2 * Copyright (c) 1990, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the University nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 static char sccsid
[] = "@(#)verify.c 8.1 (Berkeley) 6/6/93";
35 #include <sys/cdefs.h>
36 __FBSDID("$FreeBSD: src/usr.sbin/mtree/verify.c,v 1.24 2005/08/11 15:43:55 brian Exp $");
38 #include <sys/param.h>
48 #include <removefile.h>
54 static char path
[MAXPATHLEN
];
56 static int miss(NODE
*, char *, size_t path_length
);
57 static int vwalk(void);
60 mtree_verifyspec(FILE *fi
)
63 size_t path_length
= 0;
65 root
= mtree_readspec(fi
);
67 mval
= miss(root
, path
, path_length
);
70 RECORD_FAILURE(60, WARN_MISMATCH
);
73 RECORD_FAILURE(61, WARN_MISMATCH
);
91 if ((t
= fts_open(argv
, ftsoptions
, NULL
)) == NULL
) {
93 RECORD_FAILURE(62, error
);
94 errc(1, error
, "line %d: fts_open", lineno
);
98 while ((p
= fts_read(t
))) {
99 if (check_excludes(p
->fts_name
, p
->fts_path
)) {
100 fts_set(t
, p
, FTS_SKIP
);
103 switch(p
->fts_info
) {
109 RECORD_FAILURE(63, EINVAL
);
110 errx(1 , "invalid root in vwalk");
112 if (specdepth
> p
->fts_level
) {
113 for (level
= level
->parent
; level
->prev
;
114 level
= level
->prev
);
121 warnx("%s: %s", RP(p
), strerror(p
->fts_errno
));
128 if (specdepth
!= p
->fts_level
)
130 for (ep
= level
; ep
; ep
= ep
->next
)
131 if ((ep
->flags
& F_MAGIC
&&
132 !fnmatch(ep
->name
, p
->fts_name
, FNM_PATHNAME
)) ||
133 !strcmp(ep
->name
, p
->fts_name
)) {
134 ep
->flags
|= F_VISIT
;
135 if ((ep
->flags
& F_NOCHANGE
) == 0 &&
136 compare(ep
->name
, ep
, p
)) {
137 RECORD_FAILURE(64, WARN_MISMATCH
);
140 if (ep
->flags
& F_IGN
)
141 (void)fts_set(t
, p
, FTS_SKIP
);
142 else if (ep
->child
&& ep
->type
== F_DIR
&&
143 p
->fts_info
== FTS_D
) {
154 (void)printf("%s extra", RP(p
));
157 /* rflag implies: delete stuff if "extra" is observed" */
159 /* -mflag is used for sealing & verification -- use removefile for recursive behavior */
160 removefile_state_t rmstate
;
161 rmstate
= removefile_state_alloc();
162 if (removefile(p
->fts_accpath
, rmstate
, (REMOVEFILE_RECURSIVE
))) {
164 RECORD_FAILURE(65, error
);
165 errx (1, "\n error deleting item (or descendant) at path %s (%s)", RP(p
), strerror(error
));
168 /* removefile success */
169 (void) printf(", removed");
171 removefile_state_free(rmstate
);
175 /* legacy: use rmdir/unlink if "-m" not specified */
178 if (S_ISDIR(p
->fts_statp
->st_mode
)){
179 syserr
= rmdir(p
->fts_accpath
);
182 syserr
= unlink(p
->fts_accpath
);
188 RECORD_FAILURE(66, error
);
189 (void) printf(", not removed :%s", strerror(error
));
193 RECORD_FAILURE(68956, WARN_MISMATCH
);
194 errx(1, "cannot generate the XML dictionary");
198 (void)fts_set(t
, p
, FTS_SKIP
);
202 RECORD_FAILURE(67, WARN_CHECKSUM
);
203 warnx("%s checksum: %lu", fullpath
, (unsigned long)crc_total
);
209 miss(NODE
*p
, char *tail
, size_t path_length
)
213 const char *type
, *what
;
217 size_t file_name_length
= 0;
219 for (; p
; p
= p
->next
) {
220 if (p
->type
!= F_DIR
&& (dflag
|| p
->flags
& F_VISIT
))
222 file_name_length
= strnlen(p
->name
, MAXPATHLEN
);
223 path_length
+= file_name_length
;
224 if (path_length
>= MAXPATHLEN
) {
225 RECORD_FAILURE(61971, ENAMETOOLONG
);
228 (void)strcpy(tail
, p
->name
);
229 if (!(p
->flags
& F_VISIT
)) {
230 /* Don't print missing message if file exists as a
231 symbolic link and the -q flag is set. */
234 if (qflag
&& stat(path
, &statbuf
) == 0) {
237 (void)printf("%s missing", path
);
238 RECORD_FAILURE(68, WARN_MISMATCH
);
242 if (p
->type
!= F_DIR
&& p
->type
!= F_LINK
) {
248 if (p
->type
== F_LINK
)
252 if (!(p
->flags
& F_VISIT
) && uflag
) {
253 if (!(p
->flags
& (F_UID
| F_UNAME
))) {
254 (void)printf(" (%s not created: user not specified)", type
);
255 } else if (!(p
->flags
& (F_GID
| F_GNAME
))) {
256 (void)printf(" (%s not created: group not specified)", type
);
257 } else if (p
->type
== F_LINK
) {
258 if (symlink(p
->slink
, path
)) {
260 RECORD_FAILURE(69, serr
);
261 (void)printf(" (symlink not created: %s)\n",
264 (void)printf(" (created)\n");
266 if (lchown(path
, p
->st_uid
, p
->st_gid
) == -1) {
268 if (p
->st_uid
== (uid_t
)-1)
270 else if (lchown(path
, (uid_t
)-1,
272 what
= "user & group";
278 RECORD_FAILURE(70, serr
);
279 (void)printf("%s: %s not modified: %s"
280 "\n", path
, what
, strerror(serr
));
283 } else if (!(p
->flags
& F_MODE
)) {
284 (void)printf(" (directory not created: mode not specified)");
285 } else if (mkdir(path
, S_IRWXU
)) {
287 RECORD_FAILURE(71, serr
);
288 (void)printf(" (directory not created: %s)",
292 (void)printf(" (created)");
295 if (!(p
->flags
& F_VISIT
))
298 for (tp
= tail
; *tp
; ++tp
);
301 rrval
= miss(p
->child
, tp
+ 1, path_length
);
303 RECORD_FAILURE(72, WARN_MISMATCH
);
306 path_length
-= (file_name_length
+ 1);
311 if (chown(path
, p
->st_uid
, p
->st_gid
) == -1) {
313 if (p
->st_uid
== (uid_t
)-1)
315 else if (chown(path
, (uid_t
)-1, p
->st_gid
) == -1)
316 what
= "user & group";
322 RECORD_FAILURE(73, serr
);
323 (void)printf("%s: %s not modified: %s\n",
324 path
, what
, strerror(serr
));
326 if (chmod(path
, p
->st_mode
)) {
328 RECORD_FAILURE(74, serr
);
329 (void)printf("%s: permissions not set: %s\n",
330 path
, strerror(serr
));
332 if ((p
->flags
& F_FLAGS
) && p
->st_flags
&&
333 chflags(path
, (u_int
)p
->st_flags
)) {
335 RECORD_FAILURE(75, serr
);
336 (void)printf("%s: file flags not set: %s\n",
337 path
, strerror(serr
));