find.c revision 1.6 1 1.1 cgd /*-
2 1.5 jtc * Copyright (c) 1991, 1993
3 1.5 jtc * The Regents of the University of California. All rights reserved.
4 1.1 cgd *
5 1.1 cgd * This code is derived from software contributed to Berkeley by
6 1.1 cgd * Cimarron D. Taylor of the University of California, Berkeley.
7 1.1 cgd *
8 1.1 cgd * Redistribution and use in source and binary forms, with or without
9 1.1 cgd * modification, are permitted provided that the following conditions
10 1.1 cgd * are met:
11 1.1 cgd * 1. Redistributions of source code must retain the above copyright
12 1.1 cgd * notice, this list of conditions and the following disclaimer.
13 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 cgd * notice, this list of conditions and the following disclaimer in the
15 1.1 cgd * documentation and/or other materials provided with the distribution.
16 1.1 cgd * 3. All advertising materials mentioning features or use of this software
17 1.1 cgd * must display the following acknowledgement:
18 1.1 cgd * This product includes software developed by the University of
19 1.1 cgd * California, Berkeley and its contributors.
20 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
21 1.1 cgd * may be used to endorse or promote products derived from this software
22 1.1 cgd * without specific prior written permission.
23 1.1 cgd *
24 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 1.1 cgd * SUCH DAMAGE.
35 1.1 cgd */
36 1.1 cgd
37 1.1 cgd #ifndef lint
38 1.5 jtc /*static char sccsid[] = "from: @(#)find.c 8.1 (Berkeley) 6/6/93";*/
39 1.6 cgd static char rcsid[] = "$Id: find.c,v 1.6 1994/07/18 09:55:36 cgd Exp $";
40 1.1 cgd #endif /* not lint */
41 1.1 cgd
42 1.1 cgd #include <sys/types.h>
43 1.1 cgd #include <sys/stat.h>
44 1.5 jtc
45 1.5 jtc #include <err.h>
46 1.5 jtc #include <errno.h>
47 1.1 cgd #include <fts.h>
48 1.1 cgd #include <stdio.h>
49 1.1 cgd #include <string.h>
50 1.1 cgd #include <stdlib.h>
51 1.5 jtc
52 1.1 cgd #include "find.h"
53 1.1 cgd
54 1.1 cgd /*
55 1.1 cgd * find_formplan --
56 1.1 cgd * process the command line and create a "plan" corresponding to the
57 1.1 cgd * command arguments.
58 1.1 cgd */
59 1.1 cgd PLAN *
60 1.1 cgd find_formplan(argv)
61 1.1 cgd char **argv;
62 1.1 cgd {
63 1.1 cgd PLAN *plan, *tail, *new;
64 1.1 cgd
65 1.1 cgd /*
66 1.1 cgd * for each argument in the command line, determine what kind of node
67 1.1 cgd * it is, create the appropriate node type and add the new plan node
68 1.1 cgd * to the end of the existing plan. The resulting plan is a linked
69 1.1 cgd * list of plan nodes. For example, the string:
70 1.1 cgd *
71 1.1 cgd * % find . -name foo -newer bar -print
72 1.1 cgd *
73 1.1 cgd * results in the plan:
74 1.1 cgd *
75 1.1 cgd * [-name foo]--> [-newer bar]--> [-print]
76 1.1 cgd *
77 1.1 cgd * in this diagram, `[-name foo]' represents the plan node generated
78 1.1 cgd * by c_name() with an argument of foo and `-->' represents the
79 1.1 cgd * plan->next pointer.
80 1.1 cgd */
81 1.5 jtc for (plan = tail = NULL; *argv;) {
82 1.1 cgd if (!(new = find_create(&argv)))
83 1.1 cgd continue;
84 1.1 cgd if (plan == NULL)
85 1.1 cgd tail = plan = new;
86 1.1 cgd else {
87 1.1 cgd tail->next = new;
88 1.1 cgd tail = new;
89 1.1 cgd }
90 1.1 cgd }
91 1.1 cgd
92 1.1 cgd /*
93 1.1 cgd * if the user didn't specify one of -print, -ok or -exec, then -print
94 1.6 cgd * is assumed so we bracket the current expression with parens, if
95 1.6 cgd * necessary, and add a -print node on the end.
96 1.1 cgd */
97 1.1 cgd if (!isoutput) {
98 1.6 cgd if (plan == NULL) {
99 1.6 cgd new = c_print();
100 1.1 cgd tail = plan = new;
101 1.6 cgd } else {
102 1.6 cgd new = c_openparen();
103 1.6 cgd new->next = plan;
104 1.6 cgd plan = new;
105 1.6 cgd new = c_closeparen();
106 1.6 cgd tail->next = new;
107 1.6 cgd tail = new;
108 1.6 cgd new = c_print();
109 1.1 cgd tail->next = new;
110 1.1 cgd tail = new;
111 1.1 cgd }
112 1.1 cgd }
113 1.1 cgd
114 1.1 cgd /*
115 1.1 cgd * the command line has been completely processed into a search plan
116 1.1 cgd * except for the (, ), !, and -o operators. Rearrange the plan so
117 1.1 cgd * that the portions of the plan which are affected by the operators
118 1.1 cgd * are moved into operator nodes themselves. For example:
119 1.1 cgd *
120 1.1 cgd * [!]--> [-name foo]--> [-print]
121 1.1 cgd *
122 1.1 cgd * becomes
123 1.1 cgd *
124 1.1 cgd * [! [-name foo] ]--> [-print]
125 1.1 cgd *
126 1.1 cgd * and
127 1.1 cgd *
128 1.1 cgd * [(]--> [-depth]--> [-name foo]--> [)]--> [-print]
129 1.1 cgd *
130 1.1 cgd * becomes
131 1.1 cgd *
132 1.1 cgd * [expr [-depth]-->[-name foo] ]--> [-print]
133 1.1 cgd *
134 1.1 cgd * operators are handled in order of precedence.
135 1.1 cgd */
136 1.1 cgd
137 1.1 cgd plan = paren_squish(plan); /* ()'s */
138 1.1 cgd plan = not_squish(plan); /* !'s */
139 1.1 cgd plan = or_squish(plan); /* -o's */
140 1.5 jtc return (plan);
141 1.1 cgd }
142 1.1 cgd
143 1.1 cgd FTS *tree; /* pointer to top of FTS hierarchy */
144 1.1 cgd
145 1.1 cgd /*
146 1.1 cgd * find_execute --
147 1.1 cgd * take a search plan and an array of search paths and executes the plan
148 1.1 cgd * over all FTSENT's returned for the given search paths.
149 1.1 cgd */
150 1.1 cgd void
151 1.1 cgd find_execute(plan, paths)
152 1.1 cgd PLAN *plan; /* search plan */
153 1.1 cgd char **paths; /* array of pathnames to traverse */
154 1.1 cgd {
155 1.1 cgd register FTSENT *entry;
156 1.1 cgd PLAN *p;
157 1.1 cgd
158 1.1 cgd if (!(tree = fts_open(paths, ftsoptions, (int (*)())NULL)))
159 1.5 jtc err(1, "ftsopen");
160 1.1 cgd
161 1.1 cgd while (entry = fts_read(tree)) {
162 1.1 cgd switch(entry->fts_info) {
163 1.1 cgd case FTS_D:
164 1.1 cgd if (isdepth)
165 1.1 cgd continue;
166 1.1 cgd break;
167 1.1 cgd case FTS_DP:
168 1.1 cgd if (!isdepth)
169 1.1 cgd continue;
170 1.1 cgd break;
171 1.1 cgd case FTS_DNR:
172 1.1 cgd case FTS_ERR:
173 1.1 cgd case FTS_NS:
174 1.5 jtc (void)fflush(stdout);
175 1.5 jtc warn("%s", entry->fts_path);
176 1.1 cgd continue;
177 1.1 cgd }
178 1.1 cgd #define BADCH " \t\n\\'\""
179 1.1 cgd if (isxargs && strpbrk(entry->fts_path, BADCH)) {
180 1.5 jtc (void)fflush(stdout);
181 1.5 jtc warnx("%s: illegal path", entry->fts_path);
182 1.1 cgd continue;
183 1.1 cgd }
184 1.1 cgd
185 1.1 cgd /*
186 1.1 cgd * call all the functions in the execution plan until one is
187 1.1 cgd * false or all have been executed. This is where we do all
188 1.1 cgd * the work specified by the user on the command line.
189 1.1 cgd */
190 1.1 cgd for (p = plan; p && (p->eval)(p, entry); p = p->next);
191 1.1 cgd }
192 1.1 cgd (void)fts_close(tree);
193 1.1 cgd }
194