();
|
|
if (ftpfs_anonymous_passwd)
|
|
return;
|
|
|
|
if ((passwd_info = getpwuid (geteuid ())) == NULL)
|
|
p = "unknown";
|
|
else
|
|
p = passwd_info->pw_name;
|
|
gethostname(hostname, sizeof(hostname));
|
|
hp = gethostbyname(hostname);
|
|
if (hp != NULL)
|
|
ftpfs_anonymous_passwd = g_strconcat (p, "@", hp->h_name, NULL);
|
|
else
|
|
ftpfs_anonymous_passwd = g_strconcat (p, "@", hostname, NULL);
|
|
endpwent ();
|
|
}
|
|
|
|
int
|
|
ftpfs_init (vfs *me)
|
|
{
|
|
connections_list = linklist_init();
|
|
ftpfs_directory_timeout = FTPFS_DIRECTORY_TIMEOUT;
|
|
return 1;
|
|
}
|
|
|
|
static int ftpfs_chmod (vfs *me, char *path, int mode)
|
|
{
|
|
char buf[BUF_SMALL];
|
|
|
|
g_snprintf(buf, sizeof(buf), "SITE CHMOD %4.4o %%s", mode & 07777);
|
|
return send_ftp_command(path, buf, OPT_IGNORE_ERROR | OPT_FLUSH);
|
|
}
|
|
|
|
static int ftpfs_chown (vfs *me, char *path, int owner, int group)
|
|
{
|
|
#if 0
|
|
my_errno = EPERM;
|
|
return -1;
|
|
#else
|
|
/* Everyone knows it is not possible to chown remotely, so why bother them.
|
|
If someone's root, then copy/move will always try to chown it... */
|
|
return 0;
|
|
#endif
|
|
}
|
|
|
|
static int ftpfs_unlink (vfs *me, char *path)
|
|
{
|
|
return send_ftp_command(path, "DELE %s", OPT_FLUSH);
|
|
}
|
|
|
|
/* Return true if path is the same directoy as the one we are on now */
|
|
static int
|
|
is_same_dir (char *path, struct connection *bucket)
|
|
{
|
|
if (!qcdir (bucket))
|
|
return 0;
|
|
if (strcmp (path, qcdir (bucket)) == 0)
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
ftpfs_chdir_internal (struct connection *bucket ,char *remote_path)
|
|
{
|
|
int r;
|
|
char *p;
|
|
|
|
if (!bucket->cwd_defered && is_same_dir (remote_path, bucket))
|
|
return COMPLETE;
|
|
|
|
p = translate_path (bucket, remote_path);
|
|
r = command (bucket, WAIT_REPLY, "CWD %s", p);
|
|
|
|
if (r != COMPLETE) {
|
|
my_errno = EIO;
|
|
} else {
|
|
if (qcdir(bucket))
|
|
g_free(qcdir(bucket));
|
|
qcdir(bucket) = g_strdup (remote_path);
|
|
bucket->cwd_defered = 0;
|
|
}
|
|
return r;
|
|
}
|
|
|
|
static int ftpfs_rename (vfs *me, char *path1, char *path2)
|
|
{
|
|
send_ftp_command(path1, "RNFR %s", OPT_FLUSH);
|
|
return send_ftp_command(path2, "RNTO %s", OPT_FLUSH);
|
|
}
|
|
|
|
static int ftpfs_mkdir (vfs *me, char *path, mode_t mode)
|
|
{
|
|
return send_ftp_command(path, "MKD %s", OPT_FLUSH);
|
|
}
|
|
|
|
static int ftpfs_rmdir (vfs *me, char *path)
|
|
{
|
|
return send_ftp_command(path, "RMD %s", OPT_FLUSH);
|
|
}
|
|
|
|
void ftpfs_set_debug (char *file)
|
|
{
|
|
logfile = fopen (file, "w+");
|
|
}
|
|
|
|
static void my_forget (char *file)
|
|
{
|
|
struct linklist *l;
|
|
char *host, *user, *pass, *rp;
|
|
int port;
|
|
|
|
#ifndef BROKEN_PATHS
|
|
if (strncmp (file, "/#ftp:", 6))
|
|
return; /* Normal: consider cd /bla/#ftp */
|
|
#else
|
|
if (!(file = strstr (file, "/#ftp:")))
|
|
return;
|
|
#endif
|
|
|
|
file += 6;
|
|
if (!(rp = my_get_host_and_username (file, &host, &user, &port, &pass))) {
|
|
g_free (host);
|
|
g_free (user);
|
|
if (pass)
|
|
wipe_password (pass);
|
|
return;
|
|
}
|
|
|
|
/* we do not care about the path actually */
|
|
g_free (rp);
|
|
|
|
for (l = connections_list->next; l != connections_list; l = l->next){
|
|
struct connection *bucket = l->data;
|
|
|
|
if ((strcmp (host, qhost (bucket)) == 0) &&
|
|
(strcmp (user, quser (bucket)) == 0) &&
|
|
(port == qport (bucket))){
|
|
|
|
/* close socket: the child owns it now */
|
|
close (bucket->sock);
|
|
bucket->sock = -1;
|
|
|
|
/* reopen the connection */
|
|
bucket->sock = ftpfs_open_socket (bucket);
|
|
if (bucket->sock != -1)
|
|
login_server (bucket, pass);
|
|
break;
|
|
}
|
|
}
|
|
g_free (host);
|
|
g_free (user);
|
|
if (pass)
|
|
wipe_password (pass);
|
|
}
|
|
|
|
vfs vfs_ftpfs_ops = {
|
|
NULL, /* This is place of next pointer */
|
|
"File Tranfer Protocol (ftp)",
|
|
F_NET, /* flags */
|
|
"ftp:", /* prefix */
|
|
NULL, /* data */
|
|
0, /* errno */
|
|
ftpfs_init,
|
|
ftpfs_done,
|
|
ftpfs_fill_names,
|
|
NULL,
|
|
|
|
s_open,
|
|
s_close,
|
|
s_read,
|
|
s_write,
|
|
|
|
s_opendir,
|
|
s_readdir,
|
|
s_closedir,
|
|
s_telldir,
|
|
s_seekdir,
|
|
|
|
s_stat,
|
|
s_lstat,
|
|
s_fstat,
|
|
|
|
ftpfs_chmod,
|
|
ftpfs_chown, /* not really implemented but returns success */
|
|
NULL,
|
|
|
|
s_readlink,
|
|
NULL,
|
|
NULL,
|
|
ftpfs_unlink,
|
|
|
|
ftpfs_rename,
|
|
s_chdir,
|
|
s_errno,
|
|
s_lseek,
|
|
NULL,
|
|
|
|
s_getid,
|
|
s_nothingisopen,
|
|
s_free,
|
|
|
|
s_getlocalcopy,
|
|
s_ungetlocalcopy,
|
|
|
|
ftpfs_mkdir,
|
|
ftpfs_rmdir,
|
|
ftpfs_ctl,
|
|
s_setctl
|
|
|
|
MMAPNULL
|
|
};
|
|
|
|
#ifdef USE_NETRC
|
|
static char buffer[BUF_MEDIUM];
|
|
static char *netrc, *netrcp;
|
|
|
|
static int netrc_next (void)
|
|
{
|
|
char *p;
|
|
int i;
|
|
static char *keywords [] = { "default", "machine",
|
|
"login", "password", "passwd",
|
|
"account", "macdef" };
|
|
|
|
while (1) {
|
|
netrcp = skip_separators (netrcp);
|
|
if (*netrcp != '\n')
|
|
break;
|
|
netrcp++;
|
|
}
|
|
if (!*netrcp)
|
|
return 0;
|
|
p = buffer;
|
|
if (*netrcp == '"') {
|
|
for (;*netrcp != '"' && *netrcp; netrcp++) {
|
|
if (*netrcp == '\\')
|
|
netrcp++;
|
|
*p++ = *netrcp;
|
|
}
|
|
} else {
|
|
for (;*netrcp != '\n' && *netrcp != '\t' && *netrcp != ' ' &&
|
|
*netrcp != ',' && *netrcp; netrcp++) {
|
|
if (*netrcp == '\\')
|
|
netrcp++;
|
|
*p++ = *netrcp;
|
|
}
|
|
}
|
|
*p = 0;
|
|
if (!*buffer)
|
|
return 0;
|
|
for (i = 0; i < sizeof (keywords) / sizeof (keywords [0]); i++)
|
|
if (!strcmp (keywords [i], buffer))
|
|
break;
|
|
return i + 1;
|
|
}
|
|
|
|
int lookup_netrc (char *host, char **login, char **pass)
|
|
{
|
|
char *netrcname, *tmp;
|
|
char hostname[MAXHOSTNAMELEN], *domain;
|
|
int keyword;
|
|
struct stat mystat;
|
|
static int be_angry = 1;
|
|
static struct rupcache {
|
|
struct rupcache *next;
|
|
char *host;
|
|
char *login;
|
|
char *pass;
|
|
} *rup_cache = NULL, *rupp;
|
|
|
|
for (rupp = rup_cache; rupp != NULL; rupp = rupp->next)
|
|
if (!strcmp (host, rupp->host)) {
|
|
if (rupp->login != NULL)
|
|
*login = g_strdup (rupp->login);
|
|
if (rupp->pass != NULL)
|
|
*pass = g_strdup (rupp->pass);
|
|
return 0;
|
|
}
|
|
netrcname = concat_dir_and_file (home_dir, ".netrc");
|
|
netrcp = netrc = load_file (netrcname);
|
|
if (netrc == NULL) {
|
|
g_free (netrcname);
|
|
return 0;
|
|
}
|
|
if (gethostname (hostname, sizeof (hostname)) < 0)
|
|
*hostname = 0;
|
|
if (!(domain = strchr (hostname, '.')))
|
|
domain = "";
|
|
|
|
while ((keyword = netrc_next ())) {
|
|
if (keyword == 2) {
|
|
if (netrc_next () != 8)
|
|
continue;
|
|
if (g_strcasecmp (host, buffer) &&
|
|
((tmp = strchr (host, '.')) == NULL ||
|
|
g_strcasecmp (tmp, domain) ||
|
|
g_strncasecmp (host, buffer, tmp - host) ||
|
|
buffer [tmp - host]))
|
|
continue;
|
|
} else if (keyword != 1)
|
|
continue;
|
|
while ((keyword = netrc_next ()) > 2) {
|
|
switch (keyword) {
|
|
case 3:
|
|
if (netrc_next ())
|
|
if (*login == NULL)
|
|
*login = g_strdup (buffer);
|
|
else if (strcmp (*login, buffer))
|
|
keyword = 20;
|
|
break;
|
|
case 4:
|
|
case 5:
|
|
if (strcmp (*login, "anonymous") && strcmp (*login, "ftp") &&
|
|
stat (netrcname, &mystat) >= 0 &&
|
|
(mystat.st_mode & 077)) {
|
|
if (be_angry) {
|
|
message_1s (1, MSG_ERROR, _("~/.netrc file has not correct mode.\n"
|
|
"Remove password or correct mode."));
|
|
be_angry = 0;
|
|
}
|
|
g_free (netrc);
|
|
g_free (netrcname);
|
|
return -1;
|
|
}
|
|
if (netrc_next () && *pass == NULL)
|
|
*pass = g_strdup (buffer);
|
|
break;
|
|
case 6:
|
|
if (stat (netrcname, &mystat) >= 0 &&
|
|
(mystat.st_mode & 077)) {
|
|
if (be_angry) {
|
|
message_1s (1, MSG_ERROR, _("~/.netrc file has not correct mode.\n"
|
|
"Remove password or correct mode."));
|
|
be_angry = 0;
|
|
}
|
|
g_free (netrc);
|
|
g_free (netrcname);
|
|
return -1;
|
|
}
|
|
netrc_next ();
|
|
break;
|
|
case 7:
|
|
for (;;) {
|
|
while (*netrcp != '\n' && *netrcp);
|
|
if (*netrcp != '\n')
|
|
break;
|
|
netrcp++;
|
|
if (*netrcp == '\n' || !*netrcp)
|
|
break;
|
|
}
|
|
break;
|
|
}
|
|
if (keyword == 20)
|
|
break;
|
|
}
|
|
if (keyword == 20)
|
|
continue;
|
|
else
|
|
break;
|
|
}
|
|
rupp = g_new (struct rupcache, 1);
|
|
rupp->host = g_strdup (host);
|
|
rupp->login = rupp->pass = 0;
|
|
|
|
if (*login != NULL)
|
|
rupp->login = g_strdup (*login);
|
|
if (*pass != NULL)
|
|
rupp->pass = g_strdup (*pass);
|
|
rupp->next = rup_cache;
|
|
rup_cache = rupp;
|
|
|
|
g_free (netrc);
|
|
g_free (netrcname);
|
|
return 0;
|
|
}
|
|
|
|
#endif /* USE_NETRC */
|