xref: /freebsd/contrib/mtree/create.c (revision 0edc114ac0b998b06235da32bec24d55c10206cd)
1 /*	$NetBSD: create.c,v 1.73 2014/04/24 17:22:41 christos Exp $	*/
2 
3 /*-
4  * Copyright (c) 1989, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. Neither the name of the University nor the names of its contributors
16  *    may be used to endorse or promote products derived from this software
17  *    without specific prior written permission.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29  * SUCH DAMAGE.
30  */
31 
32 #if HAVE_NBTOOL_CONFIG_H
33 #include "nbtool_config.h"
34 #endif
35 
36 #include <sys/cdefs.h>
37 #if defined(__RCSID) && !defined(lint)
38 #if 0
39 static char sccsid[] = "@(#)create.c	8.1 (Berkeley) 6/6/93";
40 #else
41 __RCSID("$NetBSD: create.c,v 1.73 2014/04/24 17:22:41 christos Exp $");
42 #endif
43 #endif /* not lint */
44 
45 #include <sys/param.h>
46 #include <sys/stat.h>
47 
48 #if ! HAVE_NBTOOL_CONFIG_H
49 #include <dirent.h>
50 #endif
51 
52 #include <errno.h>
53 #include <fcntl.h>
54 #include <grp.h>
55 #include <pwd.h>
56 #include <stdio.h>
57 #include <stdarg.h>
58 #include <stdint.h>
59 #include <stdlib.h>
60 #include <string.h>
61 #include <time.h>
62 #include <unistd.h>
63 
64 #ifndef NO_MD5
65 #include <md5.h>
66 #endif
67 #ifndef NO_RMD160
68 #include <rmd160.h>
69 #endif
70 #ifndef NO_SHA1
71 #include <sha1.h>
72 #endif
73 #ifndef NO_SHA2
74 #include <sha2.h>
75 #endif
76 
77 #include "extern.h"
78 
79 #define	INDENTNAMELEN	15
80 #define	MAXLINELEN	80
81 
82 static gid_t gid;
83 static uid_t uid;
84 static mode_t mode;
85 static u_long flags;
86 
87 #ifdef __FreeBSD__
88 #define	FTS_CONST const
89 #else
90 #define	FTS_CONST
91 #endif
92 
93 static int	dcmp(const FTSENT *FTS_CONST *, const FTSENT *FTS_CONST *);
94 static void	output(FILE *, int, int *, const char *, ...)
95     __printflike(4, 5);
96 static int	statd(FILE *, FTS *, FTSENT *, uid_t *, gid_t *, mode_t *,
97     u_long *);
98 static void	statf(FILE *, int, FTSENT *);
99 
100 void
101 cwalk(FILE *fp)
102 {
103 	FTS *t;
104 	FTSENT *p;
105 	time_t clocktime;
106 	char host[MAXHOSTNAMELEN + 1];
107 	const char *user;
108 	char *argv[2];
109 	char  dot[] = ".";
110 	int indent = 0;
111 
112 	argv[0] = dot;
113 	argv[1] = NULL;
114 
115 	time(&clocktime);
116 	gethostname(host, sizeof(host));
117 	host[sizeof(host) - 1] = '\0';
118 	if ((user = getlogin()) == NULL) {
119 		struct passwd *pw;
120 		user = (pw = getpwuid(getuid())) != NULL ? pw->pw_name :
121 		    "<unknown>";
122 	}
123 
124 	if (!nflag)
125 		fprintf(fp,
126 	    	    "#\t   user: %s\n#\tmachine: %s\n#\t   tree: %s\n"
127 		    "#\t   date: %s",
128 		    user, host, fullpath, ctime(&clocktime));
129 
130 	if ((t = fts_open(argv, ftsoptions, dcmp)) == NULL)
131 		mtree_err("fts_open: %s", strerror(errno));
132 	while ((p = fts_read(t)) != NULL) {
133 		if (jflag)
134 			indent = p->fts_level * 4;
135 		if (check_excludes(p->fts_name, p->fts_path)) {
136 			fts_set(t, p, FTS_SKIP);
137 			continue;
138 		}
139 		if (!find_only(p->fts_path)) {
140 			fts_set(t, p, FTS_SKIP);
141 			continue;
142 		}
143 		switch(p->fts_info) {
144 		case FTS_D:
145 			if (!bflag)
146 				fprintf(fp, "\n");
147 			if (!nflag)
148 				fprintf(fp, "# %s\n", p->fts_path);
149 			statd(fp, t, p, &uid, &gid, &mode, &flags);
150 			statf(fp, indent, p);
151 			break;
152 		case FTS_DP:
153 			if (p->fts_level > 0)
154 				if (!nflag)
155 					fprintf(fp, "%*s# %s\n", indent, "",
156 					    p->fts_path);
157 			if (p->fts_level > 0 || flavor == F_FREEBSD9) {
158 				fprintf(fp, "%*s..\n", indent, "");
159 				if (!bflag)
160 					fprintf(fp, "\n");
161 			}
162 			break;
163 		case FTS_DNR:
164 		case FTS_ERR:
165 		case FTS_NS:
166 			mtree_err("%s: %s",
167 			    p->fts_path, strerror(p->fts_errno));
168 			break;
169 		default:
170 			if (!dflag)
171 				statf(fp, indent, p);
172 			break;
173 
174 		}
175 	}
176 	fts_close(t);
177 	if (sflag && keys & F_CKSUM)
178 		mtree_err("%s checksum: %u", fullpath, crc_total);
179 }
180 
181 static void
182 statf(FILE *fp, int indent, FTSENT *p)
183 {
184 	u_int32_t len, val;
185 	int fd, offset;
186 	const char *name = NULL;
187 #if !defined(NO_MD5) || !defined(NO_RMD160) || !defined(NO_SHA1) || !defined(NO_SHA2)
188 	char *digestbuf;
189 #endif
190 
191 	offset = fprintf(fp, "%*s%s%s", indent, "",
192 	    S_ISDIR(p->fts_statp->st_mode) ? "" : "    ", vispath(p->fts_name));
193 
194 	if (offset > (INDENTNAMELEN + indent))
195 		offset = MAXLINELEN;
196 	else
197 		offset += fprintf(fp, "%*s",
198 		    (INDENTNAMELEN + indent) - offset, "");
199 
200 	if (!S_ISREG(p->fts_statp->st_mode) && (flavor == F_NETBSD6 || !dflag))
201 		output(fp, indent, &offset, "type=%s",
202 		    inotype(p->fts_statp->st_mode));
203 	if (keys & (F_UID | F_UNAME) && p->fts_statp->st_uid != uid) {
204 		if (keys & F_UNAME &&
205 		    (name = user_from_uid(p->fts_statp->st_uid, 1)) != NULL)
206 			output(fp, indent, &offset, "uname=%s", name);
207 		if (keys & F_UID || (keys & F_UNAME && name == NULL))
208 			output(fp, indent, &offset, "uid=%u",
209 			    p->fts_statp->st_uid);
210 	}
211 	if (keys & (F_GID | F_GNAME) && p->fts_statp->st_gid != gid) {
212 		if (keys & F_GNAME &&
213 		    (name = group_from_gid(p->fts_statp->st_gid, 1)) != NULL)
214 			output(fp, indent, &offset, "gname=%s", name);
215 		if (keys & F_GID || (keys & F_GNAME && name == NULL))
216 			output(fp, indent, &offset, "gid=%u",
217 			    p->fts_statp->st_gid);
218 	}
219 	if (keys & F_MODE && (p->fts_statp->st_mode & MBITS) != mode)
220 		output(fp, indent, &offset, "mode=%#o",
221 		    p->fts_statp->st_mode & MBITS);
222 	if (keys & F_DEV &&
223 	    (S_ISBLK(p->fts_statp->st_mode) || S_ISCHR(p->fts_statp->st_mode)))
224 		output(fp, indent, &offset, "device=%#jx",
225 		    (uintmax_t)p->fts_statp->st_rdev);
226 	if (keys & F_NLINK && p->fts_statp->st_nlink != 1)
227 		output(fp, indent, &offset, "nlink=%ju",
228 		    (uintmax_t)p->fts_statp->st_nlink);
229 	if (keys & F_SIZE &&
230 	    (flavor == F_FREEBSD9 || S_ISREG(p->fts_statp->st_mode)))
231 		output(fp, indent, &offset, "size=%ju",
232 		    (uintmax_t)p->fts_statp->st_size);
233 	if (keys & F_TIME)
234 #if defined(BSD4_4) && !defined(HAVE_NBTOOL_CONFIG_H)
235 		output(fp, indent, &offset, "time=%jd.%09ld",
236 		    (intmax_t)p->fts_statp->st_mtimespec.tv_sec,
237 		    p->fts_statp->st_mtimespec.tv_nsec);
238 #else
239 		output(fp, indent, &offset, "time=%jd.%09ld",
240 		    (intmax_t)p->fts_statp->st_mtime, (long)0);
241 #endif
242 	if (keys & F_CKSUM && S_ISREG(p->fts_statp->st_mode)) {
243 		if ((fd = open(p->fts_accpath, O_RDONLY, 0)) < 0 ||
244 		    crc(fd, &val, &len))
245 			mtree_err("%s: %s", p->fts_accpath, strerror(errno));
246 		close(fd);
247 		output(fp, indent, &offset, "cksum=%lu", (long)val);
248 	}
249 #ifndef NO_MD5
250 	if (keys & F_MD5 && S_ISREG(p->fts_statp->st_mode)) {
251 		if ((digestbuf = MD5File(p->fts_accpath, NULL)) == NULL)
252 			mtree_err("%s: MD5File failed: %s", p->fts_accpath,
253 			    strerror(errno));
254 		output(fp, indent, &offset, "%s=%s", MD5KEY, digestbuf);
255 		free(digestbuf);
256 	}
257 #endif	/* ! NO_MD5 */
258 #ifndef NO_RMD160
259 	if (keys & F_RMD160 && S_ISREG(p->fts_statp->st_mode)) {
260 		if ((digestbuf = RMD160File(p->fts_accpath, NULL)) == NULL)
261 			mtree_err("%s: RMD160File failed: %s", p->fts_accpath,
262 			    strerror(errno));
263 		output(fp, indent, &offset, "%s=%s", RMD160KEY, digestbuf);
264 		free(digestbuf);
265 	}
266 #endif	/* ! NO_RMD160 */
267 #ifndef NO_SHA1
268 	if (keys & F_SHA1 && S_ISREG(p->fts_statp->st_mode)) {
269 		if ((digestbuf = SHA1File(p->fts_accpath, NULL)) == NULL)
270 			mtree_err("%s: SHA1File failed: %s", p->fts_accpath,
271 			    strerror(errno));
272 		output(fp, indent, &offset, "%s=%s", SHA1KEY, digestbuf);
273 		free(digestbuf);
274 	}
275 #endif	/* ! NO_SHA1 */
276 #ifndef NO_SHA2
277 	if (keys & F_SHA256 && S_ISREG(p->fts_statp->st_mode)) {
278 		if ((digestbuf = SHA256_File(p->fts_accpath, NULL)) == NULL)
279 			mtree_err("%s: SHA256_File failed: %s", p->fts_accpath,
280 			    strerror(errno));
281 		output(fp, indent, &offset, "%s=%s", SHA256KEY, digestbuf);
282 		free(digestbuf);
283 	}
284 #ifdef SHA384_BLOCK_LENGTH
285 	if (keys & F_SHA384 && S_ISREG(p->fts_statp->st_mode)) {
286 		if ((digestbuf = SHA384_File(p->fts_accpath, NULL)) == NULL)
287 			mtree_err("%s: SHA384_File failed: %s", p->fts_accpath,
288 			    strerror(errno));
289 		output(fp, indent, &offset, "%s=%s", SHA384KEY, digestbuf);
290 		free(digestbuf);
291 	}
292 #endif
293 	if (keys & F_SHA512 && S_ISREG(p->fts_statp->st_mode)) {
294 		if ((digestbuf = SHA512_File(p->fts_accpath, NULL)) == NULL)
295 			mtree_err("%s: SHA512_File failed: %s", p->fts_accpath,
296 			    strerror(errno));
297 		output(fp, indent, &offset, "%s=%s", SHA512KEY, digestbuf);
298 		free(digestbuf);
299 	}
300 #endif	/* ! NO_SHA2 */
301 	if (keys & F_SLINK &&
302 	    (p->fts_info == FTS_SL || p->fts_info == FTS_SLNONE))
303 		output(fp, indent, &offset, "link=%s",
304 		    vispath(rlink(p->fts_accpath)));
305 #if HAVE_STRUCT_STAT_ST_FLAGS
306 	if (keys & F_FLAGS && p->fts_statp->st_flags != flags) {
307 		char *str = flags_to_string(p->fts_statp->st_flags, "none");
308 		output(fp, indent, &offset, "flags=%s", str);
309 		free(str);
310 	}
311 #endif
312 	putchar('\n');
313 }
314 
315 /* XXX
316  * FLAGS2INDEX will fail once the user and system settable bits need more
317  * than one byte, respectively.
318  */
319 #define FLAGS2INDEX(x)  (((x >> 8) & 0x0000ff00) | (x & 0x000000ff))
320 
321 #define	MTREE_MAXGID	5000
322 #define	MTREE_MAXUID	5000
323 #define	MTREE_MAXMODE	(MBITS + 1)
324 #if HAVE_STRUCT_STAT_ST_FLAGS
325 #define	MTREE_MAXFLAGS  (FLAGS2INDEX(CH_MASK) + 1)   /* 1808 */
326 #else
327 #define MTREE_MAXFLAGS	1
328 #endif
329 #define	MTREE_MAXS 16
330 
331 static int
332 statd(FILE *fp, FTS *t, FTSENT *parent, uid_t *puid, gid_t *pgid, mode_t *pmode,
333     u_long *pflags)
334 {
335 	FTSENT *p;
336 	gid_t sgid;
337 	uid_t suid;
338 	mode_t smode;
339 	u_long sflags = 0;
340 	const char *name = NULL;
341 	gid_t savegid;
342 	uid_t saveuid;
343 	mode_t savemode;
344 	u_long saveflags;
345 	u_short maxgid, maxuid, maxmode, maxflags;
346 	u_short g[MTREE_MAXGID], u[MTREE_MAXUID],
347 		m[MTREE_MAXMODE], f[MTREE_MAXFLAGS];
348 	static int first = 1;
349 
350 	savegid = *pgid;
351 	saveuid = *puid;
352 	savemode = *pmode;
353 	saveflags = *pflags;
354 	if ((p = fts_children(t, 0)) == NULL) {
355 		if (errno)
356 			mtree_err("%s: %s", RP(parent), strerror(errno));
357 		return (1);
358 	}
359 
360 	memset(g, 0, sizeof(g));
361 	memset(u, 0, sizeof(u));
362 	memset(m, 0, sizeof(m));
363 	memset(f, 0, sizeof(f));
364 
365 	maxuid = maxgid = maxmode = maxflags = 0;
366 	for (; p; p = p->fts_link) {
367 		if (flavor == F_NETBSD6 || !dflag ||
368 		    (dflag && S_ISDIR(p->fts_statp->st_mode))) {
369 			smode = p->fts_statp->st_mode & MBITS;
370 			if (smode < MTREE_MAXMODE && ++m[smode] > maxmode) {
371 				savemode = smode;
372 				maxmode = m[smode];
373 			}
374 			sgid = p->fts_statp->st_gid;
375 			if (sgid < MTREE_MAXGID && ++g[sgid] > maxgid) {
376 				savegid = sgid;
377 				maxgid = g[sgid];
378 			}
379 			suid = p->fts_statp->st_uid;
380 			if (suid < MTREE_MAXUID && ++u[suid] > maxuid) {
381 				saveuid = suid;
382 				maxuid = u[suid];
383 			}
384 
385 #if HAVE_STRUCT_STAT_ST_FLAGS
386 			sflags = FLAGS2INDEX(p->fts_statp->st_flags);
387 			if (sflags < MTREE_MAXFLAGS && ++f[sflags] > maxflags) {
388 				saveflags = p->fts_statp->st_flags;
389 				maxflags = f[sflags];
390 			}
391 #endif
392 		}
393 	}
394 	/*
395 	 * If the /set record is the same as the last one we do not need to
396 	 * output a new one.  So first we check to see if anything changed.
397 	 * Note that we always output a /set record for the first directory.
398 	 */
399 	if (((keys & (F_UNAME | F_UID)) && (*puid != saveuid)) ||
400 	    ((keys & (F_GNAME | F_GID)) && (*pgid != savegid)) ||
401 	    ((keys & F_MODE) && (*pmode != savemode)) ||
402 	    ((keys & F_FLAGS) && (*pflags != saveflags)) ||
403 	    first) {
404 		first = 0;
405 		if (flavor != F_NETBSD6 && dflag)
406 			fprintf(fp, "/set type=dir");
407 		else
408 			fprintf(fp, "/set type=file");
409 		if (keys & (F_UID | F_UNAME)) {
410 			if (keys & F_UNAME &&
411 			    (name = user_from_uid(saveuid, 1)) != NULL)
412 				fprintf(fp, " uname=%s", name);
413 			if (keys & F_UID || (keys & F_UNAME && name == NULL))
414 				fprintf(fp, " uid=%lu", (u_long)saveuid);
415 		}
416 		if (keys & (F_GID | F_GNAME)) {
417 			if (keys & F_GNAME &&
418 			    (name = group_from_gid(savegid, 1)) != NULL)
419 				fprintf(fp, " gname=%s", name);
420 			if (keys & F_GID || (keys & F_GNAME && name == NULL))
421 				fprintf(fp, " gid=%lu", (u_long)savegid);
422 		}
423 		if (keys & F_MODE)
424 			fprintf(fp, " mode=%#lo", (u_long)savemode);
425 		if (keys & F_NLINK)
426 			fprintf(fp, " nlink=1");
427 		if (keys & F_FLAGS) {
428 			char *str = flags_to_string(saveflags, "none");
429 			fprintf(fp, " flags=%s", str);
430 			free(str);
431 		}
432 		fprintf(fp, "\n");
433 		*puid = saveuid;
434 		*pgid = savegid;
435 		*pmode = savemode;
436 		*pflags = saveflags;
437 	}
438 	return (0);
439 }
440 
441 /*
442  * dcmp --
443  *	used as a comparison function passed to fts_open() to control
444  *	the order in which fts_read() returns results.	We make
445  *	directories sort after non-directories, but otherwise sort in
446  *	strcmp() order.
447  *
448  * Keep this in sync with nodecmp() in spec.c.
449  */
450 static int
451 dcmp(const FTSENT *FTS_CONST *a, const FTSENT *FTS_CONST *b)
452 {
453 
454 	if (S_ISDIR((*a)->fts_statp->st_mode)) {
455 		if (!S_ISDIR((*b)->fts_statp->st_mode))
456 			return (1);
457 	} else if (S_ISDIR((*b)->fts_statp->st_mode))
458 		return (-1);
459 	return (strcmp((*a)->fts_name, (*b)->fts_name));
460 }
461 
462 void
463 output(FILE *fp, int indent, int *offset, const char *fmt, ...)
464 {
465 	va_list ap;
466 	char buf[1024];
467 
468 	va_start(ap, fmt);
469 	vsnprintf(buf, sizeof(buf), fmt, ap);
470 	va_end(ap);
471 
472 	if (*offset + strlen(buf) > MAXLINELEN - 3) {
473 		fprintf(fp, " \\\n%*s", INDENTNAMELEN + indent, "");
474 		*offset = INDENTNAMELEN + indent;
475 	}
476 	*offset += fprintf(fp, " %s", buf) + 1;
477 }
478