|
@@ -1076,861 +1076,10 @@ format_time_interval(char *out, size_t out_len, long interval)
|
|
|
* File helpers
|
|
|
* ===== */
|
|
|
|
|
|
-
|
|
|
- * must be 1 if fd was returned by socket() or accept(), and 0 if fd
|
|
|
- * was returned by open(). Return the number of bytes written, or -1
|
|
|
- * on error. Only use if fd is a blocking fd. */
|
|
|
-ssize_t
|
|
|
-write_all(tor_socket_t fd, const char *buf, size_t count, int isSocket)
|
|
|
-{
|
|
|
- size_t written = 0;
|
|
|
- ssize_t result;
|
|
|
- raw_assert(count < SSIZE_MAX);
|
|
|
-
|
|
|
- while (written != count) {
|
|
|
- if (isSocket)
|
|
|
- result = tor_socket_send(fd, buf+written, count-written, 0);
|
|
|
- else
|
|
|
- result = write((int)fd, buf+written, count-written);
|
|
|
- if (result<0)
|
|
|
- return -1;
|
|
|
- written += result;
|
|
|
- }
|
|
|
- return (ssize_t)count;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * or reach the end of the file. <b>isSocket</b> must be 1 if fd
|
|
|
- * was returned by socket() or accept(), and 0 if fd was returned by
|
|
|
- * open(). Return the number of bytes read, or -1 on error. Only use
|
|
|
- * if fd is a blocking fd. */
|
|
|
-ssize_t
|
|
|
-read_all(tor_socket_t fd, char *buf, size_t count, int isSocket)
|
|
|
-{
|
|
|
- size_t numread = 0;
|
|
|
- ssize_t result;
|
|
|
-
|
|
|
- if (count > SIZE_T_CEILING || count > SSIZE_MAX) {
|
|
|
- errno = EINVAL;
|
|
|
- return -1;
|
|
|
- }
|
|
|
-
|
|
|
- while (numread < count) {
|
|
|
- if (isSocket)
|
|
|
- result = tor_socket_recv(fd, buf+numread, count-numread, 0);
|
|
|
- else
|
|
|
- result = read((int)fd, buf+numread, count-numread);
|
|
|
- if (result<0)
|
|
|
- return -1;
|
|
|
- else if (result == 0)
|
|
|
- break;
|
|
|
- numread += result;
|
|
|
- }
|
|
|
- return (ssize_t)numread;
|
|
|
-}
|
|
|
-
|
|
|
|
|
|
* Filesystem operations.
|
|
|
*/
|
|
|
|
|
|
-
|
|
|
- * we do nothing. On Windows, we remove a trailing slash, unless the path is
|
|
|
- * the root of a disk. */
|
|
|
-static void
|
|
|
-clean_name_for_stat(char *name)
|
|
|
-{
|
|
|
-#ifdef _WIN32
|
|
|
- size_t len = strlen(name);
|
|
|
- if (!len)
|
|
|
- return;
|
|
|
- if (name[len-1]=='\\' || name[len-1]=='/') {
|
|
|
- if (len == 1 || (len==3 && name[1]==':'))
|
|
|
- return;
|
|
|
- name[len-1]='\0';
|
|
|
- }
|
|
|
-#else
|
|
|
- (void)name;
|
|
|
-#endif
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * if unlinking the file succeeded, -1 and sets errno if unlinking fails.
|
|
|
- */
|
|
|
-
|
|
|
-MOCK_IMPL(int,
|
|
|
-tor_unlink,(const char *pathname))
|
|
|
-{
|
|
|
- return unlink(pathname);
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * FN_ERROR if filename can't be read, is NULL, or is zero-length,
|
|
|
- * FN_NOENT if it doesn't exist,
|
|
|
- * FN_FILE if it is a non-empty regular file, or a FIFO on unix-like systems,
|
|
|
- * FN_EMPTY for zero-byte regular files,
|
|
|
- * FN_DIR if it's a directory, and
|
|
|
- * FN_ERROR for any other file type.
|
|
|
- * On FN_ERROR and FN_NOENT, sets errno. (errno is not set when FN_ERROR
|
|
|
- * is returned due to an unhandled file type.) */
|
|
|
-file_status_t
|
|
|
-file_status(const char *fname)
|
|
|
-{
|
|
|
- struct stat st;
|
|
|
- char *f;
|
|
|
- int r;
|
|
|
- if (!fname || strlen(fname) == 0) {
|
|
|
- return FN_ERROR;
|
|
|
- }
|
|
|
- f = tor_strdup(fname);
|
|
|
- clean_name_for_stat(f);
|
|
|
- log_debug(LD_FS, "stat()ing %s", f);
|
|
|
- r = stat(sandbox_intern_string(f), &st);
|
|
|
- tor_free(f);
|
|
|
- if (r) {
|
|
|
- if (errno == ENOENT) {
|
|
|
- return FN_NOENT;
|
|
|
- }
|
|
|
- return FN_ERROR;
|
|
|
- }
|
|
|
- if (st.st_mode & S_IFDIR) {
|
|
|
- return FN_DIR;
|
|
|
- } else if (st.st_mode & S_IFREG) {
|
|
|
- if (st.st_size > 0) {
|
|
|
- return FN_FILE;
|
|
|
- } else if (st.st_size == 0) {
|
|
|
- return FN_EMPTY;
|
|
|
- } else {
|
|
|
- return FN_ERROR;
|
|
|
- }
|
|
|
-#ifndef _WIN32
|
|
|
- } else if (st.st_mode & S_IFIFO) {
|
|
|
- return FN_FILE;
|
|
|
-#endif
|
|
|
- } else {
|
|
|
- return FN_ERROR;
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * If <b>dirname</b> does not exist:
|
|
|
- * - if <b>check</b>&CPD_CREATE, try to create it and return 0 on success.
|
|
|
- * - if <b>check</b>&CPD_CHECK, and we think we can create it, return 0.
|
|
|
- * - if <b>check</b>&CPD_CHECK is false, and the directory exists, return 0.
|
|
|
- * - otherwise, return -1.
|
|
|
- * If CPD_GROUP_OK is set, then it's okay if the directory
|
|
|
- * is group-readable, but in all cases we create the directory mode 0700.
|
|
|
- * If CPD_GROUP_READ is set, existing directory behaves as CPD_GROUP_OK and
|
|
|
- * if the directory is created it will use mode 0750 with group read
|
|
|
- * permission. Group read privileges also assume execute permission
|
|
|
- * as norm for directories. If CPD_CHECK_MODE_ONLY is set, then we don't
|
|
|
- * alter the directory permissions if they are too permissive:
|
|
|
- * we just return -1.
|
|
|
- * When effective_user is not NULL, check permissions against the given user
|
|
|
- * and its primary group.
|
|
|
- */
|
|
|
-MOCK_IMPL(int,
|
|
|
-check_private_dir,(const char *dirname, cpd_check_t check,
|
|
|
- const char *effective_user))
|
|
|
-{
|
|
|
- int r;
|
|
|
- struct stat st;
|
|
|
-
|
|
|
- tor_assert(dirname);
|
|
|
-
|
|
|
-#ifndef _WIN32
|
|
|
- int fd;
|
|
|
- const struct passwd *pw = NULL;
|
|
|
- uid_t running_uid;
|
|
|
- gid_t running_gid;
|
|
|
-
|
|
|
-
|
|
|
- * Goal is to harden the implementation by removing any
|
|
|
- * potential for race between stat() and chmod().
|
|
|
- * chmod() accepts filename as argument. If an attacker can move
|
|
|
- * the file between stat() and chmod(), a potential race exists.
|
|
|
- *
|
|
|
- * Several suggestions taken from:
|
|
|
- * https:
|
|
|
- * Security/Conceptual/SecureCodingGuide/Articles/RaceConditions.html
|
|
|
- */
|
|
|
-
|
|
|
-
|
|
|
- * O_NOFOLLOW to ensure that it does not follow symbolic links */
|
|
|
- fd = open(sandbox_intern_string(dirname), O_NOFOLLOW);
|
|
|
-
|
|
|
-
|
|
|
- if (fd == -1) {
|
|
|
-
|
|
|
- if (errno != ENOENT) {
|
|
|
-
|
|
|
- log_warn(LD_FS, "Directory %s cannot be read: %s", dirname,
|
|
|
- strerror(errno));
|
|
|
- return -1;
|
|
|
- }
|
|
|
-
|
|
|
-
|
|
|
-
|
|
|
-
|
|
|
- if (check & CPD_CREATE) {
|
|
|
- log_info(LD_GENERAL, "Creating directory %s", dirname);
|
|
|
- if (check & CPD_GROUP_READ) {
|
|
|
- r = mkdir(dirname, 0750);
|
|
|
- } else {
|
|
|
- r = mkdir(dirname, 0700);
|
|
|
- }
|
|
|
-
|
|
|
-
|
|
|
- if (r) {
|
|
|
- log_warn(LD_FS, "Error creating directory %s: %s", dirname,
|
|
|
- strerror(errno));
|
|
|
- return -1;
|
|
|
- }
|
|
|
-
|
|
|
-
|
|
|
- * permissions on the directory will be checked again below.*/
|
|
|
- fd = open(sandbox_intern_string(dirname), O_NOFOLLOW);
|
|
|
-
|
|
|
- if (fd == -1) {
|
|
|
- log_warn(LD_FS, "Could not reopen recently created directory %s: %s",
|
|
|
- dirname,
|
|
|
- strerror(errno));
|
|
|
- return -1;
|
|
|
- } else {
|
|
|
- close(fd);
|
|
|
- }
|
|
|
-
|
|
|
- } else if (!(check & CPD_CHECK)) {
|
|
|
- log_warn(LD_FS, "Directory %s does not exist.", dirname);
|
|
|
- return -1;
|
|
|
- }
|
|
|
-
|
|
|
-
|
|
|
- * parent directory a little harder. */
|
|
|
- return 0;
|
|
|
- }
|
|
|
-
|
|
|
- tor_assert(fd >= 0);
|
|
|
-
|
|
|
-
|
|
|
-
|
|
|
- log_debug(LD_FS, "stat()ing %s", dirname);
|
|
|
-
|
|
|
- r = fstat(fd, &st);
|
|
|
- if (r == -1) {
|
|
|
- log_warn(LD_FS, "fstat() on directory %s failed.", dirname);
|
|
|
- close(fd);
|
|
|
- return -1;
|
|
|
- }
|
|
|
-
|
|
|
-
|
|
|
-
|
|
|
- if (!(st.st_mode & S_IFDIR)) {
|
|
|
- log_warn(LD_FS, "%s is not a directory", dirname);
|
|
|
- close(fd);
|
|
|
- return -1;
|
|
|
- }
|
|
|
-
|
|
|
- if (effective_user) {
|
|
|
-
|
|
|
- * If we have a problem, bail out. */
|
|
|
- pw = tor_getpwnam(effective_user);
|
|
|
- if (pw == NULL) {
|
|
|
- log_warn(LD_CONFIG, "Error setting configured user: %s not found",
|
|
|
- effective_user);
|
|
|
- close(fd);
|
|
|
- return -1;
|
|
|
- }
|
|
|
- running_uid = pw->pw_uid;
|
|
|
- running_gid = pw->pw_gid;
|
|
|
- } else {
|
|
|
- running_uid = getuid();
|
|
|
- running_gid = getgid();
|
|
|
- }
|
|
|
- if (st.st_uid != running_uid) {
|
|
|
- char *process_ownername = NULL, *file_ownername = NULL;
|
|
|
-
|
|
|
- {
|
|
|
- const struct passwd *pw_running = tor_getpwuid(running_uid);
|
|
|
- process_ownername = pw_running ? tor_strdup(pw_running->pw_name) :
|
|
|
- tor_strdup("<unknown>");
|
|
|
- }
|
|
|
-
|
|
|
- {
|
|
|
- const struct passwd *pw_stat = tor_getpwuid(st.st_uid);
|
|
|
- file_ownername = pw_stat ? tor_strdup(pw_stat->pw_name) :
|
|
|
- tor_strdup("<unknown>");
|
|
|
- }
|
|
|
-
|
|
|
- log_warn(LD_FS, "%s is not owned by this user (%s, %d) but by "
|
|
|
- "%s (%d). Perhaps you are running Tor as the wrong user?",
|
|
|
- dirname, process_ownername, (int)running_uid,
|
|
|
- file_ownername, (int)st.st_uid);
|
|
|
-
|
|
|
- tor_free(process_ownername);
|
|
|
- tor_free(file_ownername);
|
|
|
- close(fd);
|
|
|
- return -1;
|
|
|
- }
|
|
|
- if ( (check & (CPD_GROUP_OK|CPD_GROUP_READ))
|
|
|
- && (st.st_gid != running_gid) && (st.st_gid != 0)) {
|
|
|
- struct group *gr;
|
|
|
- char *process_groupname = NULL;
|
|
|
- gr = getgrgid(running_gid);
|
|
|
- process_groupname = gr ? tor_strdup(gr->gr_name) : tor_strdup("<unknown>");
|
|
|
- gr = getgrgid(st.st_gid);
|
|
|
-
|
|
|
- log_warn(LD_FS, "%s is not owned by this group (%s, %d) but by group "
|
|
|
- "%s (%d). Are you running Tor as the wrong user?",
|
|
|
- dirname, process_groupname, (int)running_gid,
|
|
|
- gr ? gr->gr_name : "<unknown>", (int)st.st_gid);
|
|
|
-
|
|
|
- tor_free(process_groupname);
|
|
|
- close(fd);
|
|
|
- return -1;
|
|
|
- }
|
|
|
- unsigned unwanted_bits = 0;
|
|
|
- if (check & (CPD_GROUP_OK|CPD_GROUP_READ)) {
|
|
|
- unwanted_bits = 0027;
|
|
|
- } else {
|
|
|
- unwanted_bits = 0077;
|
|
|
- }
|
|
|
- unsigned check_bits_filter = ~0;
|
|
|
- if (check & CPD_RELAX_DIRMODE_CHECK) {
|
|
|
- check_bits_filter = 0022;
|
|
|
- }
|
|
|
- if ((st.st_mode & unwanted_bits & check_bits_filter) != 0) {
|
|
|
- unsigned new_mode;
|
|
|
- if (check & CPD_CHECK_MODE_ONLY) {
|
|
|
- log_warn(LD_FS, "Permissions on directory %s are too permissive.",
|
|
|
- dirname);
|
|
|
- close(fd);
|
|
|
- return -1;
|
|
|
- }
|
|
|
- log_warn(LD_FS, "Fixing permissions on directory %s", dirname);
|
|
|
- new_mode = st.st_mode;
|
|
|
- new_mode |= 0700;
|
|
|
- if (check & CPD_GROUP_READ) {
|
|
|
- new_mode |= 0050;
|
|
|
- }
|
|
|
- new_mode &= ~unwanted_bits;
|
|
|
- if (fchmod(fd, new_mode)) {
|
|
|
- log_warn(LD_FS, "Could not chmod directory %s: %s", dirname,
|
|
|
- strerror(errno));
|
|
|
- close(fd);
|
|
|
- return -1;
|
|
|
- } else {
|
|
|
- close(fd);
|
|
|
- return 0;
|
|
|
- }
|
|
|
- }
|
|
|
- close(fd);
|
|
|
-#else
|
|
|
-
|
|
|
- (void)effective_user;
|
|
|
-
|
|
|
- char *f = tor_strdup(dirname);
|
|
|
- clean_name_for_stat(f);
|
|
|
- log_debug(LD_FS, "stat()ing %s", f);
|
|
|
- r = stat(sandbox_intern_string(f), &st);
|
|
|
- tor_free(f);
|
|
|
- if (r) {
|
|
|
- if (errno != ENOENT) {
|
|
|
- log_warn(LD_FS, "Directory %s cannot be read: %s", dirname,
|
|
|
- strerror(errno));
|
|
|
- return -1;
|
|
|
- }
|
|
|
- if (check & CPD_CREATE) {
|
|
|
- log_info(LD_GENERAL, "Creating directory %s", dirname);
|
|
|
- r = mkdir(dirname);
|
|
|
- if (r) {
|
|
|
- log_warn(LD_FS, "Error creating directory %s: %s", dirname,
|
|
|
- strerror(errno));
|
|
|
- return -1;
|
|
|
- }
|
|
|
- } else if (!(check & CPD_CHECK)) {
|
|
|
- log_warn(LD_FS, "Directory %s does not exist.", dirname);
|
|
|
- return -1;
|
|
|
- }
|
|
|
- return 0;
|
|
|
- }
|
|
|
- if (!(st.st_mode & S_IFDIR)) {
|
|
|
- log_warn(LD_FS, "%s is not a directory", dirname);
|
|
|
- return -1;
|
|
|
- }
|
|
|
-
|
|
|
-#endif
|
|
|
- return 0;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * the previous <b>fname</b> if possible. Return 0 on success, -1 on failure.
|
|
|
- *
|
|
|
- * This function replaces the old file atomically, if possible. This
|
|
|
- * function, and all other functions in util.c that create files, create them
|
|
|
- * with mode 0600.
|
|
|
- */
|
|
|
-MOCK_IMPL(int,
|
|
|
-write_str_to_file,(const char *fname, const char *str, int bin))
|
|
|
-{
|
|
|
-#ifdef _WIN32
|
|
|
- if (!bin && strchr(str, '\r')) {
|
|
|
- log_warn(LD_BUG,
|
|
|
- "We're writing a text string that already contains a CR to %s",
|
|
|
- escaped(fname));
|
|
|
- }
|
|
|
-#endif
|
|
|
- return write_bytes_to_file(fname, str, strlen(str), bin);
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * we can write into a temporary file, and either remove the file on
|
|
|
- * failure, or replace the original file on success. */
|
|
|
-struct open_file_t {
|
|
|
- char *tempname;
|
|
|
- char *filename;
|
|
|
- unsigned rename_on_close:1;
|
|
|
- unsigned binary:1;
|
|
|
- int fd;
|
|
|
- FILE *stdio_file;
|
|
|
-};
|
|
|
-
|
|
|
-
|
|
|
- * <b>open_flags</b> to the open() syscall, creating the file (if needed) with
|
|
|
- * access value <b>mode</b>. If the O_APPEND flag is set, we append to the
|
|
|
- * original file. Otherwise, we open a new temporary file in the same
|
|
|
- * directory, and either replace the original or remove the temporary file
|
|
|
- * when we're done.
|
|
|
- *
|
|
|
- * Return the fd for the newly opened file, and store working data in
|
|
|
- * *<b>data_out</b>. The caller should not close the fd manually:
|
|
|
- * instead, call finish_writing_to_file() or abort_writing_to_file().
|
|
|
- * Returns -1 on failure.
|
|
|
- *
|
|
|
- * NOTE: When not appending, the flags O_CREAT and O_TRUNC are treated
|
|
|
- * as true and the flag O_EXCL is treated as false.
|
|
|
- *
|
|
|
- * NOTE: Ordinarily, O_APPEND means "seek to the end of the file before each
|
|
|
- * write()". We don't do that.
|
|
|
- */
|
|
|
-int
|
|
|
-start_writing_to_file(const char *fname, int open_flags, int mode,
|
|
|
- open_file_t **data_out)
|
|
|
-{
|
|
|
- open_file_t *new_file = tor_malloc_zero(sizeof(open_file_t));
|
|
|
- const char *open_name;
|
|
|
- int append = 0;
|
|
|
-
|
|
|
- tor_assert(fname);
|
|
|
- tor_assert(data_out);
|
|
|
-#if (O_BINARY != 0 && O_TEXT != 0)
|
|
|
- tor_assert((open_flags & (O_BINARY|O_TEXT)) != 0);
|
|
|
-#endif
|
|
|
- new_file->fd = -1;
|
|
|
- new_file->filename = tor_strdup(fname);
|
|
|
- if (open_flags & O_APPEND) {
|
|
|
- open_name = fname;
|
|
|
- new_file->rename_on_close = 0;
|
|
|
- append = 1;
|
|
|
- open_flags &= ~O_APPEND;
|
|
|
- } else {
|
|
|
- tor_asprintf(&new_file->tempname, "%s.tmp", fname);
|
|
|
- open_name = new_file->tempname;
|
|
|
-
|
|
|
- open_flags |= O_CREAT|O_TRUNC;
|
|
|
- open_flags &= ~O_EXCL;
|
|
|
- new_file->rename_on_close = 1;
|
|
|
- }
|
|
|
-#if O_BINARY != 0
|
|
|
- if (open_flags & O_BINARY)
|
|
|
- new_file->binary = 1;
|
|
|
-#endif
|
|
|
-
|
|
|
- new_file->fd = tor_open_cloexec(open_name, open_flags, mode);
|
|
|
- if (new_file->fd < 0) {
|
|
|
- log_warn(LD_FS, "Couldn't open \"%s\" (%s) for writing: %s",
|
|
|
- open_name, fname, strerror(errno));
|
|
|
- goto err;
|
|
|
- }
|
|
|
- if (append) {
|
|
|
- if (tor_fd_seekend(new_file->fd) < 0) {
|
|
|
- log_warn(LD_FS, "Couldn't seek to end of file \"%s\": %s", open_name,
|
|
|
- strerror(errno));
|
|
|
- goto err;
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- *data_out = new_file;
|
|
|
-
|
|
|
- return new_file->fd;
|
|
|
-
|
|
|
- err:
|
|
|
- if (new_file->fd >= 0)
|
|
|
- close(new_file->fd);
|
|
|
- *data_out = NULL;
|
|
|
- tor_free(new_file->filename);
|
|
|
- tor_free(new_file->tempname);
|
|
|
- tor_free(new_file);
|
|
|
- return -1;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * that can be used to write to the same file. The caller should not mix
|
|
|
- * stdio calls with non-stdio calls. */
|
|
|
-FILE *
|
|
|
-fdopen_file(open_file_t *file_data)
|
|
|
-{
|
|
|
- tor_assert(file_data);
|
|
|
- if (file_data->stdio_file)
|
|
|
- return file_data->stdio_file;
|
|
|
- tor_assert(file_data->fd >= 0);
|
|
|
- if (!(file_data->stdio_file = fdopen(file_data->fd,
|
|
|
- file_data->binary?"ab":"a"))) {
|
|
|
- log_warn(LD_FS, "Couldn't fdopen \"%s\" [%d]: %s", file_data->filename,
|
|
|
- file_data->fd, strerror(errno));
|
|
|
- }
|
|
|
- return file_data->stdio_file;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * for start_writing_to_file, but */
|
|
|
-FILE *
|
|
|
-start_writing_to_stdio_file(const char *fname, int open_flags, int mode,
|
|
|
- open_file_t **data_out)
|
|
|
-{
|
|
|
- FILE *res;
|
|
|
- if (start_writing_to_file(fname, open_flags, mode, data_out)<0)
|
|
|
- return NULL;
|
|
|
- if (!(res = fdopen_file(*data_out))) {
|
|
|
- abort_writing_to_file(*data_out);
|
|
|
- *data_out = NULL;
|
|
|
- }
|
|
|
- return res;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * <b>file_data</b>. If we were writing into a temporary file, then delete
|
|
|
- * that file (if abort_write is true) or replaces the target file with
|
|
|
- * the temporary file (if abort_write is false). */
|
|
|
-static int
|
|
|
-finish_writing_to_file_impl(open_file_t *file_data, int abort_write)
|
|
|
-{
|
|
|
- int r = 0;
|
|
|
-
|
|
|
- tor_assert(file_data && file_data->filename);
|
|
|
- if (file_data->stdio_file) {
|
|
|
- if (fclose(file_data->stdio_file)) {
|
|
|
- log_warn(LD_FS, "Error closing \"%s\": %s", file_data->filename,
|
|
|
- strerror(errno));
|
|
|
- abort_write = r = -1;
|
|
|
- }
|
|
|
- } else if (file_data->fd >= 0 && close(file_data->fd) < 0) {
|
|
|
- log_warn(LD_FS, "Error flushing \"%s\": %s", file_data->filename,
|
|
|
- strerror(errno));
|
|
|
- abort_write = r = -1;
|
|
|
- }
|
|
|
-
|
|
|
- if (file_data->rename_on_close) {
|
|
|
- tor_assert(file_data->tempname && file_data->filename);
|
|
|
- if (!abort_write) {
|
|
|
- tor_assert(strcmp(file_data->filename, file_data->tempname));
|
|
|
- if (replace_file(file_data->tempname, file_data->filename)) {
|
|
|
- log_warn(LD_FS, "Error replacing \"%s\": %s", file_data->filename,
|
|
|
- strerror(errno));
|
|
|
- abort_write = r = -1;
|
|
|
- }
|
|
|
- }
|
|
|
- if (abort_write) {
|
|
|
- int res = unlink(file_data->tempname);
|
|
|
- if (res != 0) {
|
|
|
-
|
|
|
- log_warn(LD_FS, "Failed to unlink %s: %s",
|
|
|
- file_data->tempname, strerror(errno));
|
|
|
- r = -1;
|
|
|
- }
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- tor_free(file_data->filename);
|
|
|
- tor_free(file_data->tempname);
|
|
|
- tor_free(file_data);
|
|
|
-
|
|
|
- return r;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * needed, and if using a temporary file, replace the original file with
|
|
|
- * the temporary file. */
|
|
|
-int
|
|
|
-finish_writing_to_file(open_file_t *file_data)
|
|
|
-{
|
|
|
- return finish_writing_to_file_impl(file_data, 0);
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * needed, and if using a temporary file, delete it. */
|
|
|
-int
|
|
|
-abort_writing_to_file(open_file_t *file_data)
|
|
|
-{
|
|
|
- return finish_writing_to_file_impl(file_data, 1);
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * <b>fname</b> and write all the sized_chunk_t structs in <b>chunks</b> to
|
|
|
- * the file. Do so as atomically as possible e.g. by opening temp files and
|
|
|
- * renaming. */
|
|
|
-static int
|
|
|
-write_chunks_to_file_impl(const char *fname, const smartlist_t *chunks,
|
|
|
- int open_flags)
|
|
|
-{
|
|
|
- open_file_t *file = NULL;
|
|
|
- int fd;
|
|
|
- ssize_t result;
|
|
|
- fd = start_writing_to_file(fname, open_flags, 0600, &file);
|
|
|
- if (fd<0)
|
|
|
- return -1;
|
|
|
- SMARTLIST_FOREACH(chunks, sized_chunk_t *, chunk,
|
|
|
- {
|
|
|
- result = write_all(fd, chunk->bytes, chunk->len, 0);
|
|
|
- if (result < 0) {
|
|
|
- log_warn(LD_FS, "Error writing to \"%s\": %s", fname,
|
|
|
- strerror(errno));
|
|
|
- goto err;
|
|
|
- }
|
|
|
- tor_assert((size_t)result == chunk->len);
|
|
|
- });
|
|
|
-
|
|
|
- return finish_writing_to_file(file);
|
|
|
- err:
|
|
|
- abort_writing_to_file(file);
|
|
|
- return -1;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * <b>fname</b>, overwriting or creating the file as necessary.
|
|
|
- * If <b>no_tempfile</b> is 0 then the file will be written
|
|
|
- * atomically. */
|
|
|
-int
|
|
|
-write_chunks_to_file(const char *fname, const smartlist_t *chunks, int bin,
|
|
|
- int no_tempfile)
|
|
|
-{
|
|
|
- int flags = OPEN_FLAGS_REPLACE|(bin?O_BINARY:O_TEXT);
|
|
|
-
|
|
|
- if (no_tempfile) {
|
|
|
-
|
|
|
- flags |= O_APPEND;
|
|
|
- }
|
|
|
- return write_chunks_to_file_impl(fname, chunks, flags);
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- using the open() flags passed in <b>flags</b>. */
|
|
|
-static int
|
|
|
-write_bytes_to_file_impl(const char *fname, const char *str, size_t len,
|
|
|
- int flags)
|
|
|
-{
|
|
|
- int r;
|
|
|
- sized_chunk_t c = { str, len };
|
|
|
- smartlist_t *chunks = smartlist_new();
|
|
|
- smartlist_add(chunks, &c);
|
|
|
- r = write_chunks_to_file_impl(fname, chunks, flags);
|
|
|
- smartlist_free(chunks);
|
|
|
- return r;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * string. Instead, we write <b>len</b> bytes, starting at <b>str</b>. */
|
|
|
-MOCK_IMPL(int,
|
|
|
-write_bytes_to_file,(const char *fname, const char *str, size_t len,
|
|
|
- int bin))
|
|
|
-{
|
|
|
- return write_bytes_to_file_impl(fname, str, len,
|
|
|
- OPEN_FLAGS_REPLACE|(bin?O_BINARY:O_TEXT));
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * to the end of the file instead of overwriting it. */
|
|
|
-int
|
|
|
-append_bytes_to_file(const char *fname, const char *str, size_t len,
|
|
|
- int bin)
|
|
|
-{
|
|
|
- return write_bytes_to_file_impl(fname, str, len,
|
|
|
- OPEN_FLAGS_APPEND|(bin?O_BINARY:O_TEXT));
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- already residing in <b>fname</b>. */
|
|
|
-int
|
|
|
-write_bytes_to_new_file(const char *fname, const char *str, size_t len,
|
|
|
- int bin)
|
|
|
-{
|
|
|
- return write_bytes_to_file_impl(fname, str, len,
|
|
|
- OPEN_FLAGS_DONT_REPLACE|
|
|
|
- (bin?O_BINARY:O_TEXT));
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * Read the contents of the open file <b>fd</b> presuming it is a FIFO
|
|
|
- * (or similar) file descriptor for which the size of the file isn't
|
|
|
- * known ahead of time. Return NULL on failure, and a NUL-terminated
|
|
|
- * string on success. On success, set <b>sz_out</b> to the number of
|
|
|
- * bytes read.
|
|
|
- */
|
|
|
-char *
|
|
|
-read_file_to_str_until_eof(int fd, size_t max_bytes_to_read, size_t *sz_out)
|
|
|
-{
|
|
|
- ssize_t r;
|
|
|
- size_t pos = 0;
|
|
|
- char *string = NULL;
|
|
|
- size_t string_max = 0;
|
|
|
-
|
|
|
- if (max_bytes_to_read+1 >= SIZE_T_CEILING) {
|
|
|
- errno = EINVAL;
|
|
|
- return NULL;
|
|
|
- }
|
|
|
-
|
|
|
- do {
|
|
|
-
|
|
|
- * performance here, we should be doubling. But in practice we shouldn't
|
|
|
- * be using this function on big files anyway. */
|
|
|
- string_max = pos + 1024;
|
|
|
- if (string_max > max_bytes_to_read)
|
|
|
- string_max = max_bytes_to_read + 1;
|
|
|
- string = tor_realloc(string, string_max);
|
|
|
- r = read(fd, string + pos, string_max - pos - 1);
|
|
|
- if (r < 0) {
|
|
|
- int save_errno = errno;
|
|
|
- tor_free(string);
|
|
|
- errno = save_errno;
|
|
|
- return NULL;
|
|
|
- }
|
|
|
-
|
|
|
- pos += r;
|
|
|
- } while (r > 0 && pos < max_bytes_to_read);
|
|
|
-
|
|
|
- tor_assert(pos < string_max);
|
|
|
- *sz_out = pos;
|
|
|
- string[pos] = '\0';
|
|
|
- return string;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * string; return the string on success or NULL on failure.
|
|
|
- *
|
|
|
- * If <b>stat_out</b> is provided, store the result of stat()ing the
|
|
|
- * file into <b>stat_out</b>.
|
|
|
- *
|
|
|
- * If <b>flags</b> & RFTS_BIN, open the file in binary mode.
|
|
|
- * If <b>flags</b> & RFTS_IGNORE_MISSING, don't warn if the file
|
|
|
- * doesn't exist.
|
|
|
- */
|
|
|
-
|
|
|
- * This function <em>may</em> return an erroneous result if the file
|
|
|
- * is modified while it is running, but must not crash or overflow.
|
|
|
- * Right now, the error case occurs when the file length grows between
|
|
|
- * the call to stat and the call to read_all: the resulting string will
|
|
|
- * be truncated.
|
|
|
- */
|
|
|
-MOCK_IMPL(char *,
|
|
|
-read_file_to_str, (const char *filename, int flags, struct stat *stat_out))
|
|
|
-{
|
|
|
- int fd;
|
|
|
- struct stat statbuf;
|
|
|
- char *string;
|
|
|
- ssize_t r;
|
|
|
- int bin = flags & RFTS_BIN;
|
|
|
-
|
|
|
- tor_assert(filename);
|
|
|
-
|
|
|
- fd = tor_open_cloexec(filename,O_RDONLY|(bin?O_BINARY:O_TEXT),0);
|
|
|
- if (fd<0) {
|
|
|
- int severity = LOG_WARN;
|
|
|
- int save_errno = errno;
|
|
|
- if (errno == ENOENT && (flags & RFTS_IGNORE_MISSING))
|
|
|
- severity = LOG_INFO;
|
|
|
- log_fn(severity, LD_FS,"Could not open \"%s\": %s",filename,
|
|
|
- strerror(errno));
|
|
|
- errno = save_errno;
|
|
|
- return NULL;
|
|
|
- }
|
|
|
-
|
|
|
- if (fstat(fd, &statbuf)<0) {
|
|
|
- int save_errno = errno;
|
|
|
- close(fd);
|
|
|
- log_warn(LD_FS,"Could not fstat \"%s\".",filename);
|
|
|
- errno = save_errno;
|
|
|
- return NULL;
|
|
|
- }
|
|
|
-
|
|
|
-#ifndef _WIN32
|
|
|
-
|
|
|
- * this many bytes. It's insane overkill for most uses. */
|
|
|
-#define FIFO_READ_MAX (1024*1024)
|
|
|
- if (S_ISFIFO(statbuf.st_mode)) {
|
|
|
- size_t sz = 0;
|
|
|
- string = read_file_to_str_until_eof(fd, FIFO_READ_MAX, &sz);
|
|
|
- int save_errno = errno;
|
|
|
- if (string && stat_out) {
|
|
|
- statbuf.st_size = sz;
|
|
|
- memcpy(stat_out, &statbuf, sizeof(struct stat));
|
|
|
- }
|
|
|
- close(fd);
|
|
|
- if (!string)
|
|
|
- errno = save_errno;
|
|
|
- return string;
|
|
|
- }
|
|
|
-#endif
|
|
|
-
|
|
|
- if ((uint64_t)(statbuf.st_size)+1 >= SIZE_T_CEILING) {
|
|
|
- close(fd);
|
|
|
- errno = EINVAL;
|
|
|
- return NULL;
|
|
|
- }
|
|
|
-
|
|
|
- string = tor_malloc((size_t)(statbuf.st_size+1));
|
|
|
-
|
|
|
- r = read_all(fd,string,(size_t)statbuf.st_size,0);
|
|
|
- if (r<0) {
|
|
|
- int save_errno = errno;
|
|
|
- log_warn(LD_FS,"Error reading from file \"%s\": %s", filename,
|
|
|
- strerror(errno));
|
|
|
- tor_free(string);
|
|
|
- close(fd);
|
|
|
- errno = save_errno;
|
|
|
- return NULL;
|
|
|
- }
|
|
|
- string[r] = '\0';
|
|
|
-
|
|
|
-#if defined(_WIN32) || defined(__CYGWIN__)
|
|
|
- if (!bin && strchr(string, '\r')) {
|
|
|
- log_debug(LD_FS, "We didn't convert CRLF to LF as well as we hoped "
|
|
|
- "when reading %s. Coping.",
|
|
|
- filename);
|
|
|
- tor_strstrip(string, "\r");
|
|
|
- r = strlen(string);
|
|
|
- }
|
|
|
- if (!bin) {
|
|
|
- statbuf.st_size = (size_t) r;
|
|
|
- } else
|
|
|
-#endif
|
|
|
- if (r != statbuf.st_size) {
|
|
|
-
|
|
|
- * match for size. */
|
|
|
- int save_errno = errno;
|
|
|
- log_warn(LD_FS,"Could read only %d of %ld bytes of file \"%s\".",
|
|
|
- (int)r, (long)statbuf.st_size,filename);
|
|
|
- tor_free(string);
|
|
|
- close(fd);
|
|
|
- errno = save_errno;
|
|
|
- return NULL;
|
|
|
- }
|
|
|
- close(fd);
|
|
|
- if (stat_out) {
|
|
|
- memcpy(stat_out, &statbuf, sizeof(struct stat));
|
|
|
- }
|
|
|
-
|
|
|
- return string;
|
|
|
-}
|
|
|
-
|
|
|
#define TOR_ISODIGIT(c) ('0' <= (c) && (c) <= '7')
|
|
|
|
|
|
|
|
@@ -2050,185 +1199,6 @@ unescape_string(const char *s, char **result, size_t *size_out)
|
|
|
}
|
|
|
}
|
|
|
|
|
|
-
|
|
|
- * enclosing quotes. Backslashes are not unescaped. Return the unquoted
|
|
|
- * <b>path</b> on success or 0 if <b>path</b> is not quoted correctly. */
|
|
|
-char *
|
|
|
-get_unquoted_path(const char *path)
|
|
|
-{
|
|
|
- size_t len = strlen(path);
|
|
|
-
|
|
|
- if (len == 0) {
|
|
|
- return tor_strdup("");
|
|
|
- }
|
|
|
-
|
|
|
- int has_start_quote = (path[0] == '\"');
|
|
|
- int has_end_quote = (len > 0 && path[len-1] == '\"');
|
|
|
- if (has_start_quote != has_end_quote || (len == 1 && has_start_quote)) {
|
|
|
- return NULL;
|
|
|
- }
|
|
|
-
|
|
|
- char *unquoted_path = tor_malloc(len - has_start_quote - has_end_quote + 1);
|
|
|
- char *s = unquoted_path;
|
|
|
- size_t i;
|
|
|
- for (i = has_start_quote; i < len - has_end_quote; i++) {
|
|
|
- if (path[i] == '\"' && (i > 0 && path[i-1] == '\\')) {
|
|
|
- *(s-1) = path[i];
|
|
|
- } else if (path[i] != '\"') {
|
|
|
- *s++ = path[i];
|
|
|
- } else {
|
|
|
- tor_free(unquoted_path);
|
|
|
- return NULL;
|
|
|
- }
|
|
|
- }
|
|
|
- *s = '\0';
|
|
|
- return unquoted_path;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * string. */
|
|
|
-char *
|
|
|
-expand_filename(const char *filename)
|
|
|
-{
|
|
|
- tor_assert(filename);
|
|
|
-#ifdef _WIN32
|
|
|
-
|
|
|
- * http:
|
|
|
- * Chapter+3.+Input+Validation/3.7+Validating+Filenames+and+Paths/
|
|
|
- */
|
|
|
- return tor_strdup(filename);
|
|
|
-#else
|
|
|
- if (*filename == '~') {
|
|
|
- char *home, *result=NULL;
|
|
|
- const char *rest;
|
|
|
-
|
|
|
- if (filename[1] == '/' || filename[1] == '\0') {
|
|
|
- home = getenv("HOME");
|
|
|
- if (!home) {
|
|
|
- log_warn(LD_CONFIG, "Couldn't find $HOME environment variable while "
|
|
|
- "expanding \"%s\"; defaulting to \"\".", filename);
|
|
|
- home = tor_strdup("");
|
|
|
- } else {
|
|
|
- home = tor_strdup(home);
|
|
|
- }
|
|
|
- rest = strlen(filename)>=2?(filename+2):"";
|
|
|
- } else {
|
|
|
-#ifdef HAVE_PWD_H
|
|
|
- char *username, *slash;
|
|
|
- slash = strchr(filename, '/');
|
|
|
- if (slash)
|
|
|
- username = tor_strndup(filename+1,slash-filename-1);
|
|
|
- else
|
|
|
- username = tor_strdup(filename+1);
|
|
|
- if (!(home = get_user_homedir(username))) {
|
|
|
- log_warn(LD_CONFIG,"Couldn't get homedir for \"%s\"",username);
|
|
|
- tor_free(username);
|
|
|
- return NULL;
|
|
|
- }
|
|
|
- tor_free(username);
|
|
|
- rest = slash ? (slash+1) : "";
|
|
|
-#else
|
|
|
- log_warn(LD_CONFIG, "Couldn't expand homedir on system without pwd.h");
|
|
|
- return tor_strdup(filename);
|
|
|
-#endif
|
|
|
- }
|
|
|
- tor_assert(home);
|
|
|
-
|
|
|
- if (strlen(home)>1 && !strcmpend(home,PATH_SEPARATOR)) {
|
|
|
- home[strlen(home)-1] = '\0';
|
|
|
- }
|
|
|
- tor_asprintf(&result,"%s"PATH_SEPARATOR"%s",home,rest);
|
|
|
- tor_free(home);
|
|
|
- return result;
|
|
|
- } else {
|
|
|
- return tor_strdup(filename);
|
|
|
- }
|
|
|
-#endif
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
- * Return NULL on error or if <b>dirname</b> is not a directory.
|
|
|
- */
|
|
|
-MOCK_IMPL(smartlist_t *,
|
|
|
-tor_listdir, (const char *dirname))
|
|
|
-{
|
|
|
- smartlist_t *result;
|
|
|
-#ifdef _WIN32
|
|
|
- char *pattern=NULL;
|
|
|
- TCHAR tpattern[MAX_PATH] = {0};
|
|
|
- char name[MAX_PATH*2+1] = {0};
|
|
|
- HANDLE handle;
|
|
|
- WIN32_FIND_DATA findData;
|
|
|
- tor_asprintf(&pattern, "%s\\*", dirname);
|
|
|
-#ifdef UNICODE
|
|
|
- mbstowcs(tpattern,pattern,MAX_PATH);
|
|
|
-#else
|
|
|
- strlcpy(tpattern, pattern, MAX_PATH);
|
|
|
-#endif
|
|
|
- if (INVALID_HANDLE_VALUE == (handle = FindFirstFile(tpattern, &findData))) {
|
|
|
- tor_free(pattern);
|
|
|
- return NULL;
|
|
|
- }
|
|
|
- result = smartlist_new();
|
|
|
- while (1) {
|
|
|
-#ifdef UNICODE
|
|
|
- wcstombs(name,findData.cFileName,MAX_PATH);
|
|
|
- name[sizeof(name)-1] = '\0';
|
|
|
-#else
|
|
|
- strlcpy(name,findData.cFileName,sizeof(name));
|
|
|
-#endif
|
|
|
- if (strcmp(name, ".") &&
|
|
|
- strcmp(name, "..")) {
|
|
|
- smartlist_add_strdup(result, name);
|
|
|
- }
|
|
|
- if (!FindNextFile(handle, &findData)) {
|
|
|
- DWORD err;
|
|
|
- if ((err = GetLastError()) != ERROR_NO_MORE_FILES) {
|
|
|
- char *errstr = format_win32_error(err);
|
|
|
- log_warn(LD_FS, "Error reading directory '%s': %s", dirname, errstr);
|
|
|
- tor_free(errstr);
|
|
|
- }
|
|
|
- break;
|
|
|
- }
|
|
|
- }
|
|
|
- FindClose(handle);
|
|
|
- tor_free(pattern);
|
|
|
-#else
|
|
|
- const char *prot_dname = sandbox_intern_string(dirname);
|
|
|
- DIR *d;
|
|
|
- struct dirent *de;
|
|
|
- if (!(d = opendir(prot_dname)))
|
|
|
- return NULL;
|
|
|
-
|
|
|
- result = smartlist_new();
|
|
|
- while ((de = readdir(d))) {
|
|
|
- if (!strcmp(de->d_name, ".") ||
|
|
|
- !strcmp(de->d_name, ".."))
|
|
|
- continue;
|
|
|
- smartlist_add_strdup(result, de->d_name);
|
|
|
- }
|
|
|
- closedir(d);
|
|
|
-#endif
|
|
|
- return result;
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
-int
|
|
|
-path_is_relative(const char *filename)
|
|
|
-{
|
|
|
- if (filename && filename[0] == '/')
|
|
|
- return 0;
|
|
|
-#ifdef _WIN32
|
|
|
- else if (filename && filename[0] == '\\')
|
|
|
- return 0;
|
|
|
- else if (filename && strlen(filename)>3 && TOR_ISALPHA(filename[0]) &&
|
|
|
- filename[1] == ':' && filename[2] == '\\')
|
|
|
- return 0;
|
|
|
-#endif
|
|
|
- else
|
|
|
- return 1;
|
|
|
-}
|
|
|
-
|
|
|
|
|
|
* Process helpers
|
|
|
* ===== */
|