4 * Parse the exports file. Derived from the unfsd implementation.
6 * Authors: Donald J. Becker, <becker@super.org>
7 * Rick Sladkey, <jrs@world.std.com>
8 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
9 * Olaf Kirch, <okir@monad.swb.de>
10 * Alexander O. Yuriev, <alex@bach.cis.temple.edu>
12 * This software maybe be used for any purpose provided
13 * the above copyright notice is retained. It is supplied
14 * as is, with no warranty expressed or implied.
19 #include <sys/param.h>
31 #define EXPORT_DEFAULT_FLAGS \
32 (NFSEXP_ASYNC|NFSEXP_READONLY|NFSEXP_ROOTSQUASH|NFSEXP_GATHERED_WRITES)
34 static char *efname = NULL;
35 static XFILE *efp = NULL;
37 static int *squids = NULL, nsquids = 0,
38 *sqgids = NULL, nsqgids = 0;
40 static int getexport(char *exp, int len);
41 static int getpath(char *path, int len);
42 static int parseopts(char *cp, struct exportent *ep);
43 static int parsesquash(char *list, int **idp, int *lenp, char **ep);
44 static int parsenum(char **cpp);
45 static int parsemaptype(char *type);
46 static void freesquash(void);
47 static void syntaxerr(char *msg);
50 setexportent(char *fname, char *type)
55 fname = _PATH_EXPORTS;
56 if (!(efp = xfopen(fname, type)))
57 xlog(L_ERROR, "can't open %s for %sing",
58 fname, strcmp(type, "r")? "writ" : "read");
59 efname = strdup(fname);
66 static struct exportent ee;
68 char rpath[MAXPATHLEN+1];
76 ee.e_flags = EXPORT_DEFAULT_FLAGS;
77 ee.e_maptype = CLE_MAP_IDENT;
85 if (first || (ok = getexport(exp, sizeof(exp))) == 0) {
86 ok = getpath(ee.e_path, sizeof(ee.e_path));
89 strncpy (ee.m_path, ee.e_path, sizeof (ee.m_path) - 1);
90 ee.m_path [sizeof (ee.m_path) - 1] = '\0';
91 ok = getexport(exp, sizeof(exp));
94 xlog(L_ERROR, "expected client(options...)");
99 /* Check for default client */
102 if ((opt = strchr(exp, '(')) != NULL) {
104 xlog(L_WARNING, "No host name given with %s %s, suggest *%s to avoid warning", ee.e_path, exp, exp);
106 if (!(sp = strchr(opt, ')')) || sp[1] != '\0') {
107 syntaxerr("bad option list");
111 if (parseopts(opt, &ee) < 0)
114 xlog(L_WARNING, "No options for %s %s: suggest %s() to avoid warning", ee.e_path, exp, exp);
116 if (strlen(exp) >= sizeof(ee.e_hostname)) {
117 syntaxerr("client name too long");
120 strncpy(ee.e_hostname, exp, sizeof (ee.e_hostname) - 1);
121 ee.e_hostname[sizeof (ee.e_hostname) - 1] = '\0';
123 /* resolve symlinks */
124 if (realpath(ee.e_path, rpath) != NULL) {
125 rpath[sizeof (rpath) - 1] = '\0';
126 strncpy(ee.e_path, rpath, sizeof (ee.e_path) - 1);
127 ee.e_path[sizeof (ee.e_path) - 1] = '\0';
128 strncpy (ee.m_path, ee.e_path, sizeof (ee.m_path) - 1);
129 ee.m_path [sizeof (ee.m_path) - 1] = '\0';
136 putexportent(struct exportent *ep)
140 char *esc=ep->e_path;
146 for (i=0; esc[i]; i++)
147 if (iscntrl(esc[i]) || esc[i] == '"' || esc[i] == '\\'|| isspace(esc[i]))
148 fprintf(fp, "\\%03o", esc[i]);
150 fprintf(fp, "%c", esc[i]);
152 fprintf(fp, "\t%s(", ep->e_hostname);
153 fprintf(fp, "%s,", (ep->e_flags & NFSEXP_READONLY)? "ro" : "rw");
154 fprintf(fp, "%ssync,", (ep->e_flags & NFSEXP_ASYNC)? "a" : "");
155 fprintf(fp, "%swdelay,", (ep->e_flags & NFSEXP_GATHERED_WRITES)?
157 fprintf(fp, "%shide,", (ep->e_flags & NFSEXP_CROSSMNT)?
159 fprintf(fp, "%ssecure,", (ep->e_flags & NFSEXP_INSECURE_PORT)?
161 fprintf(fp, "%sroot_squash,", (ep->e_flags & NFSEXP_ROOTSQUASH)?
163 fprintf(fp, "%sall_squash,", (ep->e_flags & NFSEXP_ALLSQUASH)?
165 fprintf(fp, "%ssubtree_check,", (ep->e_flags & NFSEXP_NOSUBTREECHECK)?
167 fprintf(fp, "%ssecure_locks,", (ep->e_flags & NFSEXP_NOAUTHNLM)?
170 fprintf(fp, "mapping=");
171 switch (ep->e_maptype) {
173 fprintf(fp, "identity,");
176 fprintf(fp, "ugidd,");
179 fprintf(fp, "file,");
182 xlog(L_ERROR, "unknown mapping type for %s:%s",
183 ep->e_hostname, ep->e_path);
185 if ((id = ep->e_squids) != NULL) {
186 fprintf(fp, "squash_uids=");
187 for (i = 0; i < ep->e_nsquids; i += 2)
188 if (id[i] != id[i+1])
189 fprintf(fp, "%d-%d,", id[i], id[i+1]);
191 fprintf(fp, "%d,", id[i]);
193 if ((id = ep->e_sqgids) != NULL) {
194 fprintf(fp, "squash_gids=");
195 for (i = 0; i < ep->e_nsquids; i += 2)
196 if (id[i] != id[i+1])
197 fprintf(fp, "%d-%d,", id[i], id[i+1]);
199 fprintf(fp, "%d,", id[i]);
201 fprintf(fp, "anonuid=%d,anongid=%d)\n", ep->e_anonuid, ep->e_anongid);
217 dupexportent(struct exportent *dst, struct exportent *src)
222 if ((n = src->e_nsquids) != 0) {
223 dst->e_squids = (int *) xmalloc(n * sizeof(int));
224 memcpy(dst->e_squids, src->e_squids, n * sizeof(int));
226 if ((n = src->e_nsqgids) != 0) {
227 dst->e_sqgids = (int *) xmalloc(n * sizeof(int));
228 memcpy(dst->e_sqgids, src->e_sqgids, n * sizeof(int));
233 mkexportent(char *hname, char *path, char *options)
235 static struct exportent ee;
237 ee.e_flags = EXPORT_DEFAULT_FLAGS;
238 ee.e_maptype = CLE_MAP_IDENT;
246 if (strlen(hname) >= sizeof(ee.e_hostname)) {
247 xlog(L_WARNING, "client name %s too long", hname);
250 strncpy(ee.e_hostname, hname, sizeof (ee.e_hostname) - 1);
251 ee.e_hostname[sizeof (ee.e_hostname) - 1] = '\0';
252 if (strlen(path) >= sizeof(ee.e_path)) {
253 xlog(L_WARNING, "path name %s too long", path);
256 strncpy(ee.e_path, path, sizeof (ee.e_path));
257 ee.e_path[sizeof (ee.e_path) - 1] = '\0';
258 strncpy (ee.m_path, ee.e_path, sizeof (ee.m_path) - 1);
259 ee.m_path [sizeof (ee.m_path) - 1] = '\0';
260 if (options && parseopts(options, &ee) < 0)
266 updateexportent(struct exportent *eep, char *options)
268 if (options && parseopts(options, eep) < 0)
274 * Parse option string pointed to by cp and set mount options accordingly.
277 parseopts(char *cp, struct exportent *ep)
280 squids = ep->e_squids; nsquids = ep->e_nsquids;
281 sqgids = ep->e_sqgids; nsqgids = ep->e_nsqgids;
286 char *opt = strdup(cp);
288 while (*cp && *cp != ',')
291 opt[cp-optstart] = '\0';
295 /* process keyword */
296 if (strcmp(opt, "ro") == 0)
297 ep->e_flags |= NFSEXP_READONLY;
298 else if (strcmp(opt, "rw") == 0)
299 ep->e_flags &= ~NFSEXP_READONLY;
300 else if (!strcmp(opt, "secure"))
301 ep->e_flags &= ~NFSEXP_INSECURE_PORT;
302 else if (!strcmp(opt, "insecure"))
303 ep->e_flags |= NFSEXP_INSECURE_PORT;
304 else if (!strcmp(opt, "sync"))
305 ep->e_flags &= ~NFSEXP_ASYNC;
306 else if (!strcmp(opt, "async"))
307 ep->e_flags |= NFSEXP_ASYNC;
308 else if (!strcmp(opt, "nohide"))
309 ep->e_flags |= NFSEXP_CROSSMNT;
310 else if (!strcmp(opt, "hide"))
311 ep->e_flags &= ~NFSEXP_CROSSMNT;
312 else if (!strcmp(opt, "crossmnt")) /* old style */
313 ep->e_flags |= NFSEXP_CROSSMNT;
314 else if (!strcmp(opt, "nocrossmnt")) /* old style */
315 ep->e_flags &= ~NFSEXP_CROSSMNT;
316 else if (!strcmp(opt, "wdelay"))
317 ep->e_flags |= NFSEXP_GATHERED_WRITES;
318 else if (!strcmp(opt, "no_wdelay"))
319 ep->e_flags &= ~NFSEXP_GATHERED_WRITES;
320 else if (strcmp(opt, "root_squash") == 0)
321 ep->e_flags |= NFSEXP_ROOTSQUASH;
322 else if (!strcmp(opt, "no_root_squash"))
323 ep->e_flags &= ~NFSEXP_ROOTSQUASH;
324 else if (strcmp(opt, "all_squash") == 0)
325 ep->e_flags |= NFSEXP_ALLSQUASH;
326 else if (strcmp(opt, "no_all_squash") == 0)
327 ep->e_flags &= ~NFSEXP_ALLSQUASH;
328 else if (strcmp(opt, "subtree_check") == 0)
329 ep->e_flags &= ~NFSEXP_NOSUBTREECHECK;
330 else if (strcmp(opt, "no_subtree_check") == 0)
331 ep->e_flags |= NFSEXP_NOSUBTREECHECK;
332 else if (strcmp(opt, "auth_nlm") == 0)
333 ep->e_flags &= ~NFSEXP_NOAUTHNLM;
334 else if (strcmp(opt, "no_auth_nlm") == 0)
335 ep->e_flags |= NFSEXP_NOAUTHNLM;
336 else if (strcmp(opt, "secure_locks") == 0)
337 ep->e_flags &= ~NFSEXP_NOAUTHNLM;
338 else if (strcmp(opt, "insecure_locks") == 0)
339 ep->e_flags |= NFSEXP_NOAUTHNLM;
340 else if (strncmp(opt, "mapping=", 8) == 0)
341 ep->e_maptype = parsemaptype(opt+8);
342 else if (strcmp(opt, "map_identity") == 0) /* old style */
343 ep->e_maptype = CLE_MAP_IDENT;
344 else if (strcmp(opt, "map_daemon") == 0) /* old style */
345 ep->e_maptype = CLE_MAP_UGIDD;
346 else if (strncmp(opt, "anonuid=", 8) == 0)
347 ep->e_anonuid = atoi(opt+8);
348 else if (strncmp(opt, "anongid=", 8) == 0)
349 ep->e_anongid = atoi(opt+8);
350 else if (strncmp(opt, "squash_uids=", 12) == 0) {
351 if (parsesquash(opt+12, &squids, &nsquids, &cp) < 0) {
355 } else if (strncmp(opt, "squash_gids=", 12) == 0) {
356 if (parsesquash(opt+12, &sqgids, &nsqgids, &cp) < 0) {
361 xlog(L_ERROR, "%s:%d: unknown keyword \"%s\"\n",
362 efname, efp->x_line, opt);
363 ep->e_flags |= NFSEXP_ALLSQUASH | NFSEXP_READONLY;
372 ep->e_squids = squids;
373 ep->e_sqgids = sqgids;
374 ep->e_nsquids = nsquids;
375 ep->e_nsqgids = nsqgids;
381 parsesquash(char *list, int **idp, int *lenp, char **ep)
399 if (id0 == -1 || id1 == -1) {
400 syntaxerr("uid/gid -1 not permitted");
404 id = (int *) xrealloc(id, (len + 8) * sizeof(*id));
407 if (!*cp || *cp == ')' || (*cp == ',' && !isdigit(cp[1])))
410 syntaxerr("bad uid/gid list");
416 if (**ep == ',') (*ep)++;
446 while (isdigit(**cpp))
448 c = **cpp; **cpp = '\0'; num = atoi(cp); **cpp = c;
453 parsemaptype(char *type)
455 if (!strcmp(type, "identity"))
456 return CLE_MAP_IDENT;
457 if (!strcmp(type, "ugidd"))
458 return CLE_MAP_UGIDD;
459 if (!strcmp(type, "file"))
461 syntaxerr("invalid map type");
462 return CLE_MAP_IDENT; /* default */
466 getpath(char *path, int len)
469 return xgettok(efp, 0, path, len);
473 getexport(char *exp, int len)
478 if ((ok = xgettok(efp, 0, exp, len)) < 0)
479 xlog(L_ERROR, "%s:%d: syntax error",
480 efname, efp->x_line);
487 xlog(L_ERROR, "%s:%d: syntax error: %s",
488 efname, efp->x_line, msg);