find.c revision 1.8 1 1.8 tls /* $NetBSD: find.c,v 1.8 1997/01/09 20:19:10 tls Exp $ */
2 1.8 tls
3 1.1 cgd /*-
4 1.5 jtc * Copyright (c) 1991, 1993
5 1.5 jtc * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * This code is derived from software contributed to Berkeley by
8 1.1 cgd * Cimarron D. Taylor of the University of California, Berkeley.
9 1.1 cgd *
10 1.1 cgd * Redistribution and use in source and binary forms, with or without
11 1.1 cgd * modification, are permitted provided that the following conditions
12 1.1 cgd * are met:
13 1.1 cgd * 1. Redistributions of source code must retain the above copyright
14 1.1 cgd * notice, this list of conditions and the following disclaimer.
15 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 cgd * notice, this list of conditions and the following disclaimer in the
17 1.1 cgd * documentation and/or other materials provided with the distribution.
18 1.1 cgd * 3. All advertising materials mentioning features or use of this software
19 1.1 cgd * must display the following acknowledgement:
20 1.1 cgd * This product includes software developed by the University of
21 1.1 cgd * California, Berkeley and its contributors.
22 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
23 1.1 cgd * may be used to endorse or promote products derived from this software
24 1.1 cgd * without specific prior written permission.
25 1.1 cgd *
26 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 1.1 cgd * SUCH DAMAGE.
37 1.1 cgd */
38 1.1 cgd
39 1.1 cgd #ifndef lint
40 1.5 jtc /*static char sccsid[] = "from: @(#)find.c 8.1 (Berkeley) 6/6/93";*/
41 1.8 tls static char rcsid[] = "$NetBSD: find.c,v 1.8 1997/01/09 20:19:10 tls Exp $";
42 1.1 cgd #endif /* not lint */
43 1.1 cgd
44 1.1 cgd #include <sys/types.h>
45 1.1 cgd #include <sys/stat.h>
46 1.5 jtc
47 1.5 jtc #include <err.h>
48 1.5 jtc #include <errno.h>
49 1.1 cgd #include <fts.h>
50 1.1 cgd #include <stdio.h>
51 1.1 cgd #include <string.h>
52 1.1 cgd #include <stdlib.h>
53 1.5 jtc
54 1.1 cgd #include "find.h"
55 1.1 cgd
56 1.1 cgd /*
57 1.1 cgd * find_formplan --
58 1.1 cgd * process the command line and create a "plan" corresponding to the
59 1.1 cgd * command arguments.
60 1.1 cgd */
61 1.1 cgd PLAN *
62 1.1 cgd find_formplan(argv)
63 1.1 cgd char **argv;
64 1.1 cgd {
65 1.1 cgd PLAN *plan, *tail, *new;
66 1.1 cgd
67 1.1 cgd /*
68 1.1 cgd * for each argument in the command line, determine what kind of node
69 1.1 cgd * it is, create the appropriate node type and add the new plan node
70 1.1 cgd * to the end of the existing plan. The resulting plan is a linked
71 1.1 cgd * list of plan nodes. For example, the string:
72 1.1 cgd *
73 1.1 cgd * % find . -name foo -newer bar -print
74 1.1 cgd *
75 1.1 cgd * results in the plan:
76 1.1 cgd *
77 1.1 cgd * [-name foo]--> [-newer bar]--> [-print]
78 1.1 cgd *
79 1.1 cgd * in this diagram, `[-name foo]' represents the plan node generated
80 1.1 cgd * by c_name() with an argument of foo and `-->' represents the
81 1.1 cgd * plan->next pointer.
82 1.1 cgd */
83 1.5 jtc for (plan = tail = NULL; *argv;) {
84 1.1 cgd if (!(new = find_create(&argv)))
85 1.1 cgd continue;
86 1.1 cgd if (plan == NULL)
87 1.1 cgd tail = plan = new;
88 1.1 cgd else {
89 1.1 cgd tail->next = new;
90 1.1 cgd tail = new;
91 1.1 cgd }
92 1.1 cgd }
93 1.1 cgd
94 1.1 cgd /*
95 1.1 cgd * if the user didn't specify one of -print, -ok or -exec, then -print
96 1.6 cgd * is assumed so we bracket the current expression with parens, if
97 1.6 cgd * necessary, and add a -print node on the end.
98 1.1 cgd */
99 1.1 cgd if (!isoutput) {
100 1.6 cgd if (plan == NULL) {
101 1.6 cgd new = c_print();
102 1.1 cgd tail = plan = new;
103 1.6 cgd } else {
104 1.6 cgd new = c_openparen();
105 1.6 cgd new->next = plan;
106 1.6 cgd plan = new;
107 1.6 cgd new = c_closeparen();
108 1.6 cgd tail->next = new;
109 1.6 cgd tail = new;
110 1.6 cgd new = c_print();
111 1.1 cgd tail->next = new;
112 1.1 cgd tail = new;
113 1.1 cgd }
114 1.1 cgd }
115 1.1 cgd
116 1.1 cgd /*
117 1.1 cgd * the command line has been completely processed into a search plan
118 1.1 cgd * except for the (, ), !, and -o operators. Rearrange the plan so
119 1.1 cgd * that the portions of the plan which are affected by the operators
120 1.1 cgd * are moved into operator nodes themselves. For example:
121 1.1 cgd *
122 1.1 cgd * [!]--> [-name foo]--> [-print]
123 1.1 cgd *
124 1.1 cgd * becomes
125 1.1 cgd *
126 1.1 cgd * [! [-name foo] ]--> [-print]
127 1.1 cgd *
128 1.1 cgd * and
129 1.1 cgd *
130 1.1 cgd * [(]--> [-depth]--> [-name foo]--> [)]--> [-print]
131 1.1 cgd *
132 1.1 cgd * becomes
133 1.1 cgd *
134 1.1 cgd * [expr [-depth]-->[-name foo] ]--> [-print]
135 1.1 cgd *
136 1.1 cgd * operators are handled in order of precedence.
137 1.1 cgd */
138 1.1 cgd
139 1.1 cgd plan = paren_squish(plan); /* ()'s */
140 1.1 cgd plan = not_squish(plan); /* !'s */
141 1.1 cgd plan = or_squish(plan); /* -o's */
142 1.5 jtc return (plan);
143 1.1 cgd }
144 1.1 cgd
145 1.1 cgd FTS *tree; /* pointer to top of FTS hierarchy */
146 1.1 cgd
147 1.1 cgd /*
148 1.1 cgd * find_execute --
149 1.1 cgd * take a search plan and an array of search paths and executes the plan
150 1.1 cgd * over all FTSENT's returned for the given search paths.
151 1.1 cgd */
152 1.1 cgd void
153 1.1 cgd find_execute(plan, paths)
154 1.1 cgd PLAN *plan; /* search plan */
155 1.1 cgd char **paths; /* array of pathnames to traverse */
156 1.1 cgd {
157 1.1 cgd register FTSENT *entry;
158 1.1 cgd PLAN *p;
159 1.1 cgd
160 1.1 cgd if (!(tree = fts_open(paths, ftsoptions, (int (*)())NULL)))
161 1.5 jtc err(1, "ftsopen");
162 1.1 cgd
163 1.1 cgd while (entry = fts_read(tree)) {
164 1.1 cgd switch(entry->fts_info) {
165 1.1 cgd case FTS_D:
166 1.1 cgd if (isdepth)
167 1.1 cgd continue;
168 1.1 cgd break;
169 1.1 cgd case FTS_DP:
170 1.1 cgd if (!isdepth)
171 1.1 cgd continue;
172 1.1 cgd break;
173 1.1 cgd case FTS_DNR:
174 1.1 cgd case FTS_ERR:
175 1.1 cgd case FTS_NS:
176 1.5 jtc (void)fflush(stdout);
177 1.5 jtc warn("%s", entry->fts_path);
178 1.1 cgd continue;
179 1.1 cgd }
180 1.1 cgd #define BADCH " \t\n\\'\""
181 1.1 cgd if (isxargs && strpbrk(entry->fts_path, BADCH)) {
182 1.5 jtc (void)fflush(stdout);
183 1.5 jtc warnx("%s: illegal path", entry->fts_path);
184 1.1 cgd continue;
185 1.1 cgd }
186 1.1 cgd
187 1.1 cgd /*
188 1.1 cgd * call all the functions in the execution plan until one is
189 1.1 cgd * false or all have been executed. This is where we do all
190 1.1 cgd * the work specified by the user on the command line.
191 1.1 cgd */
192 1.7 mrg for (p = plan; p && (p->eval)(p, entry); p = p->next)
193 1.7 mrg ;
194 1.1 cgd }
195 1.1 cgd (void)fts_close(tree);
196 1.1 cgd }
197