create.c revision 244541
1226584Sdim/* $NetBSD: create.c,v 1.68 2012/12/20 16:43:16 christos Exp $ */ 2226584Sdim 3226584Sdim/*- 4226584Sdim * Copyright (c) 1989, 1993 5226584Sdim * The Regents of the University of California. All rights reserved. 6226584Sdim * 7226584Sdim * Redistribution and use in source and binary forms, with or without 8226584Sdim * modification, are permitted provided that the following conditions 9226584Sdim * are met: 10226584Sdim * 1. Redistributions of source code must retain the above copyright 11226584Sdim * notice, this list of conditions and the following disclaimer. 12226584Sdim * 2. Redistributions in binary form must reproduce the above copyright 13226584Sdim * notice, this list of conditions and the following disclaimer in the 14226584Sdim * documentation and/or other materials provided with the distribution. 15226584Sdim * 3. Neither the name of the University nor the names of its contributors 16226584Sdim * may be used to endorse or promote products derived from this software 17226584Sdim * without specific prior written permission. 18226584Sdim * 19226584Sdim * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 20226584Sdim * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21226584Sdim * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22226584Sdim * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 23251662Sdim * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24226584Sdim * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25226584Sdim * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26226584Sdim * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27226584Sdim * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28226584Sdim * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29226584Sdim * SUCH DAMAGE. 30226584Sdim */ 31226584Sdim 32226584Sdim#if HAVE_NBTOOL_CONFIG_H 33226584Sdim#include "nbtool_config.h" 34226584Sdim#endif 35226584Sdim 36226584Sdim#include <sys/cdefs.h> 37226584Sdim#if defined(__RCSID) && !defined(lint) 38226584Sdim#if 0 39226584Sdimstatic char sccsid[] = "@(#)create.c 8.1 (Berkeley) 6/6/93"; 40226584Sdim#else 41226584Sdim__RCSID("$NetBSD: create.c,v 1.68 2012/12/20 16:43:16 christos Exp $"); 42226584Sdim#endif 43226584Sdim#endif /* not lint */ 44226584Sdim 45226584Sdim#include <sys/param.h> 46226584Sdim#include <sys/stat.h> 47226584Sdim 48226584Sdim#if ! HAVE_NBTOOL_CONFIG_H 49226584Sdim#include <dirent.h> 50226584Sdim#endif 51226584Sdim 52226584Sdim#include <errno.h> 53226584Sdim#include <fcntl.h> 54226584Sdim#include <grp.h> 55226584Sdim#include <pwd.h> 56226584Sdim#include <stdio.h> 57226584Sdim#include <stdarg.h> 58226584Sdim#include <stdlib.h> 59226584Sdim#include <string.h> 60226584Sdim#include <time.h> 61226584Sdim#include <unistd.h> 62226584Sdim 63226584Sdim#ifndef NO_MD5 64226584Sdim#include <md5.h> 65226584Sdim#endif 66226584Sdim#ifndef NO_RMD160 67226584Sdim#include <rmd160.h> 68226584Sdim#endif 69226584Sdim#ifndef NO_SHA1 70226584Sdim#include <sha1.h> 71226584Sdim#endif 72226584Sdim#ifndef NO_SHA2 73226584Sdim#include <sha2.h> 74226584Sdim#endif 75226584Sdim 76226584Sdim#include "extern.h" 77226584Sdim 78234353Sdim#define INDENTNAMELEN 15 79226584Sdim#define MAXLINELEN 80 80226584Sdim 81226584Sdimstatic gid_t gid; 82226584Sdimstatic uid_t uid; 83226584Sdimstatic mode_t mode; 84226584Sdimstatic u_long flags; 85226584Sdim 86226584Sdim#ifdef __FreeBSD__ 87226584Sdim#define FTS_CONST const 88226584Sdim#else 89226584Sdim#define FTS_CONST 90226584Sdim#endif 91226584Sdim 92226584Sdimstatic int dcmp(const FTSENT *FTS_CONST *, const FTSENT *FTS_CONST *); 93226584Sdimstatic void output(int, int *, const char *, ...) 94226584Sdim __attribute__((__format__(__printf__, 3, 4))); 95226584Sdimstatic int statd(FTS *, FTSENT *, uid_t *, gid_t *, mode_t *, u_long *); 96226584Sdimstatic void statf(int, FTSENT *); 97226584Sdim 98226584Sdimvoid 99226584Sdimcwalk(void) 100226584Sdim{ 101226584Sdim FTS *t; 102226584Sdim FTSENT *p; 103226584Sdim time_t clocktime; 104226584Sdim char host[MAXHOSTNAMELEN + 1]; 105226584Sdim const char *user; 106226584Sdim char *argv[2]; 107226584Sdim char dot[] = "."; 108226584Sdim int indent = 0; 109226584Sdim 110226584Sdim argv[0] = dot; 111226584Sdim argv[1] = NULL; 112226584Sdim 113226584Sdim time(&clocktime); 114226584Sdim gethostname(host, sizeof(host)); 115226584Sdim host[sizeof(host) - 1] = '\0'; 116226584Sdim if ((user = getlogin()) == NULL) { 117226584Sdim struct passwd *pw; 118226584Sdim user = (pw = getpwuid(getuid())) == NULL ? pw->pw_name : 119226584Sdim "<unknown>"; 120226584Sdim } 121226584Sdim 122226584Sdim if (!nflag) 123226584Sdim printf( 124226584Sdim "#\t user: %s\n#\tmachine: %s\n#\t tree: %s\n" 125226584Sdim "#\t date: %s", 126226584Sdim user, host, fullpath, ctime(&clocktime)); 127226584Sdim 128226584Sdim if ((t = fts_open(argv, ftsoptions, dcmp)) == NULL) 129226584Sdim mtree_err("fts_open: %s", strerror(errno)); 130226584Sdim while ((p = fts_read(t)) != NULL) { 131226584Sdim if (jflag) 132226584Sdim indent = p->fts_level * 4; 133226584Sdim if (check_excludes(p->fts_name, p->fts_path)) { 134226584Sdim fts_set(t, p, FTS_SKIP); 135226584Sdim continue; 136226584Sdim } 137226584Sdim switch(p->fts_info) { 138226584Sdim case FTS_D: 139226584Sdim if (!bflag) 140226584Sdim printf("\n"); 141226584Sdim if (!nflag) 142243830Sdim printf("# %s\n", p->fts_path); 143226584Sdim statd(t, p, &uid, &gid, &mode, &flags); 144226584Sdim statf(indent, p); 145226584Sdim break; 146226584Sdim case FTS_DP: 147226584Sdim if (p->fts_level > 0) 148226584Sdim if (!nflag) 149226584Sdim printf("%*s# %s\n", indent, "", 150226584Sdim p->fts_path); 151226584Sdim if (p->fts_level > 0 || flavor == F_FREEBSD9) { 152226584Sdim printf("%*s..\n", indent, ""); 153226584Sdim if (!bflag) 154226584Sdim printf("\n"); 155226584Sdim } 156226584Sdim break; 157226584Sdim case FTS_DNR: 158226584Sdim case FTS_ERR: 159226584Sdim case FTS_NS: 160226584Sdim mtree_err("%s: %s", 161226584Sdim p->fts_path, strerror(p->fts_errno)); 162226584Sdim break; 163243830Sdim default: 164226584Sdim if (!dflag) 165226584Sdim statf(indent, p); 166226584Sdim break; 167226584Sdim 168226584Sdim } 169226584Sdim } 170226584Sdim fts_close(t); 171243830Sdim if (sflag && keys & F_CKSUM) 172226584Sdim mtree_err("%s checksum: %u", fullpath, crc_total); 173226584Sdim} 174226584Sdim 175226584Sdimstatic void 176statf(int indent, FTSENT *p) 177{ 178 u_int32_t len, val; 179 int fd, offset; 180 const char *name = NULL; 181#if !defined(NO_MD5) || !defined(NO_RMD160) || !defined(NO_SHA1) || !defined(NO_SHA2) 182 char *digestbuf; 183#endif 184 185 offset = printf("%*s%s%s", indent, "", 186 S_ISDIR(p->fts_statp->st_mode) ? "" : " ", vispath(p->fts_name)); 187 188 if (offset > (INDENTNAMELEN + indent)) 189 offset = MAXLINELEN; 190 else 191 offset += printf("%*s", (INDENTNAMELEN + indent) - offset, ""); 192 193 if (!S_ISREG(p->fts_statp->st_mode) && (flavor == F_NETBSD6 || !dflag)) 194 output(indent, &offset, "type=%s", 195 inotype(p->fts_statp->st_mode)); 196 if (keys & (F_UID | F_UNAME) && p->fts_statp->st_uid != uid) { 197 if (keys & F_UNAME && 198 (name = user_from_uid(p->fts_statp->st_uid, 1)) != NULL) 199 output(indent, &offset, "uname=%s", name); 200 if (keys & F_UID || (keys & F_UNAME && name == NULL)) 201 output(indent, &offset, "uid=%u", p->fts_statp->st_uid); 202 } 203 if (keys & (F_GID | F_GNAME) && p->fts_statp->st_gid != gid) { 204 if (keys & F_GNAME && 205 (name = group_from_gid(p->fts_statp->st_gid, 1)) != NULL) 206 output(indent, &offset, "gname=%s", name); 207 if (keys & F_GID || (keys & F_GNAME && name == NULL)) 208 output(indent, &offset, "gid=%u", p->fts_statp->st_gid); 209 } 210 if (keys & F_MODE && (p->fts_statp->st_mode & MBITS) != mode) 211 output(indent, &offset, "mode=%#o", 212 p->fts_statp->st_mode & MBITS); 213 if (keys & F_DEV && 214 (S_ISBLK(p->fts_statp->st_mode) || S_ISCHR(p->fts_statp->st_mode))) 215 output(indent, &offset, "device=%#llx", 216 (long long)p->fts_statp->st_rdev); 217 if (keys & F_NLINK && p->fts_statp->st_nlink != 1) 218 output(indent, &offset, "nlink=%u", p->fts_statp->st_nlink); 219 if (keys & F_SIZE && 220 (flavor != F_NETBSD6 || S_ISREG(p->fts_statp->st_mode))) 221 output(indent, &offset, "size=%lld", 222 (long long)p->fts_statp->st_size); 223 if (keys & F_TIME) 224#if defined(BSD4_4) && !defined(HAVE_NBTOOL_CONFIG_H) 225 output(indent, &offset, "time=%ld.%09ld", 226 (long)p->fts_statp->st_mtimespec.tv_sec, 227 p->fts_statp->st_mtimespec.tv_nsec); 228#else 229 output(indent, &offset, "time=%ld.%09ld", 230 (long)p->fts_statp->st_mtime, (long)0); 231#endif 232 if (keys & F_CKSUM && S_ISREG(p->fts_statp->st_mode)) { 233 if ((fd = open(p->fts_accpath, O_RDONLY, 0)) < 0 || 234 crc(fd, &val, &len)) 235 mtree_err("%s: %s", p->fts_accpath, strerror(errno)); 236 close(fd); 237 output(indent, &offset, "cksum=%lu", (long)val); 238 } 239#ifndef NO_MD5 240 if (keys & F_MD5 && S_ISREG(p->fts_statp->st_mode)) { 241 if ((digestbuf = MD5File(p->fts_accpath, NULL)) == NULL) 242 mtree_err("%s: MD5File failed: %s", p->fts_accpath, 243 strerror(errno)); 244 output(indent, &offset, "%s=%s", MD5KEY, digestbuf); 245 free(digestbuf); 246 } 247#endif /* ! NO_MD5 */ 248#ifndef NO_RMD160 249 if (keys & F_RMD160 && S_ISREG(p->fts_statp->st_mode)) { 250 if ((digestbuf = RMD160File(p->fts_accpath, NULL)) == NULL) 251 mtree_err("%s: RMD160File failed: %s", p->fts_accpath, 252 strerror(errno)); 253 output(indent, &offset, "%s=%s", RMD160KEY, digestbuf); 254 free(digestbuf); 255 } 256#endif /* ! NO_RMD160 */ 257#ifndef NO_SHA1 258 if (keys & F_SHA1 && S_ISREG(p->fts_statp->st_mode)) { 259 if ((digestbuf = SHA1File(p->fts_accpath, NULL)) == NULL) 260 mtree_err("%s: SHA1File failed: %s", p->fts_accpath, 261 strerror(errno)); 262 output(indent, &offset, "%s=%s", SHA1KEY, digestbuf); 263 free(digestbuf); 264 } 265#endif /* ! NO_SHA1 */ 266#ifndef NO_SHA2 267 if (keys & F_SHA256 && S_ISREG(p->fts_statp->st_mode)) { 268 if ((digestbuf = SHA256_File(p->fts_accpath, NULL)) == NULL) 269 mtree_err("%s: SHA256_File failed: %s", p->fts_accpath, 270 strerror(errno)); 271 output(indent, &offset, "%s=%s", SHA256KEY, digestbuf); 272 free(digestbuf); 273 } 274#ifdef SHA384_BLOCK_LENGTH 275 if (keys & F_SHA384 && S_ISREG(p->fts_statp->st_mode)) { 276 if ((digestbuf = SHA384_File(p->fts_accpath, NULL)) == NULL) 277 mtree_err("%s: SHA384_File failed: %s", p->fts_accpath, 278 strerror(errno)); 279 output(indent, &offset, "%s=%s", SHA384KEY, digestbuf); 280 free(digestbuf); 281 } 282#endif 283 if (keys & F_SHA512 && S_ISREG(p->fts_statp->st_mode)) { 284 if ((digestbuf = SHA512_File(p->fts_accpath, NULL)) == NULL) 285 mtree_err("%s: SHA512_File failed: %s", p->fts_accpath, 286 strerror(errno)); 287 output(indent, &offset, "%s=%s", SHA512KEY, digestbuf); 288 free(digestbuf); 289 } 290#endif /* ! NO_SHA2 */ 291 if (keys & F_SLINK && 292 (p->fts_info == FTS_SL || p->fts_info == FTS_SLNONE)) 293 output(indent, &offset, "link=%s", 294 vispath(rlink(p->fts_accpath))); 295#if HAVE_STRUCT_STAT_ST_FLAGS 296 if (keys & F_FLAGS && p->fts_statp->st_flags != flags) { 297 char *str = flags_to_string(p->fts_statp->st_flags, "none"); 298 output(indent, &offset, "flags=%s", str); 299 free(str); 300 } 301#endif 302 putchar('\n'); 303} 304 305/* XXX 306 * FLAGS2INDEX will fail once the user and system settable bits need more 307 * than one byte, respectively. 308 */ 309#define FLAGS2INDEX(x) (((x >> 8) & 0x0000ff00) | (x & 0x000000ff)) 310 311#define MTREE_MAXGID 5000 312#define MTREE_MAXUID 5000 313#define MTREE_MAXMODE (MBITS + 1) 314#if HAVE_STRUCT_STAT_ST_FLAGS 315#define MTREE_MAXFLAGS (FLAGS2INDEX(CH_MASK) + 1) /* 1808 */ 316#else 317#define MTREE_MAXFLAGS 1 318#endif 319#define MTREE_MAXS 16 320 321static int 322statd(FTS *t, FTSENT *parent, uid_t *puid, gid_t *pgid, mode_t *pmode, 323 u_long *pflags) 324{ 325 FTSENT *p; 326 gid_t sgid; 327 uid_t suid; 328 mode_t smode; 329 u_long sflags = 0; 330 const char *name = NULL; 331 gid_t savegid; 332 uid_t saveuid; 333 mode_t savemode; 334 u_long saveflags; 335 u_short maxgid, maxuid, maxmode, maxflags; 336 u_short g[MTREE_MAXGID], u[MTREE_MAXUID], 337 m[MTREE_MAXMODE], f[MTREE_MAXFLAGS]; 338 static int first = 1; 339 340 savegid = *pgid; 341 saveuid = *puid; 342 savemode = *pmode; 343 saveflags = *pflags; 344 if ((p = fts_children(t, 0)) == NULL) { 345 if (errno) 346 mtree_err("%s: %s", RP(parent), strerror(errno)); 347 return (1); 348 } 349 350 memset(g, 0, sizeof(g)); 351 memset(u, 0, sizeof(u)); 352 memset(m, 0, sizeof(m)); 353 memset(f, 0, sizeof(f)); 354 355 maxuid = maxgid = maxmode = maxflags = 0; 356 for (; p; p = p->fts_link) { 357 if (flavor == F_NETBSD6 || !dflag || 358 (dflag && S_ISDIR(p->fts_statp->st_mode))) { 359 smode = p->fts_statp->st_mode & MBITS; 360 if (smode < MTREE_MAXMODE && ++m[smode] > maxmode) { 361 savemode = smode; 362 maxmode = m[smode]; 363 } 364 sgid = p->fts_statp->st_gid; 365 if (sgid < MTREE_MAXGID && ++g[sgid] > maxgid) { 366 savegid = sgid; 367 maxgid = g[sgid]; 368 } 369 suid = p->fts_statp->st_uid; 370 if (suid < MTREE_MAXUID && ++u[suid] > maxuid) { 371 saveuid = suid; 372 maxuid = u[suid]; 373 } 374 375#if HAVE_STRUCT_STAT_ST_FLAGS 376 sflags = FLAGS2INDEX(p->fts_statp->st_flags); 377 if (sflags < MTREE_MAXFLAGS && ++f[sflags] > maxflags) { 378 saveflags = p->fts_statp->st_flags; 379 maxflags = f[sflags]; 380 } 381#endif 382 } 383 } 384 /* 385 * If the /set record is the same as the last one we do not need to 386 * output a new one. So first we check to see if anything changed. 387 * Note that we always output a /set record for the first directory. 388 */ 389 if (((keys & (F_UNAME | F_UID)) && (*puid != saveuid)) || 390 ((keys & (F_GNAME | F_GID)) && (*pgid != savegid)) || 391 ((keys & F_MODE) && (*pmode != savemode)) || 392 ((keys & F_FLAGS) && (*pflags != saveflags)) || 393 first) { 394 first = 0; 395 if (flavor != F_NETBSD6 && dflag) 396 printf("/set type=dir"); 397 else 398 printf("/set type=file"); 399 if (keys & (F_UID | F_UNAME)) { 400 if (keys & F_UNAME && 401 (name = user_from_uid(saveuid, 1)) != NULL) 402 printf(" uname=%s", name); 403 if (keys & F_UID || (keys & F_UNAME && name == NULL)) 404 printf(" uid=%lu", (u_long)saveuid); 405 } 406 if (keys & (F_GID | F_GNAME)) { 407 if (keys & F_GNAME && 408 (name = group_from_gid(savegid, 1)) != NULL) 409 printf(" gname=%s", name); 410 if (keys & F_GID || (keys & F_GNAME && name == NULL)) 411 printf(" gid=%lu", (u_long)savegid); 412 } 413 if (keys & F_MODE) 414 printf(" mode=%#lo", (u_long)savemode); 415 if (keys & F_NLINK) 416 printf(" nlink=1"); 417 if (keys & F_FLAGS) { 418 char *str = flags_to_string(saveflags, "none"); 419 printf(" flags=%s", str); 420 free(str); 421 } 422 printf("\n"); 423 *puid = saveuid; 424 *pgid = savegid; 425 *pmode = savemode; 426 *pflags = saveflags; 427 } 428 return (0); 429} 430 431/* 432 * dcmp -- 433 * used as a comparison function passed to fts_open() to control 434 * the order in which fts_read() returns results. We make 435 * directories sort after non-directories, but otherwise sort in 436 * strcmp() order. 437 * 438 * Keep this in sync with nodecmp() in spec.c. 439 */ 440static int 441dcmp(const FTSENT *FTS_CONST *a, const FTSENT *FTS_CONST *b) 442{ 443 444 if (S_ISDIR((*a)->fts_statp->st_mode)) { 445 if (!S_ISDIR((*b)->fts_statp->st_mode)) 446 return (1); 447 } else if (S_ISDIR((*b)->fts_statp->st_mode)) 448 return (-1); 449 return (strcmp((*a)->fts_name, (*b)->fts_name)); 450} 451 452void 453output(int indent, int *offset, const char *fmt, ...) 454{ 455 va_list ap; 456 char buf[1024]; 457 458 va_start(ap, fmt); 459 vsnprintf(buf, sizeof(buf), fmt, ap); 460 va_end(ap); 461 462 if (*offset + strlen(buf) > MAXLINELEN - 3) { 463 printf(" \\\n%*s", INDENTNAMELEN + indent, ""); 464 *offset = INDENTNAMELEN + indent; 465 } 466 *offset += printf(" %s", buf) + 1; 467} 468