| #include <u.h> | 
 | #include <libc.h> | 
 | #include <auth.h> | 
 | #include <fcall.h> | 
 | #include <thread.h> | 
 |  | 
 | int post9p(int, char*); | 
 | int debug; | 
 | char *aname = ""; | 
 | char *keypattern = ""; | 
 | int fd; | 
 | int msize; | 
 | int doauth; | 
 | u32int afid = NOFID; | 
 | extern char *post9parg;	/* clumsy hack */ | 
 | void xauth(void); | 
 | AuthInfo* xauth_proxy(AuthGetkey *getkey, char *fmt, ...); | 
 |  | 
 | void | 
 | usage(void) | 
 | { | 
 | 	fprint(2, "usage: srv [-a] [-A aname] [-k keypattern] addr [srvname]\n"); | 
 | 	threadexitsall("usage"); | 
 | } | 
 |  | 
 | void | 
 | threadmain(int argc, char **argv) | 
 | { | 
 | 	char *addr, *service; | 
 |  | 
 | 	fmtinstall('F', fcallfmt); | 
 | 	fmtinstall('M', dirmodefmt); | 
 | 	 | 
 | 	ARGBEGIN{ | 
 | 	case 'D': | 
 | 		debug = 1; | 
 | 		break; | 
 | 	case 'A': | 
 | 		/* BUG: should be able to repeat this and establish multiple afids */ | 
 | 		aname = EARGF(usage()); | 
 | 		break; | 
 | 	case 'a': | 
 | 		doauth = 1; | 
 | 		break; | 
 | 	case 'n': | 
 | 		doauth = -1; | 
 | 		break; | 
 | 	case 'k': | 
 | 		keypattern = EARGF(usage()); | 
 | 		break; | 
 | 	default: | 
 | 		usage(); | 
 | 	}ARGEND | 
 | 	 | 
 | 	if(argc != 1 && argc != 2) | 
 | 		usage(); | 
 |  | 
 | 	addr = netmkaddr(argv[0], "tcp", "9fs"); | 
 | 	if((fd = dial(addr, nil, nil, nil)) < 0) | 
 | 		sysfatal("dial %s: %r", addr); | 
 |  | 
 | 	if(doauth > 0) | 
 | 		xauth(); | 
 |  | 
 | 	if(argc == 2) | 
 | 		service = argv[1]; | 
 | 	else | 
 | 		service = argv[0]; | 
 |  | 
 | 	rfork(RFNOTEG); | 
 | 	if(post9p(fd, service) < 0) | 
 | 		sysfatal("post9p: %r"); | 
 |  | 
 | 	threadexitsall(0); | 
 | } | 
 |  | 
 | void | 
 | do9p(Fcall *tx, Fcall *rx) | 
 | { | 
 | 	static uchar buf[9000]; | 
 | 	static char ebuf[200]; | 
 | 	int n; | 
 | 	 | 
 | 	n = convS2M(tx, buf, sizeof buf); | 
 | 	if(n == BIT16SZ){ | 
 | 		werrstr("convS2M failed"); | 
 | 		goto err; | 
 | 	} | 
 | 	if(debug) | 
 | 		fprint(2, "<- %F\n", tx); | 
 | 	if(write(fd, buf, n) != n) | 
 | 		goto err; | 
 | 	if((n = read9pmsg(fd, buf, sizeof buf)) < 0) | 
 | 		goto err; | 
 | 	if(n == 0){ | 
 | 		werrstr("unexpected eof"); | 
 | 		goto err; | 
 | 	} | 
 | 	if(convM2S(buf, n, rx) != n){ | 
 | 		werrstr("convM2S failed"); | 
 | 		goto err; | 
 | 	} | 
 | 	if(debug) | 
 | 		fprint(2, "-> %F\n", rx); | 
 | 	if(rx->type != Rerror && rx->type != tx->type+1){ | 
 | 		werrstr("unexpected type"); | 
 | 		goto err; | 
 | 	} | 
 | 	if(rx->tag != tx->tag){ | 
 | 		werrstr("unexpected tag"); | 
 | 		goto err; | 
 | 	} | 
 | 	return; | 
 |  | 
 | err: | 
 | 	rerrstr(ebuf, sizeof ebuf); | 
 | 	rx->ename = ebuf; | 
 | 	rx->type = Rerror; | 
 | 	return; | 
 | } | 
 |  | 
 | void | 
 | xauth(void) | 
 | { | 
 | 	Fcall tx, rx; | 
 |  | 
 | 	afid = 0; | 
 | 	tx.type = Tversion; | 
 | 	tx.tag = NOTAG; | 
 | 	tx.version = "9P2000"; | 
 | 	tx.msize = 8192; | 
 | 	do9p(&tx, &rx); | 
 | 	if(rx.type == Rerror) | 
 | 		sysfatal("Tversion: %s", rx.ename); | 
 | 	msize = rx.msize; | 
 | 	 | 
 | 	tx.type = Tauth; | 
 | 	tx.tag = 1; | 
 | 	tx.afid = afid; | 
 | 	tx.uname = getuser(); | 
 | 	tx.aname = aname; | 
 | 	do9p(&tx, &rx); | 
 | 	if(rx.type == Rerror){ | 
 | 		fprint(2, "rx: %s\n", rx.ename); | 
 | 		afid = NOFID; | 
 | 		return; | 
 | 	} | 
 |  | 
 | 	if(xauth_proxy(auth_getkey, "proto=p9any role=client %s", keypattern) == nil) | 
 | 		sysfatal("authproxy: %r"); | 
 | } | 
 |  | 
 | int | 
 | xread(void *buf, int n) | 
 | { | 
 | 	Fcall tx, rx; | 
 | 	 | 
 | 	tx.type = Tread; | 
 | 	tx.tag = 1; | 
 | 	tx.fid = 0;	/* afid above */ | 
 | 	tx.count = n; | 
 | 	tx.offset = 0; | 
 | 	do9p(&tx, &rx); | 
 | 	if(rx.type == Rerror){ | 
 | 		werrstr("%s", rx.ename); | 
 | 		return -1; | 
 | 	} | 
 | 	 | 
 | 	if(rx.count > n){ | 
 | 		werrstr("too much data returned"); | 
 | 		return -1; | 
 | 	} | 
 | 	memmove(buf, rx.data, rx.count); | 
 | 	return rx.count; | 
 | } | 
 |  | 
 | int | 
 | xwrite(void *buf, int n) | 
 | { | 
 | 	Fcall tx, rx; | 
 | 	 | 
 | 	tx.type = Twrite; | 
 | 	tx.tag = 1; | 
 | 	tx.fid = 0;	/* afid above */ | 
 | 	tx.data = buf; | 
 | 	tx.count = n; | 
 | 	tx.offset = 0; | 
 | 	do9p(&tx, &rx); | 
 | 	if(rx.type == Rerror){ | 
 | 		werrstr("%s", rx.ename); | 
 | 		return -1; | 
 | 	} | 
 | 	return n; | 
 | } | 
 |  | 
 |  | 
 | /* | 
 |  * changed to add -A below | 
 |  */ | 
 | #undef _exits | 
 | int | 
 | post9p(int fd, char *name) | 
 | { | 
 | 	int i; | 
 | 	char *ns, *s; | 
 | 	Waitmsg *w; | 
 |  | 
 | 	if((ns = getns()) == nil) | 
 | 		return -1; | 
 |  | 
 | 	s = smprint("unix!%s/%s", ns, name); | 
 | 	free(ns); | 
 | 	if(s == nil) | 
 | 		return -1; | 
 | 	switch(fork()){ | 
 | 	case -1: | 
 | 		return -1; | 
 | 	case 0: | 
 | 		dup(fd, 0); | 
 | 		dup(fd, 1); | 
 | 		for(i=3; i<20; i++) | 
 | 			close(i); | 
 | 		if(doauth > 0) | 
 | 			execlp("9pserve", "9pserve", "-u", | 
 | 				"-M", | 
 | 					smprint("%d", msize), | 
 | 				"-A", | 
 | 					aname, | 
 | 					smprint("%d", afid), | 
 | 				s, (char*)0); | 
 | 		else | 
 | 			execlp("9pserve", "9pserve", | 
 | 				doauth < 0 ? "-nu" : "-u", s, (char*)0); | 
 | 		fprint(2, "exec 9pserve: %r\n"); | 
 | 		_exits("exec"); | 
 | 	default: | 
 | 		w = wait(); | 
 | 		if(w == nil) | 
 | 			return -1; | 
 | 		close(fd); | 
 | 		free(s); | 
 | 		if(w->msg && w->msg[0]){ | 
 | 			free(w); | 
 | 			werrstr("9pserve failed"); | 
 | 			return -1; | 
 | 		} | 
 | 		free(w); | 
 | 		return 0; | 
 | 	} | 
 | } | 
 |  | 
 | enum { ARgiveup = 100 }; | 
 | static int | 
 | dorpc(AuthRpc *rpc, char *verb, char *val, int len, AuthGetkey *getkey) | 
 | { | 
 | 	int ret; | 
 |  | 
 | 	for(;;){ | 
 | 		if((ret = auth_rpc(rpc, verb, val, len)) != ARneedkey && ret != ARbadkey) | 
 | 			return ret; | 
 | 		if(getkey == nil) | 
 | 			return ARgiveup;	/* don't know how */ | 
 | 		if((*getkey)(rpc->arg) < 0) | 
 | 			return ARgiveup;	/* user punted */ | 
 | 	} | 
 | } | 
 |  | 
 |  | 
 | /* | 
 |  *  this just proxies what the factotum tells it to. | 
 |  */ | 
 | AuthInfo* | 
 | xfauth_proxy(AuthRpc *rpc, AuthGetkey *getkey, char *params) | 
 | { | 
 | 	char *buf; | 
 | 	int m, n, ret; | 
 | 	AuthInfo *a; | 
 | 	char oerr[ERRMAX]; | 
 |  | 
 | 	rerrstr(oerr, sizeof oerr); | 
 | 	werrstr("UNKNOWN AUTH ERROR"); | 
 |  | 
 | 	if(dorpc(rpc, "start", params, strlen(params), getkey) != ARok){ | 
 | 		werrstr("fauth_proxy start: %r"); | 
 | 		return nil; | 
 | 	} | 
 |  | 
 | 	buf = malloc(AuthRpcMax); | 
 | 	if(buf == nil) | 
 | 		return nil; | 
 | 	for(;;){ | 
 | 		switch(dorpc(rpc, "read", nil, 0, getkey)){ | 
 | 		case ARdone: | 
 | 			free(buf); | 
 | 			a = auth_getinfo(rpc); | 
 | 			errstr(oerr, sizeof oerr);	/* no error, restore whatever was there */ | 
 | 			return a; | 
 | 		case ARok: | 
 | 			if(xwrite(rpc->arg, rpc->narg) != rpc->narg){ | 
 | 				werrstr("auth_proxy write fid: %r"); | 
 | 				goto Error; | 
 | 			} | 
 | 			break; | 
 | 		case ARphase: | 
 | 			n = 0; | 
 | 			memset(buf, 0, AuthRpcMax); | 
 | 			while((ret = dorpc(rpc, "write", buf, n, getkey)) == ARtoosmall){ | 
 | 				if(atoi(rpc->arg) > AuthRpcMax) | 
 | 					break; | 
 | 				m = xread(buf+n, atoi(rpc->arg)-n); | 
 | 				if(m <= 0){ | 
 | 					if(m == 0) | 
 | 						werrstr("auth_proxy short read: %s", buf); | 
 | 					goto Error; | 
 | 				} | 
 | 				n += m; | 
 | 			} | 
 | 			if(ret != ARok){ | 
 | 				werrstr("auth_proxy rpc write: %s: %r", buf); | 
 | 				goto Error; | 
 | 			} | 
 | 			break; | 
 | 		default: | 
 | 			werrstr("auth_proxy rpc: %r"); | 
 | 			goto Error; | 
 | 		} | 
 | 	} | 
 | Error: | 
 | 	free(buf); | 
 | 	return nil; | 
 | } | 
 |  | 
 | AuthInfo* | 
 | xauth_proxy(AuthGetkey *getkey, char *fmt, ...) | 
 | { | 
 | 	char *p; | 
 | 	va_list arg; | 
 | 	AuthInfo *ai; | 
 | 	AuthRpc *rpc; | 
 |  | 
 | 	quotefmtinstall();	/* just in case */ | 
 | 	va_start(arg, fmt); | 
 | 	p = vsmprint(fmt, arg); | 
 | 	va_end(arg); | 
 |  | 
 | 	rpc = auth_allocrpc(); | 
 | 	if(rpc == nil){ | 
 | 		free(p); | 
 | 		return nil; | 
 | 	} | 
 |  | 
 | 	ai = xfauth_proxy(rpc, getkey, p); | 
 | 	free(p); | 
 | 	auth_freerpc(rpc); | 
 | 	return ai; | 
 | } | 
 |  |