tar2qfile.c 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854
  1. /* $OpenBSD: tar.h,v 1.7 2003/06/02 23:32:09 millert Exp $ */
  2. /* $NetBSD: tar.h,v 1.3 1995/03/21 09:07:51 cgd Exp $ */
  3. /*-
  4. * Copyright (c) 1992 Keith Muller.
  5. * Copyright (c) 1992, 1993
  6. * The Regents of the University of California. All rights reserved.
  7. *
  8. * This code is derived from software contributed to Berkeley by
  9. * Keith Muller of the University of California, San Diego.
  10. *
  11. * Redistribution and use in source and binary forms, with or without
  12. * modification, are permitted provided that the following conditions
  13. * are met:
  14. * 1. Redistributions of source code must retain the above copyright
  15. * notice, this list of conditions and the following disclaimer.
  16. * 2. Redistributions in binary form must reproduce the above copyright
  17. * notice, this list of conditions and the following disclaimer in the
  18. * documentation and/or other materials provided with the distribution.
  19. * 3. Neither the name of the University nor the names of its contributors
  20. * may be used to endorse or promote products derived from this software
  21. * without specific prior written permission.
  22. *
  23. * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
  24. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  25. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  26. * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
  27. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  28. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  29. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  30. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  31. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  32. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  33. * SUCH DAMAGE.
  34. *
  35. * @(#)tar.h 8.2 (Berkeley) 4/18/94
  36. */
  37. #define _GNU_SOURCE /* For O_NOFOLLOW. */
  38. #include <errno.h>
  39. #include <ioall.h>
  40. #include <fcntl.h>
  41. #include <sys/time.h>
  42. #include <sys/stat.h>
  43. #include <stdlib.h>
  44. #include <unistd.h>
  45. #include <stdio.h>
  46. #include <string.h>
  47. #include <qfile-utils.h>
  48. /***************************************************
  49. * Most routines extracted from the PAX project (tar.c...) *
  50. ***************************************************/
  51. /*
  52. * BSD PAX global data structures and constants.
  53. */
  54. #define MAXBLK 64512 /* MAX blocksize supported (posix SPEC) */
  55. /* WARNING: increasing MAXBLK past 32256 */
  56. /* will violate posix spec. */
  57. #define MAXBLK_POSIX 32256 /* MAX blocksize supported as per POSIX */
  58. #define BLKMULT 512 /* blocksize must be even mult of 512 bytes */
  59. /* Don't even think of changing this */
  60. #define DEVBLK 8192 /* default read blksize for devices */
  61. #define FILEBLK 10240 /* default read blksize for files */
  62. #define PAXPATHLEN 3072 /* maximium path length for pax. MUST be */
  63. /*
  64. * defines and data structures common to all tar formats
  65. */
  66. #define CHK_LEN 8 /* length of checksum field */
  67. #define TNMSZ 100 /* size of name field */
  68. #define NULLCNT 2 /* number of null blocks in trailer */
  69. #define CHK_OFFSET 148 /* start of chksum field */
  70. #define BLNKSUM 256L /* sum of checksum field using ' ' */
  71. /*
  72. * General Defines
  73. */
  74. #define HEX 16
  75. #define OCT 8
  76. #define _PAX_ 1
  77. #define _TFILE_BASE "paxXXXXXXXXXX"
  78. /*
  79. * General Macros
  80. */
  81. #ifndef MIN
  82. #define MIN(a,b) (((a)<(b))?(a):(b))
  83. #endif
  84. #ifndef MAX
  85. #define MAX(a,b) (((a)>(b))?(a):(b))
  86. #endif
  87. #define MAJOR(x) major(x)
  88. #define MINOR(x) minor(x)
  89. #define TODEV(x, y) makedev((x), (y))
  90. /*
  91. * Values used in typeflag field in all tar formats
  92. * (only REGTYPE, LNKTYPE and SYMTYPE are used in old bsd tar headers)
  93. */
  94. #define REGTYPE '0' /* Regular File */
  95. #define AREGTYPE '\0' /* Regular File */
  96. #define LNKTYPE '1' /* Link */
  97. #define SYMTYPE '2' /* Symlink */
  98. #define CHRTYPE '3' /* Character Special File */
  99. #define BLKTYPE '4' /* Block Special File */
  100. #define DIRTYPE '5' /* Directory */
  101. #define FIFOTYPE '6' /* FIFO */
  102. #define CONTTYPE '7' /* high perf file */
  103. /*
  104. * GNU tar compatibility;
  105. */
  106. #define LONGLINKTYPE 'K' /* Long Symlink */
  107. #define LONGNAMETYPE 'L' /* Long File */
  108. #define EXTHEADERTYPE 'x' /* Extended header */
  109. /*
  110. * Pad with a bit mask, much faster than doing a mod but only works on powers
  111. * of 2. Macro below is for block of 512 bytes.
  112. */
  113. #define TAR_PAD(x) ((512 - ((x) & 511)) & 511)
  114. /*
  115. * Data Interchange Format - Extended tar header format - POSIX 1003.1-1990
  116. */
  117. #define TPFSZ 155
  118. #define TMAGIC "ustar" /* ustar and a null */
  119. #define TMAGLEN 6
  120. #define TVERSION "00" /* 00 and no null */
  121. #define TVERSLEN 2
  122. typedef struct {
  123. char name[TNMSZ]; /* name of entry */
  124. char mode[8]; /* mode */
  125. char uid[8]; /* uid */
  126. char gid[8]; /* gid */
  127. char size[12]; /* size */
  128. char mtime[12]; /* modification time */
  129. char chksum[CHK_LEN]; /* checksum */
  130. char typeflag; /* type of file. */
  131. char linkname[TNMSZ]; /* linked to name */
  132. char magic[TMAGLEN]; /* magic cookie */
  133. char version[TVERSLEN]; /* version */
  134. char uname[32]; /* ascii owner name */
  135. char gname[32]; /* ascii group name */
  136. char devmajor[8]; /* major device number */
  137. char devminor[8]; /* minor device number */
  138. char prefix[TPFSZ]; /* linked to name */
  139. } HD_USTAR;
  140. /*
  141. * Routines for manipulating headers, trailers:
  142. * asc_ul()
  143. * tar_trail()
  144. * tar_chksm()
  145. * ustar_id()
  146. */
  147. static unsigned long tar_chksm (char *, int);
  148. char *gnu_hack_string; /* GNU ././@LongLink hackery */
  149. char untrusted_namebuf[MAX_PATH_LENGTH];
  150. /*
  151. * asc_ul()
  152. * convert hex/octal character string into a u_long. We do not have to
  153. * check for overflow! (the headers in all supported formats are not large
  154. * enough to create an overflow).
  155. * NOTE: strings passed to us are NOT TERMINATED.
  156. * Return:
  157. * unsigned long value
  158. */
  159. u_long
  160. asc_ul (char *str, int len, int base)
  161. {
  162. char *stop;
  163. u_long tval = 0;
  164. stop = str + len;
  165. /*
  166. * skip over leading blanks and zeros
  167. */
  168. while ((str < stop) && ((*str == ' ') || (*str == '0')))
  169. ++str;
  170. /*
  171. * for each valid digit, shift running value (tval) over to next digit
  172. * and add next digit
  173. */
  174. if (base == HEX)
  175. {
  176. while (str < stop)
  177. {
  178. if ((*str >= '0') && (*str <= '9'))
  179. tval = (tval << 4) + (*str++ - '0');
  180. else if ((*str >= 'A') && (*str <= 'F'))
  181. tval = (tval << 4) + 10 + (*str++ - 'A');
  182. else if ((*str >= 'a') && (*str <= 'f'))
  183. tval = (tval << 4) + 10 + (*str++ - 'a');
  184. else
  185. break;
  186. }
  187. }
  188. else
  189. {
  190. while ((str < stop) && (*str >= '0') && (*str <= '7'))
  191. tval = (tval << 3) + (*str++ - '0');
  192. }
  193. return (tval);
  194. }
  195. /*
  196. * tar_trail()
  197. * Called to determine if a header block is a valid trailer. We are passed
  198. * the block, the in_sync flag (which tells us we are in resync mode;
  199. * looking for a valid header), and cnt (which starts at zero) which is
  200. * used to count the number of empty blocks we have seen so far.
  201. * Return:
  202. * 0 if a valid trailer, -1 if not a valid trailer, or 1 if the block
  203. * could never contain a header.
  204. */
  205. int
  206. tar_trail (char *buf,
  207. int in_resync, int *cnt)
  208. {
  209. register int i;
  210. /*
  211. * look for all zero, trailer is two consecutive blocks of zero
  212. */
  213. for (i = 0; i < BLKMULT; ++i)
  214. {
  215. if (buf[i] != '\0')
  216. break;
  217. }
  218. /*
  219. * if not all zero it is not a trailer, but MIGHT be a header.
  220. */
  221. if (i != BLKMULT)
  222. return (-1);
  223. /*
  224. * When given a zero block, we must be careful!
  225. * If we are not in resync mode, check for the trailer. Have to watch
  226. * out that we do not mis-identify file data as the trailer, so we do
  227. * NOT try to id a trailer during resync mode. During resync mode we
  228. * might as well throw this block out since a valid header can NEVER be
  229. * a block of all 0 (we must have a valid file name).
  230. */
  231. if (!in_resync && (++*cnt >= NULLCNT))
  232. return (0);
  233. return (1);
  234. }
  235. /*
  236. * tar_chksm()
  237. * calculate the checksum for a tar block counting the checksum field as
  238. * all blanks (BLNKSUM is that value pre-calculated, the sum of 8 blanks).
  239. * NOTE: we use len to short circuit summing 0's on write since we ALWAYS
  240. * pad headers with 0.
  241. * Return:
  242. * unsigned long checksum
  243. */
  244. static unsigned long
  245. tar_chksm (char *blk, int len)
  246. {
  247. char *stop;
  248. char *pt;
  249. unsigned int chksm = BLNKSUM; /* initial value is checksum field sum */
  250. /*
  251. * add the part of the block before the checksum field
  252. */
  253. pt = blk;
  254. stop = blk + CHK_OFFSET;
  255. while (pt < stop)
  256. chksm += (*pt++ & 0xff);
  257. /*
  258. * move past the checksum field and keep going, spec counts the
  259. * checksum field as the sum of 8 blanks (which is pre-computed as
  260. * BLNKSUM).
  261. * ASSUMED: len is greater than CHK_OFFSET. (len is where our 0 padding
  262. * starts, no point in summing zero's)
  263. */
  264. pt += CHK_LEN;
  265. stop = blk + len;
  266. while (pt < stop)
  267. chksm += (*pt++ & 0xff);
  268. return chksm;
  269. }
  270. /*
  271. * ustar_id()
  272. * determine if a block given to us is a valid ustar header. We have to
  273. * be on the lookout for those pesky blocks of all zero's
  274. * Return:
  275. * 0 if a ustar header, -1 otherwise
  276. */
  277. int
  278. ustar_id (char *blk, size_t size)
  279. {
  280. HD_USTAR *hd;
  281. if (size < BLKMULT)
  282. return (-1);
  283. hd = (HD_USTAR *) blk;
  284. /*
  285. * check for block of zero's first, a simple and fast test then check
  286. * ustar magic cookie. We should use TMAGLEN, but some USTAR archive
  287. * programs are fouled up and create archives missing the \0. Last we
  288. * check the checksum. If ok we have to assume it is a valid header.
  289. */
  290. if (hd->name[0] == '\0')
  291. return (-1);
  292. if (strncmp (hd->magic, TMAGIC, TMAGLEN - 1) != 0)
  293. return (-1);
  294. if (asc_ul (hd->chksum, sizeof (hd->chksum), OCT) !=
  295. tar_chksm (blk, BLKMULT))
  296. return (-1);
  297. return (0);
  298. }
  299. /*
  300. * Routines for reading tar files
  301. // Source: http://www.mkssoftware.com/docs/man4/pax.4.asp
  302. struct file_header { // PAX header is similar as file_header and can be completely ignored
  303. unsigned char[100] name;
  304. unsigned char[8] mode;
  305. unsigned char[8] uid; // unused
  306. unsigned char[8] gid; // unused
  307. unsigned char[12] size; // 0 if file is a link
  308. unsigned char[12] mtime;
  309. unsigned char[8] chksum;
  310. unsigned char[1] typeflag;
  311. unsigned char[100] linkname;
  312. unsigned char[6] magic; //ustar
  313. unsigned char[2] version; // 00
  314. unsigned char[32] uname; // unused
  315. unsigned char[32] gname; // unused
  316. unsigned char[8] devmajor; // unused ?
  317. unsigned char[8] devminor; // unused ?
  318. unsigned char[155] prefix; // only used for files > 100 characters. could be unused ?
  319. };
  320. enum {
  321. TYPE_REGULAR, //0
  322. TYPE_ARCHIVE_LINK, //1
  323. TYPE_SYMLINK, //2
  324. TYPE_CHARACTER_DEVICE, //3
  325. TYPE_BLOCK_DEVICE, //4
  326. TYPE_DIRECTORY, //5
  327. TYPE_FIFO, //6
  328. // Other types:
  329. TYPE_EXTENDED_USAGE, //xxxxx
  330. // A-Z are available for custom usage
  331. };
  332. // Extended attribute:
  333. // length keyword=value
  334. // atime, charset, comment, gname, linkpath, mtime, path, size, uname
  335. */
  336. enum {
  337. NEED_NOTHING,
  338. NEED_SKIP,
  339. NEED_READ,
  340. NEED_SYNC_TRAIL,
  341. INVALID_HEADER,
  342. MEMORY_ALLOC_FAILED,
  343. };
  344. /*
  345. * ustar_rd()
  346. * extract the values out of block already determined to be a ustar header.
  347. * store the values in the ARCHD parameter.
  348. * Return:
  349. * 0
  350. */
  351. int n_dirs = 0;
  352. char ** dirs_headers_sent = NULL;
  353. int
  354. ustar_rd (int fd, struct file_header * untrusted_hdr, char *buf, struct stat * sb)
  355. {
  356. register HD_USTAR *hd;
  357. register char *dest;
  358. register int cnt = 0;
  359. int ret;
  360. /* DISABLED: unused
  361. dev_t devmajor;
  362. dev_t devminor;
  363. */
  364. /*
  365. * we only get proper sized buffers
  366. */
  367. fprintf(stderr,"Checking if valid header\n");
  368. if (ustar_id (buf, BLKMULT) < 0) {
  369. fprintf (stderr,"Invalid header\n");
  370. return INVALID_HEADER;
  371. }
  372. fprintf(stderr,"Valid header!\n");
  373. /* DISABLED: Internal to PAX
  374. arcn->org_name = arcn->name;
  375. arcn->sb.st_nlink = 1;
  376. arcn->pat = NULL;
  377. arcn->nlen = 0;
  378. */
  379. untrusted_hdr->namelen = 0;
  380. hd = (HD_USTAR *) buf;
  381. /*
  382. * see if the filename is split into two parts. if, so joint the parts.
  383. * we copy the prefix first and add a / between the prefix and name.
  384. */
  385. dest = untrusted_namebuf;
  386. if (*(hd->prefix) != '\0')
  387. {
  388. cnt = strlen(strncpy (dest, hd->prefix,
  389. MIN(sizeof (untrusted_namebuf) - 1,TPFSZ+1)));
  390. dest += cnt;
  391. *dest++ = '/';
  392. cnt++;
  393. }
  394. if (gnu_hack_string)
  395. {
  396. untrusted_hdr->namelen = cnt + strlen(strncpy (dest, gnu_hack_string,
  397. MIN(TNMSZ+1, sizeof (untrusted_namebuf) - cnt)));
  398. free(gnu_hack_string);
  399. gnu_hack_string = NULL;
  400. } else
  401. untrusted_hdr->namelen = cnt + strlen(strncpy (dest, hd->name,
  402. MIN(TNMSZ+1, sizeof (untrusted_namebuf) - cnt)));
  403. // qfile count the \0 in the namelen
  404. untrusted_hdr->namelen += 1;
  405. fprintf(stderr,"Retrieved name len: %d\n",untrusted_hdr->namelen);
  406. fprintf(stderr,"Retrieved name: %s\n",untrusted_namebuf);
  407. /*
  408. * follow the spec to the letter. we should only have mode bits, strip
  409. * off all other crud we may be passed.
  410. */
  411. sb->st_mode = (mode_t) (asc_ul (hd->mode, sizeof (hd->mode), OCT) &
  412. 0xfff);
  413. untrusted_hdr->mode = sb->st_mode;
  414. #if defined(_FILE_OFFSET_BITS) && _FILE_OFFSET_BITS == 64
  415. sb->st_size = (off_t) asc_uqd (hd->size, sizeof (hd->size), OCT);
  416. #else
  417. sb->st_size = (off_t) asc_ul (hd->size, sizeof (hd->size), OCT);
  418. #endif
  419. untrusted_hdr->filelen = sb->st_size;
  420. untrusted_hdr->atime = (time_t) asc_ul (hd->mtime, sizeof (hd->mtime), OCT);
  421. untrusted_hdr->mtime = untrusted_hdr->atime;
  422. untrusted_hdr->atime_nsec = untrusted_hdr->mtime_nsec = 0;
  423. sb->st_mtime = (time_t) asc_ul (hd->mtime, sizeof (hd->mtime), OCT);
  424. sb->st_ctime = sb->st_atime = sb->st_mtime;
  425. /*
  426. * If we can find the ascii names for gname and uname in the password
  427. * and group files we will use the uid's and gid they bind. Otherwise
  428. * we use the uid and gid values stored in the header. (This is what
  429. * the posix spec wants).
  430. */
  431. /* DISABLED: unused
  432. hd->gname[sizeof (hd->gname) - 1] = '\0';
  433. if (gid_name (hd->gname, &(arcn->sb.st_gid)) < 0)
  434. arcn->sb.st_gid = (gid_t) asc_ul (hd->gid, sizeof (hd->gid), OCT);
  435. hd->uname[sizeof (hd->uname) - 1] = '\0';
  436. if (uid_name (hd->uname, &(arcn->sb.st_uid)) < 0)
  437. arcn->sb.st_uid = (uid_t) asc_ul (hd->uid, sizeof (hd->uid), OCT);
  438. */
  439. /*
  440. * set the defaults, these may be changed depending on the file type
  441. */
  442. /* Disabled: pax specific
  443. arcn->ln_name[0] = '\0';
  444. arcn->ln_nlen = 0;
  445. arcn->pad = 0;
  446. arcn->skip = 0;
  447. arcn->sb.st_rdev = (dev_t) 0;
  448. */
  449. /*
  450. * set the mode and PAX type according to the typeflag in the header
  451. */
  452. switch (hd->typeflag)
  453. {
  454. case FIFOTYPE:
  455. fprintf(stderr,"File is FIFOTYPE\n");
  456. /* DISABLED: unused
  457. arcn->type = PAX_FIF;
  458. arcn->sb.st_mode |= S_IFIFO;
  459. */
  460. break;
  461. case DIRTYPE:
  462. fprintf(stderr,"File is DIRTYPE\n");
  463. /* DISABLED: unused
  464. arcn->type = PAX_DIR;
  465. arcn->sb.st_mode |= S_IFDIR;
  466. arcn->sb.st_nlink = 2;
  467. */
  468. /*
  469. * Some programs that create ustar archives append a '/'
  470. * to the pathname for directories. This clearly violates
  471. * ustar specs, but we will silently strip it off anyway.
  472. */
  473. /*
  474. if (arcn->name[arcn->nlen - 1] == '/')
  475. arcn->name[--arcn->nlen] = '\0';
  476. */
  477. break;
  478. case BLKTYPE:
  479. fprintf(stderr,"File is BLKTYPE\n");
  480. break;
  481. case CHRTYPE:
  482. fprintf(stderr,"File is CHRTYPE\n");
  483. /*
  484. * this type requires the rdev field to be set.
  485. */
  486. if (hd->typeflag == BLKTYPE)
  487. {
  488. /*
  489. arcn->type = PAX_BLK;
  490. arcn->sb.st_mode |= S_IFBLK;
  491. */
  492. }
  493. else
  494. {
  495. /*
  496. arcn->type = PAX_CHR;
  497. arcn->sb.st_mode |= S_IFCHR;
  498. */
  499. }
  500. /* DISABLED: unused
  501. devmajor = (dev_t) asc_ul (hd->devmajor, sizeof (hd->devmajor), OCT);
  502. devminor = (dev_t) asc_ul (hd->devminor, sizeof (hd->devminor), OCT);
  503. */
  504. // arcn->sb.st_rdev = TODEV (devmajor, devminor);
  505. break;
  506. case SYMTYPE:
  507. fprintf(stderr,"File is SYMTYPE\n");
  508. break;
  509. case LNKTYPE:
  510. fprintf(stderr,"File is LNKTYPE\n");
  511. if (hd->typeflag == SYMTYPE)
  512. {
  513. // arcn->type = PAX_SLK;
  514. // arcn->sb.st_mode |= S_IFLNK;
  515. }
  516. else
  517. {
  518. // arcn->type = PAX_HLK;
  519. /*
  520. * so printing looks better
  521. */
  522. // arcn->sb.st_mode |= S_IFREG;
  523. // arcn->sb.st_nlink = 2;
  524. }
  525. /*
  526. * copy the link name
  527. */
  528. // arcn->ln_nlen = strlcpy (arcn->ln_name, hd->linkname,
  529. // MIN(TNMSZ+1,sizeof (arcn->ln_name)));
  530. break;
  531. case LONGLINKTYPE:
  532. fprintf(stderr,"File is LONGLINKTYPE\n");
  533. break;
  534. case LONGNAMETYPE:
  535. fprintf(stderr,"File is LONGNAMETYPE\n");
  536. /*
  537. * GNU long link/file; we tag these here and let the
  538. * pax internals deal with it -- too ugly otherwise.
  539. */
  540. // arcn->type =
  541. // hd->typeflag == LONGLINKTYPE ? PAX_GLL : PAX_GLF;
  542. // arcn->pad = TAR_PAD(arcn->sb.st_size);
  543. // arcn->skip = arcn->sb.st_size;
  544. // arcn->ln_name[0] = '\0';
  545. // arcn->ln_nlen = 0;
  546. break;
  547. case CONTTYPE:
  548. fprintf(stderr,"File is CONTTYPE\n");
  549. break;
  550. case AREGTYPE:
  551. fprintf(stderr,"File is AREGTYPE\n");
  552. break;
  553. case REGTYPE:
  554. fprintf(stderr,"File is REGTYPE of size %ld\n",sb->st_size);
  555. // Create a copy of untrusted_namebuf to be used for strtok
  556. char * dirbuf;
  557. dirbuf = malloc(sizeof (char) * (untrusted_hdr->namelen));
  558. if (dirbuf == NULL)
  559. return MEMORY_ALLOC_FAILED;
  560. dirbuf = strncpy(dirbuf, untrusted_namebuf, untrusted_hdr->namelen);
  561. int i = 0;
  562. int dir_found = 0;
  563. size_t pathsize = 0;
  564. char * path = NULL;
  565. struct file_header dir_header;
  566. // Split the path in directories and recompose it incrementally
  567. char * last_token = strtok(dirbuf,"/");
  568. char * token = strtok(NULL, "/");
  569. while (token != NULL) {
  570. fprintf(stderr,"Found directory %s (last:%s)\n",token,last_token);
  571. // Recompose the path based on last discovered directory
  572. if (path == NULL) {
  573. path = malloc(sizeof (char) * (strlen(last_token)+1));
  574. if (path == NULL)
  575. return MEMORY_ALLOC_FAILED;
  576. path = strncpy(path, last_token, strlen(last_token));
  577. path[strlen(last_token)] = '\0';
  578. } else {
  579. pathsize = strlen(path);
  580. path = realloc(path, sizeof (char) * (strlen(path)+1+strlen(last_token)+1));
  581. if (path == NULL)
  582. return MEMORY_ALLOC_FAILED;
  583. path[pathsize] = '/';
  584. strncpy(path+pathsize+1, last_token, strlen(last_token));
  585. path[pathsize+strlen(last_token)+1] = '\0';
  586. }
  587. fprintf(stderr,"Path is %s\n",path);
  588. fprintf(stderr,"Checking from i=0 i<%d\n",n_dirs);
  589. // Verify if qfile headers for the current path have already been sent based on the dirs_headers_sent table
  590. dir_found = 0;
  591. for (i = 0; i < n_dirs; ++i) {
  592. fprintf(stderr,"Comparing with %d %d %s %s\n",i,n_dirs,dirs_headers_sent[i],path);
  593. if (strcmp(dirs_headers_sent[i],path)==0) {
  594. fprintf(stderr,"Directory headers already sent\n");
  595. dir_found=1;
  596. }
  597. }
  598. if (dir_found == 0) {
  599. // Register the current path as being sent in the dirs_headers_sent table
  600. fprintf(stderr,"Inserting %s into register\n",path);
  601. dirs_headers_sent = realloc(dirs_headers_sent, sizeof (char*) * n_dirs++);
  602. if (dirs_headers_sent == NULL)
  603. return MEMORY_ALLOC_FAILED;
  604. dirs_headers_sent[n_dirs-1] = malloc(sizeof (char) * (strlen(path)+1));
  605. if (dirs_headers_sent[n_dirs-1] == NULL)
  606. return MEMORY_ALLOC_FAILED;
  607. strncpy(dirs_headers_sent[n_dirs-1], path, strlen(path)+1);
  608. // Initialize the qfile headers for the current directory path
  609. dir_header.namelen = strlen(path)+1;
  610. dir_header.atime = untrusted_hdr->atime;
  611. dir_header.atime_nsec = untrusted_hdr->atime_nsec;
  612. dir_header.mtime = untrusted_hdr->mtime;
  613. dir_header.mtime_nsec = untrusted_hdr->mtime_nsec;
  614. dir_header.mode = untrusted_hdr->mode | S_IFDIR;
  615. dir_header.filelen = 0;
  616. fprintf(stderr,"Sending directory headers for %s\n",path);
  617. // Send the qfile headers for the current directory path
  618. write_headers(&dir_header, path);
  619. }
  620. last_token = token;
  621. token = strtok(NULL, "/");
  622. }
  623. free(path);
  624. free(dirbuf);
  625. fprintf(stderr,"End of directory checks\n");
  626. // Restore POSIX stat file mode (because PAX format use its own file type)
  627. untrusted_hdr->mode |= S_IFREG;
  628. fprintf(stderr,"Writing file header\n");
  629. // Send header and file content
  630. write_headers(untrusted_hdr, untrusted_namebuf);
  631. fprintf(stderr,"Writing file content\n");
  632. ret = copy_file(1, fd, untrusted_hdr->filelen, &crc32_sum);
  633. fprintf(stderr,"Copyfile returned with error %d\n",ret);
  634. if (ret != COPY_FILE_OK) {
  635. if (ret != COPY_FILE_WRITE_ERROR)
  636. gui_fatal("Copying file %s: %s", untrusted_namebuf,
  637. copy_file_status_to_str(ret));
  638. else {
  639. fprintf(stderr,"UNKNOWN ERROR RETURN STATUS:%d\n.. Waiting...\n",ret);
  640. set_block(0);
  641. wait_for_result();
  642. exit(1);
  643. }
  644. }
  645. // Extract extra padding
  646. fprintf(stderr,"Need to remove pad:%ld %ld\n",sb->st_size,BLKMULT-(sb->st_size%BLKMULT));
  647. ret = read(fd, buf, BLKMULT-(sb->st_size%BLKMULT));
  648. fprintf(stderr,"Removed %d bytes of padding\n",ret);
  649. // Resync trailing headers in order to find next file chunck in the tar file
  650. return NEED_SYNC_TRAIL;
  651. break;
  652. case EXTHEADERTYPE:
  653. fprintf(stderr,"Extended HEADER encountered\n");
  654. return NEED_SKIP;
  655. break;
  656. default:
  657. fprintf(stderr,"Default type detected:%c\n",hd->typeflag);
  658. return NEED_SKIP;
  659. /*
  660. * these types have file data that follows. Set the skip and
  661. * pad fields.
  662. */
  663. // arcn->type = PAX_REG;
  664. // arcn->pad = TAR_PAD (arcn->sb.st_size);
  665. // arcn->skip = arcn->sb.st_size;
  666. // arcn->sb.st_mode |= S_IFREG;
  667. break;
  668. }
  669. return NEED_SKIP;
  670. }
  671. void tar_file_processor(int fd)
  672. {
  673. int ret;
  674. int i;
  675. int current;
  676. struct file_header hdr;
  677. struct stat sb; /* stat buffer see stat(2) */
  678. char buf[BLKMULT+1];
  679. size_t size;
  680. i=0;
  681. current = NEED_READ;
  682. size_t to_skip = 0;
  683. int sync_count = 0;
  684. while ((size = read(fd, &buf, BLKMULT))) {
  685. if (size != -1) {
  686. fprintf(stderr,"Read %ld bytes\n",size);
  687. ret = 0;
  688. if (current==NEED_SYNC_TRAIL) {
  689. ret = tar_trail (buf, 1, &sync_count);
  690. fprintf(stderr,"Synchronizing trail: %d %d\n",ret,sync_count);
  691. if (ret != 1) {
  692. current = NEED_READ;
  693. }
  694. }
  695. if (current==NEED_READ) {
  696. current = ustar_rd(fd, &hdr, buf, &sb);
  697. fprintf(stderr,"Return %d\n",ret);
  698. }
  699. if (current==NEED_SKIP) {
  700. fprintf(stderr,"Need to skip %ld bytes\n",sb.st_size);
  701. to_skip = sb.st_size;
  702. while (to_skip > 0) {
  703. to_skip -= read(fd, &buf, MIN(to_skip,BLKMULT));
  704. }
  705. // Extract extra padding
  706. fprintf(stderr,"Need to remove pad:%ld %ld %ld\n",to_skip,sb.st_size,BLKMULT-(sb.st_size%BLKMULT));
  707. ret = read(fd, &buf, BLKMULT-(sb.st_size%BLKMULT));
  708. fprintf(stderr,"Removed %d bytes of padding\n",ret);
  709. current = NEED_READ;
  710. }
  711. i++;
  712. }
  713. //if (i >= 10)
  714. // exit(0);
  715. }
  716. }
  717. int main(int argc, char **argv)
  718. {
  719. int i;
  720. char *entry;
  721. int fd;
  722. signal(SIGPIPE, SIG_IGN);
  723. // this will allow checking for possible feedback packet in the middle of transfer
  724. // if disabled, the copy_file process could hang
  725. notify_progress(0, PROGRESS_FLAG_INIT);
  726. //set_size_limit(1500000000, 2048);
  727. crc32_sum = 0;
  728. for (i = 1; i < argc; i++) {
  729. set_nonblock(0);
  730. if (strcmp(argv[i], "--ignore-symlinks")==0) {
  731. ignore_symlinks = 1;
  732. continue;
  733. } else {
  734. // Parse tar file
  735. entry = argv[i];
  736. fprintf(stderr,"Parsing file %s\n",entry);
  737. fd = open(entry, O_RDONLY);
  738. if (fd < 0)
  739. fprintf(stderr,"Error opening file %s\n",entry);
  740. tar_file_processor(fd);
  741. }
  742. }
  743. if (i <= 1) {
  744. // No argument specified. Use STDIN
  745. fprintf(stderr,"Using STDIN\n");
  746. set_block(0);
  747. tar_file_processor(fileno(stdin));
  748. }
  749. //notify_end_and_wait_for_result();
  750. notify_progress(0, PROGRESS_FLAG_DONE);
  751. return 0;
  752. }