2 * Copyright (c) 2021, 2022 Omar Polo <op@omarpolo.com>
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19 #include <sys/ioctl.h>
20 #include <sys/types.h>
21 #include <sys/socket.h>
41 #include <readline/readline.h>
42 #include <readline/history.h>
52 #define TMPFSTR "/tmp/kamiftp.XXXXXXXXXX"
53 #define TMPFSTRLEN sizeof(TMPFSTR)
61 struct tls_config *tlsconf;
65 struct evbuffer *dirbuf;
70 volatile sig_atomic_t resized;
82 #define ASSERT_EMPTYBUF() assert(EVBUFFER_LENGTH(buf) == 0)
85 read_line(const char *prompt)
90 if ((line = readline(prompt)) == NULL)
92 /* XXX: trim spaces? */
103 spawn(const char *argv0, ...)
108 const char *argv[16], *last;
111 memset(argv, 0, sizeof(argv));
115 for (i = 1; i < nitems(argv); ++i) {
116 last = va_arg(ap, const char *);
123 assert(last == NULL);
125 switch (pid = fork()) {
129 execvp(argv[0], (char *const *)argv);
132 waitpid(pid, &status, 0);
137 tty_resized(int signo)
145 fprintf(stderr, "usage: %s [-C cert] [-K key] [-o output] "
146 "[9p://][user@]host[:port][/path]\n", getprogname());
147 fprintf(stderr, "kamid suite version " KAMID_VERSION "\n");
170 hexdump("outgoing message", EVBUFFER_DATA(evb),
171 EVBUFFER_LENGTH(evb));
173 while (EVBUFFER_LENGTH(evb) != 0) {
174 buf = EVBUFFER_DATA(evb);
175 nbytes = EVBUFFER_LENGTH(evb);
178 r = write(sock, buf, nbytes);
179 if (r == 0 || r == -1)
182 r = tls_write(ctx, buf, nbytes);
183 if (r == TLS_WANT_POLLIN || r == TLS_WANT_POLLOUT)
186 errx(1, "tls: %s", tls_error(ctx));
189 evbuffer_drain(evb, r);
194 mustread(void *d, size_t len)
200 r = read(sock, d, len);
201 if (r == 0 || r == -1)
204 r = tls_read(ctx, d, len);
205 if (r == TLS_WANT_POLLIN || r == TLS_WANT_POLLOUT)
208 errx(1, "tls: %s", tls_error(ctx));
222 mustread(&len, sizeof(len));
224 if (len < HEADERSIZE)
225 errx(1, "read message of invalid length %d", len);
227 len -= 4; /* skip the length just read */
230 l = MIN(len, sizeof(tmp));
233 evbuffer_add(buf, tmp, l);
237 hexdump("incoming packet", EVBUFFER_DATA(buf),
238 EVBUFFER_LENGTH(buf));
242 np_read64(struct evbuffer *buf)
246 evbuffer_remove(buf, &n, sizeof(n));
251 np_read32(struct evbuffer *buf)
255 evbuffer_remove(buf, &n, sizeof(n));
260 np_read16(struct evbuffer *buf)
264 evbuffer_remove(buf, &n, sizeof(n));
269 np_read8(struct evbuffer *buf)
273 evbuffer_remove(buf, &n, sizeof(n));
278 np_readstr(struct evbuffer *buf)
283 len = np_read16(buf);
284 assert(EVBUFFER_LENGTH(buf) >= len);
286 if ((str = calloc(1, len+1)) == NULL)
288 evbuffer_remove(buf, str, len);
293 np_read_qid(struct evbuffer *buf, struct qid *qid)
295 assert(EVBUFFER_LENGTH(buf) >= QIDSIZE);
297 qid->type = np_read8(buf);
298 qid->vers = np_read32(buf);
299 qid->path = np_read64(buf);
303 np_read_stat(struct evbuffer *buf, struct np_stat *st)
307 memset(st, 0, sizeof(*st));
309 size = np_read16(buf);
310 if (size > EVBUFFER_LENGTH(buf))
313 st->type = np_read16(buf);
314 st->dev = np_read32(buf);
315 np_read_qid(buf, &st->qid);
316 st->mode = np_read32(buf);
317 st->atime = np_read32(buf);
318 st->mtime = np_read32(buf);
319 st->length = np_read64(buf);
320 st->name = np_readstr(buf);
321 st->uid = np_readstr(buf);
322 st->gid = np_readstr(buf);
323 st->muid = np_readstr(buf);
343 err = np_readstr(buf);
344 errx(1, "expected %s, got error %s",
345 pp_msg_type(type), err);
348 errx(1, "expected %s, got msg type %s",
349 pp_msg_type(type), pp_msg_type(t));
353 expect2(uint8_t type, uint16_t tag)
363 errx(1, "expected tag 0x%x, got 0x%x", tag, t);
367 check(uint8_t type, uint16_t tag)
372 rtype = np_read8(buf);
373 rtag = np_read16(buf);
376 errx(1, "expected tag 0x%x, got 0x%x", tag, rtag);
381 return np_readstr(buf);
383 errx(1, "expected %s, got msg type %s",
384 pp_msg_type(type), pp_msg_type(rtype));
392 tversion(VERSION9P, MSIZE9P);
395 expect2(Rversion, NOTAG);
397 msize = np_read32(buf);
398 version = np_readstr(buf);
400 if (msize > MSIZE9P || msize < 256)
401 errx(1, "got unexpected msize: %d", msize);
402 if (strcmp(version, VERSION9P))
403 errx(1, "unexpected 9p version: %s", version);
410 do_attach(const char *user)
414 tattach(pwdfid, NOFID, user, "/");
417 expect2(Rattach, iota_tag);
418 np_read_qid(buf, &qid);
424 do_open(uint32_t fid, uint8_t mode)
432 expect2(Ropen, iota_tag);
434 np_read_qid(buf, &qid);
435 iounit = np_read32(buf);
443 do_create(uint32_t fid, const char *name, uint32_t perm, uint8_t mode)
448 tcreate(fid, name, perm, mode);
451 expect2(Rcreate, iota_tag);
453 np_read_qid(buf, &qid);
454 iounit = np_read32(buf);
462 do_clunk(uint32_t fid)
467 expect2(Rclunk, iota_tag);
473 dup_fid(int fid, int nfid)
478 twalk(fid, nfid, NULL, 0);
482 if ((errstr = check(Rwalk, iota_tag)) != NULL)
485 nwqid = np_read16(buf);
494 walk_path(int fid, int newfid, const char *path, int *missing,
497 char *wnames[MAXWELEM], *p, *t, *errstr;
501 if ((p = strdup(path)) == NULL)
505 /* strip initial ./ */
506 if (t[0] == '.' && t[1] == '/')
509 for (nwname = 0; nwname < nitems(wnames) &&
510 (wnames[nwname] = strsep(&t, "/")) != NULL;) {
511 if (*wnames[nwname] != '\0')
515 twalk(fid, newfid, (const char **)wnames, nwname);
520 if ((errstr = check(Rwalk, iota_tag)) != NULL) {
525 nwqid = np_read16(buf);
526 assert(nwqid <= nwname);
528 /* consume all qids */
529 for (i = 0; i < nwqid; ++i)
530 np_read_qid(buf, qid);
534 *missing = nwname - nwqid;
539 do_stat(int fid, struct np_stat *st)
544 expect2(Rstat, iota_tag);
546 /* eat up the first two byte length */
549 if (np_read_stat(buf, st) == -1)
550 errx(1, "invalid stat struct read");
556 do_wstat(int fid, const struct np_stat *st)
564 if ((errstr = check(Rwstat, iota_tag)) != NULL)
580 if ((errstr = check(Rremove, iota_tag)) != NULL)
589 do_read(int fid, uint64_t off, uint32_t count, void *data)
593 tread(fid, off, count);
596 expect2(Rread, iota_tag);
599 assert(r == EVBUFFER_LENGTH(buf));
601 evbuffer_remove(buf, data, r);
609 do_write(int fid, uint64_t off, uint32_t count, void *data)
613 twrite(fid, off, data, count);
616 expect2(Rwrite, iota_tag);
627 draw_progress(const char *pre, const struct progress *p)
636 perc = 100.0 * p->done / p->max;
638 fprintf(stderr, "%s: %d%%\n", pre, (int)perc);
645 if (ioctl(0, TIOCGWINSZ, &ws) == -1)
647 tty_width = ws.ws_col;
652 ((l = fprintf(stderr, "\r%s ", pre)) == -1 || l >= w))
655 w -= l + 2 + 5; /* 2 for |, 5 for percentage + \n */
657 fprintf(stderr, "%4d%%\n", (int)perc);
661 fprintf(stderr, "|");
663 l = w * MIN(100.0, perc) / 100.0;
664 for (i = 0; i < l; i++)
665 fprintf(stderr, "*");
667 fprintf(stderr, " ");
668 fprintf(stderr, "|%4d%%", (int)perc);
672 fetch_fid(int fid, int fd, const char *name)
674 static char buf[MSIZE9P];
675 struct progress p = {0};
681 do_open(fid, KOREAD);
688 len = MIN(sizeof(buf), msize);
689 len -= IOHDRSZ; /* for the request' fields */
691 r = do_read(fid, p.done, len, buf);
695 for (off = 0; off < r; off += nw)
696 if ((nw = write(fd, buf + off, r - off)) == 0 ||
703 draw_progress(name, &p);
706 /* throttle, for debugging purpose */
708 struct timespec ts = { 0, 500000000 };
709 nanosleep(&ts, NULL);
722 send_fid(int fid, const char *fnam, int open_flags, int fd, const char *name)
724 static char buf[MSIZE9P];
725 struct progress p = {0};
730 if (fstat(fd, &sb) == -1)
734 do_create(fid, fnam, 0644, KOWRITE);
736 do_open(fid, open_flags | KOWRITE);
740 len = MIN(sizeof(buf), msize);
741 len -= HEADERSIZE + 4 + 4 + 8; /* for the request' fields */
743 r = read(fd, buf, len);
749 w = do_write(fid, p.done, r, buf);
752 draw_progress(name, &p);
755 /* throttle, for debugging purpose */
757 struct timespec ts = { 0, 500000000 };
758 nanosleep(&ts, NULL);
768 woc_file(int fd, const char *prompt, const char *path)
771 const char *n = NULL;
776 errstr = walk_path(pwdfid, nfid, path, &miss, &qid);
777 if (errstr != NULL && miss > 1) {
778 fprintf(stderr, "%s: %s\n", path, errstr);
783 if (errstr != NULL || miss == 1) {
784 char p[PATH_MAX], *dn;
787 * If it's only one component missing (the file name), walk
788 * to the parent directory and try to create the file.
791 if (strlcpy(p, path, sizeof(p)) >= sizeof(p)) {
792 fprintf(stderr, "path too long: %s\n", path);
797 if (!strcmp(dn, ".")) {
798 errstr = dup_fid(pwdfid, nfid);
801 errstr = walk_path(pwdfid, nfid, dn, &miss, &qid);
803 if (errstr != NULL) {
804 fprintf(stderr, "%s: %s\n", dn, errstr);
810 fprintf(stderr, "%s: not a directory\n", dn);
814 if ((n = strrchr(path, '/')) != NULL)
823 fprintf(stderr, "can't create %s: missing %d path"
824 " component(s)\n", path, miss);
828 send_fid(nfid, n, KOTRUNC, fd, prompt);
833 do_tls_connect(const char *host, const char *port)
837 if ((tlsconf = tls_config_new()) == NULL)
838 fatalx("tls_config_new");
839 tls_config_insecure_noverifycert(tlsconf);
840 tls_config_insecure_noverifyname(tlsconf);
845 if (tls_config_set_keypair_file(tlsconf, crtpath, keypath) == -1)
846 fatalx("can't load certs (%s, %s)", crtpath, keypath);
848 if ((ctx = tls_client()) == NULL)
850 if (tls_configure(ctx, tlsconf) == -1)
851 fatalx("tls_configure: %s", tls_error(ctx));
853 if (tls_connect(ctx, host, port) == -1)
854 fatalx("can't connect to %s:%s: %s", host, port,
857 for (handshake = 0; !handshake;) {
858 switch (tls_handshake(ctx)) {
860 fatalx("tls_handshake: %s", tls_error(ctx));
869 do_ctxt_connect(const char *host, const char *port)
871 struct addrinfo hints, *res, *res0;
872 int error, saved_errno;
873 const char *cause = NULL;
875 memset(&hints, 0, sizeof(hints));
876 hints.ai_family = AF_UNSPEC;
877 hints.ai_socktype = SOCK_STREAM;
878 error = getaddrinfo(host, port, &hints, &res0);
880 errx(1, "%s", gai_strerror(error));
883 for (res = res0; res != NULL; res = res->ai_next) {
884 sock = socket(res->ai_family, res->ai_socktype|SOCK_CLOEXEC,
891 if (connect(sock, res->ai_addr, res->ai_addrlen) == -1) {
909 do_connect(const char *host, const char *port, const char *user)
915 fprintf(stderr, "connecting to %s:%s...", host, port);
918 do_tls_connect(host, port);
920 do_ctxt_connect(host, port);
922 fprintf(stderr, " done!\n");
929 tmp_file(char sfn[TMPFSTRLEN])
933 strlcpy(sfn, TMPFSTR, TMPFSTRLEN);
934 if ((tmpfd = mkstemp(sfn)) == -1) {
935 warn("mkstemp %s", sfn);
939 /* set the close-on-exec flag */
940 if (fcntl(tmpfd, F_SETFD, FD_CLOEXEC) == -1) {
949 static inline const char *
970 /* unreachable, just for the compiler' happiness */
976 prepare_wstat(struct np_stat *st)
978 memset(st, 0xFF, sizeof(*st));
986 print_dirent(const struct np_stat *st)
991 char fmt[FMT_SCALED_STRSIZE], tim[13];
993 if (fmt_scaled(st->length, fmt) == -1)
994 strlcpy(fmt, "xxx", sizeof(fmt));
998 if (now > mtime && (now - mtime) < 365/2 * 24 * 12 * 60)
1001 timfmt = "%b %e %Y";
1003 if ((tm = localtime(&mtime)) == NULL ||
1004 strftime(tim, sizeof(tim), timfmt, tm) == 0)
1005 strlcpy(tim, "unknown", sizeof(tim));
1007 if (st->qid.type & QTDIR)
1011 printf("%s", pp_perm(st->mode >> 6));
1012 printf("%s", pp_perm(st->mode >> 3));
1013 printf("%s", pp_perm(st->mode));
1014 printf(" %8s %12s %s%s\n", fmt, tim, st->name,
1015 st->qid.type & QTDIR ? "/" : "");
1021 dir_listing(const char *path, int (*fn)(const struct np_stat *),
1034 errstr = walk_path(pwdfid, nfid, path, &miss, &qid);
1035 if (errstr != NULL) {
1037 printf("%s: %s\n", path, errstr);
1043 printf("%s: No such file or directory\n", path);
1046 if (!(qid.type & QTDIR)) {
1048 printf("%s: not a directory\n", path);
1053 do_open(nfid, KOREAD);
1054 evbuffer_drain(dirbuf, EVBUFFER_LENGTH(dirbuf));
1057 tread(nfid, off, msize - IOHDRSZ);
1060 expect2(Rread, iota_tag);
1062 len = np_read32(buf);
1066 evbuffer_add_buffer(dirbuf, buf);
1072 while (EVBUFFER_LENGTH(dirbuf) != 0) {
1073 if (np_read_stat(dirbuf, &st) == -1)
1074 errx(1, "invalid stat struct read");
1087 evbuffer_drain(dirbuf, EVBUFFER_LENGTH(dirbuf));
1093 cmd_bell(int argc, const char **argv)
1098 puts("bell mode enabled");
1100 puts("bell mode disabled");
1107 if (!strcmp(*argv, "on")) {
1109 puts("bell mode enabled");
1113 if (!strcmp(*argv, "off")) {
1115 puts("bell mode disabled");
1120 printf("bell [on | off]\n");
1124 cmd_bye(int argc, const char **argv)
1131 cmd_cd(int argc, const char **argv)
1138 printf("usage: cd remote-path\n");
1143 errstr = walk_path(pwdfid, nfid, argv[0], &miss, &qid);
1144 if (errstr != NULL) {
1145 printf("%s: %s\n", argv[0], errstr);
1150 if (miss != 0 || !(qid.type & QTDIR)) {
1151 printf("%s: not a directory\n", argv[0]);
1162 cmd_edit(int argc, const char **argv)
1165 int nfid, tmpfd, miss;
1166 char sfn[TMPFSTRLEN], p[PATH_MAX], *name, *errstr;
1170 puts("usage: edit file");
1174 if ((ed = getenv("VISUAL")) == NULL &&
1175 (ed = getenv("EDITOR")) == NULL)
1179 errstr = walk_path(pwdfid, nfid, *argv, &miss, &qid);
1180 if (errstr != NULL) {
1181 printf("%s: %s\n", *argv, errstr);
1186 if (miss != 0 || qid.type != 0) {
1187 printf("%s: not a file\n", *argv);
1193 if ((tmpfd = tmp_file(sfn)) == -1) {
1198 strlcpy(p, *argv, sizeof(p));
1201 if (fetch_fid(nfid, tmpfd, name)) {
1202 warn("failed fetch or can't write %s", sfn);
1207 spawn(ed, sfn, NULL);
1210 * Re-open the file because it's not guaranteed that the
1211 * file descriptor tmpfd is still associated with the file
1212 * pointed by sfn: it's not uncommon for editor to write
1213 * a backup file and then rename(2) it to the file name.
1215 if ((tmpfd = open(sfn, O_RDONLY)) == -1) {
1216 warn("can't open %s", sfn);
1220 woc_file(tmpfd, *argv, name);
1228 cmd_get(int argc, const char **argv)
1235 if (argc != 1 && argc != 2) {
1236 printf("usage: get remote-file [local-file]\n");
1242 else if ((l = strrchr(argv[0], '/')) != NULL)
1248 errstr = walk_path(pwdfid, nfid, argv[0], &miss, &qid);
1249 if (errstr != NULL) {
1250 printf("%s: %s\n", argv[0], errstr);
1255 if (miss != 0 || qid.type != 0) {
1256 printf("%s: not a file\n", argv[0]);
1262 if ((fd = open(l, O_WRONLY|O_CREAT|O_TRUNC|O_CLOEXEC, 0644)) == -1) {
1263 warn("can't open %s", l);
1268 if (fetch_fid(nfid, fd, l) == -1)
1269 warn("write %s", l);
1274 cmd_hexdump(int argc, const char **argv)
1279 puts("hexdump mode enabled");
1281 puts("hexdump mode disabled");
1288 if (!strcmp(*argv, "on")) {
1290 puts("hexdump mode enabled");
1294 if (!strcmp(*argv, "off")) {
1296 puts("hexdump mode disabled");
1301 puts("usage: hexdump [on | off]");
1305 cmd_lcd(int argc, const char **argv)
1310 printf("usage: lcd [local-directory]\n");
1317 if (argc == 0 && (dir = getenv("HOME")) == NULL) {
1318 printf("HOME is not defined\n");
1322 if (chdir(dir) == -1)
1323 printf("cd: %s: %s\n", dir, strerror(errno));
1327 cmd_lpwd(int argc, const char **argv)
1329 char path[PATH_MAX];
1332 printf("usage: lpwd\n");
1336 if (getcwd(path, sizeof(path)) == NULL) {
1337 printf("lpwd: %s\n", strerror(errno));
1341 printf("%s\n", path);
1345 cmd_ls(int argc, const char **argv)
1348 puts("usage: ls [path]");
1352 dir_listing(argc == 0 ? "." : argv[0], print_dirent, 1);
1356 cmd_page(int argc, const char **argv)
1359 int nfid, tmpfd, miss, r;
1360 char sfn[TMPFSTRLEN], p[PATH_MAX], *name, *errstr;
1364 puts("usage: page file");
1368 if ((pager = getenv("PAGER")) == NULL)
1372 errstr = walk_path(pwdfid, nfid, *argv, &miss, &qid);
1373 if (errstr != NULL) {
1374 printf("%s: %s\n", *argv, errstr);
1379 if (miss != 0 || qid.type != 0) {
1380 printf("%s: not a file\n", *argv);
1386 if ((tmpfd = tmp_file(sfn)) == -1) {
1391 strlcpy(p, *argv, sizeof(p));
1393 if ((r = fetch_fid(nfid, tmpfd, name)) == -1)
1394 warn("write %s", sfn);
1397 spawn(pager, sfn, NULL);
1402 cmd_pipe(int argc, const char **argv)
1406 int nfid, tmpfd, miss, status;
1407 int filedes[2]; /* read end, write end */
1411 puts("usage: pipe remote-file cmd [args...]");
1416 errstr = walk_path(pwdfid, nfid, *argv, &miss, &qid);
1417 if (errstr != NULL) {
1418 printf("%s: %s\n", *argv, errstr);
1423 if (miss != 0 || qid.type != 0) {
1424 printf("%s: not a file\n", *argv);
1430 if (pipe(filedes) == -1)
1433 switch (pid = vfork()) {
1438 if (dup2(filedes[0], 0) == -1)
1440 execvp(argv[1], (char *const *)argv + 1);
1445 if (fetch_fid(nfid, filedes[1], *argv) == -1)
1446 warnx("failed to fetch all the file");
1449 waitpid(pid, &status, 0);
1453 cmd_put(int argc, const char **argv)
1459 if (argc != 1 && argc != 2) {
1460 printf("usage: put local-file [remote-file]\n");
1466 else if ((l = strrchr(argv[0], '/')) != NULL)
1471 if ((fd = open(argv[0], O_RDONLY)) == -1) {
1472 warn("%s", argv[0]);
1476 woc_file(fd, argv[0], l);
1481 cmd_rename(int argc, const char **argv)
1489 puts("usage: rename remote-file new-remote-name");
1494 errstr = walk_path(pwdfid, nfid, argv[0], &miss, &qid);
1495 if (errstr != NULL) {
1496 printf("%s: %s\n", argv[0], errstr);
1502 printf("%s: not such file or directory\n", argv[0]);
1507 st.name = (char *)argv[1];
1508 if ((errstr = do_wstat(nfid, &st)) != NULL) {
1509 printf("rename: %s\n", errstr);
1517 cmd_rm(int argc, const char **argv)
1524 puts("usage: rm file ...");
1528 for (; *argv; ++argv, --argc) {
1530 errstr = walk_path(pwdfid, nfid, *argv, &miss, &qid);
1531 if (errstr != NULL) {
1532 printf("%s: %s\n", *argv, errstr);
1537 printf("%s: not such file or directory\n", *argv);
1541 if ((errstr = do_remove(nfid)) != NULL) {
1542 printf("%s: %s\n", *argv, errstr);
1550 cmd_verbose(int argc, const char **argv)
1553 log_setverbose(!log_getverbose());
1554 if (log_getverbose())
1555 puts("verbose mode enabled");
1557 puts("verbose mode disabled");
1564 if (!strcmp(*argv, "on")) {
1566 puts("verbose mode enabled");
1570 if (!strcmp(*argv, "off")) {
1572 puts("verbose mode disabled");
1577 printf("verbose [on | off]\n");
1581 excmd(int argc, const char **argv)
1588 for (i = 0; i < nitems(cmds); ++i) {
1589 if (!strcmp(cmds[i].name, *argv)) {
1590 cmds[i].fn(argc-1, argv+1);
1595 log_warnx("unknown command %s", *argv);
1599 parsecmd(char *cmd, char **argv, size_t len)
1604 memset(argv, 0, sizeof(*argv) * len);
1606 while (argc < len) {
1607 while (isspace((unsigned char)*cmd))
1614 for (; *cmd != '\0'; ++cmd) {
1621 memmove(cmd, cmd + 1, strlen(cmd));
1625 if (*cmd == quote) {
1627 memmove(cmd, cmd + 1, strlen(cmd));
1631 if (*cmd == '\'' || *cmd == '"') {
1633 memmove(cmd, cmd + 1, strlen(cmd));
1640 if (isspace((unsigned char)*cmd))
1644 if (*cmd == '\0' && (escape || quote)) {
1645 fprintf(stderr, "unterminated %s\n",
1646 escape ? "escape" : "quote");
1656 fprintf(stderr, "too many arguments\n");
1663 cd_or_fetch(const char *path, const char *outfile)
1669 while (*path == '/')
1675 errstr = walk_path(pwdfid, nfid, path, &miss, &qid);
1677 errx(1, "walk %s: %s", path, errstr);
1679 errc(1, ENOENT, "walk %s", path);
1681 if (qid.type & QTDIR) {
1683 errx(1, "can't fetch directory %s", path);
1689 if (outfile == NULL) {
1690 if ((outfile = strrchr(path, '/')) == NULL)
1694 if (*outfile == '\0')
1695 errx(1, "invalid path: missing file name: %s",
1699 if (strcmp(outfile, "-") != 0) {
1700 fd = open(outfile, O_WRONLY|O_CREAT, 0644);
1702 err(1, "can't open for writing %s", outfile);
1706 if (fetch_fid(nfid, fd, outfile) == -1)
1707 err(1, "write %s", outfile);
1713 parse_addr(const char *url, const char **user,
1714 const char **port, const char **path)
1716 static char buf[PATH_MAX];
1719 *user = *port = *path = NULL;
1722 if (strlcpy(buf, url, sizeof(buf)) >= sizeof(buf))
1723 errx(1, "connection string too long");
1725 if (!strncmp(host, "9p://", 5))
1728 if ((t = strchr(host, '/')) != NULL) {
1730 errx(1, "invalid connection string: %s", url);
1736 if ((t = strchr(host, '@')) != NULL) {
1738 errx(1, "invalid connection string: %s", url);
1742 } else if ((*user = getenv("USER")) == NULL)
1743 errx(1, "USER not defined");
1745 if ((t = strchr(host, ':')) != NULL) {
1757 main(int argc, char **argv)
1759 const char *user, *host, *port, *path;
1760 const char *outfile = NULL;
1763 log_init(1, LOG_DAEMON);
1765 log_procinit(getprogname());
1767 while ((ch = getopt(argc, argv, "C:cK:o:")) != -1) {
1773 case 'c': /* deprecated, remove after 0.3 */
1790 if (argc == 0 || (tls && crtpath == NULL))
1793 host = parse_addr(argv[0], &user, &port, &path);
1794 if (path == NULL && argv[1] != NULL) /* drop argv[1] after 0.3 */
1796 if (outfile && path == NULL)
1799 signal(SIGPIPE, SIG_IGN);
1803 signal(SIGWINCH, tty_resized);
1806 if ((evb = evbuffer_new()) == NULL)
1807 fatal("evbuffer_new");
1809 if ((buf = evbuffer_new()) == NULL)
1810 fatal("evbuffer_new");
1812 if ((dirbuf = evbuffer_new()) == NULL)
1813 fatal("evbuferr_new");
1815 do_connect(host, port, user);
1817 cd_or_fetch(path, outfile);
1822 char *line, *argv[16] = {0}, **ap;
1824 if ((line = read_line("kamiftp> ")) == NULL)
1827 if ((argc = parsecmd(line, argv, nitems(argv) - 1)) == -1) {
1833 excmd(argc, (const char **)argv);
1836 fprintf(stderr, "\a");