source: abuse/trunk/src/net/fileman.cpp @ 39

Last change on this file since 39 was 39, checked in by Sam Hocevar, 15 years ago
  • Fix almost 2,000 warnings by using proper "const" keywords where needed.
File size: 11.3 KB
Line 
1#include "macs.hpp"
2
3#include "fileman.hpp"
4#include "netface.hpp"
5#include "ghandler.hpp"
6#include "specache.hpp"
7
8#include <stdio.h>
9#include <stdlib.h>
10#include <fcntl.h>
11#include <unistd.h>
12#include <string.h>
13#include <signal.h>
14
15extern net_protocol *prot;
16
17
18#ifndef __WATCOMC__
19#include <sys/stat.h>
20#endif
21
22file_manager *fman=NULL;
23
24file_manager::file_manager(int argc, char **argv, net_protocol *proto) : proto(proto)
25
26  default_fs=NULL;
27  no_security=0;
28  nfs_list=NULL;
29
30  int i;
31  for (i=1;i<argc;i++)
32    if (!strcmp(argv[i],"-bastard"))   // this bypasses filename security features
33    {
34      fprintf(stderr,"Warning : Security measures bypassed (-bastard)\n");
35      no_security=1;
36    }
37}
38
39
40
41void file_manager::process_net()
42{
43  nfs_client *nc,*last=NULL;
44  for (nc=nfs_list;nc;)      // check for nfs request
45  {
46
47    int ok=1;
48
49    if (nc->sock->error())
50    {
51      ok=0;
52      //fprintf(stderr,"Killing nfs client, socket went bad\n");
53    }
54    else if (nc->size_to_read && nc->sock->ready_to_write())
55      ok=nc->send_read();
56    else if (nc->sock->ready_to_read())
57      ok=process_nfs_command(nc);    // if we couldn't process the packeted, delete the connection
58   
59    if (ok)
60    {
61      last=nc;
62      nc=nc->next;
63    } else
64    {
65      if (last) last->next=nc->next;
66      else nfs_list=nc->next;
67      nfs_client *c=nc;
68      nc=nc->next;
69      delete c;
70    }
71  }
72}
73
74
75int file_manager::process_nfs_command(nfs_client *c)
76{
77  char cmd;
78  if (c->sock->read(&cmd,1)!=1) return 0;
79  switch (cmd)
80  {
81    case NFCMD_READ :
82    {
83      int32_t size;
84      if (c->sock->read(&size,sizeof(size))!=sizeof(size)) return 0;
85      size=lltl(size);
86
87      c->size_to_read=size;
88      return c->send_read();
89    } break;
90    case NFCMD_CLOSE :
91    {
92      return 0;
93    } break;
94    case NFCMD_SEEK :
95    {
96      int32_t offset;
97      if (c->sock->read(&offset,sizeof(offset))!=sizeof(offset)) return 0;
98      offset=lltl(offset);
99      offset=lseek(c->file_fd,offset,0);
100      offset=lltl(offset);
101      if (c->sock->write(&offset,sizeof(offset))!=sizeof(offset)) return 0;
102      return 1;
103    } break;
104    case NFCMD_TELL :
105    {
106      int32_t offset=lseek(c->file_fd,0,SEEK_CUR);
107      offset=lltl(offset);
108      if (c->sock->write(&offset,sizeof(offset))!=sizeof(offset)) return 0;
109      return 1;
110    } break;
111   
112    default :
113    { fprintf(stderr,"net driver : bad command from nfs client\n");
114      return 0;
115    }
116  }
117}
118
119int file_manager::nfs_client::send_read()   // return 0 if failure on socket, not failure to read
120{
121  if (file_fd>=0 && sock)
122  {
123    // first make sure the socket isn't 'full'
124    if (sock->ready_to_write())
125    {
126      char buf[READ_PACKET_SIZE];   
127      short read_total;
128      short actual;
129
130      do
131      {     
132        read_total=size_to_read>(READ_PACKET_SIZE-2) ? (READ_PACKET_SIZE-2) : size_to_read;
133
134        actual=read(file_fd,buf+2,read_total);
135        *((ushort *)buf)=lstl(actual);
136
137        int write_amount=sock->write(buf,actual+2);
138        if (write_amount!=actual+2)
139        {
140          fprintf(stderr,"write failed\n");
141          return 0;
142        }
143
144        size_to_read-=actual;
145
146        if (!sock->ready_to_write())
147        {
148          sock->read_unselectable();
149          sock->write_selectable();
150          return 1;    // not ok to write anymore, try again latter
151        }
152
153      } while (size_to_read && actual==read_total);
154
155      sock->read_selectable();
156      sock->write_unselectable();
157
158      size_to_read=0;
159      return 1;
160    } else
161    {
162      sock->read_unselectable();
163      sock->write_selectable();
164      return 1;
165    }
166  }
167  return 0;
168}
169
170
171void file_manager::secure_filename(char *filename, char *mode)
172{
173  if (!no_security)
174  {   
175    if (filename[0]=='/') { filename[0]=0; return ; }
176    int level=0;
177    char *f=filename;
178    while (*f)
179    {
180      if (*f=='/') { f++; level++; }
181      else if (*f=='.' && f[1]=='.')
182      {
183        if (f[3]=='.') while (*f!='.') f++;
184        else
185        {
186          f+=2;
187          level--;
188        }
189      } else f++;
190     
191    }
192    if (level<0)
193      filename[0]=0;
194  }
195}
196
197
198
199
200file_manager::nfs_client::nfs_client(net_socket *sock, int file_fd, nfs_client *next) :
201  sock(sock),file_fd(file_fd),next(next),size_to_read(0)
202{
203  sock->read_selectable();
204
205
206
207file_manager::nfs_client::~nfs_client()
208{
209  delete sock;
210  if (file_fd>=0)
211    close(file_fd);
212}
213
214
215void file_manager::add_nfs_client(net_socket *sock)
216{
217  uint8_t size[2];
218  char filename[300],mode[20],*mp;
219  if (sock->read(size,2)!=2) { delete sock; return ; }
220  if (sock->read(filename,size[0])!=size[0]) { delete sock; return ; }
221  if (sock->read(mode,size[1])!=size[1]) { delete sock; return ; }
222 
223
224  secure_filename(filename,mode);  // make sure this filename isn't a security risk
225  if (filename[0]==0) { fprintf(stderr,"(denied)\n"); delete sock; return ; }
226
227  mp=mode;
228  int flags=0;
229
230#ifdef __WATCOMC__
231    flags|=O_BINARY;
232#endif
233
234  while (*mp)
235  {
236    if (*mp=='w') flags|=O_CREAT|O_RDWR;
237    else if (*mp=='r') flags|=O_RDONLY;
238    mp++;
239  }
240     
241  int f=open(filename,flags,S_IRWXU | S_IRWXG | S_IRWXO);
242
243  FILE *fp=fopen("open.log","ab");
244  fprintf(fp,"open file %s, fd=%d\n",filename,f);
245  fclose(fp);
246 
247  if (f<0)
248    f=-1;  // make sure this is -1
249
250
251  int32_t ret=lltl(f);
252  if (sock->write(&ret,sizeof(ret))!=sizeof(ret)) { delete sock; return ; }
253
254  if (f<0)    // no file, sorry
255    delete sock;
256  else
257  {
258    int32_t cur_pos=lseek(f,0,SEEK_CUR);
259    int32_t size=lseek(f,0,SEEK_END);
260    lseek(f,cur_pos,SEEK_SET);
261    size=lltl(size);
262    if (sock->write(&size,sizeof(size))!=sizeof(size)) {  close(f); delete sock; sock=NULL; return ; }
263
264    nfs_list=new nfs_client(sock,f,nfs_list);
265    nfs_list->size=size;
266  }
267}
268
269
270
271void file_manager::remote_file::r_close(char const *reason)
272{
273//  if (reason) fprintf(stderr,"remote_file : %s\n",reason);
274
275  if (sock)
276  {
277    delete sock;
278    sock=NULL;
279  }
280
281}
282
283file_manager::remote_file::remote_file(net_socket *sock, char const *filename, char const *mode, remote_file *Next) : sock(sock)
284{
285  next=Next;
286  open_local=0;
287
288  uint8_t sizes[3]={CLIENT_NFS,strlen(filename)+1,strlen(mode)+1};
289  if (sock->write(sizes,3)!=3) { r_close("could not send open info"); return ; }
290  if (sock->write(filename,sizes[1])!=sizes[1]) { r_close("could not send filename"); return ; }
291  if (sock->write(mode,sizes[2])!=sizes[2]) { r_close("could not send mode"); return ; }
292
293  int32_t remote_file_fd;
294  if (sock->read(&remote_file_fd,sizeof(remote_file_fd))!=sizeof(remote_file_fd))
295  { r_close("could not read remote fd"); return ; }   
296  remote_file_fd=lltl(remote_file_fd);
297  if (remote_file_fd<0) { r_close("remote fd is bad"); return ; }
298
299  if (sock->read(&size,sizeof(size))!=sizeof(size)) { r_close("could not read remote filesize"); return ; }
300
301  size=lltl(size);
302}
303
304int file_manager::remote_file::unbuffered_read(void *buffer, size_t count)
305{
306  if (sock && count)
307  {
308    uint8_t cmd=NFCMD_READ;
309    if (sock->write(&cmd,sizeof(cmd))!=sizeof(cmd)) { r_close("read : could not send command"); return 0; }
310
311    int32_t rsize=lltl(count);
312    if (sock->write(&rsize,sizeof(rsize))!=sizeof(rsize)) { r_close("read : could not send size"); return 0; }
313
314    int32_t total_read=0;
315    char buf[READ_PACKET_SIZE];
316
317    ushort packet_size;
318    do
319    {
320      if (sock->read(&packet_size,sizeof(packet_size))!=sizeof(packet_size))
321      {
322        fprintf(stderr,"could not read packet size\n");
323        return 0;
324      }
325
326      packet_size=lstl(packet_size);
327
328      ushort size_read=sock->read(buf,packet_size);
329
330      if (size_read!=packet_size)
331      {
332        if (sock->read(buf+2+size_read,packet_size-size_read)!=packet_size-size_read)
333        {
334          fprintf(stderr,"incomplete packet\n");
335          return 0;
336        }
337      }
338
339      memcpy(buffer,buf,packet_size);
340      buffer=(void *)(((char *)buffer)+packet_size);
341
342      total_read+=packet_size;
343      count-=packet_size;
344    } while (packet_size==READ_PACKET_SIZE-2 && count);     
345    return total_read;
346  }
347  return 0;
348}
349
350int32_t file_manager::remote_file::unbuffered_tell()   // ask server where the offset of the file pointer is
351{
352  if (sock)
353  {
354    uint8_t cmd=NFCMD_TELL;
355    if (sock->write(&cmd,sizeof(cmd))!=sizeof(cmd)) { r_close("tell : could not send command"); return 0; }
356
357    int32_t offset;
358    if (sock->read(&offset,sizeof(offset))!=sizeof(offset)) { r_close("tell : could not read offset"); return 0; }   
359    return lltl(offset);
360  }   
361  return 0;
362}
363
364int32_t file_manager::remote_file::unbuffered_seek(int32_t offset)  // tell server to seek to a spot in a file
365{
366  if (sock)
367  {
368    uint8_t cmd=NFCMD_SEEK;
369    if (sock->write(&cmd,sizeof(cmd))!=sizeof(cmd)) { r_close("seek : could not send command"); return 0; }
370
371    int32_t off=lltl(offset);
372    if (sock->write(&off,sizeof(off))!=sizeof(off)) { r_close("seek : could not send offset"); return 0; }
373
374    if (sock->read(&offset,sizeof(offset))!=sizeof(offset)) { r_close("seek : could not read offset"); return 0; }   
375    return lltl(offset);
376  }   
377  return 0;
378}
379
380
381file_manager::remote_file::~remote_file()
382{ r_close(NULL); }
383
384int file_manager::rf_open_file(char const *&filename, char const *mode)
385{
386  net_address *fs_server_addr=NULL;
387
388  if (filename[0]=='/' && filename[1]=='/')   // passive server file reference?
389  {
390    filename+=2;
391
392    fs_server_addr=prot->get_node_address(filename,DEFAULT_COMM_PORT,0);
393    if (!fs_server_addr)
394    {
395      printf("couldn not get address for %s\n",filename);
396      return -1;
397    }
398  } else if (default_fs)
399    fs_server_addr=default_fs->copy();
400 
401  if (fs_server_addr)
402  {
403    net_socket *sock=proto->connect_to_server(fs_server_addr,net_socket::SOCKET_SECURE);
404    delete fs_server_addr;
405
406    if (!sock)
407    {
408      fprintf(stderr,"unable to connect\n");
409      return -1;
410    }
411
412    remote_file *rf=new remote_file(sock,filename,mode,remote_list);
413    if (rf->open_failure())
414    {
415      delete rf;
416      return -1;
417    }
418    else
419    {
420      remote_list=rf;
421      return rf->sock->get_fd();
422    }     
423  }
424
425
426// FIXME: AK - Should we keep this?
427//  secure_filename(filename,mode);
428  if (filename[0]==0) return -1;
429
430  int flags=0;
431  while (*mode)
432  {
433    if (*mode=='w') flags|=O_CREAT|O_RDWR;
434    else if (*mode=='r') flags|=O_RDONLY;
435    mode++;
436  }
437
438  char tmp_name[200];
439  if (get_filename_prefix() && filename[0] != '/')
440    sprintf(tmp_name,"%s%s",get_filename_prefix(),filename);
441  else strcpy(tmp_name,filename);
442
443  int f=open(tmp_name,flags,S_IRWXU | S_IRWXG | S_IRWXO);
444  if (f>=0)
445  { close(f);
446    return -2;
447  }
448 
449  return -1;
450}
451
452
453file_manager::remote_file *file_manager::find_rf(int fd)
454{
455  remote_file *r=remote_list;
456  for (;r && r->sock->get_fd()!=fd;r=r->next)
457  {
458    if (r->sock->get_fd()==-1)
459    {
460      fprintf(stderr,"bad sock\n");
461    }
462  }
463  if (!r) { fprintf(stderr,"Bad fd for remote file %d\n",fd); }
464  return r;
465}
466
467
468int32_t file_manager::rf_tell(int fd)
469{
470  remote_file *rf=find_rf(fd);
471  if (rf) return rf->unbuffered_tell();
472  else return 0;
473}
474
475int32_t file_manager::rf_seek(int fd, int32_t offset)
476{
477  remote_file *rf=find_rf(fd);
478  if (rf) return rf->unbuffered_seek(offset);
479  else return 0;
480}
481
482int file_manager::rf_read(int fd, void *buffer, size_t count)
483{
484  remote_file *rf=find_rf(fd);
485  if (rf) return rf->unbuffered_read(buffer,count);
486  else return 0;
487}
488
489int file_manager::rf_close(int fd)
490{
491  remote_file *rf=remote_list,*last=NULL;
492  while (rf && rf->sock->get_fd()!=fd) rf=rf->next;
493  if (rf)
494  {
495    if (last) last->next=rf->next;
496    else remote_list=rf->next;
497    delete rf;
498    return 1;
499  } else
500  {
501    fprintf(stderr,"Bad fd for remote file %d\n",fd);
502    return 0;
503  } 
504}
505
506int32_t file_manager::rf_file_size(int fd)
507{
508  remote_file *rf=find_rf(fd);
509  if (rf) return rf->file_size();
510  else return 0;
511}
Note: See TracBrowser for help on using the repository browser.