/* Utilities for VFS modules. Copyright (C) 1988, 1992, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2011 The Free Software Foundation, Inc. Copyright (C) 1995, 1996 Miguel de Icaza This file is part of the Midnight Commander. The Midnight Commander is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. The Midnight Commander is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ /** * \file * \brief Source: Utilities for VFS modules * \author Miguel de Icaza * \date 1995, 1996 */ #include #include #include #include #include #include #include #include #include "lib/global.h" #include "lib/unixcompat.h" #include "lib/util.h" /* mc_mkstemps() */ #include "lib/widget.h" /* message() */ #include "lib/strutil.h" /* INVALID_CONV */ #include "vfs.h" #include "utilvfs.h" /*** global variables ****************************************************************************/ /*** file scope macro definitions ****************************************************************/ #ifndef TUNMLEN #define TUNMLEN 256 #endif #ifndef TGNMLEN #define TGNMLEN 256 #endif #define myuid ( my_uid < 0? (my_uid = getuid()): my_uid ) #define mygid ( my_gid < 0? (my_gid = getgid()): my_gid ) #define MC_HISTORY_VFS_PASSWORD "mc.vfs.password" /*** file scope type declarations ****************************************************************/ /*** file scope variables ************************************************************************/ /*** file scope functions ************************************************************************/ /* --------------------------------------------------------------------------------------------- */ /* --------------------------------------------------------------------------------------------- */ /*** public functions ****************************************************************************/ /* --------------------------------------------------------------------------------------------- */ /** Get current username * * @return g_malloc()ed string with the name of the currently logged in * user ("anonymous" if uid is not registered in the system) */ char * vfs_get_local_username (void) { struct passwd *p_i; p_i = getpwuid (geteuid ()); return (p_i && p_i->pw_name) ? g_strdup (p_i->pw_name) : g_strdup ("anonymous"); /* Unknown UID, strange */ } /* --------------------------------------------------------------------------------------------- */ /** * Look up a user or group name from a uid/gid, maintaining a cache. * FIXME, for now it's a one-entry cache. * FIXME2, the "-993" is to reduce the chance of a hit on the first lookup. * This file should be modified for non-unix systems to do something * reasonable. */ /* --------------------------------------------------------------------------------------------- */ int vfs_finduid (const char *uname) { static int saveuid = -993; static char saveuname[TUNMLEN]; static int my_uid = -993; struct passwd *pw; if (uname[0] != saveuname[0] /* Quick test w/o proc call */ || 0 != strncmp (uname, saveuname, TUNMLEN)) { g_strlcpy (saveuname, uname, TUNMLEN); pw = getpwnam (uname); if (pw) { saveuid = pw->pw_uid; } else { saveuid = myuid; } } return saveuid; } /* --------------------------------------------------------------------------------------------- */ int vfs_findgid (const char *gname) { static int savegid = -993; static char savegname[TGNMLEN]; static int my_gid = -993; struct group *gr; if (gname[0] != savegname[0] /* Quick test w/o proc call */ || 0 != strncmp (gname, savegname, TUNMLEN)) { g_strlcpy (savegname, gname, TUNMLEN); gr = getgrnam (gname); if (gr) { savegid = gr->gr_gid; } else { savegid = mygid; } } return savegid; } /* --------------------------------------------------------------------------------------------- */ /** * Create a temporary file with a name resembling the original. * This is needed e.g. for local copies requested by extfs. * Some extfs scripts may look at the extension. * We also protect stupid scripts agains dangerous names. */ int vfs_mkstemps (vfs_path_t ** pname_vpath, const char *prefix, const char *param_basename) { const char *p; char *suffix, *q; int shift; int fd; /* Strip directories */ p = strrchr (param_basename, PATH_SEP); if (!p) p = param_basename; else p++; /* Protection against very long names */ shift = strlen (p) - (MC_MAXPATHLEN - 16); if (shift > 0) p += shift; suffix = g_malloc (MC_MAXPATHLEN); /* Protection against unusual characters */ q = suffix; while (*p && (*p != '#')) { if (strchr (".-_@", *p) || isalnum ((unsigned char) *p)) *q++ = *p; p++; } *q = 0; fd = mc_mkstemps (pname_vpath, prefix, suffix); g_free (suffix); return fd; } /* --------------------------------------------------------------------------------------------- */ /** Extract the hostname and username from the path * * Format of the path is [user@]hostname:port/remote-dir, e.g.: * * ftp://sunsite.unc.edu/pub/linux * ftp://miguel@sphinx.nuclecu.unam.mx/c/nc * ftp://tsx-11.mit.edu:8192/ * ftp://joe@foo.edu:11321/private * ftp://joe:password@foo.se * * @param path is an input string to be parsed * @param default_port is an input default port * @param flags are parsing modifier flags (@see vfs_url_flags_t) * * @return g_malloc()ed url info. * If the user is empty, e.g. ftp://@roxanne/private, and URL_USE_ANONYMOUS * is not set, then the current login name is supplied. * Return value is a g_malloc()ed structure with the pathname relative to the * host. */ vfs_path_element_t * vfs_url_split (const char *path, int default_port, vfs_url_flags_t flags) { vfs_path_element_t *path_element; char *pcopy; size_t pcopy_len; const char *pend; char *dir, *colon, *inner_colon, *at, *rest; path_element = g_new0 (vfs_path_element_t, 1); path_element->port = default_port; pcopy_len = strlen (path); pcopy = g_strndup (path, pcopy_len); pend = pcopy + pcopy_len; dir = pcopy; if ((flags & URL_NOSLASH) == 0) { /* locate path component */ while (*dir != PATH_SEP && *dir != '\0') dir++; if (*dir == '\0') path_element->path = g_strdup (PATH_SEP_STR); else { path_element->path = g_strndup (dir, pcopy_len - (size_t) (dir - pcopy)); *dir = '\0'; } } /* search for any possible user */ at = strrchr (pcopy, '@'); /* We have a username */ if (at == NULL) rest = pcopy; else { *at = '\0'; inner_colon = strchr (pcopy, ':'); if (inner_colon != NULL) { *inner_colon = '\0'; inner_colon++; path_element->password = g_strdup (inner_colon); } if (*pcopy != '\0') path_element->user = g_strdup (pcopy); if (pend == at + 1) rest = at; else rest = at + 1; } if ((flags & URL_USE_ANONYMOUS) == 0) path_element->user = vfs_get_local_username (); /* Check if the host comes with a port spec, if so, chop it */ if (*rest != '[') colon = strchr (rest, ':'); else { colon = strchr (++rest, ']'); if (colon != NULL) { colon[0] = '\0'; colon[1] = '\0'; colon++; } else { vfs_path_element_free (path_element); return NULL; } } if (colon != NULL) { *colon = '\0'; if (sscanf (colon + 1, "%d", &path_element->port) == 1) { if (path_element->port <= 0 || path_element->port >= 65536) path_element->port = default_port; } else while (*(++colon) != '\0') { switch (*colon) { case 'C': path_element->port = 1; break; case 'r': path_element->port = 2; break; } } } path_element->host = g_strdup (rest); #ifdef HAVE_CHARSET path_element->dir.converter = INVALID_CONV; #endif return path_element; } /* --------------------------------------------------------------------------------------------- */ void vfs_die (const char *m) { message (D_ERROR, _("Internal error:"), "%s", m); exit (EXIT_FAILURE); } /* --------------------------------------------------------------------------------------------- */ char * vfs_get_password (const char *msg) { return input_dialog (msg, _("Password:"), MC_HISTORY_VFS_PASSWORD, INPUT_PASSWORD); } /* --------------------------------------------------------------------------------------------- */