]>
Commit | Line | Data |
---|---|---|
1 | /*- | |
2 | * Copyright (c) 1989, 1993 | |
3 | * The Regents of the University of California. All rights reserved. | |
4 | * | |
5 | * Redistribution and use in source and binary forms, with or without | |
6 | * modification, are permitted provided that the following conditions | |
7 | * are met: | |
8 | * 1. Redistributions of source code must retain the above copyright | |
9 | * notice, this list of conditions and the following disclaimer. | |
10 | * 2. Redistributions in binary form must reproduce the above copyright | |
11 | * notice, this list of conditions and the following disclaimer in the | |
12 | * documentation and/or other materials provided with the distribution. | |
13 | * 3. Neither the name of the University nor the names of its contributors | |
14 | * may be used to endorse or promote products derived from this software | |
15 | * without specific prior written permission. | |
16 | * | |
17 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND | |
18 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
19 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
20 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | |
21 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
22 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
23 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
24 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
25 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
26 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
27 | * SUCH DAMAGE. | |
28 | */ | |
29 | ||
30 | #if 0 | |
31 | #ifndef lint | |
32 | static char sccsid[] = "@(#)create.c 8.1 (Berkeley) 6/6/93"; | |
33 | #endif /* not lint */ | |
34 | #endif | |
35 | #include <sys/cdefs.h> | |
36 | __FBSDID("$FreeBSD: src/usr.sbin/mtree/create.c,v 1.37 2005/03/29 11:44:17 tobez Exp $"); | |
37 | ||
38 | #include <sys/param.h> | |
39 | #include <sys/stat.h> | |
40 | #include <dirent.h> | |
41 | #include <err.h> | |
42 | #include <errno.h> | |
43 | #include <fcntl.h> | |
44 | #include <fts.h> | |
45 | #include <grp.h> | |
46 | #ifndef __APPLE__ | |
47 | #ifdef ENABLE_MD5 | |
48 | #include <md5.h> | |
49 | #endif | |
50 | #ifdef ENABLE_SHA1 | |
51 | #include <sha.h> | |
52 | #endif | |
53 | #ifdef ENABLE_RMD160 | |
54 | #include <ripemd.h> | |
55 | #endif | |
56 | #ifdef ENABLE_SHA256 | |
57 | #include <sha256.h> | |
58 | #endif | |
59 | #endif /* !__APPLE__ */ | |
60 | #include <pwd.h> | |
61 | #include <stdint.h> | |
62 | #include <stdio.h> | |
63 | #include <time.h> | |
64 | #include <unistd.h> | |
65 | #include <vis.h> | |
66 | #include "metrics.h" | |
67 | #include "mtree.h" | |
68 | #include "extern.h" | |
69 | ||
70 | #ifdef __APPLE__ | |
71 | #include "commoncrypto.h" | |
72 | #endif /* __APPLE__ */ | |
73 | ||
74 | #define INDENTNAMELEN 15 | |
75 | #define MAXLINELEN 80 | |
76 | ||
77 | static gid_t gid; | |
78 | static uid_t uid; | |
79 | static mode_t mode; | |
80 | static u_long flags = 0xffffffff; | |
81 | static char *xattrs = kNone; | |
82 | static char *acl = kNone; | |
83 | static u_quad_t xdstream_id; | |
84 | ||
85 | static int dsort(const FTSENT **, const FTSENT **); | |
86 | static void output(int, int *, const char *, ...) __printflike(3, 4); | |
87 | static int statd(FTS *, FTSENT *, uid_t *, gid_t *, mode_t *, u_long *, char **, char **, u_quad_t *); | |
88 | static void statf(int, FTSENT *); | |
89 | ||
90 | void | |
91 | cwalk(void) | |
92 | { | |
93 | int error = 0; | |
94 | FTS *t; | |
95 | FTSENT *p; | |
96 | time_t cl; | |
97 | char *argv[2], host[MAXHOSTNAMELEN]; | |
98 | char dot[] = "."; | |
99 | int indent = 0; | |
100 | char *path; | |
101 | ||
102 | if (!nflag) { | |
103 | (void)time(&cl); | |
104 | (void)gethostname(host, sizeof(host)); | |
105 | (void)printf( | |
106 | "#\t user: %s\n#\tmachine: %s\n", | |
107 | getlogin(), host); | |
108 | (void)printf( | |
109 | "#\t tree: %s\n#\t date: %s", | |
110 | fullpath, ctime(&cl)); | |
111 | } | |
112 | ||
113 | argv[0] = dot; | |
114 | argv[1] = NULL; | |
115 | if ((t = fts_open(argv, ftsoptions, dsort)) == NULL) { | |
116 | error = errno; | |
117 | RECORD_FAILURE(76, error); | |
118 | errc(1, error, "fts_open()"); | |
119 | } | |
120 | while ((p = fts_read(t))) { | |
121 | if (iflag) | |
122 | indent = p->fts_level * 4; | |
123 | if (check_excludes(p->fts_name, p->fts_path)) { | |
124 | fts_set(t, p, FTS_SKIP); | |
125 | continue; | |
126 | } | |
127 | switch(p->fts_info) { | |
128 | case FTS_D: | |
129 | if (!dflag) | |
130 | (void)printf("\n"); | |
131 | if (!nflag) { | |
132 | path = escape_path(p->fts_path); | |
133 | (void)printf("# %s\n", path); | |
134 | free(path); | |
135 | } | |
136 | statd(t, p, &uid, &gid, &mode, &flags, &xattrs, &acl, &xdstream_id); | |
137 | statf(indent, p); | |
138 | break; | |
139 | case FTS_DP: | |
140 | if (!nflag && (p->fts_level > 0)) { | |
141 | path = escape_path(p->fts_path); | |
142 | (void)printf("%*s# %s\n", indent, "", path); | |
143 | free(path); | |
144 | } | |
145 | (void)printf("%*s..\n", indent, ""); | |
146 | if (!dflag) | |
147 | (void)printf("\n"); | |
148 | break; | |
149 | case FTS_DNR: | |
150 | case FTS_ERR: | |
151 | case FTS_NS: | |
152 | warnx("%s: %s", p->fts_path, strerror(p->fts_errno)); | |
153 | break; | |
154 | default: | |
155 | if (!dflag) | |
156 | statf(indent, p); | |
157 | break; | |
158 | ||
159 | } | |
160 | } | |
161 | (void)fts_close(t); | |
162 | if (sflag && keys & F_CKSUM) { | |
163 | RECORD_FAILURE(77, WARN_CHECKSUM); | |
164 | warnx("%s checksum: %lu", fullpath, (unsigned long)crc_total); | |
165 | } | |
166 | } | |
167 | ||
168 | static void | |
169 | statf(int indent, FTSENT *p) | |
170 | { | |
171 | int error = 0; | |
172 | struct group *gr; | |
173 | struct passwd *pw; | |
174 | uint32_t val; | |
175 | off_t len; | |
176 | int fd, offset; | |
177 | char *fflags; | |
178 | char *escaped_name; | |
179 | ||
180 | escaped_name = calloc(1, p->fts_namelen * 4 + 1); | |
181 | if (escaped_name == NULL) { | |
182 | RECORD_FAILURE(78, ENOMEM); | |
183 | errx(1, "statf(): calloc() failed"); | |
184 | } | |
185 | strvis(escaped_name, p->fts_name, VIS_WHITE | VIS_OCTAL | VIS_GLOB); | |
186 | ||
187 | if (iflag || S_ISDIR(p->fts_statp->st_mode)) | |
188 | offset = printf("%*s%s", indent, "", escaped_name); | |
189 | else | |
190 | offset = printf("%*s %s", indent, "", escaped_name); | |
191 | ||
192 | free(escaped_name); | |
193 | ||
194 | if (offset > (INDENTNAMELEN + indent)) | |
195 | offset = MAXLINELEN; | |
196 | else | |
197 | offset += printf("%*s", (INDENTNAMELEN + indent) - offset, ""); | |
198 | ||
199 | if (!S_ISREG(p->fts_statp->st_mode) && !dflag) | |
200 | output(indent, &offset, "type=%s", inotype(p->fts_statp->st_mode)); | |
201 | if (p->fts_statp->st_uid != uid) { | |
202 | if (keys & F_UNAME) { | |
203 | pw = getpwuid(p->fts_statp->st_uid); | |
204 | if (pw != NULL) { | |
205 | output(indent, &offset, "uname=%s", pw->pw_name); | |
206 | } else if (wflag) { | |
207 | RECORD_FAILURE(27448, WARN_UNAME); | |
208 | warnx("Could not get uname for uid=%u", | |
209 | p->fts_statp->st_uid); | |
210 | } else { | |
211 | RECORD_FAILURE(79, EINVAL); | |
212 | errx(1, | |
213 | "Could not get uname for uid=%u", | |
214 | p->fts_statp->st_uid); | |
215 | } | |
216 | } | |
217 | if (keys & F_UID) | |
218 | output(indent, &offset, "uid=%u", p->fts_statp->st_uid); | |
219 | } | |
220 | if (p->fts_statp->st_gid != gid) { | |
221 | if (keys & F_GNAME) { | |
222 | gr = getgrgid(p->fts_statp->st_gid); | |
223 | if (gr != NULL) { | |
224 | output(indent, &offset, "gname=%s", gr->gr_name); | |
225 | } else if (wflag) { | |
226 | RECORD_FAILURE(27449, WARN_UNAME); | |
227 | warnx("Could not get gname for gid=%u", | |
228 | p->fts_statp->st_gid); | |
229 | } else { | |
230 | RECORD_FAILURE(80, EINVAL); | |
231 | errx(1, | |
232 | "Could not get gname for gid=%u", | |
233 | p->fts_statp->st_gid); | |
234 | } | |
235 | } | |
236 | if (keys & F_GID) | |
237 | output(indent, &offset, "gid=%u", p->fts_statp->st_gid); | |
238 | } | |
239 | if (keys & F_MODE && (p->fts_statp->st_mode & MBITS) != mode) | |
240 | output(indent, &offset, "mode=%#o", p->fts_statp->st_mode & MBITS); | |
241 | if (keys & F_NLINK && p->fts_statp->st_nlink != 1) | |
242 | output(indent, &offset, "nlink=%u", p->fts_statp->st_nlink); | |
243 | if (keys & F_SIZE) | |
244 | output(indent, &offset, "size=%jd", | |
245 | (intmax_t)p->fts_statp->st_size); | |
246 | if (keys & F_TIME) { | |
247 | if (tflag && !insert_mod) { | |
248 | output(indent, &offset, "time=%ld.%09ld", | |
249 | (long)ts.tv_sec, ts.tv_nsec); | |
250 | insert_mod = 1; | |
251 | } | |
252 | if (!tflag) { | |
253 | output(indent, &offset, "time=%ld.%09ld", | |
254 | (long)p->fts_statp->st_mtimespec.tv_sec, | |
255 | p->fts_statp->st_mtimespec.tv_nsec); | |
256 | } | |
257 | } | |
258 | if (keys & F_CKSUM && S_ISREG(p->fts_statp->st_mode)) { | |
259 | if ((fd = open(p->fts_accpath, O_RDONLY, 0)) < 0 || | |
260 | crc(fd, &val, &len)) { | |
261 | error = errno; | |
262 | RECORD_FAILURE(27450, error); | |
263 | errc(1, error, "%s", p->fts_accpath); | |
264 | } | |
265 | (void)close(fd); | |
266 | output(indent, &offset, "cksum=%lu", (unsigned long)val); | |
267 | } | |
268 | #ifdef ENABLE_MD5 | |
269 | if (keys & F_MD5 && S_ISREG(p->fts_statp->st_mode)) { | |
270 | char *digest, buf[33]; | |
271 | #ifdef __clang__ | |
272 | /* clang doesn't like MD5 due to security concerns, but it's used for file data/metadata integrity.. */ | |
273 | #pragma clang diagnostic push | |
274 | #pragma clang diagnostic ignored "-Wdeprecated-declarations" | |
275 | digest = MD5File(p->fts_accpath, buf); | |
276 | #pragma clang diagnostic pop | |
277 | #endif | |
278 | if (!digest) { | |
279 | error = errno; | |
280 | RECORD_FAILURE(81, error); | |
281 | errc(1, error, "%s", p->fts_accpath); | |
282 | } | |
283 | output(indent, &offset, "md5digest=%s", digest); | |
284 | } | |
285 | #endif /* ENABLE_MD5 */ | |
286 | #ifdef ENABLE_SHA1 | |
287 | if (keys & F_SHA1 && S_ISREG(p->fts_statp->st_mode)) { | |
288 | char *digest, buf[41]; | |
289 | #ifdef __clang__ | |
290 | /* clang doesn't like SHA1 due to security concerns, but it's used for file data/metadata integrity.. */ | |
291 | #pragma clang diagnostic push | |
292 | #pragma clang diagnostic ignored "-Wdeprecated-declarations" | |
293 | digest = SHA1_File(p->fts_accpath, buf); | |
294 | #pragma clang diagnostic pop | |
295 | #endif | |
296 | if (!digest) { | |
297 | error = errno; | |
298 | RECORD_FAILURE(82, error); | |
299 | errc(1, error, "%s", p->fts_accpath); | |
300 | } | |
301 | output(indent, &offset, "sha1digest=%s", digest); | |
302 | } | |
303 | #endif /* ENABLE_SHA1 */ | |
304 | #ifdef ENABLE_RMD160 | |
305 | if (keys & F_RMD160 && S_ISREG(p->fts_statp->st_mode)) { | |
306 | char *digest, buf[41]; | |
307 | #ifdef __clang__ | |
308 | /* clang doesn't like RIPEMD160 due to security concerns, but it's used for file data/metadata integrity.. */ | |
309 | #pragma clang diagnostic push | |
310 | #pragma clang diagnostic ignored "-Wdeprecated-declarations" | |
311 | digest = RIPEMD160_File(p->fts_accpath, buf); | |
312 | #pragma clang diagnostic pop | |
313 | #endif | |
314 | if (!digest) { | |
315 | error = errno; | |
316 | RECORD_FAILURE(83, error); | |
317 | errc(1, error, "%s", p->fts_accpath); | |
318 | } | |
319 | output(indent, &offset, "ripemd160digest=%s", digest); | |
320 | } | |
321 | #endif /* ENABLE_RMD160 */ | |
322 | #ifdef ENABLE_SHA256 | |
323 | if (keys & F_SHA256 && S_ISREG(p->fts_statp->st_mode)) { | |
324 | char *digest, buf[kSHA256NullTerminatedBuffLen]; | |
325 | ||
326 | digest = SHA256_File(p->fts_accpath, buf); | |
327 | if (!digest) { | |
328 | error = errno; | |
329 | RECORD_FAILURE(84, error); | |
330 | errc(1, error, "%s", p->fts_accpath); | |
331 | } | |
332 | output(indent, &offset, "sha256digest=%s", digest); | |
333 | } | |
334 | #endif /* ENABLE_SHA256 */ | |
335 | if (keys & F_SLINK && | |
336 | (p->fts_info == FTS_SL || p->fts_info == FTS_SLNONE)) { | |
337 | char visbuf[MAXPATHLEN * 4]; | |
338 | char *s = rlink(p->fts_accpath); | |
339 | strvis(visbuf, s, VIS_WHITE | VIS_OCTAL); | |
340 | output(indent, &offset, "link=%s", visbuf); | |
341 | } | |
342 | if (keys & F_FLAGS && p->fts_statp->st_flags != flags) { | |
343 | fflags = flags_to_string(p->fts_statp->st_flags); | |
344 | output(indent, &offset, "flags=%s", fflags); | |
345 | free(fflags); | |
346 | } | |
347 | if (keys & F_BTIME) { | |
348 | if (tflag && !insert_birth) { | |
349 | output(indent, &offset, "btime=%ld.%09ld", | |
350 | ts.tv_sec, ts.tv_nsec); | |
351 | insert_birth = 1; | |
352 | } | |
353 | if (!tflag) { | |
354 | output(indent, &offset, "btime=%ld.%09ld", | |
355 | p->fts_statp->st_birthtimespec.tv_sec, | |
356 | p->fts_statp->st_birthtimespec.tv_nsec); | |
357 | } | |
358 | } | |
359 | // only check access time on regular files, as traversing a folder will update its access time | |
360 | if (keys & F_ATIME && S_ISREG(p->fts_statp->st_mode)) { | |
361 | if (tflag && !insert_access) { | |
362 | output(indent, &offset, "atime=%ld.%09ld", | |
363 | ts.tv_sec, ts.tv_nsec); | |
364 | insert_access = 1; | |
365 | } | |
366 | if (!tflag) { | |
367 | output(indent, &offset, "atime=%ld.%09ld", | |
368 | p->fts_statp->st_atimespec.tv_sec, | |
369 | p->fts_statp->st_atimespec.tv_nsec); | |
370 | } | |
371 | } | |
372 | if (keys & F_CTIME) { | |
373 | if (tflag && !insert_change) { | |
374 | output(indent, &offset, "ctime=%ld.%09ld", | |
375 | ts.tv_sec, ts.tv_nsec); | |
376 | insert_change = 1; | |
377 | } | |
378 | if (!tflag) { | |
379 | output(indent, &offset, "ctime=%ld.%09ld", | |
380 | p->fts_statp->st_ctimespec.tv_sec, | |
381 | p->fts_statp->st_ctimespec.tv_nsec); | |
382 | } | |
383 | } | |
384 | // date added to parent folder is only supported for files and directories | |
385 | if (keys & F_PTIME && (S_ISREG(p->fts_statp->st_mode) || | |
386 | S_ISDIR(p->fts_statp->st_mode))) { | |
387 | int supported; | |
388 | struct timespec ptimespec = ptime(p->fts_accpath, &supported); | |
389 | if (tflag && !insert_parent) { | |
390 | output(indent, &offset, "ptime=%ld.%09ld", | |
391 | ts.tv_sec, ts.tv_nsec); | |
392 | insert_parent = 1; | |
393 | } | |
394 | if (!tflag && supported) { | |
395 | output(indent, &offset, "ptime=%ld.%09ld", | |
396 | ptimespec.tv_sec, | |
397 | ptimespec.tv_nsec); | |
398 | } | |
399 | } | |
400 | if (keys & F_XATTRS) { | |
401 | char buf[kSHA256NullTerminatedBuffLen]; | |
402 | xattr_info *ai; | |
403 | ||
404 | ai = SHA256_Path_XATTRs(p->fts_accpath, buf); | |
405 | if (ai && ai->digest) { | |
406 | if ((strcmp(ai->digest, xattrs) != 0) || (ai->xdstream_priv_id != xdstream_id)) { | |
407 | output(indent, &offset, "xattrsdigest=%s.%llu", ai->digest, ai->xdstream_priv_id); | |
408 | } | |
409 | free(ai); | |
410 | ai = NULL; | |
411 | } | |
412 | } | |
413 | if (keys & F_INODE) { | |
414 | output(indent, &offset, "inode=%llu", p->fts_statp->st_ino); | |
415 | } | |
416 | if (keys & F_ACL) { | |
417 | char *digest, buf[kSHA256NullTerminatedBuffLen]; | |
418 | ||
419 | digest = SHA256_Path_ACL(p->fts_accpath, buf); | |
420 | if (digest && (strcmp(digest, acl) != 0)) { | |
421 | output(indent, &offset, "acldigest=%s", digest); | |
422 | } | |
423 | } | |
424 | if (keys & F_SIBLINGID) { | |
425 | uint64_t sibling_id = get_sibling_id(p->fts_accpath); | |
426 | sibling_id = (sibling_id != p->fts_statp->st_ino) ? sibling_id : 0; | |
427 | output(indent, &offset, "siblingid=%llu", sibling_id); | |
428 | } | |
429 | ||
430 | (void)putchar('\n'); | |
431 | } | |
432 | ||
433 | #define MAXGID 5000 | |
434 | #define MAXUID 5000 | |
435 | #define MAXMODE MBITS + 1 | |
436 | #define MAXFLAGS 256 | |
437 | #define MAXS 16 | |
438 | ||
439 | static int | |
440 | statd(FTS *t, FTSENT *parent, uid_t *puid, gid_t *pgid, mode_t *pmode, u_long *pflags, char **pxattrs, char **pacl, u_quad_t *xdstream_id) | |
441 | { | |
442 | int error = 0; | |
443 | FTSENT *p; | |
444 | gid_t sgid; | |
445 | uid_t suid; | |
446 | mode_t smode; | |
447 | u_long sflags; | |
448 | struct group *gr; | |
449 | struct passwd *pw; | |
450 | gid_t savegid = *pgid; | |
451 | uid_t saveuid = *puid; | |
452 | mode_t savemode = *pmode; | |
453 | u_long saveflags = *pflags; | |
454 | char *savexattrs = *pxattrs; | |
455 | char *saveacl = *pacl; | |
456 | u_quad_t savexdstream_id = *xdstream_id; | |
457 | u_short maxgid, maxuid, maxmode, maxflags; | |
458 | u_short g[MAXGID], u[MAXUID], m[MAXMODE], f[MAXFLAGS]; | |
459 | char *fflags; | |
460 | static int first = 1; | |
461 | ||
462 | if ((p = fts_children(t, 0)) == NULL) { | |
463 | error = errno; | |
464 | if (error) { | |
465 | RECORD_FAILURE(85, error); | |
466 | errc(1, error, "%s", RP(parent)); | |
467 | } | |
468 | return (1); | |
469 | } | |
470 | ||
471 | bzero(g, sizeof(g)); | |
472 | bzero(u, sizeof(u)); | |
473 | bzero(m, sizeof(m)); | |
474 | bzero(f, sizeof(f)); | |
475 | ||
476 | maxuid = maxgid = maxmode = maxflags = 0; | |
477 | for (; p; p = p->fts_link) { | |
478 | if (!dflag || (dflag && S_ISDIR(p->fts_statp->st_mode))) { | |
479 | smode = p->fts_statp->st_mode & MBITS; | |
480 | if (smode < MAXMODE && ++m[smode] > maxmode) { | |
481 | savemode = smode; | |
482 | maxmode = m[smode]; | |
483 | } | |
484 | sgid = p->fts_statp->st_gid; | |
485 | if (sgid < MAXGID && ++g[sgid] > maxgid) { | |
486 | savegid = sgid; | |
487 | maxgid = g[sgid]; | |
488 | } | |
489 | suid = p->fts_statp->st_uid; | |
490 | if (suid < MAXUID && ++u[suid] > maxuid) { | |
491 | saveuid = suid; | |
492 | maxuid = u[suid]; | |
493 | } | |
494 | ||
495 | /* | |
496 | * XXX | |
497 | * note that we don't count the most common xattr/acl digest | |
498 | * so set will always the default value (none) | |
499 | */ | |
500 | ||
501 | /* | |
502 | * XXX | |
503 | * note that the below will break when file flags | |
504 | * are extended beyond the first 4 bytes of each | |
505 | * half word of the flags | |
506 | */ | |
507 | #define FLAGS2IDX(f) ((f & 0xf) | ((f >> 12) & 0xf0)) | |
508 | sflags = p->fts_statp->st_flags; | |
509 | if (FLAGS2IDX(sflags) < MAXFLAGS && | |
510 | ++f[FLAGS2IDX(sflags)] > maxflags) { | |
511 | saveflags = sflags; | |
512 | maxflags = f[FLAGS2IDX(sflags)]; | |
513 | } | |
514 | } | |
515 | } | |
516 | /* | |
517 | * If the /set record is the same as the last one we do not need to output | |
518 | * a new one. So first we check to see if anything changed. Note that we | |
519 | * always output a /set record for the first directory. | |
520 | */ | |
521 | if ((((keys & F_UNAME) | (keys & F_UID)) && (*puid != saveuid)) || | |
522 | (((keys & F_GNAME) | (keys & F_GID)) && (*pgid != savegid)) || | |
523 | ((keys & F_MODE) && (*pmode != savemode)) || | |
524 | ((keys & F_FLAGS) && (*pflags != saveflags)) || | |
525 | (first)) { | |
526 | first = 0; | |
527 | if (dflag) | |
528 | (void)printf("/set type=dir"); | |
529 | else | |
530 | (void)printf("/set type=file"); | |
531 | if (keys & F_UNAME) { | |
532 | pw = getpwuid(saveuid); | |
533 | if (pw != NULL) { | |
534 | (void)printf(" uname=%s", pw->pw_name); | |
535 | } else if (wflag) { | |
536 | RECORD_FAILURE(27451, WARN_UNAME); | |
537 | warnx( "Could not get uname for uid=%u", saveuid); | |
538 | } else { | |
539 | RECORD_FAILURE(86, EINVAL); | |
540 | errx(1, "Could not get uname for uid=%u", saveuid); | |
541 | } | |
542 | } | |
543 | if (keys & F_UID) | |
544 | (void)printf(" uid=%lu", (u_long)saveuid); | |
545 | if (keys & F_GNAME) { | |
546 | gr = getgrgid(savegid); | |
547 | if (gr != NULL) { | |
548 | (void)printf(" gname=%s", gr->gr_name); | |
549 | } else if (wflag) { | |
550 | RECORD_FAILURE(27452, WARN_UNAME); | |
551 | warnx("Could not get gname for gid=%u", savegid); | |
552 | } else { | |
553 | RECORD_FAILURE(87, EINVAL); | |
554 | errx(1, "Could not get gname for gid=%u", savegid); | |
555 | } | |
556 | } | |
557 | if (keys & F_GID) | |
558 | (void)printf(" gid=%lu", (u_long)savegid); | |
559 | if (keys & F_MODE) | |
560 | (void)printf(" mode=%#o", savemode); | |
561 | if (keys & F_NLINK) | |
562 | (void)printf(" nlink=1"); | |
563 | if (keys & F_FLAGS) { | |
564 | fflags = flags_to_string(saveflags); | |
565 | (void)printf(" flags=%s", fflags); | |
566 | free(fflags); | |
567 | } | |
568 | if (keys & F_XATTRS) | |
569 | (void)printf(" xattrsdigest=%s.%llu", savexattrs, savexdstream_id); | |
570 | if (keys & F_ACL) | |
571 | (void)printf(" acldigest=%s", saveacl); | |
572 | (void)printf("\n"); | |
573 | *puid = saveuid; | |
574 | *pgid = savegid; | |
575 | *pmode = savemode; | |
576 | *pflags = saveflags; | |
577 | *pxattrs = savexattrs; | |
578 | *pacl = saveacl; | |
579 | *xdstream_id = savexdstream_id; | |
580 | } | |
581 | return (0); | |
582 | } | |
583 | ||
584 | static int | |
585 | dsort(const FTSENT **a, const FTSENT **b) | |
586 | { | |
587 | if (S_ISDIR((*a)->fts_statp->st_mode)) { | |
588 | if (!S_ISDIR((*b)->fts_statp->st_mode)) | |
589 | return (1); | |
590 | } else if (S_ISDIR((*b)->fts_statp->st_mode)) | |
591 | return (-1); | |
592 | return (strcmp((*a)->fts_name, (*b)->fts_name)); | |
593 | } | |
594 | ||
595 | #include <stdarg.h> | |
596 | ||
597 | void | |
598 | output(int indent, int *offset, const char *fmt, ...) | |
599 | { | |
600 | va_list ap; | |
601 | char buf[1024]; | |
602 | va_start(ap, fmt); | |
603 | (void)vsnprintf(buf, sizeof(buf), fmt, ap); | |
604 | va_end(ap); | |
605 | ||
606 | if (*offset + strlen(buf) > MAXLINELEN - 3) { | |
607 | (void)printf(" \\\n%*s", INDENTNAMELEN + indent, ""); | |
608 | *offset = INDENTNAMELEN + indent; | |
609 | } | |
610 | *offset += printf(" %s", buf) + 1; | |
611 | } |