summaryrefslogtreecommitdiff
path: root/appl/cmd/9export.b
diff options
context:
space:
mode:
Diffstat (limited to 'appl/cmd/9export.b')
-rw-r--r--appl/cmd/9export.b180
1 files changed, 180 insertions, 0 deletions
diff --git a/appl/cmd/9export.b b/appl/cmd/9export.b
new file mode 100644
index 00000000..5df1c8cf
--- /dev/null
+++ b/appl/cmd/9export.b
@@ -0,0 +1,180 @@
+implement P9export;
+
+include "sys.m";
+ sys: Sys;
+
+include "draw.m";
+include "keyring.m";
+include "security.m";
+include "factotum.m";
+include "encoding.m";
+include "arg.m";
+
+P9export: module
+{
+ init: fn(nil: ref Draw->Context, nil: list of string);
+};
+
+factotumfile := "/mnt/factotum/rpc";
+
+fail(status, msg: string)
+{
+ sys->fprint(sys->fildes(2), "9export: %s\n", msg);
+ raise "fail:"+status;
+}
+
+nomod(mod: string)
+{
+ fail("load", sys->sprint("can't load %s: %r", mod));
+}
+
+init(nil: ref Draw->Context, args: list of string)
+{
+ sys = load Sys Sys->PATH;
+
+ arg := load Arg Arg->PATH;
+ if(arg == nil)
+ nomod(Arg->PATH);
+
+ arg->init(args);
+ arg->setusage("9export [-aA9] [-k keyspec] [-e enc digest]");
+ flags := 0;
+ cryptalg := ""; # will be rc4_256 sha1
+ keyspec := "";
+ noauth := 0;
+ xflag := Sys->EXPWAIT;
+ while((o := arg->opt()) != 0)
+ case o {
+ 'a' =>
+ xflag = Sys->EXPASYNC;
+ 'A' =>
+ noauth = 1;
+ 'e' =>
+ cryptalg = arg->earg();
+ if(cryptalg == "clear")
+ cryptalg = nil;
+ 'k' =>
+ keyspec = arg->earg();
+ '9' =>
+ ;
+ * =>
+ arg->usage();
+ }
+ args = arg->argv();
+ arg = nil;
+
+ sys->pctl(Sys->FORKFD|Sys->FORKNS, nil);
+
+ fd := sys->fildes(0);
+
+ secret: array of byte;
+ if(noauth == 0){
+ factotum := load Factotum Factotum->PATH;
+ if(factotum == nil)
+ nomod(Factotum->PATH);
+ factotum->init();
+ facfd := sys->open(factotumfile, Sys->ORDWR);
+ if(facfd == nil)
+ fail("factotum", sys->sprint("can't open %s: %r", factotumfile));
+ ai := factotum->proxy(fd, facfd, "proto=p9any role=server "+keyspec);
+ if(ai == nil)
+ fail("auth", sys->sprint("can't authenticate 9export: %r"));
+ secret = ai.secret;
+ }
+
+ # read tree; it's a Plan 9 bug that there's no reliable delimiter
+ btree := array[2048] of byte;
+ n := sys->read(fd, btree, len btree);
+ if(n <= 0)
+ fail("tree", sys->sprint("can't read tree: %r"));
+ tree := string btree[0:n];
+ if(sys->chdir(tree) < 0){
+ sys->fprint(fd, "chdir(%d:\"%s\"): %r", n, tree);
+ fail("tree", sys->sprint("bad tree: %s", tree));
+ }
+ if(sys->write(fd, array of byte "OK", 2) != 2)
+ fail("tree", sys->sprint("can't OK tree: %r"));
+ impo := array[2048] of byte;
+ for(n = 0; n < len impo; n++)
+ if(sys->read(fd, impo[n:], 1) != 1)
+ fail("impo", sys->sprint("can't read impo: %r"));
+ else if(impo[n] == byte 0 || impo[n] == byte '\n')
+ break;
+ if(n < 4 || string impo[0:4] != "impo")
+ fail("impo", "wasn't impo: possibly old import/cpu");
+ if(noauth == 0 && cryptalg != nil){
+ if(secret == nil)
+ fail("import", "didn't establish shared secret");
+ random := load Random Random->PATH;
+ if(random == nil)
+ nomod(Random->PATH);
+ kr := load Keyring Keyring->PATH;
+ if(kr == nil)
+ nomod(Keyring->PATH);
+ ssl := load SSL SSL->PATH;
+ if(ssl == nil)
+ nomod(SSL->PATH);
+ base64 := load Encoding Encoding->BASE64PATH;
+ if(base64 == nil)
+ nomod(Encoding->BASE64PATH);
+ key := array[16] of byte; # myrand[4] secret[8] hisrand[4]
+ key[0:] = random->randombuf(Random->ReallyRandom, 4);
+ ns := len secret;
+ if(ns > 8)
+ ns = 8;
+ key[12:] = secret[0:ns];
+ if(sys->write(fd, key[12:], 4) != 4)
+ fail("import", sys->sprint("can't write key to remote: %r"));
+ if(readn(fd, key, 4) != 4)
+ fail("import", sys->sprint("can't read remote key: %r"));
+ digest := array[Keyring->SHA1dlen] of byte;
+ kr->sha1(key, len key, digest, nil);
+ err: string;
+ (fd, err) = pushssl(fd, base64->dec(S(digest[10:20])), base64->dec(S(digest[0:10])), cryptalg);
+ if(err != nil)
+ fail("import", sys->sprint("can't push security layer: %s", err));
+ }
+ if(sys->export(fd, ".", xflag) < 0)
+ fail("export", sys->sprint("can't export %s: %r", tree));
+}
+
+readn(fd: ref Sys->FD, buf: array of byte, nb: int): int
+{
+ for(nr := 0; nr < nb;){
+ n := sys->read(fd, buf[nr:], nb-nr);
+ if(n <= 0){
+ if(nr == 0)
+ return n;
+ break;
+ }
+ nr += n;
+ }
+ return nr;
+}
+
+S(a: array of byte): string
+{
+ s := "";
+ for(i:=0; i<len a; i++)
+ s += sys->sprint("%.2ux", int a[i]);
+ return s;
+}
+
+pushssl(fd: ref Sys->FD, secretin, secretout: array of byte, alg: string): (ref Sys->FD, string)
+{
+ ssl := load SSL SSL->PATH;
+ if(ssl == nil)
+ nomod(SSL->PATH);
+
+ (err, c) := ssl->connect(fd);
+ if(err != nil)
+ return (nil, "can't connect ssl: " + err);
+
+ err = ssl->secret(c, secretin, secretout);
+ if(err != nil)
+ return (nil, "can't write secret: " + err);
+ if(sys->fprint(c.cfd, "alg %s", alg) < 0)
+ return (nil, sys->sprint("can't push algorithm %s: %r", alg));
+
+ return (c.dfd, nil);
+}