forked from Archive/PX4-Autopilot
949 lines
22 KiB
C++
949 lines
22 KiB
C++
/****************************************************************************
|
|
*
|
|
* Copyright (c) 2014, 2015 PX4 Development Team. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
* 3. Neither the name PX4 nor the names of its contributors may be
|
|
* used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
****************************************************************************/
|
|
|
|
/// @file mavlink_ftp.cpp
|
|
/// @author px4dev, Don Gagne <don@thegagnes.com>
|
|
|
|
#include <crc32.h>
|
|
#include <unistd.h>
|
|
#include <stdio.h>
|
|
#include <fcntl.h>
|
|
#include <sys/stat.h>
|
|
#include <errno.h>
|
|
|
|
#include "mavlink_ftp.h"
|
|
#include "mavlink_main.h"
|
|
#include "mavlink_tests/mavlink_ftp_test.h"
|
|
|
|
// Uncomment the line below to get better debug output. Never commit with this left on.
|
|
//#define MAVLINK_FTP_DEBUG
|
|
|
|
int buf_size_1 = 0;
|
|
int buf_size_2 = 0;
|
|
|
|
MavlinkFTP::MavlinkFTP(Mavlink* mavlink) :
|
|
MavlinkStream(mavlink),
|
|
_session_info{},
|
|
_utRcvMsgFunc{},
|
|
_worker_data{}
|
|
{
|
|
// initialize session
|
|
_session_info.fd = -1;
|
|
}
|
|
|
|
MavlinkFTP::~MavlinkFTP()
|
|
{
|
|
|
|
}
|
|
|
|
const char*
|
|
MavlinkFTP::get_name(void) const
|
|
{
|
|
return "MAVLINK_FTP";
|
|
}
|
|
|
|
uint8_t
|
|
MavlinkFTP::get_id(void)
|
|
{
|
|
return MAVLINK_MSG_ID_FILE_TRANSFER_PROTOCOL;
|
|
}
|
|
|
|
unsigned
|
|
MavlinkFTP::get_size(void)
|
|
{
|
|
if (_session_info.stream_download) {
|
|
return MAVLINK_MSG_ID_FILE_TRANSFER_PROTOCOL_LEN + MAVLINK_NUM_NON_PAYLOAD_BYTES;
|
|
|
|
} else {
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
MavlinkStream*
|
|
MavlinkFTP::new_instance(Mavlink *mavlink)
|
|
{
|
|
return new MavlinkFTP(mavlink);
|
|
}
|
|
|
|
#ifdef MAVLINK_FTP_UNIT_TEST
|
|
void
|
|
MavlinkFTP::set_unittest_worker(ReceiveMessageFunc_t rcvMsgFunc, void *worker_data)
|
|
{
|
|
_utRcvMsgFunc = rcvMsgFunc;
|
|
_worker_data = worker_data;
|
|
}
|
|
#endif
|
|
|
|
uint8_t
|
|
MavlinkFTP::_getServerSystemId(void)
|
|
{
|
|
#ifdef MAVLINK_FTP_UNIT_TEST
|
|
// We use fake ids when unit testing
|
|
return MavlinkFtpTest::serverSystemId;
|
|
#else
|
|
// Not unit testing, use the real thing
|
|
return _mavlink->get_system_id();
|
|
#endif
|
|
}
|
|
|
|
uint8_t
|
|
MavlinkFTP::_getServerComponentId(void)
|
|
{
|
|
#ifdef MAVLINK_FTP_UNIT_TEST
|
|
// We use fake ids when unit testing
|
|
return MavlinkFtpTest::serverComponentId;
|
|
#else
|
|
// Not unit testing, use the real thing
|
|
return _mavlink->get_component_id();
|
|
#endif
|
|
}
|
|
|
|
uint8_t
|
|
MavlinkFTP::_getServerChannel(void)
|
|
{
|
|
#ifdef MAVLINK_FTP_UNIT_TEST
|
|
// We use fake ids when unit testing
|
|
return MavlinkFtpTest::serverChannel;
|
|
#else
|
|
// Not unit testing, use the real thing
|
|
return _mavlink->get_channel();
|
|
#endif
|
|
}
|
|
|
|
void
|
|
MavlinkFTP::handle_message(const mavlink_message_t *msg)
|
|
{
|
|
//warnx("MavlinkFTP::handle_message %d %d", buf_size_1, buf_size_2);
|
|
|
|
if (msg->msgid == MAVLINK_MSG_ID_FILE_TRANSFER_PROTOCOL) {
|
|
mavlink_file_transfer_protocol_t ftp_request;
|
|
mavlink_msg_file_transfer_protocol_decode(msg, &ftp_request);
|
|
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
warnx("FTP: received ftp protocol message target_system: %d", ftp_request.target_system);
|
|
#endif
|
|
|
|
if (ftp_request.target_system == _getServerSystemId()) {
|
|
_process_request(&ftp_request, msg->sysid);
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
/// @brief Processes an FTP message
|
|
void
|
|
MavlinkFTP::_process_request(mavlink_file_transfer_protocol_t* ftp_req, uint8_t target_system_id)
|
|
{
|
|
bool stream_send = false;
|
|
PayloadHeader *payload = reinterpret_cast<PayloadHeader *>(&ftp_req->payload[0]);
|
|
|
|
ErrorCode errorCode = kErrNone;
|
|
|
|
// basic sanity checks; must validate length before use
|
|
if (payload->size > kMaxDataLength) {
|
|
errorCode = kErrInvalidDataSize;
|
|
goto out;
|
|
}
|
|
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
printf("ftp: channel %u opc %u size %u offset %u\n", _getServerChannel(), payload->opcode, payload->size, payload->offset);
|
|
#endif
|
|
|
|
switch (payload->opcode) {
|
|
case kCmdNone:
|
|
break;
|
|
|
|
case kCmdTerminateSession:
|
|
errorCode = _workTerminate(payload);
|
|
break;
|
|
|
|
case kCmdResetSessions:
|
|
errorCode = _workReset(payload);
|
|
break;
|
|
|
|
case kCmdListDirectory:
|
|
errorCode = _workList(payload);
|
|
break;
|
|
|
|
case kCmdOpenFileRO:
|
|
errorCode = _workOpen(payload, O_RDONLY);
|
|
break;
|
|
|
|
case kCmdCreateFile:
|
|
errorCode = _workOpen(payload, O_CREAT | O_EXCL | O_WRONLY);
|
|
break;
|
|
|
|
case kCmdOpenFileWO:
|
|
errorCode = _workOpen(payload, O_CREAT | O_WRONLY);
|
|
break;
|
|
|
|
case kCmdReadFile:
|
|
errorCode = _workRead(payload);
|
|
break;
|
|
|
|
case kCmdBurstReadFile:
|
|
errorCode = _workBurst(payload, target_system_id);
|
|
stream_send = true;
|
|
break;
|
|
|
|
case kCmdWriteFile:
|
|
errorCode = _workWrite(payload);
|
|
break;
|
|
|
|
case kCmdRemoveFile:
|
|
errorCode = _workRemoveFile(payload);
|
|
break;
|
|
|
|
case kCmdRename:
|
|
errorCode = _workRename(payload);
|
|
break;
|
|
|
|
case kCmdTruncateFile:
|
|
errorCode = _workTruncateFile(payload);
|
|
break;
|
|
|
|
case kCmdCreateDirectory:
|
|
errorCode = _workCreateDirectory(payload);
|
|
break;
|
|
|
|
case kCmdRemoveDirectory:
|
|
errorCode = _workRemoveDirectory(payload);
|
|
break;
|
|
|
|
case kCmdCalcFileCRC32:
|
|
errorCode = _workCalcFileCRC32(payload);
|
|
break;
|
|
|
|
default:
|
|
errorCode = kErrUnknownCommand;
|
|
break;
|
|
}
|
|
|
|
out:
|
|
payload->seq_number++;
|
|
|
|
// handle success vs. error
|
|
if (errorCode == kErrNone) {
|
|
payload->req_opcode = payload->opcode;
|
|
payload->opcode = kRspAck;
|
|
} else {
|
|
int r_errno = errno;
|
|
payload->req_opcode = payload->opcode;
|
|
payload->opcode = kRspNak;
|
|
payload->size = 1;
|
|
payload->data[0] = errorCode;
|
|
if (errorCode == kErrFailErrno) {
|
|
payload->size = 2;
|
|
payload->data[1] = r_errno;
|
|
}
|
|
}
|
|
|
|
// Stream download replies are sent through mavlink stream mechanism. Unless we need to Nak.
|
|
if (!stream_send || errorCode != kErrNone) {
|
|
// respond to the request
|
|
ftp_req->target_system = target_system_id;
|
|
_reply(ftp_req);
|
|
}
|
|
}
|
|
|
|
/// @brief Sends the specified FTP response message out through mavlink
|
|
void
|
|
MavlinkFTP::_reply(mavlink_file_transfer_protocol_t* ftp_req)
|
|
{
|
|
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
PayloadHeader *payload = reinterpret_cast<PayloadHeader *>(&ftp_req->payload[0]);
|
|
warnx("FTP: %s seq_number: %d", payload->opcode == kRspAck ? "Ack" : "Nak", payload->seq_number);
|
|
#endif
|
|
|
|
ftp_req->target_network = 0;
|
|
ftp_req->target_component = 0;
|
|
#ifdef MAVLINK_FTP_UNIT_TEST
|
|
// Unit test hook is set, call that instead
|
|
_utRcvMsgFunc(ftp_req, _worker_data);
|
|
#else
|
|
_mavlink->send_message(MAVLINK_MSG_ID_FILE_TRANSFER_PROTOCOL, ftp_req);
|
|
#endif
|
|
|
|
}
|
|
|
|
/// @brief Responds to a List command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workList(PayloadHeader* payload, bool list_hidden)
|
|
{
|
|
char dirPath[kMaxDataLength];
|
|
strncpy(dirPath, _data_as_cstring(payload), kMaxDataLength);
|
|
|
|
ErrorCode errorCode = kErrNone;
|
|
unsigned offset = 0;
|
|
|
|
DIR *dp = opendir(dirPath);
|
|
|
|
if (dp == nullptr) {
|
|
#ifdef MAVLINK_FTP_UNIT_TEST
|
|
warnx("File open failed");
|
|
#else
|
|
_mavlink->send_statustext_critical("FTP: can't open path (file system corrupted?)");
|
|
_mavlink->send_statustext_critical(dirPath);
|
|
#endif
|
|
// this is not an FTP error, abort directory by simulating eof
|
|
return kErrEOF;
|
|
}
|
|
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
warnx("FTP: list %s offset %d", dirPath, payload->offset);
|
|
#endif
|
|
|
|
struct dirent entry, *result = nullptr;
|
|
|
|
// move to the requested offset
|
|
seekdir(dp, payload->offset);
|
|
|
|
for (;;) {
|
|
// read the directory entry
|
|
if (readdir_r(dp, &entry, &result)) {
|
|
#ifdef MAVLINK_FTP_UNIT_TEST
|
|
warnx("readdir_r failed");
|
|
#else
|
|
_mavlink->send_statustext_critical("FTP: list readdir_r failure");
|
|
_mavlink->send_statustext_critical(dirPath);
|
|
#endif
|
|
|
|
payload->data[offset++] = kDirentSkip;
|
|
*((char *)&payload->data[offset]) = '\0';
|
|
offset++;
|
|
payload->size = offset;
|
|
closedir(dp);
|
|
|
|
return errorCode;
|
|
}
|
|
|
|
// no more entries?
|
|
if (result == nullptr) {
|
|
if (payload->offset != 0 && offset == 0) {
|
|
// User is requesting subsequent dir entries but there were none. This means the user asked
|
|
// to seek past EOF.
|
|
errorCode = kErrEOF;
|
|
}
|
|
// Otherwise we are just at the last directory entry, so we leave the errorCode at kErrorNone to signal that
|
|
break;
|
|
}
|
|
|
|
uint32_t fileSize = 0;
|
|
char buf[256];
|
|
char direntType;
|
|
|
|
// Determine the directory entry type
|
|
switch (entry.d_type) {
|
|
#ifdef __PX4_NUTTX
|
|
case DTYPE_FILE:
|
|
#else
|
|
case DT_REG:
|
|
#endif
|
|
// For files we get the file size as well
|
|
direntType = kDirentFile;
|
|
snprintf(buf, sizeof(buf), "%s/%s", dirPath, entry.d_name);
|
|
struct stat st;
|
|
if (stat(buf, &st) == 0) {
|
|
fileSize = st.st_size;
|
|
}
|
|
break;
|
|
#ifdef __PX4_NUTTX
|
|
case DTYPE_DIRECTORY:
|
|
#else
|
|
case DT_DIR:
|
|
#endif
|
|
if ((!list_hidden && (strncmp(entry.d_name, ".", 1) == 0)) ||
|
|
strcmp(entry.d_name, ".") == 0 || strcmp(entry.d_name, "..") == 0) {
|
|
// Don't bother sending these back
|
|
direntType = kDirentSkip;
|
|
} else {
|
|
direntType = kDirentDir;
|
|
}
|
|
break;
|
|
default:
|
|
// We only send back file and diretory entries, skip everything else
|
|
direntType = kDirentSkip;
|
|
}
|
|
|
|
if (direntType == kDirentSkip) {
|
|
// Skip send only dirent identifier
|
|
buf[0] = '\0';
|
|
} else if (direntType == kDirentFile) {
|
|
// Files send filename and file length
|
|
snprintf(buf, sizeof(buf), "%s\t%d", entry.d_name, fileSize);
|
|
} else {
|
|
// Everything else just sends name
|
|
strncpy(buf, entry.d_name, sizeof(buf));
|
|
buf[sizeof(buf)-1] = 0;
|
|
}
|
|
size_t nameLen = strlen(buf);
|
|
|
|
// Do we have room for the name, the one char directory identifier and the null terminator?
|
|
if ((offset + nameLen + 2) > kMaxDataLength) {
|
|
break;
|
|
}
|
|
|
|
// Move the data into the buffer
|
|
payload->data[offset++] = direntType;
|
|
strcpy((char *)&payload->data[offset], buf);
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
printf("FTP: list %s %s\n", dirPath, (char *)&payload->data[offset-1]);
|
|
#endif
|
|
offset += nameLen + 1;
|
|
}
|
|
|
|
closedir(dp);
|
|
payload->size = offset;
|
|
|
|
return errorCode;
|
|
}
|
|
|
|
/// @brief Responds to an Open command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workOpen(PayloadHeader* payload, int oflag)
|
|
{
|
|
if (_session_info.fd >= 0) {
|
|
warnx("FTP: Open failed - out of sessions\n");
|
|
return kErrNoSessionsAvailable;
|
|
}
|
|
|
|
char *filename = _data_as_cstring(payload);
|
|
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
warnx("FTP: open '%s'", filename);
|
|
#endif
|
|
|
|
uint32_t fileSize = 0;
|
|
struct stat st;
|
|
if (stat(filename, &st) != 0) {
|
|
// fail only if requested open for read
|
|
if (oflag & O_RDONLY)
|
|
return kErrFailErrno;
|
|
else
|
|
st.st_size = 0;
|
|
}
|
|
fileSize = st.st_size;
|
|
|
|
// Set mode to 666 incase oflag has O_CREAT
|
|
int fd = ::open(filename, oflag, PX4_O_MODE_666);
|
|
if (fd < 0) {
|
|
return kErrFailErrno;
|
|
}
|
|
_session_info.fd = fd;
|
|
_session_info.file_size = fileSize;
|
|
_session_info.stream_download = false;
|
|
|
|
payload->session = 0;
|
|
payload->size = sizeof(uint32_t);
|
|
*((uint32_t*)payload->data) = fileSize;
|
|
|
|
return kErrNone;
|
|
}
|
|
|
|
/// @brief Responds to a Read command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workRead(PayloadHeader* payload)
|
|
{
|
|
if (payload->session != 0 || _session_info.fd < 0) {
|
|
return kErrInvalidSession;
|
|
}
|
|
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
warnx("FTP: read offset:%d", payload->offset);
|
|
#endif
|
|
// We have to test seek past EOF ourselves, lseek will allow seek past EOF
|
|
if (payload->offset >= _session_info.file_size) {
|
|
warnx("request past EOF");
|
|
return kErrEOF;
|
|
}
|
|
|
|
if (lseek(_session_info.fd, payload->offset, SEEK_SET) < 0) {
|
|
warnx("seek fail");
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
int bytes_read = ::read(_session_info.fd, &payload->data[0], kMaxDataLength);
|
|
if (bytes_read < 0) {
|
|
// Negative return indicates error other than eof
|
|
warnx("read fail %d", bytes_read);
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
payload->size = bytes_read;
|
|
|
|
return kErrNone;
|
|
}
|
|
|
|
/// @brief Responds to a Stream command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workBurst(PayloadHeader* payload, uint8_t target_system_id)
|
|
{
|
|
if (payload->session != 0 && _session_info.fd < 0) {
|
|
return kErrInvalidSession;
|
|
}
|
|
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
warnx("FTP: burst offset:%d", payload->offset);
|
|
#endif
|
|
// Setup for streaming sends
|
|
_session_info.stream_download = true;
|
|
_session_info.stream_offset = payload->offset;
|
|
_session_info.stream_chunk_transmitted = 0;
|
|
_session_info.stream_seq_number = payload->seq_number + 1;
|
|
_session_info.stream_target_system_id = target_system_id;
|
|
|
|
return kErrNone;
|
|
}
|
|
|
|
/// @brief Responds to a Write command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workWrite(PayloadHeader* payload)
|
|
{
|
|
if (payload->session != 0 && _session_info.fd < 0) {
|
|
return kErrInvalidSession;
|
|
}
|
|
|
|
if (lseek(_session_info.fd, payload->offset, SEEK_SET) < 0) {
|
|
// Unable to see to the specified location
|
|
warnx("seek fail");
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
int bytes_written = ::write(_session_info.fd, &payload->data[0], payload->size);
|
|
if (bytes_written < 0) {
|
|
// Negative return indicates error other than eof
|
|
warnx("write fail %d", bytes_written);
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
payload->size = sizeof(uint32_t);
|
|
*((uint32_t*)payload->data) = bytes_written;
|
|
|
|
return kErrNone;
|
|
}
|
|
|
|
/// @brief Responds to a RemoveFile command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workRemoveFile(PayloadHeader* payload)
|
|
{
|
|
char file[kMaxDataLength];
|
|
strncpy(file, _data_as_cstring(payload), kMaxDataLength);
|
|
|
|
if (unlink(file) == 0) {
|
|
payload->size = 0;
|
|
return kErrNone;
|
|
} else {
|
|
return kErrFailErrno;
|
|
}
|
|
}
|
|
|
|
/// @brief Responds to a TruncateFile command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workTruncateFile(PayloadHeader* payload)
|
|
{
|
|
char file[kMaxDataLength];
|
|
const char temp_file[] = PX4_ROOTFSDIR"/fs/microsd/.trunc.tmp";
|
|
strncpy(file, _data_as_cstring(payload), kMaxDataLength);
|
|
payload->size = 0;
|
|
|
|
// emulate truncate(file, payload->offset) by
|
|
// copying to temp and overwrite with O_TRUNC flag.
|
|
|
|
struct stat st;
|
|
if (stat(file, &st) != 0) {
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
if (!S_ISREG(st.st_mode)) {
|
|
errno = EISDIR;
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
// check perms allow us to write (not romfs)
|
|
if (!(st.st_mode & (S_IWUSR | S_IWGRP | S_IWOTH))) {
|
|
errno = EROFS;
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
if (payload->offset == (unsigned)st.st_size) {
|
|
// nothing to do
|
|
return kErrNone;
|
|
}
|
|
else if (payload->offset == 0) {
|
|
// 1: truncate all data
|
|
int fd = ::open(file, O_TRUNC | O_WRONLY);
|
|
if (fd < 0) {
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
::close(fd);
|
|
return kErrNone;
|
|
}
|
|
else if (payload->offset > (unsigned)st.st_size) {
|
|
// 2: extend file
|
|
int fd = ::open(file, O_WRONLY);
|
|
if (fd < 0) {
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
if (lseek(fd, payload->offset - 1, SEEK_SET) < 0) {
|
|
::close(fd);
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
bool ok = 1 == ::write(fd, "", 1);
|
|
::close(fd);
|
|
|
|
return (ok)? kErrNone : kErrFailErrno;
|
|
}
|
|
else {
|
|
// 3: truncate
|
|
if (_copy_file(file, temp_file, payload->offset) != 0) {
|
|
return kErrFailErrno;
|
|
}
|
|
if (_copy_file(temp_file, file, payload->offset) != 0) {
|
|
return kErrFailErrno;
|
|
}
|
|
if (::unlink(temp_file) != 0) {
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
return kErrNone;
|
|
}
|
|
}
|
|
|
|
/// @brief Responds to a Terminate command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workTerminate(PayloadHeader* payload)
|
|
{
|
|
if (payload->session != 0 || _session_info.fd < 0) {
|
|
return kErrInvalidSession;
|
|
}
|
|
|
|
::close(_session_info.fd);
|
|
_session_info.fd = -1;
|
|
_session_info.stream_download = false;
|
|
|
|
payload->size = 0;
|
|
|
|
return kErrNone;
|
|
}
|
|
|
|
/// @brief Responds to a Reset command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workReset(PayloadHeader* payload)
|
|
{
|
|
if (_session_info.fd != -1) {
|
|
::close(_session_info.fd);
|
|
_session_info.fd = -1;
|
|
_session_info.stream_download = false;
|
|
}
|
|
|
|
payload->size = 0;
|
|
|
|
return kErrNone;
|
|
}
|
|
|
|
/// @brief Responds to a Rename command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workRename(PayloadHeader* payload)
|
|
{
|
|
char oldpath[kMaxDataLength];
|
|
char newpath[kMaxDataLength];
|
|
|
|
char *ptr = _data_as_cstring(payload);
|
|
size_t oldpath_sz = strlen(ptr);
|
|
|
|
if (oldpath_sz == payload->size) {
|
|
// no newpath
|
|
errno = EINVAL;
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
strncpy(oldpath, ptr, kMaxDataLength);
|
|
strncpy(newpath, ptr + oldpath_sz + 1, kMaxDataLength);
|
|
|
|
if (rename(oldpath, newpath) == 0) {
|
|
payload->size = 0;
|
|
return kErrNone;
|
|
} else {
|
|
return kErrFailErrno;
|
|
}
|
|
}
|
|
|
|
/// @brief Responds to a RemoveDirectory command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workRemoveDirectory(PayloadHeader* payload)
|
|
{
|
|
char dir[kMaxDataLength];
|
|
strncpy(dir, _data_as_cstring(payload), kMaxDataLength);
|
|
|
|
if (rmdir(dir) == 0) {
|
|
payload->size = 0;
|
|
return kErrNone;
|
|
} else {
|
|
return kErrFailErrno;
|
|
}
|
|
}
|
|
|
|
/// @brief Responds to a CreateDirectory command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workCreateDirectory(PayloadHeader* payload)
|
|
{
|
|
char dir[kMaxDataLength];
|
|
strncpy(dir, _data_as_cstring(payload), kMaxDataLength);
|
|
|
|
if (mkdir(dir, S_IRWXU | S_IRWXG | S_IRWXO) == 0) {
|
|
payload->size = 0;
|
|
return kErrNone;
|
|
} else {
|
|
return kErrFailErrno;
|
|
}
|
|
}
|
|
|
|
/// @brief Responds to a CalcFileCRC32 command
|
|
MavlinkFTP::ErrorCode
|
|
MavlinkFTP::_workCalcFileCRC32(PayloadHeader* payload)
|
|
{
|
|
char file_buf[256];
|
|
uint32_t checksum = 0;
|
|
ssize_t bytes_read;
|
|
strncpy(file_buf, _data_as_cstring(payload), kMaxDataLength);
|
|
|
|
int fd = ::open(file_buf, O_RDONLY);
|
|
if (fd < 0) {
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
do {
|
|
bytes_read = ::read(fd, file_buf, sizeof(file_buf));
|
|
if (bytes_read < 0) {
|
|
int r_errno = errno;
|
|
::close(fd);
|
|
errno = r_errno;
|
|
return kErrFailErrno;
|
|
}
|
|
|
|
checksum = crc32part((uint8_t*)file_buf, bytes_read, checksum);
|
|
} while (bytes_read == sizeof(file_buf));
|
|
|
|
::close(fd);
|
|
|
|
payload->size = sizeof(uint32_t);
|
|
*((uint32_t*)payload->data) = checksum;
|
|
return kErrNone;
|
|
}
|
|
|
|
/// @brief Guarantees that the payload data is null terminated.
|
|
/// @return Returns a pointer to the payload data as a char *
|
|
char *
|
|
MavlinkFTP::_data_as_cstring(PayloadHeader* payload)
|
|
{
|
|
// guarantee nul termination
|
|
if (payload->size < kMaxDataLength) {
|
|
payload->data[payload->size] = '\0';
|
|
} else {
|
|
payload->data[kMaxDataLength - 1] = '\0';
|
|
}
|
|
|
|
// and return data
|
|
return (char *)&(payload->data[0]);
|
|
}
|
|
|
|
/// @brief Copy file (with limited space)
|
|
int
|
|
MavlinkFTP::_copy_file(const char *src_path, const char *dst_path, size_t length)
|
|
{
|
|
char buff[512];
|
|
int src_fd = -1, dst_fd = -1;
|
|
int op_errno = 0;
|
|
|
|
src_fd = ::open(src_path, O_RDONLY);
|
|
if (src_fd < 0) {
|
|
return -1;
|
|
}
|
|
|
|
dst_fd = ::open(dst_path, O_CREAT | O_TRUNC | O_WRONLY
|
|
// POSIX requires the permissions to be supplied if O_CREAT passed
|
|
#ifdef __PX4_POSIX
|
|
, 0x0777
|
|
#endif
|
|
);
|
|
if (dst_fd < 0) {
|
|
op_errno = errno;
|
|
::close(src_fd);
|
|
errno = op_errno;
|
|
return -1;
|
|
}
|
|
|
|
while (length > 0) {
|
|
ssize_t bytes_read, bytes_written;
|
|
size_t blen = (length > sizeof(buff))? sizeof(buff) : length;
|
|
|
|
bytes_read = ::read(src_fd, buff, blen);
|
|
if (bytes_read == 0) {
|
|
// EOF
|
|
break;
|
|
}
|
|
else if (bytes_read < 0) {
|
|
warnx("cp: read");
|
|
op_errno = errno;
|
|
break;
|
|
}
|
|
|
|
bytes_written = ::write(dst_fd, buff, bytes_read);
|
|
if (bytes_written != bytes_read) {
|
|
warnx("cp: short write");
|
|
op_errno = errno;
|
|
break;
|
|
}
|
|
|
|
length -= bytes_written;
|
|
}
|
|
|
|
::close(src_fd);
|
|
::close(dst_fd);
|
|
|
|
errno = op_errno;
|
|
return (length > 0)? -1 : 0;
|
|
}
|
|
|
|
void MavlinkFTP::send(const hrt_abstime t)
|
|
{
|
|
// Anything to stream?
|
|
if (!_session_info.stream_download) {
|
|
return;
|
|
}
|
|
|
|
#ifndef MAVLINK_FTP_UNIT_TEST
|
|
// Skip send if not enough room
|
|
unsigned max_bytes_to_send = _mavlink->get_free_tx_buf();
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
warnx("MavlinkFTP::send max_bytes_to_send(%d) get_free_tx_buf(%d)", max_bytes_to_send, _mavlink->get_free_tx_buf());
|
|
#endif
|
|
if (max_bytes_to_send < get_size()) {
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
// Send stream packets until buffer is full
|
|
|
|
bool more_data;
|
|
do {
|
|
more_data = false;
|
|
|
|
ErrorCode error_code = kErrNone;
|
|
|
|
mavlink_file_transfer_protocol_t ftp_msg;
|
|
PayloadHeader* payload = reinterpret_cast<PayloadHeader *>(&ftp_msg.payload[0]);
|
|
|
|
payload->seq_number = _session_info.stream_seq_number;
|
|
payload->session = 0;
|
|
payload->opcode = kRspAck;
|
|
payload->req_opcode = kCmdBurstReadFile;
|
|
payload->offset = _session_info.stream_offset;
|
|
_session_info.stream_seq_number++;
|
|
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
warnx("stream send: offset %d", _session_info.stream_offset);
|
|
#endif
|
|
// We have to test seek past EOF ourselves, lseek will allow seek past EOF
|
|
if (_session_info.stream_offset >= _session_info.file_size) {
|
|
error_code = kErrEOF;
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
warnx("stream download: sending Nak EOF");
|
|
#endif
|
|
}
|
|
|
|
if (error_code == kErrNone) {
|
|
if (lseek(_session_info.fd, payload->offset, SEEK_SET) < 0) {
|
|
error_code = kErrFailErrno;
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
warnx("stream download: seek fail");
|
|
#endif
|
|
}
|
|
}
|
|
|
|
if (error_code == kErrNone) {
|
|
int bytes_read = ::read(_session_info.fd, &payload->data[0], kMaxDataLength);
|
|
if (bytes_read < 0) {
|
|
// Negative return indicates error other than eof
|
|
error_code = kErrFailErrno;
|
|
#ifdef MAVLINK_FTP_DEBUG
|
|
warnx("stream download: read fail");
|
|
#endif
|
|
} else {
|
|
payload->size = bytes_read;
|
|
_session_info.stream_offset += bytes_read;
|
|
_session_info.stream_chunk_transmitted += bytes_read;
|
|
}
|
|
}
|
|
|
|
if (error_code != kErrNone) {
|
|
payload->opcode = kRspNak;
|
|
payload->size = 1;
|
|
uint8_t* pData = &payload->data[0];
|
|
*pData = error_code; // Straight reference to data[0] is causing bogus gcc array subscript error
|
|
if (error_code == kErrFailErrno) {
|
|
int r_errno = errno;
|
|
payload->size = 2;
|
|
payload->data[1] = r_errno;
|
|
}
|
|
_session_info.stream_download = false;
|
|
} else {
|
|
#ifndef MAVLINK_FTP_UNIT_TEST
|
|
if (max_bytes_to_send < (get_size()*2)) {
|
|
more_data = false;
|
|
/* perform transfers in 35K chunks - this is determined empirical */
|
|
if (_session_info.stream_chunk_transmitted > 35000) {
|
|
payload->burst_complete = true;
|
|
_session_info.stream_download = false;
|
|
_session_info.stream_chunk_transmitted = 0;
|
|
}
|
|
} else {
|
|
#endif
|
|
more_data = true;
|
|
payload->burst_complete = false;
|
|
#ifndef MAVLINK_FTP_UNIT_TEST
|
|
max_bytes_to_send -= get_size();
|
|
}
|
|
#endif
|
|
}
|
|
|
|
ftp_msg.target_system = _session_info.stream_target_system_id;
|
|
_reply(&ftp_msg);
|
|
} while (more_data);
|
|
}
|
|
|