1 /* $NetBSD: create.c,v 1.65 2012/10/05 01:21:44 christos Exp $ */ 2 3 /*- 4 * Copyright (c) 1989, 1993 5 * The Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. Neither the name of the University nor the names of its contributors 16 * may be used to endorse or promote products derived from this software 17 * without specific prior written permission. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 */ 31 32 #if HAVE_NBTOOL_CONFIG_H 33 #include "nbtool_config.h" 34 #endif 35 36 #include <sys/cdefs.h> 37 #if defined(__RCSID) && !defined(lint) 38 #if 0 39 static char sccsid[] = "@(#)create.c 8.1 (Berkeley) 6/6/93"; 40 #else 41 __RCSID("$NetBSD: create.c,v 1.65 2012/10/05 01:21:44 christos Exp $"); 42 #endif 43 #endif /* not lint */ 44 45 #include <sys/param.h> 46 #include <sys/stat.h> 47 48 #if ! HAVE_NBTOOL_CONFIG_H 49 #include <dirent.h> 50 #endif 51 52 #include <errno.h> 53 #include <fcntl.h> 54 #include <grp.h> 55 #include <pwd.h> 56 #include <stdio.h> 57 #include <stdarg.h> 58 #include <stdlib.h> 59 #include <string.h> 60 #include <time.h> 61 #include <unistd.h> 62 63 #ifndef NO_MD5 64 #include <md5.h> 65 #endif 66 #ifndef NO_RMD160 67 #include <rmd160.h> 68 #endif 69 #ifndef NO_SHA1 70 #include <sha1.h> 71 #endif 72 #ifndef NO_SHA2 73 #include <sha2.h> 74 #endif 75 76 #include "extern.h" 77 78 #define INDENTNAMELEN 15 79 #define MAXLINELEN 80 80 81 static gid_t gid; 82 static uid_t uid; 83 static mode_t mode; 84 static u_long flags; 85 86 #ifdef __FreeBSD__ 87 #define FTS_CONST const 88 #else 89 #define FTS_CONST 90 #endif 91 92 static int dcmp(const FTSENT *FTS_CONST *, const FTSENT *FTS_CONST *); 93 static void output(int, int *, const char *, ...) 94 __attribute__((__format__(__printf__, 3, 4))); 95 static int statd(FTS *, FTSENT *, uid_t *, gid_t *, mode_t *, u_long *); 96 static void statf(int, FTSENT *); 97 98 void 99 cwalk(void) 100 { 101 FTS *t; 102 FTSENT *p; 103 time_t clocktime; 104 char host[MAXHOSTNAMELEN + 1]; 105 const char *user; 106 char *argv[2]; 107 char dot[] = "."; 108 int indent = 0; 109 110 argv[0] = dot; 111 argv[1] = NULL; 112 113 time(&clocktime); 114 gethostname(host, sizeof(host)); 115 host[sizeof(host) - 1] = '\0'; 116 if ((user = getlogin()) == NULL) { 117 struct passwd *pw; 118 user = (pw = getpwuid(getuid())) == NULL ? pw->pw_name : 119 "<unknown>"; 120 } 121 122 if (!nflag) 123 printf( 124 "#\t user: %s\n#\tmachine: %s\n#\t tree: %s\n" 125 "#\t date: %s", 126 user, host, fullpath, ctime(&clocktime)); 127 128 if ((t = fts_open(argv, ftsoptions, dcmp)) == NULL) 129 mtree_err("fts_open: %s", strerror(errno)); 130 while ((p = fts_read(t)) != NULL) { 131 if (jflag) 132 indent = p->fts_level * 4; 133 if (check_excludes(p->fts_name, p->fts_path)) { 134 fts_set(t, p, FTS_SKIP); 135 continue; 136 } 137 switch(p->fts_info) { 138 case FTS_D: 139 if (!nflag) 140 printf("\n# %s\n", p->fts_path); 141 statd(t, p, &uid, &gid, &mode, &flags); 142 statf(indent, p); 143 break; 144 case FTS_DP: 145 if (!nflag && p->fts_level > 0) 146 printf("%*s# %s\n%*s..\n\n", indent, "", 147 p->fts_path, indent, ""); 148 break; 149 case FTS_DNR: 150 case FTS_ERR: 151 case FTS_NS: 152 mtree_err("%s: %s", 153 p->fts_path, strerror(p->fts_errno)); 154 break; 155 default: 156 if (!dflag) 157 statf(indent, p); 158 break; 159 160 } 161 } 162 fts_close(t); 163 if (sflag && keys & F_CKSUM) 164 mtree_err("%s checksum: %u", fullpath, crc_total); 165 } 166 167 static void 168 statf(int indent, FTSENT *p) 169 { 170 u_int32_t len, val; 171 int fd, offset; 172 const char *name = NULL; 173 #if !defined(NO_MD5) || !defined(NO_RMD160) || !defined(NO_SHA1) || !defined(NO_SHA2) 174 char *digestbuf; 175 #endif 176 177 offset = printf("%*s%s%s", indent, "", 178 S_ISDIR(p->fts_statp->st_mode) ? "" : " ", vispath(p->fts_name)); 179 180 if (offset > (INDENTNAMELEN + indent)) 181 offset = MAXLINELEN; 182 else 183 offset += printf("%*s", (INDENTNAMELEN + indent) - offset, ""); 184 185 if (!S_ISREG(p->fts_statp->st_mode)) 186 output(indent, &offset, "type=%s", 187 inotype(p->fts_statp->st_mode)); 188 if (keys & (F_UID | F_UNAME) && p->fts_statp->st_uid != uid) { 189 if (keys & F_UNAME && 190 (name = user_from_uid(p->fts_statp->st_uid, 1)) != NULL) 191 output(indent, &offset, "uname=%s", name); 192 if (keys & F_UID || (keys & F_UNAME && name == NULL)) 193 output(indent, &offset, "uid=%u", p->fts_statp->st_uid); 194 } 195 if (keys & (F_GID | F_GNAME) && p->fts_statp->st_gid != gid) { 196 if (keys & F_GNAME && 197 (name = group_from_gid(p->fts_statp->st_gid, 1)) != NULL) 198 output(indent, &offset, "gname=%s", name); 199 if (keys & F_GID || (keys & F_GNAME && name == NULL)) 200 output(indent, &offset, "gid=%u", p->fts_statp->st_gid); 201 } 202 if (keys & F_MODE && (p->fts_statp->st_mode & MBITS) != mode) 203 output(indent, &offset, "mode=%#o", 204 p->fts_statp->st_mode & MBITS); 205 if (keys & F_DEV && 206 (S_ISBLK(p->fts_statp->st_mode) || S_ISCHR(p->fts_statp->st_mode))) 207 output(indent, &offset, "device=%#llx", 208 (long long)p->fts_statp->st_rdev); 209 if (keys & F_NLINK && p->fts_statp->st_nlink != 1) 210 output(indent, &offset, "nlink=%u", p->fts_statp->st_nlink); 211 if (keys & F_SIZE && S_ISREG(p->fts_statp->st_mode)) 212 output(indent, &offset, "size=%lld", 213 (long long)p->fts_statp->st_size); 214 if (keys & F_TIME) 215 #if defined(BSD4_4) && !defined(HAVE_NBTOOL_CONFIG_H) 216 output(indent, &offset, "time=%ld.%09ld", 217 (long)p->fts_statp->st_mtimespec.tv_sec, 218 p->fts_statp->st_mtimespec.tv_nsec); 219 #else 220 output(indent, &offset, "time=%ld.%09ld", 221 (long)p->fts_statp->st_mtime, (long)0); 222 #endif 223 if (keys & F_CKSUM && S_ISREG(p->fts_statp->st_mode)) { 224 if ((fd = open(p->fts_accpath, O_RDONLY, 0)) < 0 || 225 crc(fd, &val, &len)) 226 mtree_err("%s: %s", p->fts_accpath, strerror(errno)); 227 close(fd); 228 output(indent, &offset, "cksum=%lu", (long)val); 229 } 230 #ifndef NO_MD5 231 if (keys & F_MD5 && S_ISREG(p->fts_statp->st_mode)) { 232 if ((digestbuf = MD5File(p->fts_accpath, NULL)) == NULL) 233 mtree_err("%s: MD5File failed: %s", p->fts_accpath, 234 strerror(errno)); 235 output(indent, &offset, "%s=%s", MD5KEY, digestbuf); 236 free(digestbuf); 237 } 238 #endif /* ! NO_MD5 */ 239 #ifndef NO_RMD160 240 if (keys & F_RMD160 && S_ISREG(p->fts_statp->st_mode)) { 241 if ((digestbuf = RMD160File(p->fts_accpath, NULL)) == NULL) 242 mtree_err("%s: RMD160File failed: %s", p->fts_accpath, 243 strerror(errno)); 244 output(indent, &offset, "%s=%s", RMD160KEY, digestbuf); 245 free(digestbuf); 246 } 247 #endif /* ! NO_RMD160 */ 248 #ifndef NO_SHA1 249 if (keys & F_SHA1 && S_ISREG(p->fts_statp->st_mode)) { 250 if ((digestbuf = SHA1File(p->fts_accpath, NULL)) == NULL) 251 mtree_err("%s: SHA1File failed: %s", p->fts_accpath, 252 strerror(errno)); 253 output(indent, &offset, "%s=%s", SHA1KEY, digestbuf); 254 free(digestbuf); 255 } 256 #endif /* ! NO_SHA1 */ 257 #ifndef NO_SHA2 258 if (keys & F_SHA256 && S_ISREG(p->fts_statp->st_mode)) { 259 if ((digestbuf = SHA256_File(p->fts_accpath, NULL)) == NULL) 260 mtree_err("%s: SHA256_File failed: %s", p->fts_accpath, 261 strerror(errno)); 262 output(indent, &offset, "%s=%s", SHA256KEY, digestbuf); 263 free(digestbuf); 264 } 265 #ifdef SHA384_BLOCK_LENGTH 266 if (keys & F_SHA384 && S_ISREG(p->fts_statp->st_mode)) { 267 if ((digestbuf = SHA384_File(p->fts_accpath, NULL)) == NULL) 268 mtree_err("%s: SHA384_File failed: %s", p->fts_accpath, 269 strerror(errno)); 270 output(indent, &offset, "%s=%s", SHA384KEY, digestbuf); 271 free(digestbuf); 272 } 273 #endif 274 if (keys & F_SHA512 && S_ISREG(p->fts_statp->st_mode)) { 275 if ((digestbuf = SHA512_File(p->fts_accpath, NULL)) == NULL) 276 mtree_err("%s: SHA512_File failed: %s", p->fts_accpath, 277 strerror(errno)); 278 output(indent, &offset, "%s=%s", SHA512KEY, digestbuf); 279 free(digestbuf); 280 } 281 #endif /* ! NO_SHA2 */ 282 if (keys & F_SLINK && 283 (p->fts_info == FTS_SL || p->fts_info == FTS_SLNONE)) 284 output(indent, &offset, "link=%s", 285 vispath(rlink(p->fts_accpath))); 286 #if HAVE_STRUCT_STAT_ST_FLAGS 287 if (keys & F_FLAGS && p->fts_statp->st_flags != flags) { 288 char *str = flags_to_string(p->fts_statp->st_flags, "none"); 289 output(indent, &offset, "flags=%s", str); 290 free(str); 291 } 292 #endif 293 putchar('\n'); 294 } 295 296 /* XXX 297 * FLAGS2INDEX will fail once the user and system settable bits need more 298 * than one byte, respectively. 299 */ 300 #define FLAGS2INDEX(x) (((x >> 8) & 0x0000ff00) | (x & 0x000000ff)) 301 302 #define MTREE_MAXGID 5000 303 #define MTREE_MAXUID 5000 304 #define MTREE_MAXMODE (MBITS + 1) 305 #if HAVE_STRUCT_STAT_ST_FLAGS 306 #define MTREE_MAXFLAGS (FLAGS2INDEX(CH_MASK) + 1) /* 1808 */ 307 #else 308 #define MTREE_MAXFLAGS 1 309 #endif 310 #define MTREE_MAXS 16 311 312 static int 313 statd(FTS *t, FTSENT *parent, uid_t *puid, gid_t *pgid, mode_t *pmode, 314 u_long *pflags) 315 { 316 FTSENT *p; 317 gid_t sgid; 318 uid_t suid; 319 mode_t smode; 320 #if HAVE_STRUCT_STAT_ST_FLAGS 321 u_long sflags = 0; 322 #endif 323 const char *name = NULL; 324 gid_t savegid; 325 uid_t saveuid; 326 mode_t savemode; 327 u_long saveflags; 328 u_short maxgid, maxuid, maxmode, maxflags; 329 u_short g[MTREE_MAXGID], u[MTREE_MAXUID], 330 m[MTREE_MAXMODE], f[MTREE_MAXFLAGS]; 331 static int first = 1; 332 333 savegid = *pgid; 334 saveuid = *puid; 335 savemode = *pmode; 336 saveflags = *pflags; 337 if ((p = fts_children(t, 0)) == NULL) { 338 if (errno) 339 mtree_err("%s: %s", RP(parent), strerror(errno)); 340 return (1); 341 } 342 343 memset(g, 0, sizeof(g)); 344 memset(u, 0, sizeof(u)); 345 memset(m, 0, sizeof(m)); 346 memset(f, 0, sizeof(f)); 347 348 maxuid = maxgid = maxmode = maxflags = 0; 349 for (; p; p = p->fts_link) { 350 smode = p->fts_statp->st_mode & MBITS; 351 if (smode < MTREE_MAXMODE && ++m[smode] > maxmode) { 352 savemode = smode; 353 maxmode = m[smode]; 354 } 355 sgid = p->fts_statp->st_gid; 356 if (sgid < MTREE_MAXGID && ++g[sgid] > maxgid) { 357 savegid = sgid; 358 maxgid = g[sgid]; 359 } 360 suid = p->fts_statp->st_uid; 361 if (suid < MTREE_MAXUID && ++u[suid] > maxuid) { 362 saveuid = suid; 363 maxuid = u[suid]; 364 } 365 366 #if HAVE_STRUCT_STAT_ST_FLAGS 367 sflags = FLAGS2INDEX(p->fts_statp->st_flags); 368 if (sflags < MTREE_MAXFLAGS && ++f[sflags] > maxflags) { 369 saveflags = p->fts_statp->st_flags; 370 maxflags = f[sflags]; 371 } 372 #endif 373 } 374 /* 375 * If the /set record is the same as the last one we do not need to 376 * output a new one. So first we check to see if anything changed. 377 * Note that we always output a /set record for the first directory. 378 */ 379 if (((keys & (F_UNAME | F_UID)) && (*puid != saveuid)) || 380 ((keys & (F_GNAME | F_GID)) && (*pgid != savegid)) || 381 ((keys & F_MODE) && (*pmode != savemode)) || 382 ((keys & F_FLAGS) && (*pflags != saveflags)) || 383 first) { 384 first = 0; 385 printf("/set type=file"); 386 if (keys & (F_UID | F_UNAME)) { 387 if (keys & F_UNAME && 388 (name = user_from_uid(saveuid, 1)) != NULL) 389 printf(" uname=%s", name); 390 if (keys & F_UID || (keys & F_UNAME && name == NULL)) 391 printf(" uid=%lu", (u_long)saveuid); 392 } 393 if (keys & (F_GID | F_GNAME)) { 394 if (keys & F_GNAME && 395 (name = group_from_gid(savegid, 1)) != NULL) 396 printf(" gname=%s", name); 397 if (keys & F_GID || (keys & F_GNAME && name == NULL)) 398 printf(" gid=%lu", (u_long)savegid); 399 } 400 if (keys & F_MODE) 401 printf(" mode=%#lo", (u_long)savemode); 402 if (keys & F_NLINK) 403 printf(" nlink=1"); 404 if (keys & F_FLAGS) { 405 char *str = flags_to_string(saveflags, "none"); 406 printf(" flags=%s", str); 407 free(str); 408 } 409 printf("\n"); 410 *puid = saveuid; 411 *pgid = savegid; 412 *pmode = savemode; 413 *pflags = saveflags; 414 } 415 return (0); 416 } 417 418 /* 419 * dcmp -- 420 * used as a comparison function passed to fts_open() to control 421 * the order in which fts_read() returns results. We make 422 * directories sort after non-directories, but otherwise sort in 423 * strcmp() order. 424 * 425 * Keep this in sync with nodecmp() in spec.c. 426 */ 427 static int 428 dcmp(const FTSENT *FTS_CONST *a, const FTSENT *FTS_CONST *b) 429 { 430 431 if (S_ISDIR((*a)->fts_statp->st_mode)) { 432 if (!S_ISDIR((*b)->fts_statp->st_mode)) 433 return (1); 434 } else if (S_ISDIR((*b)->fts_statp->st_mode)) 435 return (-1); 436 return (strcmp((*a)->fts_name, (*b)->fts_name)); 437 } 438 439 void 440 output(int indent, int *offset, const char *fmt, ...) 441 { 442 va_list ap; 443 char buf[1024]; 444 445 va_start(ap, fmt); 446 vsnprintf(buf, sizeof(buf), fmt, ap); 447 va_end(ap); 448 449 if (*offset + strlen(buf) > MAXLINELEN - 3) { 450 printf(" \\\n%*s", INDENTNAMELEN + indent, ""); 451 *offset = INDENTNAMELEN + indent; 452 } 453 *offset += printf(" %s", buf) + 1; 454 } 455