nonblocking chmod, add chmod sftp test

pull/134/head
Jacob Barthelmeh 2019-02-07 17:51:52 -07:00
parent 854fb8d7e8
commit aa7330f7fc
5 changed files with 214 additions and 70 deletions

View File

@ -1115,8 +1115,11 @@ THREAD_RETURN WOLFSSH_THREAD sftpclient_test(void* args)
ret = doCmds(args); ret = doCmds(args);
XFREE(workingDir, NULL, DYNAMIC_TYPE_TMP_BUFFER); XFREE(workingDir, NULL, DYNAMIC_TYPE_TMP_BUFFER);
if (ret == WS_SUCCESS) if (ret == WS_SUCCESS) {
ret = wolfSSH_shutdown(ssh); if (wolfSSH_shutdown(ssh) != WS_SUCCESS) {
printf("error with wolfSSH_shutdown(), already disconnected?\n");
}
}
WCLOSESOCKET(sockFd); WCLOSESOCKET(sockFd);
wolfSSH_free(ssh); wolfSSH_free(ssh);
wolfSSH_CTX_free(ctx); wolfSSH_CTX_free(ctx);

View File

@ -58,13 +58,13 @@ trap do_trap INT TERM
[ ! -x ./examples/sftpclient/wolfsftp ] && echo -e "\n\nClient doesn't exist" && exit 1 [ ! -x ./examples/sftpclient/wolfsftp ] && echo -e "\n\nClient doesn't exist" && exit 1
echo "Test basic connection"
./examples/echoserver/echoserver -1 -R $ready_file & ./examples/echoserver/echoserver -1 -R $ready_file &
server_pid=$! server_pid=$!
create_port create_port
echo "ls\nexit" | ./examples/sftpclient/wolfsftp -u jill -P upthehill -p $port echo "exit" | ./examples/sftpclient/wolfsftp -u jill -P upthehill -p $port
RESULT=$? RESULT=$?
remove_ready_file remove_ready_file
# if fail here then is a settings issue so return 0
if [ $RESULT -ne 0 ]; then if [ $RESULT -ne 0 ]; then
echo -e "\n\nfailed to connect" echo -e "\n\nfailed to connect"
do_cleanup do_cleanup
@ -72,13 +72,13 @@ if [ $RESULT -ne 0 ]; then
fi fi
# Test non blocking connection # Test non blocking connection
echo "Test non blocking connection"
./examples/echoserver/echoserver -N -1 -R $ready_file & ./examples/echoserver/echoserver -N -1 -R $ready_file &
server_pid=$! server_pid=$!
create_port create_port
echo "ls\nexit" | ./examples/sftpclient/wolfsftp -N -u jill -P upthehill -p $port echo "exit" | ./examples/sftpclient/wolfsftp -N -u jill -P upthehill -p $port
RESULT=$? RESULT=$?
remove_ready_file remove_ready_file
# if fail here then is a settings issue so return 0
if [ $RESULT -ne 0 ]; then if [ $RESULT -ne 0 ]; then
echo -e "\n\nfailed to connect" echo -e "\n\nfailed to connect"
do_cleanup do_cleanup
@ -86,14 +86,14 @@ if [ $RESULT -ne 0 ]; then
fi fi
# Test of setting directory # Test of setting directory
echo "Test of setting directory"
PWD=`pwd` PWD=`pwd`
./examples/echoserver/echoserver -d $PWD/examples -1 -R $ready_file & ./examples/echoserver/echoserver -d $PWD/examples -1 -R $ready_file &
server_pid=$! server_pid=$!
create_port create_port
echo "ls\nexit" | ./examples/sftpclient/wolfsftp -N -u jill -P upthehill -p $port echo "exit" | ./examples/sftpclient/wolfsftp -N -u jill -P upthehill -p $port
RESULT=$? RESULT=$?
remove_ready_file remove_ready_file
# if fail here then is a settings issue so return 0
if [ $RESULT -ne 0 ]; then if [ $RESULT -ne 0 ]; then
echo -e "\n\nfailed to connect" echo -e "\n\nfailed to connect"
do_cleanup do_cleanup

View File

@ -58,6 +58,20 @@ enum WS_SFTP_STATE_ID {
STATE_ID_RMDIR = 0x4000, STATE_ID_RMDIR = 0x4000,
STATE_ID_RENAME = 0x8000, STATE_ID_RENAME = 0x8000,
STATE_ID_RECV = 0x10000, STATE_ID_RECV = 0x10000,
STATE_ID_CHMOD = 0x20000,
STATE_ID_SETATR = 0x40000,
};
enum WS_SFTP_CHMOD_STATE_ID {
STATE_CHMOD_GET,
STATE_CHMOD_SEND
};
enum WS_SFTP_SETATR_STATE_ID {
STATE_SET_ATR_INIT,
STATE_SET_ATR_SEND,
STATE_SET_ATR_GET,
STATE_SET_ATR_STATUS
}; };
enum WS_SFTP_RMDIR_STATE_ID { enum WS_SFTP_RMDIR_STATE_ID {
@ -123,6 +137,20 @@ enum WS_SFTP_LSTAT_STATE_ID {
STATE_LSTAT_CLEANUP STATE_LSTAT_CLEANUP
}; };
typedef struct WS_SFTP_CHMOD_STATE {
enum WS_SFTP_CHMOD_STATE_ID state;
WS_SFTP_FILEATRB atr;
} WS_SFTP_CHMOD_STATE;
typedef struct WS_SFTP_SETATR_STATE {
enum WS_SFTP_SETATR_STATE_ID state;
byte* data;
word32 sz;
word32 reqId;
} WS_SFTP_SETATR_STATE;
typedef struct WS_SFTP_LSTAT_STATE { typedef struct WS_SFTP_LSTAT_STATE {
enum WS_SFTP_LSTAT_STATE_ID state; enum WS_SFTP_LSTAT_STATE_ID state;
word32 reqId; word32 reqId;
@ -497,6 +525,21 @@ static void wolfSSH_SFTP_ClearState(WOLFSSH* ssh, enum WS_SFTP_STATE_ID state)
XFREE(ssh->recvState, ssh->ctx->heap, DYNTYPE_SFTP_STATE); XFREE(ssh->recvState, ssh->ctx->heap, DYNTYPE_SFTP_STATE);
ssh->recvState = NULL; ssh->recvState = NULL;
} }
if (state & STATE_ID_CHMOD) {
if (ssh->chmodState) {
XFREE(ssh->chmodState, ssh->ctx->heap, DYNTYPE_SFTP_STATE);
ssh->chmodState = NULL;
}
}
if (state & STATE_ID_SETATR) {
if (ssh->setatrState) {
XFREE(ssh->setatrState->data, ssh->ctx->heap, DYNTYPE_BUFFER);
XFREE(ssh->setatrState, ssh->ctx->heap, DYNTYPE_SFTP_STATE);
ssh->setatrState = NULL;
}
}
} }
} }
@ -5009,29 +5052,63 @@ WS_SFTPNAME* wolfSSH_SFTP_LS(WOLFSSH* ssh, char* dir)
*/ */
int wolfSSH_SFTP_CHMOD(WOLFSSH* ssh, char* n, char* oct) int wolfSSH_SFTP_CHMOD(WOLFSSH* ssh, char* n, char* oct)
{ {
int ret; struct WS_SFTP_CHMOD_STATE* state = NULL;
int ret = WS_FATAL_ERROR;
int mode; int mode;
WS_SFTP_FILEATRB atr;
if (ssh == NULL || n == NULL || oct == NULL) { if (ssh == NULL || n == NULL || oct == NULL) {
return WS_BAD_ARGUMENT; return WS_BAD_ARGUMENT;
} }
/* convert from octal to decimal */ state = ssh->chmodState;
mode = wolfSSH_oct2dec(ssh, (byte*)oct, (word32)WSTRLEN(oct)); if (state == NULL) {
if (mode < 0) { state = (WS_SFTP_CHMOD_STATE*)WMALLOC(sizeof(WS_SFTP_CHMOD_STATE),
return mode; ssh->ctx->heap, DYNTYPE_SFTP_STATE);
if (state == NULL) {
ssh->error = WS_MEMORY_E;
return WS_FATAL_ERROR;
}
WMEMSET(state, 0, sizeof(WS_SFTP_CHMOD_STATE));
ssh->chmodState = state;
state->state = STATE_CHMOD_GET;
} }
switch (state->state) {
case STATE_CHMOD_GET:
/* get current attributes of path */ /* get current attributes of path */
WMEMSET(&atr, 0, sizeof(WS_SFTP_FILEATRB)); if ((ret = wolfSSH_SFTP_STAT(ssh, n, &state->atr)) != WS_SUCCESS) {
if ((ret = wolfSSH_SFTP_STAT(ssh, n, &atr)) != WS_SUCCESS) { if (ssh->error != WS_WANT_READ && ssh->error != WS_WANT_WRITE) {
break;
}
return ret; return ret;
} }
/* convert from octal to decimal */
mode = wolfSSH_oct2dec(ssh, (byte*)oct, (word32)WSTRLEN(oct));
if (mode < 0) {
ret = WS_FATAL_ERROR;
break;
}
/* update permissions */ /* update permissions */
atr.per = mode; state->atr.per = mode;
return wolfSSH_SFTP_SetSTAT(ssh, n, &atr); state->state = STATE_CHMOD_SEND;
FALL_THROUGH;
/* no break */
case STATE_CHMOD_SEND:
ret = wolfSSH_SFTP_SetSTAT(ssh, n, &state->atr);
if (ssh->error == WS_WANT_READ || ssh->error == WS_WANT_WRITE) {
return ret;
}
break;
default:
WLOG(WS_LOG_SFTP, "Unknown CHMOD state");
}
wolfSSH_SFTP_ClearState(ssh, STATE_ID_CHMOD);
return ret;
} }
@ -5223,10 +5300,9 @@ int wolfSSH_SFTP_LSTAT(WOLFSSH* ssh, char* dir, WS_SFTP_FILEATRB* atr)
*/ */
int wolfSSH_SFTP_SetSTAT(WOLFSSH* ssh, char* dir, WS_SFTP_FILEATRB* atr) int wolfSSH_SFTP_SetSTAT(WOLFSSH* ssh, char* dir, WS_SFTP_FILEATRB* atr)
{ {
byte* data; struct WS_SFTP_SETATR_STATE* state = NULL;
int dirSz, atrSz, status; int dirSz, atrSz, status;
int maxSz; int maxSz, ret = WS_FATAL_ERROR;
word32 reqId;
word32 idx; word32 idx;
byte type; byte type;
@ -5235,54 +5311,116 @@ int wolfSSH_SFTP_SetSTAT(WOLFSSH* ssh, char* dir, WS_SFTP_FILEATRB* atr)
return WS_BAD_ARGUMENT; return WS_BAD_ARGUMENT;
} }
state = ssh->setatrState;
if (state == NULL) {
state = (WS_SFTP_SETATR_STATE*)WMALLOC(sizeof(WS_SFTP_SETATR_STATE),
ssh->ctx->heap, DYNTYPE_SFTP_STATE);
if (state == NULL) {
ssh->error = WS_MEMORY_E;
return WS_FATAL_ERROR;
}
WMEMSET(state, 0, sizeof(WS_SFTP_SETATR_STATE));
ssh->setatrState = state;
state->state = STATE_SET_ATR_INIT;
}
switch (state->state) {
case STATE_SET_ATR_INIT:
dirSz = (int)WSTRLEN(dir); dirSz = (int)WSTRLEN(dir);
atrSz = SFTP_AtributesSz(ssh, atr); atrSz = SFTP_AtributesSz(ssh, atr);
data = (byte*)WMALLOC(dirSz + atrSz + WOLFSSH_SFTP_HEADER + UINT32_SZ, state->data = (byte*)WMALLOC(dirSz + atrSz + WOLFSSH_SFTP_HEADER +
ssh->ctx->heap, DYNTYPE_BUFFER); UINT32_SZ, ssh->ctx->heap, DYNTYPE_BUFFER);
if (data == NULL) { if (state->data == NULL) {
return WS_MEMORY_E; ret = WS_MEMORY_E;
break;
} }
if (SFTP_SetHeader(ssh, ssh->reqId, WOLFSSH_FTP_SETSTAT, if (SFTP_SetHeader(ssh, ssh->reqId, WOLFSSH_FTP_SETSTAT,
dirSz + atrSz + UINT32_SZ, data) != WS_SUCCESS) { dirSz + atrSz + UINT32_SZ, state->data) != WS_SUCCESS) {
WFREE(data, NULL, DYNTYPE_BUFFER); ret = WS_FATAL_ERROR;
return WS_FATAL_ERROR; break;
} }
idx = WOLFSSH_SFTP_HEADER; idx = WOLFSSH_SFTP_HEADER;
c32toa(dirSz, data + idx); idx += UINT32_SZ; c32toa(dirSz, state->data + idx);
WMEMCPY(data + idx, (byte*)dir, dirSz); idx += dirSz; idx += UINT32_SZ;
SFTP_SetAttributes(ssh, data + idx, atrSz, atr); idx += atrSz; WMEMCPY(state->data + idx, (byte*)dir, dirSz);
idx += dirSz;
SFTP_SetAttributes(ssh, state->data + idx, atrSz, atr);
idx += atrSz;
state->sz = idx;
state->state = STATE_SET_ATR_SEND;
FALL_THROUGH;
/* no break */
/* send header and type specific data */ /* send header and type specific data */
if (wolfSSH_stream_send(ssh, data, idx) < 0) { case STATE_SET_ATR_SEND:
WFREE(data, NULL, DYNTYPE_BUFFER); if (wolfSSH_stream_send(ssh, state->data, state->sz) < 0) {
if (ssh->error != WS_WANT_READ && ssh->error != WS_WANT_WRITE) {
ret = WS_FATAL_ERROR;
break;
}
return WS_FATAL_ERROR; return WS_FATAL_ERROR;
} }
WFREE(data, NULL, DYNTYPE_BUFFER); state->state = STATE_SET_ATR_GET;
FALL_THROUGH;
/* no break */
maxSz = SFTP_GetHeader(ssh, &reqId, &type);
case STATE_SET_ATR_GET:
maxSz = SFTP_GetHeader(ssh, &state->reqId, &type);
if (maxSz <= 0) { if (maxSz <= 0) {
if (ssh->error != WS_WANT_READ && ssh->error != WS_WANT_WRITE) {
ret = WS_FATAL_ERROR;
break;
}
return WS_FATAL_ERROR; return WS_FATAL_ERROR;
} }
if (type != WOLFSSH_FTP_STATUS) { if (type != WOLFSSH_FTP_STATUS) {
WLOG(WS_LOG_SFTP, "Unexpected packet type %d", type); WLOG(WS_LOG_SFTP, "Unexpected packet type %d", type);
return WS_FATAL_ERROR; ret = WS_FATAL_ERROR;
break;
} }
else { XFREE(state->data, ssh->ctx->heap, DYNTYPE_BUFER);
idx = 0; state->data = (byte*)WMALLOC(maxSz, ssh->ctx->heap, DYNTYPE_BUFFER);
data = (byte*)WMALLOC(maxSz, ssh->ctx->heap, DYNTYPE_BUFFER); if (state->data == NULL) {
wolfSSH_stream_read(ssh, data, maxSz); ret = WS_MEMORY_E;
status = wolfSSH_SFTP_DoStatus(ssh, reqId, data, &idx, maxSz); break;
WFREE(data, ssh->ctx->heap, DYNTYPE_BUFFER);
if (status != WOLFSSH_FTP_OK) {
return WS_BAD_FILE_E;
} }
}
(void)maxSz;
return WS_SUCCESS; state->sz = maxSz;
state->state = STATE_SET_ATR_STATUS;
FALL_THROUGH;
/* no break */
case STATE_SET_ATR_STATUS:
idx = 0;
ret = wolfSSH_stream_read(ssh, state->data, state->sz);
if (ret < 0) {
if (ssh->error != WS_WANT_READ && ssh->error != WS_WANT_WRITE) {
ret = WS_FATAL_ERROR;
break;
}
return ret;
}
status = wolfSSH_SFTP_DoStatus(ssh, state->reqId, state->data, &idx,
state->sz);
ret = WS_SUCCESS;
if (status != WOLFSSH_FTP_OK) {
ret = WS_BAD_FILE_E;
}
break;
default:
WLOG(WS_LOG_SFTP, "Unknown set attribute state");
}
wolfSSH_SFTP_ClearState(ssh, STATE_ID_SETATR);
return ret;
} }

View File

@ -46,6 +46,7 @@ static const char* cmds[] = {
"rename test-get test-get-2", "rename test-get test-get-2",
"rmdir a", "rmdir a",
"ls", "ls",
"chmod 600 test-get-2",
"rm test-get-2", "rm test-get-2",
"exit" "exit"
}; };

View File

@ -405,6 +405,8 @@ struct WOLFSSH {
struct WS_SFTP_MKDIR_STATE* mkdirState; struct WS_SFTP_MKDIR_STATE* mkdirState;
struct WS_SFTP_RM_STATE* rmState; struct WS_SFTP_RM_STATE* rmState;
struct WS_SFTP_READDIR_STATE* readDirState; struct WS_SFTP_READDIR_STATE* readDirState;
struct WS_SFTP_SETATR_STATE* setatrState;
struct WS_SFTP_CHMOD_STATE* chmodState;
struct WS_SFTP_LS_STATE* lsState; struct WS_SFTP_LS_STATE* lsState;
struct WS_SFTP_SEND_STATE* sendState; struct WS_SFTP_SEND_STATE* sendState;
struct WS_SFTP_NAME_STATE* nameState; struct WS_SFTP_NAME_STATE* nameState;