find.c revision 1.1 1 1.1 cgd /*-
2 1.1 cgd * Copyright (c) 1991 The Regents of the University of California.
3 1.1 cgd * All rights reserved.
4 1.1 cgd *
5 1.1 cgd * This code is derived from software contributed to Berkeley by
6 1.1 cgd * Cimarron D. Taylor of the University of California, Berkeley.
7 1.1 cgd *
8 1.1 cgd * Redistribution and use in source and binary forms, with or without
9 1.1 cgd * modification, are permitted provided that the following conditions
10 1.1 cgd * are met:
11 1.1 cgd * 1. Redistributions of source code must retain the above copyright
12 1.1 cgd * notice, this list of conditions and the following disclaimer.
13 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 cgd * notice, this list of conditions and the following disclaimer in the
15 1.1 cgd * documentation and/or other materials provided with the distribution.
16 1.1 cgd * 3. All advertising materials mentioning features or use of this software
17 1.1 cgd * must display the following acknowledgement:
18 1.1 cgd * This product includes software developed by the University of
19 1.1 cgd * California, Berkeley and its contributors.
20 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
21 1.1 cgd * may be used to endorse or promote products derived from this software
22 1.1 cgd * without specific prior written permission.
23 1.1 cgd *
24 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 1.1 cgd * SUCH DAMAGE.
35 1.1 cgd */
36 1.1 cgd
37 1.1 cgd #ifndef lint
38 1.1 cgd static char sccsid[] = "@(#)find.c 5.3 (Berkeley) 5/25/91";
39 1.1 cgd #endif /* not lint */
40 1.1 cgd
41 1.1 cgd #include <sys/types.h>
42 1.1 cgd #include <sys/stat.h>
43 1.1 cgd #include <sys/errno.h>
44 1.1 cgd #include <fts.h>
45 1.1 cgd #include <stdio.h>
46 1.1 cgd #include <string.h>
47 1.1 cgd #include <stdlib.h>
48 1.1 cgd #include "find.h"
49 1.1 cgd
50 1.1 cgd /*
51 1.1 cgd * find_formplan --
52 1.1 cgd * process the command line and create a "plan" corresponding to the
53 1.1 cgd * command arguments.
54 1.1 cgd */
55 1.1 cgd PLAN *
56 1.1 cgd find_formplan(argv)
57 1.1 cgd char **argv;
58 1.1 cgd {
59 1.1 cgd PLAN *plan, *tail, *new;
60 1.1 cgd PLAN *c_print(), *find_create(), *not_squish(), *or_squish();
61 1.1 cgd PLAN *paren_squish();
62 1.1 cgd
63 1.1 cgd /*
64 1.1 cgd * for each argument in the command line, determine what kind of node
65 1.1 cgd * it is, create the appropriate node type and add the new plan node
66 1.1 cgd * to the end of the existing plan. The resulting plan is a linked
67 1.1 cgd * list of plan nodes. For example, the string:
68 1.1 cgd *
69 1.1 cgd * % find . -name foo -newer bar -print
70 1.1 cgd *
71 1.1 cgd * results in the plan:
72 1.1 cgd *
73 1.1 cgd * [-name foo]--> [-newer bar]--> [-print]
74 1.1 cgd *
75 1.1 cgd * in this diagram, `[-name foo]' represents the plan node generated
76 1.1 cgd * by c_name() with an argument of foo and `-->' represents the
77 1.1 cgd * plan->next pointer.
78 1.1 cgd */
79 1.1 cgd for (plan = NULL; *argv;) {
80 1.1 cgd if (!(new = find_create(&argv)))
81 1.1 cgd continue;
82 1.1 cgd if (plan == NULL)
83 1.1 cgd tail = plan = new;
84 1.1 cgd else {
85 1.1 cgd tail->next = new;
86 1.1 cgd tail = new;
87 1.1 cgd }
88 1.1 cgd }
89 1.1 cgd
90 1.1 cgd /*
91 1.1 cgd * if the user didn't specify one of -print, -ok or -exec, then -print
92 1.1 cgd * is assumed so we add a -print node on the end. It is possible that
93 1.1 cgd * the user might want the -print someplace else on the command line,
94 1.1 cgd * but there's no way to know that.
95 1.1 cgd */
96 1.1 cgd if (!isoutput) {
97 1.1 cgd new = c_print();
98 1.1 cgd if (plan == NULL)
99 1.1 cgd tail = plan = new;
100 1.1 cgd else {
101 1.1 cgd tail->next = new;
102 1.1 cgd tail = new;
103 1.1 cgd }
104 1.1 cgd }
105 1.1 cgd
106 1.1 cgd /*
107 1.1 cgd * the command line has been completely processed into a search plan
108 1.1 cgd * except for the (, ), !, and -o operators. Rearrange the plan so
109 1.1 cgd * that the portions of the plan which are affected by the operators
110 1.1 cgd * are moved into operator nodes themselves. For example:
111 1.1 cgd *
112 1.1 cgd * [!]--> [-name foo]--> [-print]
113 1.1 cgd *
114 1.1 cgd * becomes
115 1.1 cgd *
116 1.1 cgd * [! [-name foo] ]--> [-print]
117 1.1 cgd *
118 1.1 cgd * and
119 1.1 cgd *
120 1.1 cgd * [(]--> [-depth]--> [-name foo]--> [)]--> [-print]
121 1.1 cgd *
122 1.1 cgd * becomes
123 1.1 cgd *
124 1.1 cgd * [expr [-depth]-->[-name foo] ]--> [-print]
125 1.1 cgd *
126 1.1 cgd * operators are handled in order of precedence.
127 1.1 cgd */
128 1.1 cgd
129 1.1 cgd plan = paren_squish(plan); /* ()'s */
130 1.1 cgd plan = not_squish(plan); /* !'s */
131 1.1 cgd plan = or_squish(plan); /* -o's */
132 1.1 cgd return(plan);
133 1.1 cgd }
134 1.1 cgd
135 1.1 cgd FTS *tree; /* pointer to top of FTS hierarchy */
136 1.1 cgd
137 1.1 cgd /*
138 1.1 cgd * find_execute --
139 1.1 cgd * take a search plan and an array of search paths and executes the plan
140 1.1 cgd * over all FTSENT's returned for the given search paths.
141 1.1 cgd */
142 1.1 cgd void
143 1.1 cgd find_execute(plan, paths)
144 1.1 cgd PLAN *plan; /* search plan */
145 1.1 cgd char **paths; /* array of pathnames to traverse */
146 1.1 cgd {
147 1.1 cgd register FTSENT *entry;
148 1.1 cgd PLAN *p;
149 1.1 cgd
150 1.1 cgd if (!(tree = fts_open(paths, ftsoptions, (int (*)())NULL)))
151 1.1 cgd err("ftsopen: %s", strerror(errno));
152 1.1 cgd
153 1.1 cgd while (entry = fts_read(tree)) {
154 1.1 cgd switch(entry->fts_info) {
155 1.1 cgd case FTS_D:
156 1.1 cgd if (isdepth)
157 1.1 cgd continue;
158 1.1 cgd break;
159 1.1 cgd case FTS_DP:
160 1.1 cgd if (!isdepth)
161 1.1 cgd continue;
162 1.1 cgd break;
163 1.1 cgd case FTS_DNR:
164 1.1 cgd case FTS_ERR:
165 1.1 cgd case FTS_NS:
166 1.1 cgd (void)fprintf(stderr, "find: %s: %s\n",
167 1.1 cgd entry->fts_path, strerror(errno));
168 1.1 cgd continue;
169 1.1 cgd case FTS_SL:
170 1.1 cgd if (entry->fts_level == FTS_ROOTLEVEL) {
171 1.1 cgd (void)fts_set(tree, entry, FTS_FOLLOW);
172 1.1 cgd continue;
173 1.1 cgd }
174 1.1 cgd break;
175 1.1 cgd }
176 1.1 cgd
177 1.1 cgd #define BADCH " \t\n\\'\""
178 1.1 cgd if (isxargs && strpbrk(entry->fts_path, BADCH)) {
179 1.1 cgd (void)fprintf(stderr,
180 1.1 cgd "find: illegal path: %s\n", entry->fts_path);
181 1.1 cgd continue;
182 1.1 cgd }
183 1.1 cgd
184 1.1 cgd /*
185 1.1 cgd * call all the functions in the execution plan until one is
186 1.1 cgd * false or all have been executed. This is where we do all
187 1.1 cgd * the work specified by the user on the command line.
188 1.1 cgd */
189 1.1 cgd for (p = plan; p && (p->eval)(p, entry); p = p->next);
190 1.1 cgd }
191 1.1 cgd (void)fts_close(tree);
192 1.1 cgd }
193