tar2qfile.c 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858
  1. /*
  2. /* $OpenBSD: tar.h,v 1.7 2003/06/02 23:32:09 millert Exp $ */
  3. /* $NetBSD: tar.h,v 1.3 1995/03/21 09:07:51 cgd Exp $ */
  4. /*-
  5. * Copyright (c) 1992 Keith Muller.
  6. * Copyright (c) 1992, 1993
  7. * The Regents of the University of California. All rights reserved.
  8. *
  9. * This code is derived from software contributed to Berkeley by
  10. * Keith Muller of the University of California, San Diego.
  11. *
  12. * Redistribution and use in source and binary forms, with or without
  13. * modification, are permitted provided that the following conditions
  14. * are met:
  15. * 1. Redistributions of source code must retain the above copyright
  16. * notice, this list of conditions and the following disclaimer.
  17. * 2. Redistributions in binary form must reproduce the above copyright
  18. * notice, this list of conditions and the following disclaimer in the
  19. * documentation and/or other materials provided with the distribution.
  20. * 3. Neither the name of the University nor the names of its contributors
  21. * may be used to endorse or promote products derived from this software
  22. * without specific prior written permission.
  23. *
  24. * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
  25. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  26. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  27. * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
  28. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  29. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  30. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  31. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  32. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  33. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  34. * SUCH DAMAGE.
  35. *
  36. * @(#)tar.h 8.2 (Berkeley) 4/18/94
  37. */
  38. #define _GNU_SOURCE /* For O_NOFOLLOW. */
  39. #include <errno.h>
  40. #include <ioall.h>
  41. #include <fcntl.h>
  42. #include <sys/time.h>
  43. #include <sys/stat.h>
  44. #include <stdlib.h>
  45. #include <unistd.h>
  46. #include <stdio.h>
  47. #include <string.h>
  48. #include <qfile-utils.h>
  49. /***************************************************
  50. * Most routines extracted from the PAX project (tar.c...) *
  51. ***************************************************/
  52. /*
  53. * BSD PAX global data structures and constants.
  54. */
  55. #define MAXBLK 64512 /* MAX blocksize supported (posix SPEC) */
  56. /* WARNING: increasing MAXBLK past 32256 */
  57. /* will violate posix spec. */
  58. #define MAXBLK_POSIX 32256 /* MAX blocksize supported as per POSIX */
  59. #define BLKMULT 512 /* blocksize must be even mult of 512 bytes */
  60. /* Don't even think of changing this */
  61. #define DEVBLK 8192 /* default read blksize for devices */
  62. #define FILEBLK 10240 /* default read blksize for files */
  63. #define PAXPATHLEN 3072 /* maximium path length for pax. MUST be */
  64. /*
  65. * defines and data structures common to all tar formats
  66. */
  67. #define CHK_LEN 8 /* length of checksum field */
  68. #define TNMSZ 100 /* size of name field */
  69. #define NULLCNT 2 /* number of null blocks in trailer */
  70. #define CHK_OFFSET 148 /* start of chksum field */
  71. #define BLNKSUM 256L /* sum of checksum field using ' ' */
  72. /*
  73. * General Defines
  74. */
  75. #define HEX 16
  76. #define OCT 8
  77. #define _PAX_ 1
  78. #define _TFILE_BASE "paxXXXXXXXXXX"
  79. /*
  80. * General Macros
  81. */
  82. #ifndef MIN
  83. #define MIN(a,b) (((a)<(b))?(a):(b))
  84. #endif
  85. #ifndef MAX
  86. #define MAX(a,b) (((a)>(b))?(a):(b))
  87. #endif
  88. #define MAJOR(x) major(x)
  89. #define MINOR(x) minor(x)
  90. #define TODEV(x, y) makedev((x), (y))
  91. /*
  92. * Values used in typeflag field in all tar formats
  93. * (only REGTYPE, LNKTYPE and SYMTYPE are used in old bsd tar headers)
  94. */
  95. #define REGTYPE '0' /* Regular File */
  96. #define AREGTYPE '\0' /* Regular File */
  97. #define LNKTYPE '1' /* Link */
  98. #define SYMTYPE '2' /* Symlink */
  99. #define CHRTYPE '3' /* Character Special File */
  100. #define BLKTYPE '4' /* Block Special File */
  101. #define DIRTYPE '5' /* Directory */
  102. #define FIFOTYPE '6' /* FIFO */
  103. #define CONTTYPE '7' /* high perf file */
  104. /*
  105. * GNU tar compatibility;
  106. */
  107. #define LONGLINKTYPE 'K' /* Long Symlink */
  108. #define LONGNAMETYPE 'L' /* Long File */
  109. #define EXTHEADERTYPE 'x' /* Extended header */
  110. /*
  111. * Pad with a bit mask, much faster than doing a mod but only works on powers
  112. * of 2. Macro below is for block of 512 bytes.
  113. */
  114. #define TAR_PAD(x) ((512 - ((x) & 511)) & 511)
  115. /*
  116. * Data Interchange Format - Extended tar header format - POSIX 1003.1-1990
  117. */
  118. #define TPFSZ 155
  119. #define TMAGIC "ustar" /* ustar and a null */
  120. #define TMAGLEN 6
  121. #define TVERSION "00" /* 00 and no null */
  122. #define TVERSLEN 2
  123. typedef struct {
  124. char name[TNMSZ]; /* name of entry */
  125. char mode[8]; /* mode */
  126. char uid[8]; /* uid */
  127. char gid[8]; /* gid */
  128. char size[12]; /* size */
  129. char mtime[12]; /* modification time */
  130. char chksum[CHK_LEN]; /* checksum */
  131. char typeflag; /* type of file. */
  132. char linkname[TNMSZ]; /* linked to name */
  133. char magic[TMAGLEN]; /* magic cookie */
  134. char version[TVERSLEN]; /* version */
  135. char uname[32]; /* ascii owner name */
  136. char gname[32]; /* ascii group name */
  137. char devmajor[8]; /* major device number */
  138. char devminor[8]; /* minor device number */
  139. char prefix[TPFSZ]; /* linked to name */
  140. } HD_USTAR;
  141. /*
  142. * Routines for manipulating headers, trailers:
  143. * asc_ul()
  144. * tar_trail()
  145. * tar_chksm()
  146. * ustar_id()
  147. */
  148. static unsigned long tar_chksm (char *, int);
  149. char *gnu_hack_string; /* GNU ././@LongLink hackery */
  150. char untrusted_namebuf[MAX_PATH_LENGTH];
  151. /*
  152. * asc_ul()
  153. * convert hex/octal character string into a u_long. We do not have to
  154. * check for overflow! (the headers in all supported formats are not large
  155. * enough to create an overflow).
  156. * NOTE: strings passed to us are NOT TERMINATED.
  157. * Return:
  158. * unsigned long value
  159. */
  160. u_long
  161. asc_ul (char *str, int len, int base)
  162. {
  163. char *stop;
  164. u_long tval = 0;
  165. stop = str + len;
  166. /*
  167. * skip over leading blanks and zeros
  168. */
  169. while ((str < stop) && ((*str == ' ') || (*str == '0')))
  170. ++str;
  171. /*
  172. * for each valid digit, shift running value (tval) over to next digit
  173. * and add next digit
  174. */
  175. if (base == HEX)
  176. {
  177. while (str < stop)
  178. {
  179. if ((*str >= '0') && (*str <= '9'))
  180. tval = (tval << 4) + (*str++ - '0');
  181. else if ((*str >= 'A') && (*str <= 'F'))
  182. tval = (tval << 4) + 10 + (*str++ - 'A');
  183. else if ((*str >= 'a') && (*str <= 'f'))
  184. tval = (tval << 4) + 10 + (*str++ - 'a');
  185. else
  186. break;
  187. }
  188. }
  189. else
  190. {
  191. while ((str < stop) && (*str >= '0') && (*str <= '7'))
  192. tval = (tval << 3) + (*str++ - '0');
  193. }
  194. return (tval);
  195. }
  196. /*
  197. * tar_trail()
  198. * Called to determine if a header block is a valid trailer. We are passed
  199. * the block, the in_sync flag (which tells us we are in resync mode;
  200. * looking for a valid header), and cnt (which starts at zero) which is
  201. * used to count the number of empty blocks we have seen so far.
  202. * Return:
  203. * 0 if a valid trailer, -1 if not a valid trailer, or 1 if the block
  204. * could never contain a header.
  205. */
  206. int
  207. tar_trail (char *buf,
  208. int in_resync, int *cnt)
  209. {
  210. register int i;
  211. /*
  212. * look for all zero, trailer is two consecutive blocks of zero
  213. */
  214. for (i = 0; i < BLKMULT; ++i)
  215. {
  216. if (buf[i] != '\0')
  217. break;
  218. }
  219. /*
  220. * if not all zero it is not a trailer, but MIGHT be a header.
  221. */
  222. if (i != BLKMULT)
  223. return (-1);
  224. /*
  225. * When given a zero block, we must be careful!
  226. * If we are not in resync mode, check for the trailer. Have to watch
  227. * out that we do not mis-identify file data as the trailer, so we do
  228. * NOT try to id a trailer during resync mode. During resync mode we
  229. * might as well throw this block out since a valid header can NEVER be
  230. * a block of all 0 (we must have a valid file name).
  231. */
  232. if (!in_resync && (++*cnt >= NULLCNT))
  233. return (0);
  234. return (1);
  235. }
  236. /*
  237. * tar_chksm()
  238. * calculate the checksum for a tar block counting the checksum field as
  239. * all blanks (BLNKSUM is that value pre-calculated, the sum of 8 blanks).
  240. * NOTE: we use len to short circuit summing 0's on write since we ALWAYS
  241. * pad headers with 0.
  242. * Return:
  243. * unsigned long checksum
  244. */
  245. static unsigned long
  246. tar_chksm (char *blk, int len)
  247. {
  248. char *stop;
  249. char *pt;
  250. unsigned int chksm = BLNKSUM; /* initial value is checksum field sum */
  251. /*
  252. * add the part of the block before the checksum field
  253. */
  254. pt = blk;
  255. stop = blk + CHK_OFFSET;
  256. while (pt < stop)
  257. chksm += (*pt++ & 0xff);
  258. /*
  259. * move past the checksum field and keep going, spec counts the
  260. * checksum field as the sum of 8 blanks (which is pre-computed as
  261. * BLNKSUM).
  262. * ASSUMED: len is greater than CHK_OFFSET. (len is where our 0 padding
  263. * starts, no point in summing zero's)
  264. */
  265. pt += CHK_LEN;
  266. stop = blk + len;
  267. while (pt < stop)
  268. chksm += (*pt++ & 0xff);
  269. return chksm;
  270. }
  271. /*
  272. * ustar_id()
  273. * determine if a block given to us is a valid ustar header. We have to
  274. * be on the lookout for those pesky blocks of all zero's
  275. * Return:
  276. * 0 if a ustar header, -1 otherwise
  277. */
  278. int
  279. ustar_id (char *blk, size_t size)
  280. {
  281. HD_USTAR *hd;
  282. if (size < BLKMULT)
  283. return (-1);
  284. hd = (HD_USTAR *) blk;
  285. /*
  286. * check for block of zero's first, a simple and fast test then check
  287. * ustar magic cookie. We should use TMAGLEN, but some USTAR archive
  288. * programs are fouled up and create archives missing the \0. Last we
  289. * check the checksum. If ok we have to assume it is a valid header.
  290. */
  291. if (hd->name[0] == '\0')
  292. return (-1);
  293. if (strncmp (hd->magic, TMAGIC, TMAGLEN - 1) != 0)
  294. return (-1);
  295. if (asc_ul (hd->chksum, sizeof (hd->chksum), OCT) !=
  296. tar_chksm (blk, BLKMULT))
  297. return (-1);
  298. return (0);
  299. }
  300. /*
  301. * Routines for reading tar files
  302. // Source: http://www.mkssoftware.com/docs/man4/pax.4.asp
  303. struct file_header { // PAX header is similar as file_header and can be completely ignored
  304. unsigned char[100] name;
  305. unsigned char[8] mode;
  306. unsigned char[8] uid; // unused
  307. unsigned char[8] gid; // unused
  308. unsigned char[12] size; // 0 if file is a link
  309. unsigned char[12] mtime;
  310. unsigned char[8] chksum;
  311. unsigned char[1] typeflag;
  312. unsigned char[100] linkname;
  313. unsigned char[6] magic; //ustar
  314. unsigned char[2] version; // 00
  315. unsigned char[32] uname; // unused
  316. unsigned char[32] gname; // unused
  317. unsigned char[8] devmajor; // unused ?
  318. unsigned char[8] devminor; // unused ?
  319. unsigned char[155] prefix; // only used for files > 100 characters. could be unused ?
  320. };
  321. enum {
  322. TYPE_REGULAR, //0
  323. TYPE_ARCHIVE_LINK, //1
  324. TYPE_SYMLINK, //2
  325. TYPE_CHARACTER_DEVICE, //3
  326. TYPE_BLOCK_DEVICE, //4
  327. TYPE_DIRECTORY, //5
  328. TYPE_FIFO, //6
  329. // Other types:
  330. TYPE_EXTENDED_USAGE, //xxxxx
  331. // A-Z are available for custom usage
  332. };
  333. // Extended attribute:
  334. // length keyword=value
  335. // atime, charset, comment, gname, linkpath, mtime, path, size, uname
  336. */
  337. enum {
  338. NEED_NOTHING,
  339. NEED_SKIP,
  340. NEED_READ,
  341. NEED_SYNC_TRAIL,
  342. INVALID_HEADER,
  343. MEMORY_ALLOC_FAILED,
  344. };
  345. /*
  346. * ustar_rd()
  347. * extract the values out of block already determined to be a ustar header.
  348. * store the values in the ARCHD parameter.
  349. * Return:
  350. * 0
  351. */
  352. int n_dirs = 0;
  353. char ** dirs_headers_sent = NULL;
  354. int
  355. ustar_rd (int fd, struct file_header * untrusted_hdr, char *buf, struct stat * sb)
  356. {
  357. register HD_USTAR *hd;
  358. register char *dest;
  359. register int cnt = 0;
  360. int ret;
  361. /* DISABLED: unused
  362. dev_t devmajor;
  363. dev_t devminor;
  364. */
  365. /*
  366. * we only get proper sized buffers
  367. */
  368. fprintf(stderr,"Checking if valid header\n");
  369. if (ustar_id (buf, BLKMULT) < 0) {
  370. fprintf (stderr,"Invalid header\n");
  371. return INVALID_HEADER;
  372. }
  373. fprintf(stderr,"Valid header!\n");
  374. /* DISABLED: Internal to PAX
  375. arcn->org_name = arcn->name;
  376. arcn->sb.st_nlink = 1;
  377. arcn->pat = NULL;
  378. arcn->nlen = 0;
  379. */
  380. untrusted_hdr->namelen = 0;
  381. hd = (HD_USTAR *) buf;
  382. /*
  383. * see if the filename is split into two parts. if, so joint the parts.
  384. * we copy the prefix first and add a / between the prefix and name.
  385. */
  386. dest = untrusted_namebuf;
  387. if (*(hd->prefix) != '\0')
  388. {
  389. cnt = strlen(strncpy (dest, hd->prefix,
  390. MIN(sizeof (untrusted_namebuf) - 1,TPFSZ+1)));
  391. dest += cnt;
  392. *dest++ = '/';
  393. cnt++;
  394. }
  395. if (gnu_hack_string)
  396. {
  397. untrusted_hdr->namelen = cnt + strlen(strncpy (dest, gnu_hack_string,
  398. MIN(TNMSZ+1, sizeof (untrusted_namebuf) - cnt)));
  399. free(gnu_hack_string);
  400. gnu_hack_string = NULL;
  401. } else
  402. untrusted_hdr->namelen = cnt + strlen(strncpy (dest, hd->name,
  403. MIN(TNMSZ+1, sizeof (untrusted_namebuf) - cnt)));
  404. // qfile count the \0 in the namelen
  405. untrusted_hdr->namelen += 1;
  406. fprintf(stderr,"Retrieved name len: %d\n",untrusted_hdr->namelen);
  407. fprintf(stderr,"Retrieved name: %s\n",untrusted_namebuf);
  408. /*
  409. * follow the spec to the letter. we should only have mode bits, strip
  410. * off all other crud we may be passed.
  411. */
  412. sb->st_mode = (mode_t) (asc_ul (hd->mode, sizeof (hd->mode), OCT) &
  413. 0xfff);
  414. untrusted_hdr->mode = sb->st_mode;
  415. #if defined(_FILE_OFFSET_BITS) && _FILE_OFFSET_BITS == 64
  416. sb->st_size = (off_t) asc_uqd (hd->size, sizeof (hd->size), OCT);
  417. #else
  418. sb->st_size = (off_t) asc_ul (hd->size, sizeof (hd->size), OCT);
  419. #endif
  420. untrusted_hdr->filelen = sb->st_size;
  421. untrusted_hdr->atime = (time_t) asc_ul (hd->mtime, sizeof (hd->mtime), OCT);
  422. untrusted_hdr->mtime = untrusted_hdr->atime;
  423. untrusted_hdr->atime_nsec = untrusted_hdr->mtime_nsec = 0;
  424. sb->st_mtime = (time_t) asc_ul (hd->mtime, sizeof (hd->mtime), OCT);
  425. sb->st_ctime = sb->st_atime = sb->st_mtime;
  426. /*
  427. * If we can find the ascii names for gname and uname in the password
  428. * and group files we will use the uid's and gid they bind. Otherwise
  429. * we use the uid and gid values stored in the header. (This is what
  430. * the posix spec wants).
  431. */
  432. /* DISABLED: unused
  433. hd->gname[sizeof (hd->gname) - 1] = '\0';
  434. if (gid_name (hd->gname, &(arcn->sb.st_gid)) < 0)
  435. arcn->sb.st_gid = (gid_t) asc_ul (hd->gid, sizeof (hd->gid), OCT);
  436. hd->uname[sizeof (hd->uname) - 1] = '\0';
  437. if (uid_name (hd->uname, &(arcn->sb.st_uid)) < 0)
  438. arcn->sb.st_uid = (uid_t) asc_ul (hd->uid, sizeof (hd->uid), OCT);
  439. */
  440. /*
  441. * set the defaults, these may be changed depending on the file type
  442. */
  443. /* Disabled: pax specific
  444. arcn->ln_name[0] = '\0';
  445. arcn->ln_nlen = 0;
  446. arcn->pad = 0;
  447. arcn->skip = 0;
  448. arcn->sb.st_rdev = (dev_t) 0;
  449. */
  450. /*
  451. * set the mode and PAX type according to the typeflag in the header
  452. */
  453. switch (hd->typeflag)
  454. {
  455. case FIFOTYPE:
  456. fprintf(stderr,"File is FIFOTYPE\n");
  457. /* DISABLED: unused
  458. arcn->type = PAX_FIF;
  459. arcn->sb.st_mode |= S_IFIFO;
  460. */
  461. break;
  462. case DIRTYPE:
  463. fprintf(stderr,"File is DIRTYPE\n");
  464. /* DISABLED: unused
  465. arcn->type = PAX_DIR;
  466. arcn->sb.st_mode |= S_IFDIR;
  467. arcn->sb.st_nlink = 2;
  468. */
  469. /*
  470. * Some programs that create ustar archives append a '/'
  471. * to the pathname for directories. This clearly violates
  472. * ustar specs, but we will silently strip it off anyway.
  473. */
  474. /*
  475. if (arcn->name[arcn->nlen - 1] == '/')
  476. arcn->name[--arcn->nlen] = '\0';
  477. */
  478. break;
  479. case BLKTYPE:
  480. fprintf(stderr,"File is BLKTYPE\n");
  481. break;
  482. case CHRTYPE:
  483. fprintf(stderr,"File is CHRTYPE\n");
  484. /*
  485. * this type requires the rdev field to be set.
  486. */
  487. if (hd->typeflag == BLKTYPE)
  488. {
  489. /*
  490. arcn->type = PAX_BLK;
  491. arcn->sb.st_mode |= S_IFBLK;
  492. */
  493. }
  494. else
  495. {
  496. /*
  497. arcn->type = PAX_CHR;
  498. arcn->sb.st_mode |= S_IFCHR;
  499. */
  500. }
  501. /* DISABLED: unused
  502. devmajor = (dev_t) asc_ul (hd->devmajor, sizeof (hd->devmajor), OCT);
  503. devminor = (dev_t) asc_ul (hd->devminor, sizeof (hd->devminor), OCT);
  504. */
  505. // arcn->sb.st_rdev = TODEV (devmajor, devminor);
  506. break;
  507. case SYMTYPE:
  508. fprintf(stderr,"File is SYMTYPE\n");
  509. break;
  510. case LNKTYPE:
  511. fprintf(stderr,"File is LNKTYPE\n");
  512. if (hd->typeflag == SYMTYPE)
  513. {
  514. // arcn->type = PAX_SLK;
  515. // arcn->sb.st_mode |= S_IFLNK;
  516. }
  517. else
  518. {
  519. // arcn->type = PAX_HLK;
  520. /*
  521. * so printing looks better
  522. */
  523. // arcn->sb.st_mode |= S_IFREG;
  524. // arcn->sb.st_nlink = 2;
  525. }
  526. /*
  527. * copy the link name
  528. */
  529. // arcn->ln_nlen = strlcpy (arcn->ln_name, hd->linkname,
  530. // MIN(TNMSZ+1,sizeof (arcn->ln_name)));
  531. break;
  532. case LONGLINKTYPE:
  533. fprintf(stderr,"File is LONGLINKTYPE\n");
  534. break;
  535. case LONGNAMETYPE:
  536. fprintf(stderr,"File is LONGNAMETYPE\n");
  537. /*
  538. * GNU long link/file; we tag these here and let the
  539. * pax internals deal with it -- too ugly otherwise.
  540. */
  541. // arcn->type =
  542. // hd->typeflag == LONGLINKTYPE ? PAX_GLL : PAX_GLF;
  543. // arcn->pad = TAR_PAD(arcn->sb.st_size);
  544. // arcn->skip = arcn->sb.st_size;
  545. // arcn->ln_name[0] = '\0';
  546. // arcn->ln_nlen = 0;
  547. break;
  548. case CONTTYPE:
  549. fprintf(stderr,"File is CONTTYPE\n");
  550. break;
  551. case AREGTYPE:
  552. fprintf(stderr,"File is AREGTYPE\n");
  553. break;
  554. case REGTYPE:
  555. fprintf(stderr,"File is REGTYPE of size %d\n",sb->st_size);
  556. // Create a copy of untrusted_namebuf to be used for strtok
  557. char * dirbuf;
  558. dirbuf = malloc(sizeof (char) * (untrusted_hdr->namelen));
  559. if (dirbuf == NULL)
  560. return MEMORY_ALLOC_FAILED;
  561. dirbuf = strncpy(dirbuf, untrusted_namebuf, untrusted_hdr->namelen);
  562. int i = 0;
  563. int dir_found = 0;
  564. size_t pathsize = 0;
  565. char * path = NULL;
  566. struct file_header dir_header;
  567. // Split the path in directories and recompose it incrementally
  568. char * last_token = strtok(dirbuf,"/");
  569. char * token = strtok(NULL, "/");
  570. while (token != NULL) {
  571. fprintf(stderr,"Found directory %s (last:%s)\n",token,last_token);
  572. // Recompose the path based on last discovered directory
  573. if (path == NULL) {
  574. path = malloc(sizeof (char) * (strlen(last_token)+1));
  575. if (path == NULL)
  576. return MEMORY_ALLOC_FAILED;
  577. path = strncpy(path, last_token, strlen(last_token));
  578. path[strlen(last_token)] = '\0';
  579. } else {
  580. pathsize = strlen(path);
  581. path = realloc(path, sizeof (char) * (strlen(path)+1+strlen(last_token)+1));
  582. if (path == NULL)
  583. return MEMORY_ALLOC_FAILED;
  584. path[pathsize] = '/';
  585. strncpy(path+pathsize+1, last_token, strlen(last_token));
  586. path[pathsize+strlen(last_token)+1] = '\0';
  587. }
  588. fprintf(stderr,"Path is %s\n",path);
  589. fprintf(stderr,"Checking from i=0 i<%d\n",n_dirs);
  590. // Verify if qfile headers for the current path have already been sent based on the dirs_headers_sent table
  591. dir_found = 0;
  592. for (i = 0; i < n_dirs; ++i) {
  593. fprintf(stderr,"Comparing with %d %d %s %s\n",i,n_dirs,dirs_headers_sent[i],path);
  594. if (strcmp(dirs_headers_sent[i],path)==0) {
  595. fprintf(stderr,"Directory headers already sent\n");
  596. dir_found=1;
  597. }
  598. }
  599. if (dir_found == 0) {
  600. // Register the current path as being sent in the dirs_headers_sent table
  601. fprintf(stderr,"Inserting %s into register\n",path);
  602. dirs_headers_sent = realloc(dirs_headers_sent, sizeof (char*) * n_dirs++);
  603. if (dirs_headers_sent == NULL)
  604. return MEMORY_ALLOC_FAILED;
  605. dirs_headers_sent[n_dirs-1] = malloc(sizeof (char) * (strlen(path)+1));
  606. if (dirs_headers_sent[n_dirs-1] == NULL)
  607. return MEMORY_ALLOC_FAILED;
  608. strncpy(dirs_headers_sent[n_dirs-1], path, strlen(path)+1);
  609. // Initialize the qfile headers for the current directory path
  610. dir_header.namelen = strlen(path)+1;
  611. dir_header.atime = untrusted_hdr->atime;
  612. dir_header.atime_nsec = untrusted_hdr->atime_nsec;
  613. dir_header.mtime = untrusted_hdr->mtime;
  614. dir_header.mtime_nsec = untrusted_hdr->mtime_nsec;
  615. dir_header.mode = untrusted_hdr->mode | S_IFDIR;
  616. dir_header.filelen = 0;
  617. fprintf(stderr,"Sending directory headers for %s\n",path);
  618. // Send the qfile headers for the current directory path
  619. write_headers(&dir_header, path);
  620. }
  621. last_token = token;
  622. token = strtok(NULL, "/");
  623. }
  624. free(path);
  625. free(dirbuf);
  626. fprintf(stderr,"End of directory checks\n");
  627. // Restore POSIX stat file mode (because PAX format use its own file type)
  628. untrusted_hdr->mode |= S_IFREG;
  629. fprintf(stderr,"Writing file header\n");
  630. // Send header and file content
  631. write_headers(untrusted_hdr, untrusted_namebuf);
  632. fprintf(stderr,"Writing file content\n");
  633. ret = copy_file(1, fd, untrusted_hdr->filelen, &crc32_sum);
  634. fprintf(stderr,"Copyfile returned with error %d\n",ret);
  635. if (ret != COPY_FILE_OK) {
  636. if (ret != COPY_FILE_WRITE_ERROR)
  637. gui_fatal("Copying file %s: %s", untrusted_namebuf,
  638. copy_file_status_to_str(ret));
  639. else {
  640. fprintf(stderr,"UNKNOWN ERROR RETURN STATUS:%d\n.. Waiting...\n",ret);
  641. set_block(0);
  642. wait_for_result();
  643. exit(1);
  644. }
  645. }
  646. // Extract extra padding
  647. fprintf(stderr,"Need to remove pad:%d %d\n",sb->st_size,BLKMULT-(sb->st_size%BLKMULT));
  648. ret = read(fd, buf, BLKMULT-(sb->st_size%BLKMULT));
  649. fprintf(stderr,"Removed %d bytes of padding\n",ret);
  650. // Resync trailing headers in order to find next file chunck in the tar file
  651. return NEED_SYNC_TRAIL;
  652. break;
  653. case EXTHEADERTYPE:
  654. fprintf(stderr,"Extended HEADER encountered\n");
  655. return NEED_SKIP;
  656. break;
  657. default:
  658. fprintf(stderr,"Default type detected:%c\n",hd->typeflag);
  659. return NEED_SKIP;
  660. /*
  661. * these types have file data that follows. Set the skip and
  662. * pad fields.
  663. */
  664. // arcn->type = PAX_REG;
  665. // arcn->pad = TAR_PAD (arcn->sb.st_size);
  666. // arcn->skip = arcn->sb.st_size;
  667. // arcn->sb.st_mode |= S_IFREG;
  668. break;
  669. }
  670. return NEED_SKIP;
  671. }
  672. int tar_file_processor(int fd)
  673. {
  674. int ret;
  675. int i;
  676. int current;
  677. struct file_header hdr;
  678. struct stat sb; /* stat buffer see stat(2) */
  679. char buf[BLKMULT+1];
  680. size_t size;
  681. i=0;
  682. current = NEED_READ;
  683. size_t to_skip = 0;
  684. int sync_count = 0;
  685. while (size = read(fd, &buf, BLKMULT)) {
  686. if (size != -1) {
  687. fprintf(stderr,"Read %d bytes\n",size);
  688. ret = 0;
  689. if (current==NEED_SYNC_TRAIL) {
  690. ret = tar_trail (buf, 1, &sync_count);
  691. fprintf(stderr,"Synchronizing trail: %d %d\n",ret,sync_count);
  692. if (ret != 1) {
  693. current = NEED_READ;
  694. }
  695. }
  696. if (current==NEED_READ) {
  697. current = ustar_rd(fd, &hdr, &buf, &sb);
  698. fprintf(stderr,"Return %d\n",ret);
  699. }
  700. if (current==NEED_SKIP) {
  701. fprintf(stderr,"Need to skip %d bytes\n",sb.st_size);
  702. to_skip = sb.st_size;
  703. while (to_skip > 0) {
  704. to_skip -= read(fd, &buf, MIN(to_skip,BLKMULT));
  705. }
  706. // Extract extra padding
  707. fprintf(stderr,"Need to remove pad:%d %d %d\n",to_skip,sb.st_size,BLKMULT-(sb.st_size%BLKMULT));
  708. ret = read(fd, &buf, BLKMULT-(sb.st_size%BLKMULT));
  709. fprintf(stderr,"Removed %d bytes of padding\n",ret);
  710. current = NEED_READ;
  711. }
  712. i++;
  713. }
  714. //if (i >= 10)
  715. // exit(0);
  716. }
  717. }
  718. int main(int argc, char **argv)
  719. {
  720. int i;
  721. char *entry;
  722. char *cwd;
  723. char *sep;
  724. int fd;
  725. signal(SIGPIPE, SIG_IGN);
  726. // this will allow checking for possible feedback packet in the middle of transfer
  727. // if disabled, the copy_file process could hang
  728. notify_progress(0, PROGRESS_FLAG_INIT);
  729. //set_size_limit(1500000000, 2048);
  730. crc32_sum = 0;
  731. cwd = getcwd(NULL, 0);
  732. for (i = 1; i < argc; i++) {
  733. set_nonblock(0);
  734. if (strcmp(argv[i], "--ignore-symlinks")==0) {
  735. ignore_symlinks = 1;
  736. continue;
  737. } else {
  738. // Parse tar file
  739. entry = argv[i];
  740. fprintf(stderr,"Parsing file %s\n",entry);
  741. fd = open(entry, O_RDONLY);
  742. if (fd < 0)
  743. fprintf(stderr,"Error opening file %s\n",entry);
  744. tar_file_processor(fd);
  745. }
  746. }
  747. if (i <= 1) {
  748. // No argument specified. Use STDIN
  749. fprintf(stderr,"Using STDIN\n");
  750. set_block(0);
  751. tar_file_processor(fileno(stdin));
  752. }
  753. //notify_end_and_wait_for_result();
  754. notify_progress(0, PROGRESS_FLAG_DONE);
  755. return 0;
  756. }