int fd, i;
char *sargs[MAX_ARGS];
int sargc=0;
- char line[1024];
+ char line[MAXPATHLEN];
char *p, *user=NULL;
extern int remote_version;
int argc=0;
char *argv[MAX_ARGS];
char **argp;
- char line[1024];
+ char line[MAXPATHLEN];
uid_t uid;
gid_t gid;
char *p;
char *addr = client_addr(fd);
char *host = client_name(fd);
- char *auth;
+ char *name = lp_name(i);
+ int start_glob=0;
if (!allow_access(addr, host, lp_hosts_allow(i), lp_hosts_deny(i))) {
rprintf(FERROR,"rsync denied on module %s from %s (%s)\n",
- lp_name(i), client_name(fd), client_addr(fd));
+ name, client_name(fd), client_addr(fd));
io_printf(fd,"@ERROR: access denied to %s from %s (%s)\n",
- lp_name(i), client_name(fd), client_addr(fd));
+ name, client_name(fd), client_addr(fd));
return -1;
}
if (!auth_server(fd, i, addr, "@RSYNCD: AUTHREQD ")) {
rprintf(FERROR,"auth failed on module %s from %s (%s)\n",
- lp_name(i), client_name(fd), client_addr(fd));
- io_printf(fd,"@ERROR: auth failed on module %s\n",lp_name(i));
+ name, client_name(fd), client_addr(fd));
+ io_printf(fd,"@ERROR: auth failed on module %s\n",name);
return -1;
}
}
rprintf(FINFO,"rsync on module %s from %s (%s)\n",
- lp_name(i), host, addr);
+ name, host, addr);
module_id = i;
gid = atoi(p);
}
+ p = lp_exclude_from(i);
+ add_exclude_file(p, 1);
+
+ p = lp_exclude(i);
+ add_exclude_line(p);
+
if (chroot(lp_path(i))) {
io_printf(fd,"@ERROR: chroot failed\n");
return -1;
if (!*line) break;
- argv[argc] = strdup(line);
+ p = line;
+
+ argv[argc] = strdup(p);
if (!argv[argc]) {
return -1;
}
- argc++;
+ if (start_glob) {
+ rprintf(FINFO,"transferring %s\n",p);
+ glob_expand(name, argv, &argc, MAX_ARGS);
+ } else {
+ argc++;
+ }
+
+ if (strcmp(line,".") == 0) {
+ start_glob = 1;
+ }
+
if (argc == MAX_ARGS) {
return -1;
}
become_daemon();
+ rprintf(FINFO,"rsyncd version %s starting\n",VERSION);
+
start_accept_loop(rsync_port, start_daemon);
return -1;
}