]>
git.saurik.com Git - apple/file_cmds.git/blob - mtree/create.c
2 * Copyright (c) 1989, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the University nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 static char sccsid
[] = "@(#)create.c 8.1 (Berkeley) 6/6/93";
35 #include <sys/cdefs.h>
36 __FBSDID("$FreeBSD: src/usr.sbin/mtree/create.c,v 1.37 2005/03/29 11:44:17 tobez Exp $");
38 #include <sys/param.h>
59 #endif /* !__APPLE__ */
70 #include "commoncrypto.h"
71 #endif /* __APPLE__ */
73 #define INDENTNAMELEN 15
79 static u_long flags
= 0xffffffff;
81 static int dsort(const FTSENT
**, const FTSENT
**);
82 static void output(int, int *, const char *, ...) __printflike(3, 4);
83 static int statd(FTS
*, FTSENT
*, uid_t
*, gid_t
*, mode_t
*, u_long
*);
84 static void statf(int, FTSENT
*);
92 char *argv
[2], host
[MAXHOSTNAMELEN
];
98 (void)gethostname(host
, sizeof(host
));
100 "#\t user: %s\n#\tmachine: %s\n",
103 "#\t tree: %s\n#\t date: %s",
104 fullpath
, ctime(&cl
));
109 if ((t
= fts_open(argv
, ftsoptions
, dsort
)) == NULL
)
110 err(1, "fts_open()");
111 while ((p
= fts_read(t
))) {
113 indent
= p
->fts_level
* 4;
114 if (check_excludes(p
->fts_name
, p
->fts_path
)) {
115 fts_set(t
, p
, FTS_SKIP
);
118 switch(p
->fts_info
) {
123 (void)printf("# %s\n", p
->fts_path
);
124 statd(t
, p
, &uid
, &gid
, &mode
, &flags
);
128 if (!nflag
&& (p
->fts_level
> 0))
129 (void)printf("%*s# %s\n", indent
, "", p
->fts_path
);
130 (void)printf("%*s..\n", indent
, "");
137 warnx("%s: %s", p
->fts_path
, strerror(p
->fts_errno
));
147 if (sflag
&& keys
& F_CKSUM
)
148 warnx("%s checksum: %lu", fullpath
, (unsigned long)crc_total
);
152 statf(int indent
, FTSENT
*p
)
162 escaped_name
= calloc(1, p
->fts_namelen
* 4 + 1);
163 if (escaped_name
== NULL
)
164 errx(1, "statf(): calloc() failed");
165 strvis(escaped_name
, p
->fts_name
, VIS_WHITE
| VIS_OCTAL
| VIS_GLOB
);
167 if (iflag
|| S_ISDIR(p
->fts_statp
->st_mode
))
168 offset
= printf("%*s%s", indent
, "", escaped_name
);
170 offset
= printf("%*s %s", indent
, "", escaped_name
);
174 if (offset
> (INDENTNAMELEN
+ indent
))
177 offset
+= printf("%*s", (INDENTNAMELEN
+ indent
) - offset
, "");
179 if (!S_ISREG(p
->fts_statp
->st_mode
) && !dflag
)
180 output(indent
, &offset
, "type=%s", inotype(p
->fts_statp
->st_mode
));
181 if (p
->fts_statp
->st_uid
!= uid
) {
182 if (keys
& F_UNAME
) {
183 pw
= getpwuid(p
->fts_statp
->st_uid
);
185 output(indent
, &offset
, "uname=%s", pw
->pw_name
);
187 warnx("Could not get uname for uid=%u",
188 p
->fts_statp
->st_uid
);
191 "Could not get uname for uid=%u",
192 p
->fts_statp
->st_uid
);
195 output(indent
, &offset
, "uid=%u", p
->fts_statp
->st_uid
);
197 if (p
->fts_statp
->st_gid
!= gid
) {
198 if (keys
& F_GNAME
) {
199 gr
= getgrgid(p
->fts_statp
->st_gid
);
201 output(indent
, &offset
, "gname=%s", gr
->gr_name
);
203 warnx("Could not get gname for gid=%u",
204 p
->fts_statp
->st_gid
);
207 "Could not get gname for gid=%u",
208 p
->fts_statp
->st_gid
);
211 output(indent
, &offset
, "gid=%u", p
->fts_statp
->st_gid
);
213 if (keys
& F_MODE
&& (p
->fts_statp
->st_mode
& MBITS
) != mode
)
214 output(indent
, &offset
, "mode=%#o", p
->fts_statp
->st_mode
& MBITS
);
215 if (keys
& F_NLINK
&& p
->fts_statp
->st_nlink
!= 1)
216 output(indent
, &offset
, "nlink=%u", p
->fts_statp
->st_nlink
);
218 output(indent
, &offset
, "size=%jd",
219 (intmax_t)p
->fts_statp
->st_size
);
221 output(indent
, &offset
, "time=%ld.%ld",
222 (long)p
->fts_statp
->st_mtimespec
.tv_sec
,
223 p
->fts_statp
->st_mtimespec
.tv_nsec
);
224 if (keys
& F_CKSUM
&& S_ISREG(p
->fts_statp
->st_mode
)) {
225 if ((fd
= open(p
->fts_accpath
, O_RDONLY
, 0)) < 0 ||
227 err(1, "%s", p
->fts_accpath
);
229 output(indent
, &offset
, "cksum=%lu", (unsigned long)val
);
232 if (keys
& F_MD5
&& S_ISREG(p
->fts_statp
->st_mode
)) {
233 char *digest
, buf
[33];
235 digest
= MD5File(p
->fts_accpath
, buf
);
237 err(1, "%s", p
->fts_accpath
);
238 output(indent
, &offset
, "md5digest=%s", digest
);
240 #endif /* ENABLE_MD5 */
242 if (keys
& F_SHA1
&& S_ISREG(p
->fts_statp
->st_mode
)) {
243 char *digest
, buf
[41];
245 digest
= SHA1_File(p
->fts_accpath
, buf
);
247 err(1, "%s", p
->fts_accpath
);
248 output(indent
, &offset
, "sha1digest=%s", digest
);
250 #endif /* ENABLE_SHA1 */
252 if (keys
& F_RMD160
&& S_ISREG(p
->fts_statp
->st_mode
)) {
253 char *digest
, buf
[41];
255 digest
= RIPEMD160_File(p
->fts_accpath
, buf
);
257 err(1, "%s", p
->fts_accpath
);
258 output(indent
, &offset
, "ripemd160digest=%s", digest
);
260 #endif /* ENABLE_RMD160 */
262 if (keys
& F_SHA256
&& S_ISREG(p
->fts_statp
->st_mode
)) {
263 char *digest
, buf
[65];
265 digest
= SHA256_File(p
->fts_accpath
, buf
);
267 err(1, "%s", p
->fts_accpath
);
268 output(indent
, &offset
, "sha256digest=%s", digest
);
270 #endif /* ENABLE_SHA256 */
271 if (keys
& F_SLINK
&&
272 (p
->fts_info
== FTS_SL
|| p
->fts_info
== FTS_SLNONE
))
273 output(indent
, &offset
, "link=%s", rlink(p
->fts_accpath
));
274 if (keys
& F_FLAGS
&& p
->fts_statp
->st_flags
!= flags
) {
275 fflags
= flags_to_string(p
->fts_statp
->st_flags
);
276 output(indent
, &offset
, "flags=%s", fflags
);
284 #define MAXMODE MBITS + 1
289 statd(FTS
*t
, FTSENT
*parent
, uid_t
*puid
, gid_t
*pgid
, mode_t
*pmode
, u_long
*pflags
)
298 gid_t savegid
= *pgid
;
299 uid_t saveuid
= *puid
;
300 mode_t savemode
= *pmode
;
301 u_long saveflags
= *pflags
;
302 u_short maxgid
, maxuid
, maxmode
, maxflags
;
303 u_short g
[MAXGID
], u
[MAXUID
], m
[MAXMODE
], f
[MAXFLAGS
];
305 static int first
= 1;
307 if ((p
= fts_children(t
, 0)) == NULL
) {
309 err(1, "%s", RP(parent
));
318 maxuid
= maxgid
= maxmode
= maxflags
= 0;
319 for (; p
; p
= p
->fts_link
) {
320 if (!dflag
|| (dflag
&& S_ISDIR(p
->fts_statp
->st_mode
))) {
321 smode
= p
->fts_statp
->st_mode
& MBITS
;
322 if (smode
< MAXMODE
&& ++m
[smode
] > maxmode
) {
326 sgid
= p
->fts_statp
->st_gid
;
327 if (sgid
< MAXGID
&& ++g
[sgid
] > maxgid
) {
331 suid
= p
->fts_statp
->st_uid
;
332 if (suid
< MAXUID
&& ++u
[suid
] > maxuid
) {
339 * note that the below will break when file flags
340 * are extended beyond the first 4 bytes of each
341 * half word of the flags
343 #define FLAGS2IDX(f) ((f & 0xf) | ((f >> 12) & 0xf0))
344 sflags
= p
->fts_statp
->st_flags
;
345 if (FLAGS2IDX(sflags
) < MAXFLAGS
&&
346 ++f
[FLAGS2IDX(sflags
)] > maxflags
) {
348 maxflags
= f
[FLAGS2IDX(sflags
)];
353 * If the /set record is the same as the last one we do not need to output
354 * a new one. So first we check to see if anything changed. Note that we
355 * always output a /set record for the first directory.
357 if ((((keys
& F_UNAME
) | (keys
& F_UID
)) && (*puid
!= saveuid
)) ||
358 (((keys
& F_GNAME
) | (keys
& F_GID
)) && (*pgid
!= savegid
)) ||
359 ((keys
& F_MODE
) && (*pmode
!= savemode
)) ||
360 ((keys
& F_FLAGS
) && (*pflags
!= saveflags
)) ||
364 (void)printf("/set type=dir");
366 (void)printf("/set type=file");
367 if (keys
& F_UNAME
) {
368 pw
= getpwuid(saveuid
);
370 (void)printf(" uname=%s", pw
->pw_name
);
372 warnx( "Could not get uname for uid=%u", saveuid
);
374 errx(1, "Could not get uname for uid=%u", saveuid
);
377 (void)printf(" uid=%lu", (u_long
)saveuid
);
378 if (keys
& F_GNAME
) {
379 gr
= getgrgid(savegid
);
381 (void)printf(" gname=%s", gr
->gr_name
);
383 warnx("Could not get gname for gid=%u", savegid
);
385 errx(1, "Could not get gname for gid=%u", savegid
);
388 (void)printf(" gid=%lu", (u_long
)savegid
);
390 (void)printf(" mode=%#o", savemode
);
392 (void)printf(" nlink=1");
393 if (keys
& F_FLAGS
) {
394 fflags
= flags_to_string(saveflags
);
395 (void)printf(" flags=%s", fflags
);
408 dsort(const FTSENT
**a
, const FTSENT
**b
)
410 if (S_ISDIR((*a
)->fts_statp
->st_mode
)) {
411 if (!S_ISDIR((*b
)->fts_statp
->st_mode
))
413 } else if (S_ISDIR((*b
)->fts_statp
->st_mode
))
415 return (strcmp((*a
)->fts_name
, (*b
)->fts_name
));
421 output(int indent
, int *offset
, const char *fmt
, ...)
426 (void)vsnprintf(buf
, sizeof(buf
), fmt
, ap
);
429 if (*offset
+ strlen(buf
) > MAXLINELEN
- 3) {
430 (void)printf(" \\\n%*s", INDENTNAMELEN
+ indent
, "");
431 *offset
= INDENTNAMELEN
+ indent
;
433 *offset
+= printf(" %s", buf
) + 1;