4 * Parse the exports file. Derived from the unfsd implementation.
6 * Authors: Donald J. Becker, <becker@super.org>
7 * Rick Sladkey, <jrs@world.std.com>
8 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
9 * Olaf Kirch, <okir@monad.swb.de>
10 * Alexander O. Yuriev, <alex@bach.cis.temple.edu>
12 * This software maybe be used for any purpose provided
13 * the above copyright notice is retained. It is supplied
14 * as is, with no warranty expressed or implied.
21 #include <sys/param.h>
33 #include "pseudoflavors.h"
35 #define EXPORT_DEFAULT_FLAGS \
36 (NFSEXP_READONLY|NFSEXP_ROOTSQUASH|NFSEXP_GATHERED_WRITES|NFSEXP_NOSUBTREECHECK)
38 struct flav_info flav_map[] = {
39 { "krb5", RPC_AUTH_GSS_KRB5 },
40 { "krb5i", RPC_AUTH_GSS_KRB5I },
41 { "krb5p", RPC_AUTH_GSS_KRB5P },
42 { "lipkey", RPC_AUTH_GSS_LKEY },
43 { "lipkey-i", RPC_AUTH_GSS_LKEYI },
44 { "lipkey-p", RPC_AUTH_GSS_LKEYP },
45 { "spkm3", RPC_AUTH_GSS_SPKM },
46 { "spkm3i", RPC_AUTH_GSS_SPKMI },
47 { "spkm3p", RPC_AUTH_GSS_SPKMP },
48 { "unix", AUTH_UNIX },
50 { "null", AUTH_NULL },
51 { "none", AUTH_NONE },
54 const int flav_map_size = sizeof(flav_map)/sizeof(flav_map[0]);
58 static char *efname = NULL;
59 static XFILE *efp = NULL;
61 static int has_default_opts, has_default_subtree_opts;
62 static int *squids = NULL, nsquids = 0,
63 *sqgids = NULL, nsqgids = 0;
65 static int getexport(char *exp, int len);
66 static int getpath(char *path, int len);
67 static int parseopts(char *cp, struct exportent *ep, int warn, int *had_subtree_opt_ptr);
68 static int parsesquash(char *list, int **idp, int *lenp, char **ep);
69 static int parsenum(char **cpp);
70 static void freesquash(void);
71 static void syntaxerr(char *msg);
74 setexportent(char *fname, char *type)
79 fname = _PATH_EXPORTS;
80 if (!(efp = xfopen(fname, type)))
81 xlog(L_ERROR, "can't open %s for %sing",
82 fname, strcmp(type, "r")? "writ" : "read");
83 efname = strdup(fname);
88 getexportent(int fromkernel, int fromexports)
90 static struct exportent ee, def_ee;
91 char exp[512], *hostname;
92 char rpath[MAXPATHLEN+1];
101 if (first || (ok = getexport(exp, sizeof(exp))) == 0) {
102 has_default_opts = 0;
103 has_default_subtree_opts = 0;
105 def_ee.e_flags = EXPORT_DEFAULT_FLAGS;
106 /* some kernels assume the default is sync rather than
107 * async. More recent kernels always report one or other,
108 * but this test makes sure we assume same as kernel
112 def_ee.e_flags &= ~NFSEXP_ASYNC;
113 def_ee.e_flags &= ~NFSEXP_GATHERED_WRITES;
115 def_ee.e_anonuid = 65534;
116 def_ee.e_anongid = 65534;
117 def_ee.e_squids = NULL;
118 def_ee.e_sqgids = NULL;
119 def_ee.e_mountpoint = NULL;
120 def_ee.e_fslocmethod = FSLOC_NONE;
121 def_ee.e_fslocdata = NULL;
122 def_ee.e_secinfo[0].flav = NULL;
123 def_ee.e_nsquids = 0;
124 def_ee.e_nsqgids = 0;
126 ok = getpath(def_ee.e_path, sizeof(def_ee.e_path));
130 strncpy (def_ee.m_path, def_ee.e_path, sizeof (def_ee.m_path) - 1);
131 def_ee.m_path [sizeof (def_ee.m_path) - 1] = '\0';
132 ok = getexport(exp, sizeof(exp));
135 xlog(L_ERROR, "expected client(options...)");
136 export_errno = EINVAL;
141 /* Check for default options */
143 if (parseopts(exp + 1, &def_ee, 0, &has_default_subtree_opts) < 0)
146 has_default_opts = 1;
148 ok = getexport(exp, sizeof(exp));
150 xlog(L_ERROR, "expected client(options...)");
151 export_errno = EINVAL;
158 /* Check for default client */
163 if ((opt = strchr(exp, '(')) != NULL) {
165 xlog(L_WARNING, "No host name given with %s %s, suggest *%s to avoid warning", ee.e_path, exp, exp);
169 if (!(sp = strchr(opt, ')')) || sp[1] != '\0') {
170 syntaxerr("bad option list");
171 export_errno = EINVAL;
176 if (!has_default_opts)
177 xlog(L_WARNING, "No options for %s %s: suggest %s(sync) to avoid warning", ee.e_path, exp, exp);
179 if (strlen(hostname) >= sizeof(ee.e_hostname)) {
180 syntaxerr("client name too long");
181 export_errno = EINVAL;
184 strncpy(ee.e_hostname, hostname, sizeof (ee.e_hostname) - 1);
185 ee.e_hostname[sizeof (ee.e_hostname) - 1] = '\0';
187 if (parseopts(opt, &ee, fromexports && !has_default_subtree_opts, NULL) < 0)
190 /* resolve symlinks */
191 if (realpath(ee.e_path, rpath) != NULL) {
192 rpath[sizeof (rpath) - 1] = '\0';
193 strncpy(ee.e_path, rpath, sizeof (ee.e_path) - 1);
194 ee.e_path[sizeof (ee.e_path) - 1] = '\0';
195 strncpy (ee.m_path, ee.e_path, sizeof (ee.m_path) - 1);
196 ee.m_path [sizeof (ee.m_path) - 1] = '\0';
202 void secinfo_show(FILE *fp, struct exportent *ep)
204 struct sec_entry *p1, *p2;
207 for (p1=ep->e_secinfo; p1->flav; p1=p2) {
209 fprintf(fp, ",sec=%s", p1->flav->flavour);
210 for (p2=p1+1; (p2->flav != NULL) && (p1->flags == p2->flags);
212 fprintf(fp, ":%s", p2->flav->flavour);
215 fprintf(fp, ",%s", (flags & NFSEXP_READONLY) ? "ro" : "rw");
216 fprintf(fp, ",%sroot_squash", (flags & NFSEXP_ROOTSQUASH)?
218 fprintf(fp, ",%sall_squash", (flags & NFSEXP_ALLSQUASH)?
224 putexportent(struct exportent *ep)
228 char *esc=ep->e_path;
234 for (i=0; esc[i]; i++)
235 if (iscntrl(esc[i]) || esc[i] == '"' || esc[i] == '\\' || esc[i] == '#' || isspace(esc[i]))
236 fprintf(fp, "\\%03o", esc[i]);
238 fprintf(fp, "%c", esc[i]);
240 fprintf(fp, "\t%s(", ep->e_hostname);
241 fprintf(fp, "%s,", (ep->e_flags & NFSEXP_READONLY)? "ro" : "rw");
242 fprintf(fp, "%ssync,", (ep->e_flags & NFSEXP_ASYNC)? "a" : "");
243 fprintf(fp, "%swdelay,", (ep->e_flags & NFSEXP_GATHERED_WRITES)?
245 fprintf(fp, "%shide,", (ep->e_flags & NFSEXP_NOHIDE)?
247 fprintf(fp, "%scrossmnt,", (ep->e_flags & NFSEXP_CROSSMOUNT)?
249 fprintf(fp, "%ssecure,", (ep->e_flags & NFSEXP_INSECURE_PORT)?
251 fprintf(fp, "%sroot_squash,", (ep->e_flags & NFSEXP_ROOTSQUASH)?
253 fprintf(fp, "%sall_squash,", (ep->e_flags & NFSEXP_ALLSQUASH)?
255 fprintf(fp, "%ssubtree_check,", (ep->e_flags & NFSEXP_NOSUBTREECHECK)?
257 fprintf(fp, "%ssecure_locks,", (ep->e_flags & NFSEXP_NOAUTHNLM)?
259 fprintf(fp, "%sacl,", (ep->e_flags & NFSEXP_NOACL)?
261 if (ep->e_flags & NFSEXP_FSID) {
262 fprintf(fp, "fsid=%d,", ep->e_fsid);
265 fprintf(fp, "fsid=%s,", ep->e_uuid);
266 if (ep->e_mountpoint)
267 fprintf(fp, "mountpoint%s%s,",
268 ep->e_mountpoint[0]?"=":"", ep->e_mountpoint);
269 switch (ep->e_fslocmethod) {
273 fprintf(fp, "refer=%s,", ep->e_fslocdata);
276 fprintf(fp, "replicas=%s,", ep->e_fslocdata);
280 fprintf(fp, "fsloc=stub,");
284 xlog(L_ERROR, "unknown fsloc method for %s:%s",
285 ep->e_hostname, ep->e_path);
287 if ((id = ep->e_squids) != NULL) {
288 fprintf(fp, "squash_uids=");
289 for (i = 0; i < ep->e_nsquids; i += 2)
290 if (id[i] != id[i+1])
291 fprintf(fp, "%d-%d,", id[i], id[i+1]);
293 fprintf(fp, "%d,", id[i]);
295 if ((id = ep->e_sqgids) != NULL) {
296 fprintf(fp, "squash_gids=");
297 for (i = 0; i < ep->e_nsquids; i += 2)
298 if (id[i] != id[i+1])
299 fprintf(fp, "%d-%d,", id[i], id[i+1]);
301 fprintf(fp, "%d,", id[i]);
303 fprintf(fp, "anonuid=%d,anongid=%d", ep->e_anonuid, ep->e_anongid);
304 secinfo_show(fp, ep);
321 dupexportent(struct exportent *dst, struct exportent *src)
326 if ((n = src->e_nsquids) != 0) {
327 dst->e_squids = (int *) xmalloc(n * sizeof(int));
328 memcpy(dst->e_squids, src->e_squids, n * sizeof(int));
330 if ((n = src->e_nsqgids) != 0) {
331 dst->e_sqgids = (int *) xmalloc(n * sizeof(int));
332 memcpy(dst->e_sqgids, src->e_sqgids, n * sizeof(int));
334 if (src->e_mountpoint)
335 dst->e_mountpoint = strdup(src->e_mountpoint);
336 if (src->e_fslocdata)
337 dst->e_fslocdata = strdup(src->e_fslocdata);
341 mkexportent(char *hname, char *path, char *options)
343 static struct exportent ee;
345 ee.e_flags = EXPORT_DEFAULT_FLAGS;
346 ee.e_anonuid = 65534;
347 ee.e_anongid = 65534;
350 ee.e_mountpoint = NULL;
351 ee.e_fslocmethod = FSLOC_NONE;
352 ee.e_fslocdata = NULL;
353 ee.e_secinfo[0].flav = NULL;
358 if (strlen(hname) >= sizeof(ee.e_hostname)) {
359 xlog(L_WARNING, "client name %s too long", hname);
362 strncpy(ee.e_hostname, hname, sizeof (ee.e_hostname) - 1);
363 ee.e_hostname[sizeof (ee.e_hostname) - 1] = '\0';
364 if (strlen(path) >= sizeof(ee.e_path)) {
365 xlog(L_WARNING, "path name %s too long", path);
368 strncpy(ee.e_path, path, sizeof (ee.e_path));
369 ee.e_path[sizeof (ee.e_path) - 1] = '\0';
370 strncpy (ee.m_path, ee.e_path, sizeof (ee.m_path) - 1);
371 ee.m_path [sizeof (ee.m_path) - 1] = '\0';
372 if (parseopts(options, &ee, 0, NULL) < 0)
378 updateexportent(struct exportent *eep, char *options)
380 if (parseopts(options, eep, 0, NULL) < 0)
386 static int valid_uuid(char *uuid)
388 /* must have 32 hex digits */
390 for (cnt = 0 ; *uuid; uuid++)
397 * Append the given flavor to the exportent's e_secinfo array, or
398 * do nothing if it's already there. Returns the index of flavor
399 * in the resulting array in any case.
401 static int secinfo_addflavor(struct flav_info *flav, struct exportent *ep)
405 for (p=ep->e_secinfo; p->flav; p++) {
407 return p - ep->e_secinfo;
409 if (p - ep->e_secinfo >= SECFLAVOR_COUNT) {
410 xlog(L_ERROR, "more than %d security flavors on an export\n",
415 p->flags = ep->e_flags;
417 return p - ep->e_secinfo;
420 static struct flav_info *find_flavor(char *name)
422 struct flav_info *flav;
423 for (flav = flav_map; flav < flav_map + flav_map_size; flav++)
424 if (strcmp(flav->flavour, name) == 0)
429 /* @str is a colon seperated list of security flavors. Their order
430 * is recorded in @ep, and a bitmap corresponding to the list is returned.
431 * A zero return indicates an error.
433 static unsigned int parse_flavors(char *str, struct exportent *ep)
439 while ( (flavor=strsep(&str, ":")) ) {
440 struct flav_info *flav = find_flavor(flavor);
442 xlog(L_ERROR, "unknown flavor %s\n", flavor);
445 bit = secinfo_addflavor(flav, ep);
453 /* Sets the bits in @mask for the appropriate security flavor flags. */
454 static void setflags(int mask, unsigned int active, struct exportent *ep)
462 ep->e_secinfo[bit].flags |= mask;
468 /* Clears the bits in @mask for the appropriate security flavor flags. */
469 static void clearflags(int mask, unsigned int active, struct exportent *ep)
473 ep->e_flags &= ~mask;
477 ep->e_secinfo[bit].flags &= ~mask;
483 /* options that can vary per flavor: */
484 #define NFSEXP_SECINFO_FLAGS (NFSEXP_READONLY | NFSEXP_ROOTSQUASH \
488 * Parse option string pointed to by cp and set mount options accordingly.
491 parseopts(char *cp, struct exportent *ep, int warn, int *had_subtree_opt_ptr)
494 int had_subtree_opt = 0;
495 char *flname = efname?efname:"command line";
496 int flline = efp?efp->x_line:0;
497 unsigned int active = 0;
499 squids = ep->e_squids; nsquids = ep->e_nsquids;
500 sqgids = ep->e_sqgids; nsqgids = ep->e_nsqgids;
508 char *opt = strdup(cp);
510 while (*cp && *cp != ',')
513 opt[cp-optstart] = '\0';
517 /* process keyword */
518 if (strcmp(opt, "ro") == 0)
519 setflags(NFSEXP_READONLY, active, ep);
520 else if (strcmp(opt, "rw") == 0)
521 clearflags(NFSEXP_READONLY, active, ep);
522 else if (!strcmp(opt, "secure"))
523 ep->e_flags &= ~NFSEXP_INSECURE_PORT;
524 else if (!strcmp(opt, "insecure"))
525 ep->e_flags |= NFSEXP_INSECURE_PORT;
526 else if (!strcmp(opt, "sync"))
527 ep->e_flags &= ~NFSEXP_ASYNC;
528 else if (!strcmp(opt, "async"))
529 ep->e_flags |= NFSEXP_ASYNC;
530 else if (!strcmp(opt, "nohide"))
531 ep->e_flags |= NFSEXP_NOHIDE;
532 else if (!strcmp(opt, "hide"))
533 ep->e_flags &= ~NFSEXP_NOHIDE;
534 else if (!strcmp(opt, "crossmnt"))
535 ep->e_flags |= NFSEXP_CROSSMOUNT;
536 else if (!strcmp(opt, "nocrossmnt"))
537 ep->e_flags &= ~NFSEXP_CROSSMOUNT;
538 else if (!strcmp(opt, "wdelay"))
539 ep->e_flags |= NFSEXP_GATHERED_WRITES;
540 else if (!strcmp(opt, "no_wdelay"))
541 ep->e_flags &= ~NFSEXP_GATHERED_WRITES;
542 else if (strcmp(opt, "root_squash") == 0)
543 setflags(NFSEXP_ROOTSQUASH, active, ep);
544 else if (!strcmp(opt, "no_root_squash"))
545 clearflags(NFSEXP_ROOTSQUASH, active, ep);
546 else if (strcmp(opt, "all_squash") == 0)
547 setflags(NFSEXP_ALLSQUASH, active, ep);
548 else if (strcmp(opt, "no_all_squash") == 0)
549 clearflags(NFSEXP_ALLSQUASH, active, ep);
550 else if (strcmp(opt, "subtree_check") == 0) {
552 ep->e_flags &= ~NFSEXP_NOSUBTREECHECK;
553 } else if (strcmp(opt, "no_subtree_check") == 0) {
555 ep->e_flags |= NFSEXP_NOSUBTREECHECK;
556 } else if (strcmp(opt, "auth_nlm") == 0)
557 ep->e_flags &= ~NFSEXP_NOAUTHNLM;
558 else if (strcmp(opt, "no_auth_nlm") == 0)
559 ep->e_flags |= NFSEXP_NOAUTHNLM;
560 else if (strcmp(opt, "secure_locks") == 0)
561 ep->e_flags &= ~NFSEXP_NOAUTHNLM;
562 else if (strcmp(opt, "insecure_locks") == 0)
563 ep->e_flags |= NFSEXP_NOAUTHNLM;
564 else if (strcmp(opt, "acl") == 0)
565 ep->e_flags &= ~NFSEXP_NOACL;
566 else if (strcmp(opt, "no_acl") == 0)
567 ep->e_flags |= NFSEXP_NOACL;
568 else if (strncmp(opt, "anonuid=", 8) == 0) {
570 ep->e_anonuid = strtol(opt+8, &oe, 10);
571 if (opt[8]=='\0' || *oe != '\0') {
572 xlog(L_ERROR, "%s: %d: bad anonuid \"%s\"\n",
573 flname, flline, opt);
576 export_errno = EINVAL;
579 } else if (strncmp(opt, "anongid=", 8) == 0) {
581 ep->e_anongid = strtol(opt+8, &oe, 10);
582 if (opt[8]=='\0' || *oe != '\0') {
583 xlog(L_ERROR, "%s: %d: bad anongid \"%s\"\n",
584 flname, flline, opt);
587 } else if (strncmp(opt, "squash_uids=", 12) == 0) {
588 if (parsesquash(opt+12, &squids, &nsquids, &cp) < 0) {
591 } else if (strncmp(opt, "squash_gids=", 12) == 0) {
592 if (parsesquash(opt+12, &sqgids, &nsqgids, &cp) < 0) {
595 } else if (strncmp(opt, "fsid=", 5) == 0) {
597 if (strcmp(opt+5, "root") == 0) {
599 ep->e_flags |= NFSEXP_FSID;
601 ep->e_fsid = strtoul(opt+5, &oe, 0);
602 if (opt[5]!='\0' && *oe == '\0')
603 ep->e_flags |= NFSEXP_FSID;
604 else if (valid_uuid(opt+5))
605 ep->e_uuid = strdup(opt+7);
607 xlog(L_ERROR, "%s: %d: bad fsid \"%s\"\n",
608 flname, flline, opt);
612 } else if (strcmp(opt, "mountpoint")==0 ||
613 strcmp(opt, "mp") == 0 ||
614 strncmp(opt, "mountpoint=", 11)==0 ||
615 strncmp(opt, "mp=", 3) == 0) {
616 char * mp = strchr(opt, '=');
618 ep->e_mountpoint = strdup(mp+1);
620 ep->e_mountpoint = strdup("");
622 } else if (strncmp(opt, "fsloc=", 6) == 0) {
623 if (strcmp(opt+6, "stub") == 0)
624 ep->e_fslocmethod = FSLOC_STUB;
626 xlog(L_ERROR, "%s:%d: bad option %s\n",
627 flname, flline, opt);
631 } else if (strncmp(opt, "refer=", 6) == 0) {
632 ep->e_fslocmethod = FSLOC_REFER;
633 ep->e_fslocdata = strdup(opt+6);
634 } else if (strncmp(opt, "replicas=", 9) == 0) {
635 ep->e_fslocmethod = FSLOC_REPLICA;
636 ep->e_fslocdata = strdup(opt+9);
637 } else if (strncmp(opt, "sec=", 4) == 0) {
638 active = parse_flavors(opt+4, ep);
642 xlog(L_ERROR, "%s:%d: unknown keyword \"%s\"\n",
643 flname, flline, opt);
644 ep->e_flags |= NFSEXP_ALLSQUASH | NFSEXP_READONLY;
652 for (p = ep->e_secinfo; p->flav; p++)
653 p->flags |= ep->e_flags & ~NFSEXP_SECINFO_FLAGS;
654 ep->e_squids = squids;
655 ep->e_sqgids = sqgids;
656 ep->e_nsquids = nsquids;
657 ep->e_nsqgids = nsqgids;
660 if (warn && !had_subtree_opt)
661 xlog(L_WARNING, "%s [%d]: Neither 'subtree_check' or 'no_subtree_check' specified for export \"%s:%s\".\n"
662 " Assuming default behaviour ('no_subtree_check').\n"
663 " NOTE: this default has changed since nfs-utils version 1.0.x\n",
666 ep->e_hostname, ep->e_path);
667 if (had_subtree_opt_ptr)
668 *had_subtree_opt_ptr = had_subtree_opt;
674 parsesquash(char *list, int **idp, int *lenp, char **ep)
692 if (id0 == -1 || id1 == -1) {
693 syntaxerr("uid/gid -1 not permitted");
697 id = (int *) xrealloc(id, (len + 8) * sizeof(*id));
700 if (!*cp || *cp == ')' || (*cp == ',' && !isdigit(cp[1])))
703 syntaxerr("bad uid/gid list");
709 if (**ep == ',') (*ep)++;
739 while (isdigit(**cpp))
741 c = **cpp; **cpp = '\0'; num = atoi(cp); **cpp = c;
746 getpath(char *path, int len)
749 return xgettok(efp, 0, path, len);
753 getexport(char *exp, int len)
758 if ((ok = xgettok(efp, 0, exp, len)) < 0)
759 xlog(L_ERROR, "%s:%d: syntax error",
760 efname?"command line":efname, efp->x_line);
767 xlog(L_ERROR, "%s:%d: syntax error: %s",
768 efname, efp?efp->x_line:0, msg);