4 * Parse the exports file. Derived from the unfsd implementation.
6 * Authors: Donald J. Becker, <becker@super.org>
7 * Rick Sladkey, <jrs@world.std.com>
8 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
9 * Olaf Kirch, <okir@monad.swb.de>
10 * Alexander O. Yuriev, <alex@bach.cis.temple.edu>
12 * This software maybe be used for any purpose provided
13 * the above copyright notice is retained. It is supplied
14 * as is, with no warranty expressed or implied.
21 #include <sys/param.h>
34 #define EXPORT_DEFAULT_FLAGS \
35 (NFSEXP_READONLY|NFSEXP_ROOTSQUASH|NFSEXP_GATHERED_WRITES)
39 static char *efname = NULL;
40 static XFILE *efp = NULL;
42 static int *squids = NULL, nsquids = 0,
43 *sqgids = NULL, nsqgids = 0;
45 static int getexport(char *exp, int len);
46 static int getpath(char *path, int len);
47 static int parseopts(char *cp, struct exportent *ep, int warn);
48 static int parsesquash(char *list, int **idp, int *lenp, char **ep);
49 static int parsenum(char **cpp);
50 static int parsemaptype(char *type);
51 static void freesquash(void);
52 static void syntaxerr(char *msg);
55 setexportent(char *fname, char *type)
60 fname = _PATH_EXPORTS;
61 if (!(efp = xfopen(fname, type)))
62 xlog(L_ERROR, "can't open %s for %sing",
63 fname, strcmp(type, "r")? "writ" : "read");
64 efname = strdup(fname);
69 getexportent(int fromkernel, int fromexports)
71 static struct exportent ee;
72 char exp[512], *hostname;
73 char rpath[MAXPATHLEN+1];
81 ee.e_flags = EXPORT_DEFAULT_FLAGS;
82 /* some kernels assume the default is sync rather than
83 * async. More recent kernels always report one or other,
84 * but this test makes sure we assume same as kernel
88 ee.e_flags &= ~NFSEXP_ASYNC;
89 ee.e_flags &= ~NFSEXP_GATHERED_WRITES;
91 ee.e_maptype = CLE_MAP_IDENT;
96 ee.e_mountpoint = NULL;
100 if (first || (ok = getexport(exp, sizeof(exp))) == 0) {
101 ok = getpath(ee.e_path, sizeof(ee.e_path));
104 strncpy (ee.m_path, ee.e_path, sizeof (ee.m_path) - 1);
105 ee.m_path [sizeof (ee.m_path) - 1] = '\0';
106 ok = getexport(exp, sizeof(exp));
109 xlog(L_ERROR, "expected client(options...)");
110 export_errno = EINVAL;
115 /* Check for default client */
120 if ((opt = strchr(exp, '(')) != NULL) {
122 xlog(L_WARNING, "No host name given with %s %s, suggest *%s to avoid warning", ee.e_path, exp, exp);
126 if (!(sp = strchr(opt, ')')) || sp[1] != '\0') {
127 syntaxerr("bad option list");
128 export_errno = EINVAL;
133 xlog(L_WARNING, "No options for %s %s: suggest %s(sync) to avoid warning", ee.e_path, exp, exp);
135 if (strlen(hostname) >= sizeof(ee.e_hostname)) {
136 syntaxerr("client name too long");
137 export_errno = EINVAL;
140 strncpy(ee.e_hostname, hostname, sizeof (ee.e_hostname) - 1);
141 ee.e_hostname[sizeof (ee.e_hostname) - 1] = '\0';
143 if (parseopts(opt, &ee, fromexports) < 0)
146 /* resolve symlinks */
147 if (realpath(ee.e_path, rpath) != NULL) {
148 rpath[sizeof (rpath) - 1] = '\0';
149 strncpy(ee.e_path, rpath, sizeof (ee.e_path) - 1);
150 ee.e_path[sizeof (ee.e_path) - 1] = '\0';
151 strncpy (ee.m_path, ee.e_path, sizeof (ee.m_path) - 1);
152 ee.m_path [sizeof (ee.m_path) - 1] = '\0';
159 putexportent(struct exportent *ep)
163 char *esc=ep->e_path;
169 for (i=0; esc[i]; i++)
170 if (iscntrl(esc[i]) || esc[i] == '"' || esc[i] == '\\' || esc[i] == '#' || isspace(esc[i]))
171 fprintf(fp, "\\%03o", esc[i]);
173 fprintf(fp, "%c", esc[i]);
175 fprintf(fp, "\t%s(", ep->e_hostname);
176 fprintf(fp, "%s,", (ep->e_flags & NFSEXP_READONLY)? "ro" : "rw");
177 fprintf(fp, "%ssync,", (ep->e_flags & NFSEXP_ASYNC)? "a" : "");
178 fprintf(fp, "%swdelay,", (ep->e_flags & NFSEXP_GATHERED_WRITES)?
180 fprintf(fp, "%shide,", (ep->e_flags & NFSEXP_NOHIDE)?
182 fprintf(fp, "%scrossmnt,", (ep->e_flags & NFSEXP_CROSSMOUNT)?
184 fprintf(fp, "%ssecure,", (ep->e_flags & NFSEXP_INSECURE_PORT)?
186 fprintf(fp, "%sroot_squash,", (ep->e_flags & NFSEXP_ROOTSQUASH)?
188 fprintf(fp, "%sall_squash,", (ep->e_flags & NFSEXP_ALLSQUASH)?
190 fprintf(fp, "%ssubtree_check,", (ep->e_flags & NFSEXP_NOSUBTREECHECK)?
192 fprintf(fp, "%ssecure_locks,", (ep->e_flags & NFSEXP_NOAUTHNLM)?
194 fprintf(fp, "%sacl,", (ep->e_flags & NFSEXP_NOACL)?
196 if (ep->e_flags & NFSEXP_FSID) {
197 fprintf(fp, "fsid=%d,", ep->e_fsid);
199 if (ep->e_mountpoint)
200 fprintf(fp, "mountpoint%s%s,",
201 ep->e_mountpoint[0]?"=":"", ep->e_mountpoint);
203 fprintf(fp, "mapping=");
204 switch (ep->e_maptype) {
206 fprintf(fp, "identity,");
209 fprintf(fp, "ugidd,");
212 fprintf(fp, "file,");
215 xlog(L_ERROR, "unknown mapping type for %s:%s",
216 ep->e_hostname, ep->e_path);
218 if ((id = ep->e_squids) != NULL) {
219 fprintf(fp, "squash_uids=");
220 for (i = 0; i < ep->e_nsquids; i += 2)
221 if (id[i] != id[i+1])
222 fprintf(fp, "%d-%d,", id[i], id[i+1]);
224 fprintf(fp, "%d,", id[i]);
226 if ((id = ep->e_sqgids) != NULL) {
227 fprintf(fp, "squash_gids=");
228 for (i = 0; i < ep->e_nsquids; i += 2)
229 if (id[i] != id[i+1])
230 fprintf(fp, "%d-%d,", id[i], id[i+1]);
232 fprintf(fp, "%d,", id[i]);
234 fprintf(fp, "anonuid=%d,anongid=%d)\n", ep->e_anonuid, ep->e_anongid);
250 dupexportent(struct exportent *dst, struct exportent *src)
255 if ((n = src->e_nsquids) != 0) {
256 dst->e_squids = (int *) xmalloc(n * sizeof(int));
257 memcpy(dst->e_squids, src->e_squids, n * sizeof(int));
259 if ((n = src->e_nsqgids) != 0) {
260 dst->e_sqgids = (int *) xmalloc(n * sizeof(int));
261 memcpy(dst->e_sqgids, src->e_sqgids, n * sizeof(int));
263 if (src->e_mountpoint)
264 dst->e_mountpoint = strdup(src->e_mountpoint);
268 mkexportent(char *hname, char *path, char *options)
270 static struct exportent ee;
272 ee.e_flags = EXPORT_DEFAULT_FLAGS;
273 ee.e_maptype = CLE_MAP_IDENT;
274 ee.e_anonuid = 65534;
275 ee.e_anongid = 65534;
278 ee.e_mountpoint = NULL;
282 if (strlen(hname) >= sizeof(ee.e_hostname)) {
283 xlog(L_WARNING, "client name %s too long", hname);
286 strncpy(ee.e_hostname, hname, sizeof (ee.e_hostname) - 1);
287 ee.e_hostname[sizeof (ee.e_hostname) - 1] = '\0';
288 if (strlen(path) >= sizeof(ee.e_path)) {
289 xlog(L_WARNING, "path name %s too long", path);
292 strncpy(ee.e_path, path, sizeof (ee.e_path));
293 ee.e_path[sizeof (ee.e_path) - 1] = '\0';
294 strncpy (ee.m_path, ee.e_path, sizeof (ee.m_path) - 1);
295 ee.m_path [sizeof (ee.m_path) - 1] = '\0';
296 if (parseopts(options, &ee, 0) < 0)
302 updateexportent(struct exportent *eep, char *options)
304 if (parseopts(options, eep, 0) < 0)
310 * Parse option string pointed to by cp and set mount options accordingly.
313 parseopts(char *cp, struct exportent *ep, int warn)
315 int had_subtree_opt = 0;
316 char *flname = efname?efname:"command line";
317 int flline = efp?efp->x_line:0;
319 squids = ep->e_squids; nsquids = ep->e_nsquids;
320 sqgids = ep->e_sqgids; nsqgids = ep->e_nsqgids;
329 char *opt = strdup(cp);
331 while (*cp && *cp != ',')
334 opt[cp-optstart] = '\0';
338 /* process keyword */
339 if (strcmp(opt, "ro") == 0)
340 ep->e_flags |= NFSEXP_READONLY;
341 else if (strcmp(opt, "rw") == 0)
342 ep->e_flags &= ~NFSEXP_READONLY;
343 else if (!strcmp(opt, "secure"))
344 ep->e_flags &= ~NFSEXP_INSECURE_PORT;
345 else if (!strcmp(opt, "insecure"))
346 ep->e_flags |= NFSEXP_INSECURE_PORT;
347 else if (!strcmp(opt, "sync"))
348 ep->e_flags &= ~NFSEXP_ASYNC;
349 else if (!strcmp(opt, "async"))
350 ep->e_flags |= NFSEXP_ASYNC;
351 else if (!strcmp(opt, "nohide"))
352 ep->e_flags |= NFSEXP_NOHIDE;
353 else if (!strcmp(opt, "hide"))
354 ep->e_flags &= ~NFSEXP_NOHIDE;
355 else if (!strcmp(opt, "crossmnt"))
356 ep->e_flags |= NFSEXP_CROSSMOUNT;
357 else if (!strcmp(opt, "nocrossmnt"))
358 ep->e_flags &= ~NFSEXP_CROSSMOUNT;
359 else if (!strcmp(opt, "wdelay"))
360 ep->e_flags |= NFSEXP_GATHERED_WRITES;
361 else if (!strcmp(opt, "no_wdelay"))
362 ep->e_flags &= ~NFSEXP_GATHERED_WRITES;
363 else if (strcmp(opt, "root_squash") == 0)
364 ep->e_flags |= NFSEXP_ROOTSQUASH;
365 else if (!strcmp(opt, "no_root_squash"))
366 ep->e_flags &= ~NFSEXP_ROOTSQUASH;
367 else if (strcmp(opt, "all_squash") == 0)
368 ep->e_flags |= NFSEXP_ALLSQUASH;
369 else if (strcmp(opt, "no_all_squash") == 0)
370 ep->e_flags &= ~NFSEXP_ALLSQUASH;
371 else if (strcmp(opt, "subtree_check") == 0) {
373 ep->e_flags &= ~NFSEXP_NOSUBTREECHECK;
374 } else if (strcmp(opt, "no_subtree_check") == 0) {
376 ep->e_flags |= NFSEXP_NOSUBTREECHECK;
377 } else if (strcmp(opt, "auth_nlm") == 0)
378 ep->e_flags &= ~NFSEXP_NOAUTHNLM;
379 else if (strcmp(opt, "no_auth_nlm") == 0)
380 ep->e_flags |= NFSEXP_NOAUTHNLM;
381 else if (strcmp(opt, "secure_locks") == 0)
382 ep->e_flags &= ~NFSEXP_NOAUTHNLM;
383 else if (strcmp(opt, "insecure_locks") == 0)
384 ep->e_flags |= NFSEXP_NOAUTHNLM;
385 else if (strcmp(opt, "acl") == 0)
386 ep->e_flags &= ~NFSEXP_NOACL;
387 else if (strcmp(opt, "no_acl") == 0)
388 ep->e_flags |= NFSEXP_NOACL;
389 else if (strncmp(opt, "mapping=", 8) == 0)
390 ep->e_maptype = parsemaptype(opt+8);
391 else if (strcmp(opt, "map_identity") == 0) /* old style */
392 ep->e_maptype = CLE_MAP_IDENT;
393 else if (strcmp(opt, "map_daemon") == 0) /* old style */
394 ep->e_maptype = CLE_MAP_UGIDD;
395 else if (strncmp(opt, "anonuid=", 8) == 0) {
397 ep->e_anonuid = strtol(opt+8, &oe, 10);
398 if (opt[8]=='\0' || *oe != '\0') {
399 xlog(L_ERROR, "%s: %d: bad anonuid \"%s\"\n",
400 flname, flline, opt);
403 export_errno = EINVAL;
406 } else if (strncmp(opt, "anongid=", 8) == 0) {
408 ep->e_anongid = strtol(opt+8, &oe, 10);
409 if (opt[8]=='\0' || *oe != '\0') {
410 xlog(L_ERROR, "%s: %d: bad anongid \"%s\"\n",
411 flname, flline, opt);
414 } else if (strncmp(opt, "squash_uids=", 12) == 0) {
415 if (parsesquash(opt+12, &squids, &nsquids, &cp) < 0) {
418 } else if (strncmp(opt, "squash_gids=", 12) == 0) {
419 if (parsesquash(opt+12, &sqgids, &nsqgids, &cp) < 0) {
422 } else if (strncmp(opt, "fsid=", 5) == 0) {
424 ep->e_fsid = strtoul(opt+5, &oe, 0);
425 if (opt[5]=='\0' || *oe != '\0') {
426 xlog(L_ERROR, "%s: %d: bad fsid \"%s\"\n",
427 flname, flline, opt);
430 ep->e_flags |= NFSEXP_FSID;
431 } else if (strcmp(opt, "mountpoint")==0 ||
432 strcmp(opt, "mp") == 0 ||
433 strncmp(opt, "mountpoint=", 11)==0 ||
434 strncmp(opt, "mp=", 3) == 0) {
435 char * mp = strchr(opt, '=');
437 ep->e_mountpoint = strdup(mp+1);
439 ep->e_mountpoint = strdup("");
441 xlog(L_ERROR, "%s:%d: unknown keyword \"%s\"\n",
442 flname, flline, opt);
443 ep->e_flags |= NFSEXP_ALLSQUASH | NFSEXP_READONLY;
451 ep->e_squids = squids;
452 ep->e_sqgids = sqgids;
453 ep->e_nsquids = nsquids;
454 ep->e_nsqgids = nsqgids;
457 if (warn && !had_subtree_opt)
458 xlog(L_WARNING, "%s [%d]: Neither 'subtree_check' or 'no_subtree_check' specified for export \"%s:%s\".\n"
459 " Assuming default behaviour ('subtree_check').\n"
460 " NOTE: this default will change with nfs-utils version 1.1.0\n",
463 ep->e_hostname, ep->e_path);
469 parsesquash(char *list, int **idp, int *lenp, char **ep)
487 if (id0 == -1 || id1 == -1) {
488 syntaxerr("uid/gid -1 not permitted");
492 id = (int *) xrealloc(id, (len + 8) * sizeof(*id));
495 if (!*cp || *cp == ')' || (*cp == ',' && !isdigit(cp[1])))
498 syntaxerr("bad uid/gid list");
504 if (**ep == ',') (*ep)++;
534 while (isdigit(**cpp))
536 c = **cpp; **cpp = '\0'; num = atoi(cp); **cpp = c;
541 parsemaptype(char *type)
543 if (!strcmp(type, "identity"))
544 return CLE_MAP_IDENT;
545 if (!strcmp(type, "ugidd"))
546 return CLE_MAP_UGIDD;
547 if (!strcmp(type, "file"))
549 syntaxerr("invalid map type");
550 return CLE_MAP_IDENT; /* default */
554 getpath(char *path, int len)
557 return xgettok(efp, 0, path, len);
561 getexport(char *exp, int len)
566 if ((ok = xgettok(efp, 0, exp, len)) < 0)
567 xlog(L_ERROR, "%s:%d: syntax error",
568 efname?"command line":efname, efp->x_line);
575 xlog(L_ERROR, "%s:%d: syntax error: %s",
576 efname, efp?efp->x_line:0, msg);