X-Git-Url: https://mattmccutchen.net/rsync/rsync.git/blobdiff_plain/063393d62ddb2de75a0ec2f11295b12a4b929cc3..4f092bee9fd818de4248f420388bf2d6eacea987:/clientserver.c diff --git a/clientserver.c b/clientserver.c index 70c12e20..6f3edfa9 100644 --- a/clientserver.c +++ b/clientserver.c @@ -42,10 +42,11 @@ int start_socket_client(char *host, char *path, int argc, char *argv[]) char *p, *user=NULL; extern int remote_version; extern int am_sender; - extern struct in_addr socket_address; extern char *shell_cmd; extern int kludge_around_eof; - + extern char *bind_address; + extern int default_af_hint; + if (argc == 0 && !am_sender) { extern int list_only; list_only = 1; @@ -78,7 +79,10 @@ int start_socket_client(char *host, char *path, int argc, char *argv[]) if (!user) user = getenv("USER"); if (!user) user = getenv("LOGNAME"); - fd = open_socket_out(host, rsync_port, &socket_address); + if (verbose >= 2) { + } + fd = open_socket_out_wrapped (host, rsync_port, bind_address, + default_af_hint); if (fd == -1) { exit_cleanup(RERR_SOCKETIO); } @@ -166,9 +170,9 @@ static int rsync_module(int fd, int i) if (!allow_access(addr, host, lp_hosts_allow(i), lp_hosts_deny(i))) { rprintf(FERROR,"rsync denied on module %s from %s (%s)\n", - name, client_name(fd), client_addr(fd)); + name, host, addr); io_printf(fd,"@ERROR: access denied to %s from %s (%s)\n", - name, client_name(fd), client_addr(fd)); + name, host, addr); return -1; } @@ -244,6 +248,18 @@ static int rsync_module(int fd, int i) log_init(); if (use_chroot) { + /* + * XXX: The 'use chroot' flag is a fairly reliable + * source of confusion, because it fails under two + * important circumstances: running as non-root, + * running on Win32 (or possibly others). On the + * other hand, if you are running as root, then it + * might be better to always use chroot. + * + * So, perhaps if we can't chroot we should just issue + * a warning, unless a "require chroot" flag is set, + * in which case we fail. + */ if (chroot(lp_path(i))) { rsyserr(FERROR, errno, "chroot %s failed", lp_path(i)); io_printf(fd,"@ERROR: chroot failed\n"); @@ -278,6 +294,16 @@ static int rsync_module(int fd, int i) return -1; } +#ifdef HAVE_SETGROUPS + /* Get rid of any supplementary groups this process + * might have inheristed. */ + if (setgroups(0, NULL)) { + rsyserr(FERROR, errno, "setgroups failed"); + io_printf(fd, "@ERROR: setgroups failed\n"); + return -1; + } +#endif + am_root = (getuid() == 0); } @@ -473,6 +499,7 @@ int daemon_main(void) extern char *config_file; extern int orig_umask; char *pid_file; + extern int no_detach; if (is_a_socket(STDIN_FILENO)) { int i; @@ -488,7 +515,8 @@ int daemon_main(void) return start_daemon(STDIN_FILENO); } - become_daemon(); + if (!no_detach) + become_daemon(); if (!lp_load(config_file, 1)) { exit_cleanup(RERR_SYNTAX); @@ -496,10 +524,12 @@ int daemon_main(void) log_init(); - rprintf(FINFO, "rsyncd version %s starting, listening on port %d\n", VERSION, + rprintf(FINFO, "rsyncd version %s starting, listening on port %d\n", + RSYNC_VERSION, rsync_port); /* TODO: If listening on a particular address, then show that - * address too. */ + * address too. In fact, why not just do inet_ntop on the + * local address??? */ if (((pid_file = lp_pid_file()) != NULL) && (*pid_file != '\0')) { char pidbuf[16];