2 * Copyright (c) 2021, 2022 Omar Polo <op@omarpolo.com>
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19 #include <sys/ioctl.h>
20 #include <sys/types.h>
21 #include <sys/socket.h>
41 #include <readline/readline.h>
42 #include <readline/history.h>
52 #define TMPFSTR "/tmp/kamiftp.XXXXXXXXXX"
53 #define TMPFSTRLEN sizeof(TMPFSTR)
61 struct tls_config *tlsconf;
65 struct evbuffer *dirbuf;
70 volatile sig_atomic_t resized;
82 #define ASSERT_EMPTYBUF() assert(EVBUFFER_LENGTH(buf) == 0)
85 read_line(const char *prompt)
90 if ((line = readline(prompt)) == NULL)
92 /* XXX: trim spaces? */
103 spawn(const char *argv0, ...)
108 const char *argv[16], *last;
111 memset(argv, 0, sizeof(argv));
115 for (i = 1; i < nitems(argv); ++i) {
116 last = va_arg(ap, const char *);
123 assert(last == NULL);
125 switch (pid = fork()) {
129 execvp(argv[0], (char *const *)argv);
132 waitpid(pid, &status, 0);
137 tty_resized(int signo)
145 fprintf(stderr, "usage: %s [-C cert] [-K key] [-o output] "
146 "[9p://][user@]host[:port][/path]\n", getprogname());
147 fprintf(stderr, "kamid suite version " KAMID_VERSION "\n");
170 hexdump("outgoing message", EVBUFFER_DATA(evb),
171 EVBUFFER_LENGTH(evb));
173 while (EVBUFFER_LENGTH(evb) != 0) {
174 buf = EVBUFFER_DATA(evb);
175 nbytes = EVBUFFER_LENGTH(evb);
178 r = write(sock, buf, nbytes);
179 if (r == 0 || r == -1)
182 r = tls_write(ctx, buf, nbytes);
183 if (r == TLS_WANT_POLLIN || r == TLS_WANT_POLLOUT)
186 errx(1, "tls: %s", tls_error(ctx));
189 evbuffer_drain(evb, r);
194 mustread(void *buf, size_t len)
201 r = read(sock, d, len);
202 if (r == 0 || r == -1)
205 r = tls_read(ctx, d, len);
206 if (r == TLS_WANT_POLLIN || r == TLS_WANT_POLLOUT)
209 errx(1, "tls: %s", tls_error(ctx));
223 mustread(&len, sizeof(len));
225 if (len < HEADERSIZE)
226 errx(1, "read message of invalid length %d", len);
228 len -= 4; /* skip the length just read */
231 l = MIN(len, sizeof(tmp));
234 evbuffer_add(buf, tmp, l);
238 hexdump("incoming packet", EVBUFFER_DATA(buf),
239 EVBUFFER_LENGTH(buf));
243 np_read64(struct evbuffer *buf)
247 evbuffer_remove(buf, &n, sizeof(n));
252 np_read32(struct evbuffer *buf)
256 evbuffer_remove(buf, &n, sizeof(n));
261 np_read16(struct evbuffer *buf)
265 evbuffer_remove(buf, &n, sizeof(n));
270 np_read8(struct evbuffer *buf)
274 evbuffer_remove(buf, &n, sizeof(n));
279 np_readstr(struct evbuffer *buf)
284 len = np_read16(buf);
285 assert(EVBUFFER_LENGTH(buf) >= len);
287 if ((str = calloc(1, len+1)) == NULL)
289 evbuffer_remove(buf, str, len);
294 np_read_qid(struct evbuffer *buf, struct qid *qid)
296 assert(EVBUFFER_LENGTH(buf) >= QIDSIZE);
298 qid->type = np_read8(buf);
299 qid->vers = np_read32(buf);
300 qid->path = np_read64(buf);
304 np_read_stat(struct evbuffer *buf, struct np_stat *st)
308 memset(st, 0, sizeof(*st));
310 size = np_read16(buf);
311 if (size > EVBUFFER_LENGTH(buf))
314 st->type = np_read16(buf);
315 st->dev = np_read32(buf);
316 np_read_qid(buf, &st->qid);
317 st->mode = np_read32(buf);
318 st->atime = np_read32(buf);
319 st->mtime = np_read32(buf);
320 st->length = np_read64(buf);
321 st->name = np_readstr(buf);
322 st->uid = np_readstr(buf);
323 st->gid = np_readstr(buf);
324 st->muid = np_readstr(buf);
344 err = np_readstr(buf);
345 errx(1, "expected %s, got error %s",
346 pp_msg_type(type), err);
349 errx(1, "expected %s, got msg type %s",
350 pp_msg_type(type), pp_msg_type(t));
354 expect2(uint8_t type, uint16_t tag)
364 errx(1, "expected tag 0x%x, got 0x%x", tag, t);
368 check(uint8_t type, uint16_t tag)
373 rtype = np_read8(buf);
374 rtag = np_read16(buf);
377 errx(1, "expected tag 0x%x, got 0x%x", tag, rtag);
382 return np_readstr(buf);
384 errx(1, "expected %s, got msg type %s",
385 pp_msg_type(type), pp_msg_type(rtype));
393 tversion(VERSION9P, MSIZE9P);
396 expect2(Rversion, NOTAG);
398 msize = np_read32(buf);
399 version = np_readstr(buf);
401 if (msize > MSIZE9P || msize < 256)
402 errx(1, "got unexpected msize: %d", msize);
403 if (strcmp(version, VERSION9P))
404 errx(1, "unexpected 9p version: %s", version);
411 do_attach(const char *user)
415 tattach(pwdfid, NOFID, user, "/");
418 expect2(Rattach, iota_tag);
419 np_read_qid(buf, &qid);
425 do_open(uint32_t fid, uint8_t mode)
433 expect2(Ropen, iota_tag);
435 np_read_qid(buf, &qid);
436 iounit = np_read32(buf);
444 do_create(uint32_t fid, const char *name, uint32_t perm, uint8_t mode)
449 tcreate(fid, name, perm, mode);
452 expect2(Rcreate, iota_tag);
454 np_read_qid(buf, &qid);
455 iounit = np_read32(buf);
463 do_clunk(uint32_t fid)
468 expect2(Rclunk, iota_tag);
474 dup_fid(int fid, int nfid)
479 twalk(fid, nfid, NULL, 0);
483 if ((errstr = check(Rwalk, iota_tag)) != NULL)
486 nwqid = np_read16(buf);
495 walk_path(int fid, int newfid, const char *path, int *missing,
498 char *wnames[MAXWELEM], *p, *t, *errstr;
502 if ((p = strdup(path)) == NULL)
506 /* strip initial ./ */
507 if (t[0] == '.' && t[1] == '/')
510 for (nwname = 0; nwname < nitems(wnames) &&
511 (wnames[nwname] = strsep(&t, "/")) != NULL;) {
512 if (*wnames[nwname] != '\0')
516 twalk(fid, newfid, (const char **)wnames, nwname);
521 if ((errstr = check(Rwalk, iota_tag)) != NULL) {
526 nwqid = np_read16(buf);
527 assert(nwqid <= nwname);
529 /* consume all qids */
530 for (i = 0; i < nwqid; ++i)
531 np_read_qid(buf, qid);
535 *missing = nwname - nwqid;
540 do_stat(int fid, struct np_stat *st)
545 expect2(Rstat, iota_tag);
547 /* eat up the first two byte length */
550 if (np_read_stat(buf, st) == -1)
551 errx(1, "invalid stat struct read");
557 do_wstat(int fid, const struct np_stat *st)
565 if ((errstr = check(Rwstat, iota_tag)) != NULL)
581 if ((errstr = check(Rremove, iota_tag)) != NULL)
590 do_read(int fid, uint64_t off, uint32_t count, void *data)
594 tread(fid, off, count);
597 expect2(Rread, iota_tag);
600 assert(r == EVBUFFER_LENGTH(buf));
602 evbuffer_remove(buf, data, r);
610 do_write(int fid, uint64_t off, uint32_t count, void *data)
614 twrite(fid, off, data, count);
617 expect2(Rwrite, iota_tag);
628 draw_progress(const char *pre, const struct progress *p)
637 perc = 100.0 * p->done / p->max;
639 fprintf(stderr, "%s: %d%%\n", pre, (int)perc);
646 if (ioctl(0, TIOCGWINSZ, &ws) == -1)
648 tty_width = ws.ws_col;
653 ((l = fprintf(stderr, "\r%s ", pre)) == -1 || l >= w))
656 w -= l + 2 + 5; /* 2 for |, 5 for percentage + \n */
658 fprintf(stderr, "%4d%%\n", (int)perc);
662 fprintf(stderr, "|");
664 l = w * MIN(100.0, perc) / 100.0;
665 for (i = 0; i < l; i++)
666 fprintf(stderr, "*");
668 fprintf(stderr, " ");
669 fprintf(stderr, "|%4d%%", (int)perc);
673 fetch_fid(int fid, int fd, const char *name)
675 static char buf[MSIZE9P];
676 struct progress p = {0};
682 do_open(fid, KOREAD);
689 len = MIN(sizeof(buf), msize);
690 len -= IOHDRSZ; /* for the request' fields */
692 r = do_read(fid, p.done, len, buf);
696 for (off = 0; off < r; off += nw)
697 if ((nw = write(fd, buf + off, r - off)) == 0 ||
704 draw_progress(name, &p);
707 /* throttle, for debugging purpose */
709 struct timespec ts = { 0, 500000000 };
710 nanosleep(&ts, NULL);
723 send_fid(int fid, const char *fnam, int open_flags, int fd, const char *name)
725 static char buf[MSIZE9P];
726 struct progress p = {0};
731 if (fstat(fd, &sb) == -1)
735 do_create(fid, fnam, 0644, KOWRITE);
737 do_open(fid, open_flags | KOWRITE);
741 len = MIN(sizeof(buf), msize);
742 len -= HEADERSIZE + 4 + 4 + 8; /* for the request' fields */
744 r = read(fd, buf, len);
750 w = do_write(fid, p.done, r, buf);
753 draw_progress(name, &p);
756 /* throttle, for debugging purpose */
758 struct timespec ts = { 0, 500000000 };
759 nanosleep(&ts, NULL);
769 woc_file(int fd, const char *prompt, const char *path)
772 const char *n = NULL;
777 errstr = walk_path(pwdfid, nfid, path, &miss, &qid);
778 if (errstr != NULL && miss > 1) {
779 fprintf(stderr, "%s: %s\n", path, errstr);
784 if (errstr != NULL || miss == 1) {
785 char p[PATH_MAX], *dn;
788 * If it's only one component missing (the file name), walk
789 * to the parent directory and try to create the file.
792 if (strlcpy(p, path, sizeof(p)) >= sizeof(p)) {
793 fprintf(stderr, "path too long: %s\n", path);
798 if (!strcmp(dn, ".")) {
799 errstr = dup_fid(pwdfid, nfid);
802 errstr = walk_path(pwdfid, nfid, dn, &miss, &qid);
804 if (errstr != NULL) {
805 fprintf(stderr, "%s: %s\n", dn, errstr);
811 fprintf(stderr, "%s: not a directory\n", dn);
815 if ((n = strrchr(path, '/')) != NULL)
824 fprintf(stderr, "can't create %s: missing %d path"
825 " component(s)\n", path, miss);
829 send_fid(nfid, n, KOTRUNC, fd, prompt);
834 do_tls_connect(const char *host, const char *port)
838 if ((tlsconf = tls_config_new()) == NULL)
839 fatalx("tls_config_new");
840 tls_config_insecure_noverifycert(tlsconf);
841 tls_config_insecure_noverifyname(tlsconf);
846 if (tls_config_set_keypair_file(tlsconf, crtpath, keypath) == -1)
847 fatalx("can't load certs (%s, %s)", crtpath, keypath);
849 if ((ctx = tls_client()) == NULL)
851 if (tls_configure(ctx, tlsconf) == -1)
852 fatalx("tls_configure: %s", tls_error(ctx));
854 if (tls_connect(ctx, host, port) == -1)
855 fatalx("can't connect to %s:%s: %s", host, port,
858 for (handshake = 0; !handshake;) {
859 switch (tls_handshake(ctx)) {
861 fatalx("tls_handshake: %s", tls_error(ctx));
870 do_ctxt_connect(const char *host, const char *port)
872 struct addrinfo hints, *res, *res0;
873 int error, saved_errno;
874 const char *cause = NULL;
876 memset(&hints, 0, sizeof(hints));
877 hints.ai_family = AF_UNSPEC;
878 hints.ai_socktype = SOCK_STREAM;
879 error = getaddrinfo(host, port, &hints, &res0);
881 errx(1, "%s", gai_strerror(error));
884 for (res = res0; res != NULL; res = res->ai_next) {
885 sock = socket(res->ai_family, res->ai_socktype|SOCK_CLOEXEC,
892 if (connect(sock, res->ai_addr, res->ai_addrlen) == -1) {
910 do_connect(const char *host, const char *port, const char *user)
916 fprintf(stderr, "connecting to %s:%s...", host, port);
919 do_tls_connect(host, port);
921 do_ctxt_connect(host, port);
923 fprintf(stderr, " done!\n");
930 tmp_file(char sfn[TMPFSTRLEN])
934 strlcpy(sfn, TMPFSTR, TMPFSTRLEN);
935 if ((tmpfd = mkstemp(sfn)) == -1) {
936 warn("mkstemp %s", sfn);
940 /* set the close-on-exec flag */
941 if (fcntl(tmpfd, F_SETFD, FD_CLOEXEC) == -1) {
950 static inline const char *
971 /* unreachable, just for the compiler' happiness */
977 prepare_wstat(struct np_stat *st)
979 memset(st, 0xFF, sizeof(*st));
987 print_dirent(const struct np_stat *st)
992 char fmt[FMT_SCALED_STRSIZE], tim[13];
994 if (fmt_scaled(st->length, fmt) == -1)
995 strlcpy(fmt, "xxx", sizeof(fmt));
999 if (now > mtime && (now - mtime) < 365/2 * 24 * 12 * 60)
1000 timfmt = "%b %e %R";
1002 timfmt = "%b %e %Y";
1004 if ((tm = localtime(&mtime)) == NULL ||
1005 strftime(tim, sizeof(tim), timfmt, tm) == 0)
1006 strlcpy(tim, "unknown", sizeof(tim));
1008 if (st->qid.type & QTDIR)
1012 printf("%s", pp_perm(st->mode >> 6));
1013 printf("%s", pp_perm(st->mode >> 3));
1014 printf("%s", pp_perm(st->mode));
1015 printf(" %8s %12s %s%s\n", fmt, tim, st->name,
1016 st->qid.type & QTDIR ? "/" : "");
1022 dir_listing(const char *path, int (*fn)(const struct np_stat *),
1025 struct qid qid = {0, 0, QTDIR};
1029 int nfid, r, miss = 0;
1035 if (!strcmp(path, "."))
1036 errstr = dup_fid(pwdfid, nfid);
1038 errstr = walk_path(pwdfid, nfid, path, &miss, &qid);
1039 if (errstr != NULL) {
1041 printf("%s: %s\n", path, errstr);
1047 printf("%s: No such file or directory\n", path);
1050 if (!(qid.type & QTDIR)) {
1052 printf("%s: not a directory\n", path);
1057 do_open(nfid, KOREAD);
1058 evbuffer_drain(dirbuf, EVBUFFER_LENGTH(dirbuf));
1061 tread(nfid, off, msize - IOHDRSZ);
1064 expect2(Rread, iota_tag);
1066 len = np_read32(buf);
1070 evbuffer_add_buffer(dirbuf, buf);
1076 while (EVBUFFER_LENGTH(dirbuf) != 0) {
1077 if (np_read_stat(dirbuf, &st) == -1)
1078 errx(1, "invalid stat struct read");
1091 evbuffer_drain(dirbuf, EVBUFFER_LENGTH(dirbuf));
1097 cmd_bell(int argc, const char **argv)
1102 puts("bell mode enabled");
1104 puts("bell mode disabled");
1111 if (!strcmp(*argv, "on")) {
1113 puts("bell mode enabled");
1117 if (!strcmp(*argv, "off")) {
1119 puts("bell mode disabled");
1124 printf("bell [on | off]\n");
1128 cmd_bye(int argc, const char **argv)
1135 cmd_cd(int argc, const char **argv)
1142 printf("usage: cd remote-path\n");
1147 errstr = walk_path(pwdfid, nfid, argv[0], &miss, &qid);
1148 if (errstr != NULL) {
1149 printf("%s: %s\n", argv[0], errstr);
1154 if (miss != 0 || !(qid.type & QTDIR)) {
1155 printf("%s: not a directory\n", argv[0]);
1166 cmd_edit(int argc, const char **argv)
1169 int nfid, tmpfd, miss;
1170 char sfn[TMPFSTRLEN], p[PATH_MAX], *name, *errstr;
1174 puts("usage: edit file");
1178 if ((ed = getenv("VISUAL")) == NULL &&
1179 (ed = getenv("EDITOR")) == NULL)
1183 errstr = walk_path(pwdfid, nfid, *argv, &miss, &qid);
1184 if (errstr != NULL) {
1185 printf("%s: %s\n", *argv, errstr);
1190 if (miss != 0 || qid.type != 0) {
1191 printf("%s: not a file\n", *argv);
1197 if ((tmpfd = tmp_file(sfn)) == -1) {
1202 strlcpy(p, *argv, sizeof(p));
1205 if (fetch_fid(nfid, tmpfd, name)) {
1206 warn("failed fetch or can't write %s", sfn);
1211 spawn(ed, sfn, NULL);
1214 * Re-open the file because it's not guaranteed that the
1215 * file descriptor tmpfd is still associated with the file
1216 * pointed by sfn: it's not uncommon for editor to write
1217 * a backup file and then rename(2) it to the file name.
1219 if ((tmpfd = open(sfn, O_RDONLY)) == -1) {
1220 warn("can't open %s", sfn);
1224 woc_file(tmpfd, *argv, name);
1232 cmd_get(int argc, const char **argv)
1239 if (argc != 1 && argc != 2) {
1240 printf("usage: get remote-file [local-file]\n");
1246 else if ((l = strrchr(argv[0], '/')) != NULL)
1252 errstr = walk_path(pwdfid, nfid, argv[0], &miss, &qid);
1253 if (errstr != NULL) {
1254 printf("%s: %s\n", argv[0], errstr);
1259 if (miss != 0 || qid.type != 0) {
1260 printf("%s: not a file\n", argv[0]);
1266 if ((fd = open(l, O_WRONLY|O_CREAT|O_TRUNC|O_CLOEXEC, 0644)) == -1) {
1267 warn("can't open %s", l);
1272 if (fetch_fid(nfid, fd, l) == -1)
1273 warn("write %s", l);
1278 cmd_hexdump(int argc, const char **argv)
1283 puts("hexdump mode enabled");
1285 puts("hexdump mode disabled");
1292 if (!strcmp(*argv, "on")) {
1294 puts("hexdump mode enabled");
1298 if (!strcmp(*argv, "off")) {
1300 puts("hexdump mode disabled");
1305 puts("usage: hexdump [on | off]");
1309 cmd_lcd(int argc, const char **argv)
1314 printf("usage: lcd [local-directory]\n");
1321 if (argc == 0 && (dir = getenv("HOME")) == NULL) {
1322 printf("HOME is not defined\n");
1326 if (chdir(dir) == -1)
1327 printf("cd: %s: %s\n", dir, strerror(errno));
1331 cmd_lpwd(int argc, const char **argv)
1333 char path[PATH_MAX];
1336 printf("usage: lpwd\n");
1340 if (getcwd(path, sizeof(path)) == NULL) {
1341 printf("lpwd: %s\n", strerror(errno));
1345 printf("%s\n", path);
1349 cmd_ls(int argc, const char **argv)
1352 puts("usage: ls [path]");
1356 dir_listing(argc == 0 ? "." : argv[0], print_dirent, 1);
1360 cmd_page(int argc, const char **argv)
1363 int nfid, tmpfd, miss, r;
1364 char sfn[TMPFSTRLEN], p[PATH_MAX], *name, *errstr;
1368 puts("usage: page file");
1372 if ((pager = getenv("PAGER")) == NULL)
1376 errstr = walk_path(pwdfid, nfid, *argv, &miss, &qid);
1377 if (errstr != NULL) {
1378 printf("%s: %s\n", *argv, errstr);
1383 if (miss != 0 || qid.type != 0) {
1384 printf("%s: not a file\n", *argv);
1390 if ((tmpfd = tmp_file(sfn)) == -1) {
1395 strlcpy(p, *argv, sizeof(p));
1397 if ((r = fetch_fid(nfid, tmpfd, name)) == -1)
1398 warn("write %s", sfn);
1401 spawn(pager, sfn, NULL);
1406 cmd_pipe(int argc, const char **argv)
1410 int nfid, tmpfd, miss, status;
1411 int filedes[2]; /* read end, write end */
1415 puts("usage: pipe remote-file cmd [args...]");
1420 errstr = walk_path(pwdfid, nfid, *argv, &miss, &qid);
1421 if (errstr != NULL) {
1422 printf("%s: %s\n", *argv, errstr);
1427 if (miss != 0 || qid.type != 0) {
1428 printf("%s: not a file\n", *argv);
1434 if (pipe(filedes) == -1)
1437 switch (pid = vfork()) {
1442 if (dup2(filedes[0], 0) == -1)
1444 execvp(argv[1], (char *const *)argv + 1);
1449 if (fetch_fid(nfid, filedes[1], *argv) == -1)
1450 warnx("failed to fetch all the file");
1453 waitpid(pid, &status, 0);
1457 cmd_put(int argc, const char **argv)
1463 if (argc != 1 && argc != 2) {
1464 printf("usage: put local-file [remote-file]\n");
1470 else if ((l = strrchr(argv[0], '/')) != NULL)
1475 if ((fd = open(argv[0], O_RDONLY)) == -1) {
1476 warn("%s", argv[0]);
1480 woc_file(fd, argv[0], l);
1485 cmd_rename(int argc, const char **argv)
1493 puts("usage: rename remote-file new-remote-name");
1498 errstr = walk_path(pwdfid, nfid, argv[0], &miss, &qid);
1499 if (errstr != NULL) {
1500 printf("%s: %s\n", argv[0], errstr);
1506 printf("%s: not such file or directory\n", argv[0]);
1511 st.name = (char *)argv[1];
1512 if ((errstr = do_wstat(nfid, &st)) != NULL) {
1513 printf("rename: %s\n", errstr);
1521 cmd_rm(int argc, const char **argv)
1528 puts("usage: rm file ...");
1532 for (; *argv; ++argv, --argc) {
1534 errstr = walk_path(pwdfid, nfid, *argv, &miss, &qid);
1535 if (errstr != NULL) {
1536 printf("%s: %s\n", *argv, errstr);
1541 printf("%s: not such file or directory\n", *argv);
1545 if ((errstr = do_remove(nfid)) != NULL) {
1546 printf("%s: %s\n", *argv, errstr);
1554 cmd_verbose(int argc, const char **argv)
1557 log_setverbose(!log_getverbose());
1558 if (log_getverbose())
1559 puts("verbose mode enabled");
1561 puts("verbose mode disabled");
1568 if (!strcmp(*argv, "on")) {
1570 puts("verbose mode enabled");
1574 if (!strcmp(*argv, "off")) {
1576 puts("verbose mode disabled");
1581 printf("verbose [on | off]\n");
1585 excmd(int argc, const char **argv)
1592 for (i = 0; i < nitems(cmds); ++i) {
1593 if (!strcmp(cmds[i].name, *argv)) {
1594 cmds[i].fn(argc-1, argv+1);
1599 log_warnx("unknown command %s", *argv);
1603 parsecmd(char *cmd, char **argv, int len)
1608 memset(argv, 0, sizeof(*argv) * len);
1610 while (argc < len) {
1611 while (isspace((unsigned char)*cmd))
1618 for (; *cmd != '\0'; ++cmd) {
1625 memmove(cmd, cmd + 1, strlen(cmd));
1629 if (*cmd == quote) {
1631 memmove(cmd, cmd + 1, strlen(cmd));
1635 if (*cmd == '\'' || *cmd == '"') {
1637 memmove(cmd, cmd + 1, strlen(cmd));
1644 if (isspace((unsigned char)*cmd))
1648 if (*cmd == '\0' && (escape || quote)) {
1649 fprintf(stderr, "unterminated %s\n",
1650 escape ? "escape" : "quote");
1660 fprintf(stderr, "too many arguments\n");
1667 cd_or_fetch(const char *path, const char *outfile)
1673 while (*path == '/')
1679 errstr = walk_path(pwdfid, nfid, path, &miss, &qid);
1681 errx(1, "walk %s: %s", path, errstr);
1683 errc(1, ENOENT, "walk %s", path);
1685 if (qid.type & QTDIR) {
1687 errx(1, "can't fetch directory %s", path);
1693 if (outfile == NULL) {
1694 if ((outfile = strrchr(path, '/')) == NULL)
1698 if (*outfile == '\0')
1699 errx(1, "invalid path: missing file name: %s",
1703 if (strcmp(outfile, "-") != 0) {
1704 fd = open(outfile, O_WRONLY|O_CREAT, 0644);
1706 err(1, "can't open for writing %s", outfile);
1710 if (fetch_fid(nfid, fd, outfile) == -1)
1711 err(1, "write %s", outfile);
1717 parse_addr(const char *url, const char **user,
1718 const char **port, const char **path)
1720 static char buf[PATH_MAX];
1723 *user = *port = *path = NULL;
1726 if (strlcpy(buf, url, sizeof(buf)) >= sizeof(buf))
1727 errx(1, "connection string too long");
1729 if (!strncmp(host, "9p://", 5))
1732 if ((t = strchr(host, '/')) != NULL) {
1734 errx(1, "invalid connection string: %s", url);
1740 if ((t = strchr(host, '@')) != NULL) {
1742 errx(1, "invalid connection string: %s", url);
1746 } else if ((*user = getenv("USER")) == NULL)
1747 errx(1, "USER not defined");
1749 if ((t = strchr(host, ':')) != NULL) {
1761 main(int argc, char **argv)
1763 const char *user, *host, *port, *path;
1764 const char *outfile = NULL;
1767 log_init(1, LOG_DAEMON);
1769 log_procinit(getprogname());
1771 while ((ch = getopt(argc, argv, "C:cK:o:")) != -1) {
1777 case 'c': /* deprecated, remove after 0.3 */
1794 if (argc == 0 || (tls && crtpath == NULL))
1797 host = parse_addr(argv[0], &user, &port, &path);
1798 if (path == NULL && argv[1] != NULL) /* drop argv[1] after 0.3 */
1800 if (outfile && path == NULL)
1803 signal(SIGPIPE, SIG_IGN);
1807 signal(SIGWINCH, tty_resized);
1810 if ((evb = evbuffer_new()) == NULL)
1811 fatal("evbuffer_new");
1813 if ((buf = evbuffer_new()) == NULL)
1814 fatal("evbuffer_new");
1816 if ((dirbuf = evbuffer_new()) == NULL)
1817 fatal("evbuferr_new");
1819 do_connect(host, port, user);
1821 cd_or_fetch(path, outfile);
1826 char *line, *argv[16] = {0}, **ap;
1828 if ((line = read_line("kamiftp> ")) == NULL)
1831 if ((argc = parsecmd(line, argv, nitems(argv) - 1)) == -1) {
1837 excmd(argc, (const char **)argv);
1840 fprintf(stderr, "\a");