create.c revision 1.59 1 /* $NetBSD: create.c,v 1.59 2012/07/15 09:08:29 spz Exp $ */
2
3 /*-
4 * Copyright (c) 1989, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #if HAVE_NBTOOL_CONFIG_H
33 #include "nbtool_config.h"
34 #endif
35
36 #include <sys/cdefs.h>
37 #if defined(__RCSID) && !defined(lint)
38 #if 0
39 static char sccsid[] = "@(#)create.c 8.1 (Berkeley) 6/6/93";
40 #else
41 __RCSID("$NetBSD: create.c,v 1.59 2012/07/15 09:08:29 spz Exp $");
42 #endif
43 #endif /* not lint */
44
45 #include <sys/param.h>
46 #include <sys/stat.h>
47
48 #if ! HAVE_NBTOOL_CONFIG_H
49 #include <dirent.h>
50 #endif
51
52 #include <errno.h>
53 #include <fcntl.h>
54 #include <grp.h>
55 #include <pwd.h>
56 #include <stdio.h>
57 #include <stdarg.h>
58 #include <stdlib.h>
59 #include <string.h>
60 #include <time.h>
61 #include <unistd.h>
62
63 #ifndef NO_MD5
64 #include <md5.h>
65 #endif
66 #ifndef NO_RMD160
67 #include <rmd160.h>
68 #endif
69 #ifndef NO_SHA1
70 #include <sha1.h>
71 #endif
72 #ifndef NO_SHA2
73 #include <sha2.h>
74 #endif
75
76 #include "extern.h"
77
78 #define INDENTNAMELEN 15
79 #define MAXLINELEN 80
80
81 static gid_t gid;
82 static uid_t uid;
83 static mode_t mode;
84 static u_long flags;
85
86 static int dcmp(const FTSENT **, const FTSENT **);
87 static void output(int *, const char *, ...)
88 __attribute__((__format__(__printf__, 2, 3)));
89 static int statd(FTS *, FTSENT *, uid_t *, gid_t *, mode_t *, u_long *);
90 static void statf(FTSENT *);
91
92 void
93 cwalk(void)
94 {
95 FTS *t;
96 FTSENT *p;
97 time_t clocktime;
98 char host[MAXHOSTNAMELEN + 1];
99 const char *user;
100 char *argv[2];
101 char dot[] = ".";
102
103 argv[0] = dot;
104 argv[1] = NULL;
105
106 time(&clocktime);
107 gethostname(host, sizeof(host));
108 host[sizeof(host) - 1] = '\0';
109 if ((user = getlogin()) == NULL) {
110 struct passwd *pw;
111 user = (pw = getpwuid(getuid())) == NULL ? pw->pw_name :
112 "<unknown>";
113 }
114
115 printf(
116 "#\t user: %s\n#\tmachine: %s\n#\t tree: %s\n#\t date: %s",
117 user, host, fullpath, ctime(&clocktime));
118
119 if ((t = fts_open(argv, ftsoptions, dcmp)) == NULL)
120 mtree_err("fts_open: %s", strerror(errno));
121 while ((p = fts_read(t)) != NULL) {
122 if (check_excludes(p->fts_name, p->fts_path)) {
123 fts_set(t, p, FTS_SKIP);
124 continue;
125 }
126 switch(p->fts_info) {
127 case FTS_D:
128 printf("\n# %s\n", p->fts_path);
129 statd(t, p, &uid, &gid, &mode, &flags);
130 statf(p);
131 break;
132 case FTS_DP:
133 if (p->fts_level > 0)
134 printf("# %s\n..\n\n", p->fts_path);
135 break;
136 case FTS_DNR:
137 case FTS_ERR:
138 case FTS_NS:
139 mtree_err("%s: %s",
140 p->fts_path, strerror(p->fts_errno));
141 break;
142 default:
143 if (!dflag)
144 statf(p);
145 break;
146
147 }
148 }
149 fts_close(t);
150 if (sflag && keys & F_CKSUM)
151 mtree_err("%s checksum: %u", fullpath, crc_total);
152 }
153
154 static void
155 statf(FTSENT *p)
156 {
157 u_int32_t len, val;
158 int fd, indent;
159 const char *name;
160 #if !defined(NO_MD5) || !defined(NO_RMD160) || !defined(NO_SHA1) || !defined(NO_SHA2)
161 char *digestbuf;
162 #endif
163
164 indent = printf("%s%s",
165 S_ISDIR(p->fts_statp->st_mode) ? "" : " ", vispath(p->fts_name));
166
167 if (indent > INDENTNAMELEN)
168 indent = MAXLINELEN;
169 else
170 indent += printf("%*s", INDENTNAMELEN - indent, "");
171
172 if (!S_ISREG(p->fts_statp->st_mode))
173 output(&indent, "type=%s", inotype(p->fts_statp->st_mode));
174 if (keys & (F_UID | F_UNAME) && p->fts_statp->st_uid != uid) {
175 if (keys & F_UNAME &&
176 (name = user_from_uid(p->fts_statp->st_uid, 1)) != NULL)
177 output(&indent, "uname=%s", name);
178 else /* if (keys & F_UID) */
179 output(&indent, "uid=%u", p->fts_statp->st_uid);
180 }
181 if (keys & (F_GID | F_GNAME) && p->fts_statp->st_gid != gid) {
182 if (keys & F_GNAME &&
183 (name = group_from_gid(p->fts_statp->st_gid, 1)) != NULL)
184 output(&indent, "gname=%s", name);
185 else /* if (keys & F_GID) */
186 output(&indent, "gid=%u", p->fts_statp->st_gid);
187 }
188 if (keys & F_MODE && (p->fts_statp->st_mode & MBITS) != mode)
189 output(&indent, "mode=%#o", p->fts_statp->st_mode & MBITS);
190 if (keys & F_DEV &&
191 (S_ISBLK(p->fts_statp->st_mode) || S_ISCHR(p->fts_statp->st_mode)))
192 output(&indent, "device=%#llx",
193 (long long)p->fts_statp->st_rdev);
194 if (keys & F_NLINK && p->fts_statp->st_nlink != 1)
195 output(&indent, "nlink=%u", p->fts_statp->st_nlink);
196 if (keys & F_SIZE && S_ISREG(p->fts_statp->st_mode))
197 output(&indent, "size=%lld", (long long)p->fts_statp->st_size);
198 if (keys & F_TIME)
199 #if defined(BSD4_4) && !defined(HAVE_NBTOOL_CONFIG_H)
200 output(&indent, "time=%ld.%ld",
201 (long)p->fts_statp->st_mtimespec.tv_sec,
202 p->fts_statp->st_mtimespec.tv_nsec);
203 #else
204 output(&indent, "time=%ld.%ld",
205 (long)p->fts_statp->st_mtime, (long)0);
206 #endif
207 if (keys & F_CKSUM && S_ISREG(p->fts_statp->st_mode)) {
208 if ((fd = open(p->fts_accpath, O_RDONLY, 0)) < 0 ||
209 crc(fd, &val, &len))
210 mtree_err("%s: %s", p->fts_accpath, strerror(errno));
211 close(fd);
212 output(&indent, "cksum=%lu", (long)val);
213 }
214 #ifndef NO_MD5
215 if (keys & F_MD5 && S_ISREG(p->fts_statp->st_mode)) {
216 if ((digestbuf = MD5File(p->fts_accpath, NULL)) == NULL)
217 mtree_err("%s: MD5File failed: %s", p->fts_accpath, strerror(errno));
218 output(&indent, "md5=%s", digestbuf);
219 free(digestbuf);
220 }
221 #endif /* ! NO_MD5 */
222 #ifndef NO_RMD160
223 if (keys & F_RMD160 && S_ISREG(p->fts_statp->st_mode)) {
224 if ((digestbuf = RMD160File(p->fts_accpath, NULL)) == NULL)
225 mtree_err("%s: RMD160File failed: %s", p->fts_accpath, strerror(errno));
226 output(&indent, "rmd160=%s", digestbuf);
227 free(digestbuf);
228 }
229 #endif /* ! NO_RMD160 */
230 #ifndef NO_SHA1
231 if (keys & F_SHA1 && S_ISREG(p->fts_statp->st_mode)) {
232 if ((digestbuf = SHA1File(p->fts_accpath, NULL)) == NULL)
233 mtree_err("%s: SHA1File failed: %s", p->fts_accpath, strerror(errno));
234 output(&indent, "sha1=%s", digestbuf);
235 free(digestbuf);
236 }
237 #endif /* ! NO_SHA1 */
238 #ifndef NO_SHA2
239 if (keys & F_SHA256 && S_ISREG(p->fts_statp->st_mode)) {
240 if ((digestbuf = SHA256_File(p->fts_accpath, NULL)) == NULL)
241 mtree_err("%s: SHA256_File failed: %s", p->fts_accpath, strerror(errno));
242 output(&indent, "sha256=%s", digestbuf);
243 free(digestbuf);
244 }
245 if (keys & F_SHA384 && S_ISREG(p->fts_statp->st_mode)) {
246 if ((digestbuf = SHA384_File(p->fts_accpath, NULL)) == NULL)
247 mtree_err("%s: SHA384_File failed: %s", p->fts_accpath, strerror(errno));
248 output(&indent, "sha384=%s", digestbuf);
249 free(digestbuf);
250 }
251 if (keys & F_SHA512 && S_ISREG(p->fts_statp->st_mode)) {
252 if ((digestbuf = SHA512_File(p->fts_accpath, NULL)) == NULL)
253 mtree_err("%s: SHA512_File failed: %s", p->fts_accpath, strerror(errno));
254 output(&indent, "sha512=%s", digestbuf);
255 free(digestbuf);
256 }
257 #endif /* ! NO_SHA2 */
258 if (keys & F_SLINK &&
259 (p->fts_info == FTS_SL || p->fts_info == FTS_SLNONE))
260 output(&indent, "link=%s", vispath(rlink(p->fts_accpath)));
261 #if HAVE_STRUCT_STAT_ST_FLAGS
262 if (keys & F_FLAGS && p->fts_statp->st_flags != flags) {
263 char *str = flags_to_string(p->fts_statp->st_flags, "none");
264 output(&indent, "flags=%s", str);
265 free(str);
266 }
267 #endif
268 putchar('\n');
269 }
270
271 /* XXX
272 * FLAGS2INDEX will fail once the user and system settable bits need more
273 * than one byte, respectively.
274 */
275 #define FLAGS2INDEX(x) (((x >> 8) & 0x0000ff00) | (x & 0x000000ff))
276
277 #define MTREE_MAXGID 5000
278 #define MTREE_MAXUID 5000
279 #define MTREE_MAXMODE (MBITS + 1)
280 #if HAVE_STRUCT_STAT_ST_FLAGS
281 #define MTREE_MAXFLAGS (FLAGS2INDEX(CH_MASK) + 1) /* 1808 */
282 #else
283 #define MTREE_MAXFLAGS 1
284 #endif
285 #define MTREE_MAXS 16
286
287 static int
288 statd(FTS *t, FTSENT *parent, uid_t *puid, gid_t *pgid, mode_t *pmode,
289 u_long *pflags)
290 {
291 FTSENT *p;
292 gid_t sgid;
293 uid_t suid;
294 mode_t smode;
295 u_long sflags = 0;
296 const char *name;
297 gid_t savegid;
298 uid_t saveuid;
299 mode_t savemode;
300 u_long saveflags;
301 u_short maxgid, maxuid, maxmode, maxflags;
302 u_short g[MTREE_MAXGID], u[MTREE_MAXUID],
303 m[MTREE_MAXMODE], f[MTREE_MAXFLAGS];
304 static int first = 1;
305
306 savegid = *pgid;
307 saveuid = *puid;
308 savemode = *pmode;
309 saveflags = *pflags;
310 if ((p = fts_children(t, 0)) == NULL) {
311 if (errno)
312 mtree_err("%s: %s", RP(parent), strerror(errno));
313 return (1);
314 }
315
316 memset(g, 0, sizeof(g));
317 memset(u, 0, sizeof(u));
318 memset(m, 0, sizeof(m));
319 memset(f, 0, sizeof(f));
320
321 maxuid = maxgid = maxmode = maxflags = 0;
322 for (; p; p = p->fts_link) {
323 smode = p->fts_statp->st_mode & MBITS;
324 if (smode < MTREE_MAXMODE && ++m[smode] > maxmode) {
325 savemode = smode;
326 maxmode = m[smode];
327 }
328 sgid = p->fts_statp->st_gid;
329 if (sgid < MTREE_MAXGID && ++g[sgid] > maxgid) {
330 savegid = sgid;
331 maxgid = g[sgid];
332 }
333 suid = p->fts_statp->st_uid;
334 if (suid < MTREE_MAXUID && ++u[suid] > maxuid) {
335 saveuid = suid;
336 maxuid = u[suid];
337 }
338
339 #if HAVE_STRUCT_STAT_ST_FLAGS
340 sflags = FLAGS2INDEX(p->fts_statp->st_flags);
341 if (sflags < MTREE_MAXFLAGS && ++f[sflags] > maxflags) {
342 saveflags = p->fts_statp->st_flags;
343 maxflags = f[sflags];
344 }
345 #endif
346 }
347 /*
348 * If the /set record is the same as the last one we do not need to
349 * output a new one. So first we check to see if anything changed.
350 * Note that we always output a /set record for the first directory.
351 */
352 if (((keys & (F_UNAME | F_UID)) && (*puid != saveuid)) ||
353 ((keys & (F_GNAME | F_GID)) && (*pgid != savegid)) ||
354 ((keys & F_MODE) && (*pmode != savemode)) ||
355 ((keys & F_FLAGS) && (*pflags != saveflags)) ||
356 first) {
357 first = 0;
358 printf("/set type=file");
359 if (keys & (F_UID | F_UNAME)) {
360 if (keys & F_UNAME &&
361 (name = user_from_uid(saveuid, 1)) != NULL)
362 printf(" uname=%s", name);
363 else /* if (keys & F_UID) */
364 printf(" uid=%lu", (u_long)saveuid);
365 }
366 if (keys & (F_GID | F_GNAME)) {
367 if (keys & F_GNAME &&
368 (name = group_from_gid(savegid, 1)) != NULL)
369 printf(" gname=%s", name);
370 else /* if (keys & F_UID) */
371 printf(" gid=%lu", (u_long)savegid);
372 }
373 if (keys & F_MODE)
374 printf(" mode=%#lo", (u_long)savemode);
375 if (keys & F_NLINK)
376 printf(" nlink=1");
377 if (keys & F_FLAGS) {
378 char *str = flags_to_string(saveflags, "none");
379 printf(" flags=%s", str);
380 free(str);
381 }
382 printf("\n");
383 *puid = saveuid;
384 *pgid = savegid;
385 *pmode = savemode;
386 *pflags = saveflags;
387 }
388 return (0);
389 }
390
391 /*
392 * dcmp --
393 * used as a comparison function passed to fts_open() to control
394 * the order in which fts_read() returns results. We make
395 * directories sort after non-directories, but otherwise sort in
396 * strcmp() order.
397 *
398 * Keep this in sync with nodecmp() in spec.c.
399 */
400 static int
401 dcmp(const FTSENT **a, const FTSENT **b)
402 {
403
404 if (S_ISDIR((*a)->fts_statp->st_mode)) {
405 if (!S_ISDIR((*b)->fts_statp->st_mode))
406 return (1);
407 } else if (S_ISDIR((*b)->fts_statp->st_mode))
408 return (-1);
409 return (strcmp((*a)->fts_name, (*b)->fts_name));
410 }
411
412 void
413 output(int *offset, const char *fmt, ...)
414 {
415 va_list ap;
416 char buf[1024];
417
418 va_start(ap, fmt);
419 vsnprintf(buf, sizeof(buf), fmt, ap);
420 va_end(ap);
421
422 if (*offset + strlen(buf) > MAXLINELEN - 3) {
423 printf(" \\\n%*s", INDENTNAMELEN, "");
424 *offset = INDENTNAMELEN;
425 }
426 *offset += printf(" %s", buf) + 1;
427 }
428