xref: /minix3/usr.sbin/mtree/create.c (revision 0a6a1f1d05b60e214de2f05a7310ddd1f0e590e7)
1*0a6a1f1dSLionel Sambuc /*	$NetBSD: create.c,v 1.73 2014/04/24 17:22:41 christos Exp $	*/
2d433a562SThomas Veerman 
3d433a562SThomas Veerman /*-
4d433a562SThomas Veerman  * Copyright (c) 1989, 1993
5d433a562SThomas Veerman  *	The Regents of the University of California.  All rights reserved.
6d433a562SThomas Veerman  *
7d433a562SThomas Veerman  * Redistribution and use in source and binary forms, with or without
8d433a562SThomas Veerman  * modification, are permitted provided that the following conditions
9d433a562SThomas Veerman  * are met:
10d433a562SThomas Veerman  * 1. Redistributions of source code must retain the above copyright
11d433a562SThomas Veerman  *    notice, this list of conditions and the following disclaimer.
12d433a562SThomas Veerman  * 2. Redistributions in binary form must reproduce the above copyright
13d433a562SThomas Veerman  *    notice, this list of conditions and the following disclaimer in the
14d433a562SThomas Veerman  *    documentation and/or other materials provided with the distribution.
15d433a562SThomas Veerman  * 3. Neither the name of the University nor the names of its contributors
16d433a562SThomas Veerman  *    may be used to endorse or promote products derived from this software
17d433a562SThomas Veerman  *    without specific prior written permission.
18d433a562SThomas Veerman  *
19d433a562SThomas Veerman  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20d433a562SThomas Veerman  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21d433a562SThomas Veerman  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22d433a562SThomas Veerman  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23d433a562SThomas Veerman  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24d433a562SThomas Veerman  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25d433a562SThomas Veerman  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26d433a562SThomas Veerman  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27d433a562SThomas Veerman  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28d433a562SThomas Veerman  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29d433a562SThomas Veerman  * SUCH DAMAGE.
30d433a562SThomas Veerman  */
31d433a562SThomas Veerman 
32d433a562SThomas Veerman #if HAVE_NBTOOL_CONFIG_H
33d433a562SThomas Veerman #include "nbtool_config.h"
34d433a562SThomas Veerman #endif
35d433a562SThomas Veerman 
36d433a562SThomas Veerman #include <sys/cdefs.h>
37d433a562SThomas Veerman #if defined(__RCSID) && !defined(lint)
38d433a562SThomas Veerman #if 0
39d433a562SThomas Veerman static char sccsid[] = "@(#)create.c	8.1 (Berkeley) 6/6/93";
40d433a562SThomas Veerman #else
41*0a6a1f1dSLionel Sambuc __RCSID("$NetBSD: create.c,v 1.73 2014/04/24 17:22:41 christos Exp $");
42d433a562SThomas Veerman #endif
43d433a562SThomas Veerman #endif /* not lint */
44d433a562SThomas Veerman 
45d433a562SThomas Veerman #include <sys/param.h>
46d433a562SThomas Veerman #include <sys/stat.h>
47d433a562SThomas Veerman 
48d433a562SThomas Veerman #if ! HAVE_NBTOOL_CONFIG_H
49d433a562SThomas Veerman #include <dirent.h>
50d433a562SThomas Veerman #endif
51d433a562SThomas Veerman 
52d433a562SThomas Veerman #include <errno.h>
53d433a562SThomas Veerman #include <fcntl.h>
54d433a562SThomas Veerman #include <grp.h>
55d433a562SThomas Veerman #include <pwd.h>
56d433a562SThomas Veerman #include <stdio.h>
57d433a562SThomas Veerman #include <stdarg.h>
5884d9c625SLionel Sambuc #include <stdint.h>
59d433a562SThomas Veerman #include <stdlib.h>
60d433a562SThomas Veerman #include <string.h>
61d433a562SThomas Veerman #include <time.h>
62d433a562SThomas Veerman #include <unistd.h>
63d433a562SThomas Veerman 
64d433a562SThomas Veerman #ifndef NO_MD5
65d433a562SThomas Veerman #include <md5.h>
66d433a562SThomas Veerman #endif
67d433a562SThomas Veerman #ifndef NO_RMD160
68d433a562SThomas Veerman #include <rmd160.h>
69d433a562SThomas Veerman #endif
70d433a562SThomas Veerman #ifndef NO_SHA1
71d433a562SThomas Veerman #include <sha1.h>
72d433a562SThomas Veerman #endif
73d433a562SThomas Veerman #ifndef NO_SHA2
74d433a562SThomas Veerman #include <sha2.h>
75d433a562SThomas Veerman #endif
76d433a562SThomas Veerman 
77d433a562SThomas Veerman #include "extern.h"
78d433a562SThomas Veerman 
79d433a562SThomas Veerman #define	INDENTNAMELEN	15
80d433a562SThomas Veerman #define	MAXLINELEN	80
81d433a562SThomas Veerman 
82d433a562SThomas Veerman static gid_t gid;
83d433a562SThomas Veerman static uid_t uid;
84d433a562SThomas Veerman static mode_t mode;
85d433a562SThomas Veerman static u_long flags;
86d433a562SThomas Veerman 
87a8ef0910SBen Gras #ifdef __FreeBSD__
88a8ef0910SBen Gras #define	FTS_CONST const
89a8ef0910SBen Gras #else
90a8ef0910SBen Gras #define	FTS_CONST
91a8ef0910SBen Gras #endif
92a8ef0910SBen Gras 
93a8ef0910SBen Gras static int	dcmp(const FTSENT *FTS_CONST *, const FTSENT *FTS_CONST *);
94*0a6a1f1dSLionel Sambuc static void	output(FILE *, int, int *, const char *, ...)
95*0a6a1f1dSLionel Sambuc     __printflike(4, 5);
96*0a6a1f1dSLionel Sambuc static int	statd(FILE *, FTS *, FTSENT *, uid_t *, gid_t *, mode_t *,
97*0a6a1f1dSLionel Sambuc     u_long *);
98*0a6a1f1dSLionel Sambuc static void	statf(FILE *, int, FTSENT *);
99d433a562SThomas Veerman 
100d433a562SThomas Veerman void
cwalk(FILE * fp)101*0a6a1f1dSLionel Sambuc cwalk(FILE *fp)
102d433a562SThomas Veerman {
103d433a562SThomas Veerman 	FTS *t;
104d433a562SThomas Veerman 	FTSENT *p;
105d433a562SThomas Veerman 	time_t clocktime;
106d433a562SThomas Veerman 	char host[MAXHOSTNAMELEN + 1];
107d433a562SThomas Veerman 	const char *user;
108d433a562SThomas Veerman 	char *argv[2];
109d433a562SThomas Veerman 	char  dot[] = ".";
110a8ef0910SBen Gras 	int indent = 0;
111d433a562SThomas Veerman 
112d433a562SThomas Veerman 	argv[0] = dot;
113d433a562SThomas Veerman 	argv[1] = NULL;
114d433a562SThomas Veerman 
115d433a562SThomas Veerman 	time(&clocktime);
116d433a562SThomas Veerman 	gethostname(host, sizeof(host));
117d433a562SThomas Veerman 	host[sizeof(host) - 1] = '\0';
118d433a562SThomas Veerman 	if ((user = getlogin()) == NULL) {
119d433a562SThomas Veerman 		struct passwd *pw;
120d433a562SThomas Veerman 		user = (pw = getpwuid(getuid())) == NULL ? pw->pw_name :
121d433a562SThomas Veerman 		    "<unknown>";
122d433a562SThomas Veerman 	}
123d433a562SThomas Veerman 
124a8ef0910SBen Gras 	if (!nflag)
125*0a6a1f1dSLionel Sambuc 		fprintf(fp,
126a8ef0910SBen Gras 	    	    "#\t   user: %s\n#\tmachine: %s\n#\t   tree: %s\n"
127a8ef0910SBen Gras 		    "#\t   date: %s",
128d433a562SThomas Veerman 		    user, host, fullpath, ctime(&clocktime));
129d433a562SThomas Veerman 
130d433a562SThomas Veerman 	if ((t = fts_open(argv, ftsoptions, dcmp)) == NULL)
131d433a562SThomas Veerman 		mtree_err("fts_open: %s", strerror(errno));
132d433a562SThomas Veerman 	while ((p = fts_read(t)) != NULL) {
133a8ef0910SBen Gras 		if (jflag)
134a8ef0910SBen Gras 			indent = p->fts_level * 4;
135d433a562SThomas Veerman 		if (check_excludes(p->fts_name, p->fts_path)) {
136d433a562SThomas Veerman 			fts_set(t, p, FTS_SKIP);
137d433a562SThomas Veerman 			continue;
138d433a562SThomas Veerman 		}
13984d9c625SLionel Sambuc 		if (!find_only(p->fts_path)) {
14084d9c625SLionel Sambuc 			fts_set(t, p, FTS_SKIP);
14184d9c625SLionel Sambuc 			continue;
14284d9c625SLionel Sambuc 		}
143d433a562SThomas Veerman 		switch(p->fts_info) {
144d433a562SThomas Veerman 		case FTS_D:
14584d9c625SLionel Sambuc 			if (!bflag)
146*0a6a1f1dSLionel Sambuc 				fprintf(fp, "\n");
147a8ef0910SBen Gras 			if (!nflag)
148*0a6a1f1dSLionel Sambuc 				fprintf(fp, "# %s\n", p->fts_path);
149*0a6a1f1dSLionel Sambuc 			statd(fp, t, p, &uid, &gid, &mode, &flags);
150*0a6a1f1dSLionel Sambuc 			statf(fp, indent, p);
151d433a562SThomas Veerman 			break;
152d433a562SThomas Veerman 		case FTS_DP:
15384d9c625SLionel Sambuc 			if (p->fts_level > 0)
15484d9c625SLionel Sambuc 				if (!nflag)
155*0a6a1f1dSLionel Sambuc 					fprintf(fp, "%*s# %s\n", indent, "",
15684d9c625SLionel Sambuc 					    p->fts_path);
15784d9c625SLionel Sambuc 			if (p->fts_level > 0 || flavor == F_FREEBSD9) {
158*0a6a1f1dSLionel Sambuc 				fprintf(fp, "%*s..\n", indent, "");
15984d9c625SLionel Sambuc 				if (!bflag)
160*0a6a1f1dSLionel Sambuc 					fprintf(fp, "\n");
16184d9c625SLionel Sambuc 			}
162d433a562SThomas Veerman 			break;
163d433a562SThomas Veerman 		case FTS_DNR:
164d433a562SThomas Veerman 		case FTS_ERR:
165d433a562SThomas Veerman 		case FTS_NS:
166d433a562SThomas Veerman 			mtree_err("%s: %s",
167d433a562SThomas Veerman 			    p->fts_path, strerror(p->fts_errno));
168d433a562SThomas Veerman 			break;
169d433a562SThomas Veerman 		default:
170d433a562SThomas Veerman 			if (!dflag)
171*0a6a1f1dSLionel Sambuc 				statf(fp, indent, p);
172d433a562SThomas Veerman 			break;
173d433a562SThomas Veerman 
174d433a562SThomas Veerman 		}
175d433a562SThomas Veerman 	}
176d433a562SThomas Veerman 	fts_close(t);
177d433a562SThomas Veerman 	if (sflag && keys & F_CKSUM)
178d433a562SThomas Veerman 		mtree_err("%s checksum: %u", fullpath, crc_total);
179d433a562SThomas Veerman }
180d433a562SThomas Veerman 
181d433a562SThomas Veerman static void
statf(FILE * fp,int indent,FTSENT * p)182*0a6a1f1dSLionel Sambuc statf(FILE *fp, int indent, FTSENT *p)
183d433a562SThomas Veerman {
184d433a562SThomas Veerman 	u_int32_t len, val;
185a8ef0910SBen Gras 	int fd, offset;
186a8ef0910SBen Gras 	const char *name = NULL;
187d433a562SThomas Veerman #if !defined(NO_MD5) || !defined(NO_RMD160) || !defined(NO_SHA1) || !defined(NO_SHA2)
188d433a562SThomas Veerman 	char *digestbuf;
189d433a562SThomas Veerman #endif
190d433a562SThomas Veerman 
191*0a6a1f1dSLionel Sambuc 	offset = fprintf(fp, "%*s%s%s", indent, "",
192d433a562SThomas Veerman 	    S_ISDIR(p->fts_statp->st_mode) ? "" : "    ", vispath(p->fts_name));
193d433a562SThomas Veerman 
194a8ef0910SBen Gras 	if (offset > (INDENTNAMELEN + indent))
195a8ef0910SBen Gras 		offset = MAXLINELEN;
196d433a562SThomas Veerman 	else
197*0a6a1f1dSLionel Sambuc 		offset += fprintf(fp, "%*s",
198*0a6a1f1dSLionel Sambuc 		    (INDENTNAMELEN + indent) - offset, "");
199d433a562SThomas Veerman 
20084d9c625SLionel Sambuc 	if (!S_ISREG(p->fts_statp->st_mode) && (flavor == F_NETBSD6 || !dflag))
201*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "type=%s",
202a8ef0910SBen Gras 		    inotype(p->fts_statp->st_mode));
203d433a562SThomas Veerman 	if (keys & (F_UID | F_UNAME) && p->fts_statp->st_uid != uid) {
204d433a562SThomas Veerman 		if (keys & F_UNAME &&
205d433a562SThomas Veerman 		    (name = user_from_uid(p->fts_statp->st_uid, 1)) != NULL)
206*0a6a1f1dSLionel Sambuc 			output(fp, indent, &offset, "uname=%s", name);
207a8ef0910SBen Gras 		if (keys & F_UID || (keys & F_UNAME && name == NULL))
208*0a6a1f1dSLionel Sambuc 			output(fp, indent, &offset, "uid=%u",
209*0a6a1f1dSLionel Sambuc 			    p->fts_statp->st_uid);
210d433a562SThomas Veerman 	}
211d433a562SThomas Veerman 	if (keys & (F_GID | F_GNAME) && p->fts_statp->st_gid != gid) {
212d433a562SThomas Veerman 		if (keys & F_GNAME &&
213d433a562SThomas Veerman 		    (name = group_from_gid(p->fts_statp->st_gid, 1)) != NULL)
214*0a6a1f1dSLionel Sambuc 			output(fp, indent, &offset, "gname=%s", name);
215a8ef0910SBen Gras 		if (keys & F_GID || (keys & F_GNAME && name == NULL))
216*0a6a1f1dSLionel Sambuc 			output(fp, indent, &offset, "gid=%u",
217*0a6a1f1dSLionel Sambuc 			    p->fts_statp->st_gid);
218d433a562SThomas Veerman 	}
219d433a562SThomas Veerman 	if (keys & F_MODE && (p->fts_statp->st_mode & MBITS) != mode)
220*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "mode=%#o",
221a8ef0910SBen Gras 		    p->fts_statp->st_mode & MBITS);
222d433a562SThomas Veerman 	if (keys & F_DEV &&
223d433a562SThomas Veerman 	    (S_ISBLK(p->fts_statp->st_mode) || S_ISCHR(p->fts_statp->st_mode)))
224*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "device=%#jx",
22584d9c625SLionel Sambuc 		    (uintmax_t)p->fts_statp->st_rdev);
226d433a562SThomas Veerman 	if (keys & F_NLINK && p->fts_statp->st_nlink != 1)
227*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "nlink=%u", p->fts_statp->st_nlink);
22884d9c625SLionel Sambuc 	if (keys & F_SIZE &&
22984d9c625SLionel Sambuc 	    (flavor == F_FREEBSD9 || S_ISREG(p->fts_statp->st_mode)))
230*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "size=%ju",
23184d9c625SLionel Sambuc 		    (uintmax_t)p->fts_statp->st_size);
232d433a562SThomas Veerman 	if (keys & F_TIME)
233d433a562SThomas Veerman #if defined(BSD4_4) && !defined(HAVE_NBTOOL_CONFIG_H)
234*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "time=%jd.%09ld",
23584d9c625SLionel Sambuc 		    (intmax_t)p->fts_statp->st_mtimespec.tv_sec,
236d433a562SThomas Veerman 		    p->fts_statp->st_mtimespec.tv_nsec);
237d433a562SThomas Veerman #else
238*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "time=%jd.%09ld",
23984d9c625SLionel Sambuc 		    (intmax_t)p->fts_statp->st_mtime, (long)0);
240d433a562SThomas Veerman #endif
241d433a562SThomas Veerman 	if (keys & F_CKSUM && S_ISREG(p->fts_statp->st_mode)) {
242d433a562SThomas Veerman 		if ((fd = open(p->fts_accpath, O_RDONLY, 0)) < 0 ||
243d433a562SThomas Veerman 		    crc(fd, &val, &len))
244d433a562SThomas Veerman 			mtree_err("%s: %s", p->fts_accpath, strerror(errno));
245d433a562SThomas Veerman 		close(fd);
246*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "cksum=%lu", (long)val);
247d433a562SThomas Veerman 	}
248d433a562SThomas Veerman #ifndef NO_MD5
249d433a562SThomas Veerman 	if (keys & F_MD5 && S_ISREG(p->fts_statp->st_mode)) {
250d433a562SThomas Veerman 		if ((digestbuf = MD5File(p->fts_accpath, NULL)) == NULL)
251a8ef0910SBen Gras 			mtree_err("%s: MD5File failed: %s", p->fts_accpath,
252a8ef0910SBen Gras 			    strerror(errno));
253*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "%s=%s", MD5KEY, digestbuf);
254d433a562SThomas Veerman 		free(digestbuf);
255d433a562SThomas Veerman 	}
256d433a562SThomas Veerman #endif	/* ! NO_MD5 */
257d433a562SThomas Veerman #ifndef NO_RMD160
258d433a562SThomas Veerman 	if (keys & F_RMD160 && S_ISREG(p->fts_statp->st_mode)) {
259d433a562SThomas Veerman 		if ((digestbuf = RMD160File(p->fts_accpath, NULL)) == NULL)
260a8ef0910SBen Gras 			mtree_err("%s: RMD160File failed: %s", p->fts_accpath,
261a8ef0910SBen Gras 			    strerror(errno));
262*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "%s=%s", RMD160KEY, digestbuf);
263d433a562SThomas Veerman 		free(digestbuf);
264d433a562SThomas Veerman 	}
265d433a562SThomas Veerman #endif	/* ! NO_RMD160 */
266d433a562SThomas Veerman #ifndef NO_SHA1
267d433a562SThomas Veerman 	if (keys & F_SHA1 && S_ISREG(p->fts_statp->st_mode)) {
268d433a562SThomas Veerman 		if ((digestbuf = SHA1File(p->fts_accpath, NULL)) == NULL)
269a8ef0910SBen Gras 			mtree_err("%s: SHA1File failed: %s", p->fts_accpath,
270a8ef0910SBen Gras 			    strerror(errno));
271*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "%s=%s", SHA1KEY, digestbuf);
272d433a562SThomas Veerman 		free(digestbuf);
273d433a562SThomas Veerman 	}
274d433a562SThomas Veerman #endif	/* ! NO_SHA1 */
275d433a562SThomas Veerman #ifndef NO_SHA2
276d433a562SThomas Veerman 	if (keys & F_SHA256 && S_ISREG(p->fts_statp->st_mode)) {
277d433a562SThomas Veerman 		if ((digestbuf = SHA256_File(p->fts_accpath, NULL)) == NULL)
278a8ef0910SBen Gras 			mtree_err("%s: SHA256_File failed: %s", p->fts_accpath,
279a8ef0910SBen Gras 			    strerror(errno));
280*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "%s=%s", SHA256KEY, digestbuf);
281d433a562SThomas Veerman 		free(digestbuf);
282d433a562SThomas Veerman 	}
283a8ef0910SBen Gras #ifdef SHA384_BLOCK_LENGTH
284d433a562SThomas Veerman 	if (keys & F_SHA384 && S_ISREG(p->fts_statp->st_mode)) {
285d433a562SThomas Veerman 		if ((digestbuf = SHA384_File(p->fts_accpath, NULL)) == NULL)
286a8ef0910SBen Gras 			mtree_err("%s: SHA384_File failed: %s", p->fts_accpath,
287a8ef0910SBen Gras 			    strerror(errno));
288*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "%s=%s", SHA384KEY, digestbuf);
289d433a562SThomas Veerman 		free(digestbuf);
290d433a562SThomas Veerman 	}
291a8ef0910SBen Gras #endif
292d433a562SThomas Veerman 	if (keys & F_SHA512 && S_ISREG(p->fts_statp->st_mode)) {
293d433a562SThomas Veerman 		if ((digestbuf = SHA512_File(p->fts_accpath, NULL)) == NULL)
294a8ef0910SBen Gras 			mtree_err("%s: SHA512_File failed: %s", p->fts_accpath,
295a8ef0910SBen Gras 			    strerror(errno));
296*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "%s=%s", SHA512KEY, digestbuf);
297d433a562SThomas Veerman 		free(digestbuf);
298d433a562SThomas Veerman 	}
299d433a562SThomas Veerman #endif	/* ! NO_SHA2 */
300d433a562SThomas Veerman 	if (keys & F_SLINK &&
301d433a562SThomas Veerman 	    (p->fts_info == FTS_SL || p->fts_info == FTS_SLNONE))
302*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "link=%s",
303a8ef0910SBen Gras 		    vispath(rlink(p->fts_accpath)));
304d433a562SThomas Veerman #if HAVE_STRUCT_STAT_ST_FLAGS
305a8ef0910SBen Gras 	if (keys & F_FLAGS && p->fts_statp->st_flags != flags) {
306a8ef0910SBen Gras 		char *str = flags_to_string(p->fts_statp->st_flags, "none");
307*0a6a1f1dSLionel Sambuc 		output(fp, indent, &offset, "flags=%s", str);
308a8ef0910SBen Gras 		free(str);
309a8ef0910SBen Gras 	}
310d433a562SThomas Veerman #endif
311d433a562SThomas Veerman 	putchar('\n');
312d433a562SThomas Veerman }
313d433a562SThomas Veerman 
314d433a562SThomas Veerman /* XXX
315d433a562SThomas Veerman  * FLAGS2INDEX will fail once the user and system settable bits need more
316d433a562SThomas Veerman  * than one byte, respectively.
317d433a562SThomas Veerman  */
318d433a562SThomas Veerman #define FLAGS2INDEX(x)  (((x >> 8) & 0x0000ff00) | (x & 0x000000ff))
319d433a562SThomas Veerman 
320d433a562SThomas Veerman #define	MTREE_MAXGID	5000
321d433a562SThomas Veerman #define	MTREE_MAXUID	5000
322d433a562SThomas Veerman #define	MTREE_MAXMODE	(MBITS + 1)
323d433a562SThomas Veerman #if HAVE_STRUCT_STAT_ST_FLAGS
324d433a562SThomas Veerman #define	MTREE_MAXFLAGS  (FLAGS2INDEX(CH_MASK) + 1)   /* 1808 */
325d433a562SThomas Veerman #else
326d433a562SThomas Veerman #define MTREE_MAXFLAGS	1
327d433a562SThomas Veerman #endif
328d433a562SThomas Veerman #define	MTREE_MAXS 16
329d433a562SThomas Veerman 
330d433a562SThomas Veerman static int
statd(FILE * fp,FTS * t,FTSENT * parent,uid_t * puid,gid_t * pgid,mode_t * pmode,u_long * pflags)331*0a6a1f1dSLionel Sambuc statd(FILE *fp, FTS *t, FTSENT *parent, uid_t *puid, gid_t *pgid, mode_t *pmode,
332d433a562SThomas Veerman     u_long *pflags)
333d433a562SThomas Veerman {
334d433a562SThomas Veerman 	FTSENT *p;
335d433a562SThomas Veerman 	gid_t sgid;
336d433a562SThomas Veerman 	uid_t suid;
337d433a562SThomas Veerman 	mode_t smode;
338d433a562SThomas Veerman 	u_long sflags = 0;
339a8ef0910SBen Gras 	const char *name = NULL;
340d433a562SThomas Veerman 	gid_t savegid;
341d433a562SThomas Veerman 	uid_t saveuid;
342d433a562SThomas Veerman 	mode_t savemode;
343d433a562SThomas Veerman 	u_long saveflags;
344d433a562SThomas Veerman 	u_short maxgid, maxuid, maxmode, maxflags;
345d433a562SThomas Veerman 	u_short g[MTREE_MAXGID], u[MTREE_MAXUID],
346d433a562SThomas Veerman 		m[MTREE_MAXMODE], f[MTREE_MAXFLAGS];
347d433a562SThomas Veerman 	static int first = 1;
348d433a562SThomas Veerman 
349d433a562SThomas Veerman 	savegid = *pgid;
350d433a562SThomas Veerman 	saveuid = *puid;
351d433a562SThomas Veerman 	savemode = *pmode;
352d433a562SThomas Veerman 	saveflags = *pflags;
353d433a562SThomas Veerman 	if ((p = fts_children(t, 0)) == NULL) {
354d433a562SThomas Veerman 		if (errno)
355d433a562SThomas Veerman 			mtree_err("%s: %s", RP(parent), strerror(errno));
356d433a562SThomas Veerman 		return (1);
357d433a562SThomas Veerman 	}
358d433a562SThomas Veerman 
359d433a562SThomas Veerman 	memset(g, 0, sizeof(g));
360d433a562SThomas Veerman 	memset(u, 0, sizeof(u));
361d433a562SThomas Veerman 	memset(m, 0, sizeof(m));
362d433a562SThomas Veerman 	memset(f, 0, sizeof(f));
363d433a562SThomas Veerman 
364d433a562SThomas Veerman 	maxuid = maxgid = maxmode = maxflags = 0;
365d433a562SThomas Veerman 	for (; p; p = p->fts_link) {
36684d9c625SLionel Sambuc 		if (flavor == F_NETBSD6 || !dflag ||
36784d9c625SLionel Sambuc 		    (dflag && S_ISDIR(p->fts_statp->st_mode))) {
368d433a562SThomas Veerman 			smode = p->fts_statp->st_mode & MBITS;
369d433a562SThomas Veerman 			if (smode < MTREE_MAXMODE && ++m[smode] > maxmode) {
370d433a562SThomas Veerman 				savemode = smode;
371d433a562SThomas Veerman 				maxmode = m[smode];
372d433a562SThomas Veerman 			}
373d433a562SThomas Veerman 			sgid = p->fts_statp->st_gid;
374d433a562SThomas Veerman 			if (sgid < MTREE_MAXGID && ++g[sgid] > maxgid) {
375d433a562SThomas Veerman 				savegid = sgid;
376d433a562SThomas Veerman 				maxgid = g[sgid];
377d433a562SThomas Veerman 			}
378d433a562SThomas Veerman 			suid = p->fts_statp->st_uid;
379d433a562SThomas Veerman 			if (suid < MTREE_MAXUID && ++u[suid] > maxuid) {
380d433a562SThomas Veerman 				saveuid = suid;
381d433a562SThomas Veerman 				maxuid = u[suid];
382d433a562SThomas Veerman 			}
383d433a562SThomas Veerman 
384d433a562SThomas Veerman #if HAVE_STRUCT_STAT_ST_FLAGS
385d433a562SThomas Veerman 			sflags = FLAGS2INDEX(p->fts_statp->st_flags);
386d433a562SThomas Veerman 			if (sflags < MTREE_MAXFLAGS && ++f[sflags] > maxflags) {
387d433a562SThomas Veerman 				saveflags = p->fts_statp->st_flags;
388d433a562SThomas Veerman 				maxflags = f[sflags];
389d433a562SThomas Veerman 			}
390d433a562SThomas Veerman #endif
391d433a562SThomas Veerman 		}
39284d9c625SLionel Sambuc 	}
393d433a562SThomas Veerman 	/*
394d433a562SThomas Veerman 	 * If the /set record is the same as the last one we do not need to
395d433a562SThomas Veerman 	 * output a new one.  So first we check to see if anything changed.
396d433a562SThomas Veerman 	 * Note that we always output a /set record for the first directory.
397d433a562SThomas Veerman 	 */
398d433a562SThomas Veerman 	if (((keys & (F_UNAME | F_UID)) && (*puid != saveuid)) ||
399d433a562SThomas Veerman 	    ((keys & (F_GNAME | F_GID)) && (*pgid != savegid)) ||
400d433a562SThomas Veerman 	    ((keys & F_MODE) && (*pmode != savemode)) ||
401d433a562SThomas Veerman 	    ((keys & F_FLAGS) && (*pflags != saveflags)) ||
402d433a562SThomas Veerman 	    first) {
403d433a562SThomas Veerman 		first = 0;
40484d9c625SLionel Sambuc 		if (flavor != F_NETBSD6 && dflag)
405*0a6a1f1dSLionel Sambuc 			fprintf(fp, "/set type=dir");
40684d9c625SLionel Sambuc 		else
407*0a6a1f1dSLionel Sambuc 			fprintf(fp, "/set type=file");
408d433a562SThomas Veerman 		if (keys & (F_UID | F_UNAME)) {
409d433a562SThomas Veerman 			if (keys & F_UNAME &&
410d433a562SThomas Veerman 			    (name = user_from_uid(saveuid, 1)) != NULL)
411*0a6a1f1dSLionel Sambuc 				fprintf(fp, " uname=%s", name);
412a8ef0910SBen Gras 			if (keys & F_UID || (keys & F_UNAME && name == NULL))
413*0a6a1f1dSLionel Sambuc 				fprintf(fp, " uid=%lu", (u_long)saveuid);
414d433a562SThomas Veerman 		}
415d433a562SThomas Veerman 		if (keys & (F_GID | F_GNAME)) {
416d433a562SThomas Veerman 			if (keys & F_GNAME &&
417d433a562SThomas Veerman 			    (name = group_from_gid(savegid, 1)) != NULL)
418*0a6a1f1dSLionel Sambuc 				fprintf(fp, " gname=%s", name);
419a8ef0910SBen Gras 			if (keys & F_GID || (keys & F_GNAME && name == NULL))
420*0a6a1f1dSLionel Sambuc 				fprintf(fp, " gid=%lu", (u_long)savegid);
421d433a562SThomas Veerman 		}
422d433a562SThomas Veerman 		if (keys & F_MODE)
423*0a6a1f1dSLionel Sambuc 			fprintf(fp, " mode=%#lo", (u_long)savemode);
424d433a562SThomas Veerman 		if (keys & F_NLINK)
425*0a6a1f1dSLionel Sambuc 			fprintf(fp, " nlink=1");
426a8ef0910SBen Gras 		if (keys & F_FLAGS) {
427a8ef0910SBen Gras 			char *str = flags_to_string(saveflags, "none");
428*0a6a1f1dSLionel Sambuc 			fprintf(fp, " flags=%s", str);
429a8ef0910SBen Gras 			free(str);
430a8ef0910SBen Gras 		}
431*0a6a1f1dSLionel Sambuc 		fprintf(fp, "\n");
432d433a562SThomas Veerman 		*puid = saveuid;
433d433a562SThomas Veerman 		*pgid = savegid;
434d433a562SThomas Veerman 		*pmode = savemode;
435d433a562SThomas Veerman 		*pflags = saveflags;
436d433a562SThomas Veerman 	}
437d433a562SThomas Veerman 	return (0);
438d433a562SThomas Veerman }
439d433a562SThomas Veerman 
440d433a562SThomas Veerman /*
441d433a562SThomas Veerman  * dcmp --
442d433a562SThomas Veerman  *	used as a comparison function passed to fts_open() to control
443d433a562SThomas Veerman  *	the order in which fts_read() returns results.	We make
444d433a562SThomas Veerman  *	directories sort after non-directories, but otherwise sort in
445d433a562SThomas Veerman  *	strcmp() order.
446d433a562SThomas Veerman  *
447d433a562SThomas Veerman  * Keep this in sync with nodecmp() in spec.c.
448d433a562SThomas Veerman  */
449d433a562SThomas Veerman static int
dcmp(const FTSENT * FTS_CONST * a,const FTSENT * FTS_CONST * b)450a8ef0910SBen Gras dcmp(const FTSENT *FTS_CONST *a, const FTSENT *FTS_CONST *b)
451d433a562SThomas Veerman {
452d433a562SThomas Veerman 
453d433a562SThomas Veerman 	if (S_ISDIR((*a)->fts_statp->st_mode)) {
454d433a562SThomas Veerman 		if (!S_ISDIR((*b)->fts_statp->st_mode))
455d433a562SThomas Veerman 			return (1);
456d433a562SThomas Veerman 	} else if (S_ISDIR((*b)->fts_statp->st_mode))
457d433a562SThomas Veerman 		return (-1);
458d433a562SThomas Veerman 	return (strcmp((*a)->fts_name, (*b)->fts_name));
459d433a562SThomas Veerman }
460d433a562SThomas Veerman 
461d433a562SThomas Veerman void
output(FILE * fp,int indent,int * offset,const char * fmt,...)462*0a6a1f1dSLionel Sambuc output(FILE *fp, int indent, int *offset, const char *fmt, ...)
463d433a562SThomas Veerman {
464d433a562SThomas Veerman 	va_list ap;
465d433a562SThomas Veerman 	char buf[1024];
466d433a562SThomas Veerman 
467d433a562SThomas Veerman 	va_start(ap, fmt);
468d433a562SThomas Veerman 	vsnprintf(buf, sizeof(buf), fmt, ap);
469d433a562SThomas Veerman 	va_end(ap);
470d433a562SThomas Veerman 
471d433a562SThomas Veerman 	if (*offset + strlen(buf) > MAXLINELEN - 3) {
472*0a6a1f1dSLionel Sambuc 		fprintf(fp, " \\\n%*s", INDENTNAMELEN + indent, "");
473a8ef0910SBen Gras 		*offset = INDENTNAMELEN + indent;
474d433a562SThomas Veerman 	}
475*0a6a1f1dSLionel Sambuc 	*offset += fprintf(fp, " %s", buf) + 1;
476d433a562SThomas Veerman }
477