2 * Copyright (c) 1989, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the University nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 static char sccsid
[] = "@(#)create.c 8.1 (Berkeley) 6/6/93";
35 #include <sys/cdefs.h>
36 __FBSDID("$FreeBSD: src/usr.sbin/mtree/create.c,v 1.37 2005/03/29 11:44:17 tobez Exp $");
38 #include <sys/param.h>
59 #endif /* !__APPLE__ */
71 #include "commoncrypto.h"
72 #endif /* __APPLE__ */
74 #define INDENTNAMELEN 15
80 static u_long flags
= 0xffffffff;
81 static char *xattrs
= kNone
;
82 static char *acl
= kNone
;
83 static u_quad_t xdstream_id
;
85 static int dsort(const FTSENT
**, const FTSENT
**);
86 static void output(int, int *, const char *, ...) __printflike(3, 4);
87 static int statd(FTS
*, FTSENT
*, uid_t
*, gid_t
*, mode_t
*, u_long
*, char **, char **, u_quad_t
*);
88 static void statf(int, FTSENT
*);
97 char *argv
[2], host
[MAXHOSTNAMELEN
];
104 (void)gethostname(host
, sizeof(host
));
106 "#\t user: %s\n#\tmachine: %s\n",
109 "#\t tree: %s\n#\t date: %s",
110 fullpath
, ctime(&cl
));
115 if ((t
= fts_open(argv
, ftsoptions
, dsort
)) == NULL
) {
117 RECORD_FAILURE(76, error
);
118 errc(1, error
, "fts_open()");
120 while ((p
= fts_read(t
))) {
122 indent
= p
->fts_level
* 4;
123 if (check_excludes(p
->fts_name
, p
->fts_path
)) {
124 fts_set(t
, p
, FTS_SKIP
);
127 switch(p
->fts_info
) {
132 path
= escape_path(p
->fts_path
);
133 (void)printf("# %s\n", path
);
136 statd(t
, p
, &uid
, &gid
, &mode
, &flags
, &xattrs
, &acl
, &xdstream_id
);
140 if (!nflag
&& (p
->fts_level
> 0)) {
141 path
= escape_path(p
->fts_path
);
142 (void)printf("%*s# %s\n", indent
, "", path
);
145 (void)printf("%*s..\n", indent
, "");
152 warnx("%s: %s", p
->fts_path
, strerror(p
->fts_errno
));
162 if (sflag
&& keys
& F_CKSUM
) {
163 RECORD_FAILURE(77, WARN_CHECKSUM
);
164 warnx("%s checksum: %lu", fullpath
, (unsigned long)crc_total
);
169 statf(int indent
, FTSENT
*p
)
180 escaped_name
= calloc(1, p
->fts_namelen
* 4 + 1);
181 if (escaped_name
== NULL
) {
182 RECORD_FAILURE(78, ENOMEM
);
183 errx(1, "statf(): calloc() failed");
185 strvis(escaped_name
, p
->fts_name
, VIS_WHITE
| VIS_OCTAL
| VIS_GLOB
);
187 if (iflag
|| S_ISDIR(p
->fts_statp
->st_mode
))
188 offset
= printf("%*s%s", indent
, "", escaped_name
);
190 offset
= printf("%*s %s", indent
, "", escaped_name
);
194 if (offset
> (INDENTNAMELEN
+ indent
))
197 offset
+= printf("%*s", (INDENTNAMELEN
+ indent
) - offset
, "");
199 if (!S_ISREG(p
->fts_statp
->st_mode
) && !dflag
)
200 output(indent
, &offset
, "type=%s", inotype(p
->fts_statp
->st_mode
));
201 if (p
->fts_statp
->st_uid
!= uid
) {
202 if (keys
& F_UNAME
) {
203 pw
= getpwuid(p
->fts_statp
->st_uid
);
205 output(indent
, &offset
, "uname=%s", pw
->pw_name
);
207 RECORD_FAILURE(27448, WARN_UNAME
);
208 warnx("Could not get uname for uid=%u",
209 p
->fts_statp
->st_uid
);
211 RECORD_FAILURE(79, EINVAL
);
213 "Could not get uname for uid=%u",
214 p
->fts_statp
->st_uid
);
218 output(indent
, &offset
, "uid=%u", p
->fts_statp
->st_uid
);
220 if (p
->fts_statp
->st_gid
!= gid
) {
221 if (keys
& F_GNAME
) {
222 gr
= getgrgid(p
->fts_statp
->st_gid
);
224 output(indent
, &offset
, "gname=%s", gr
->gr_name
);
226 RECORD_FAILURE(27449, WARN_UNAME
);
227 warnx("Could not get gname for gid=%u",
228 p
->fts_statp
->st_gid
);
230 RECORD_FAILURE(80, EINVAL
);
232 "Could not get gname for gid=%u",
233 p
->fts_statp
->st_gid
);
237 output(indent
, &offset
, "gid=%u", p
->fts_statp
->st_gid
);
239 if (keys
& F_MODE
&& (p
->fts_statp
->st_mode
& MBITS
) != mode
)
240 output(indent
, &offset
, "mode=%#o", p
->fts_statp
->st_mode
& MBITS
);
241 if (keys
& F_NLINK
&& p
->fts_statp
->st_nlink
!= 1)
242 output(indent
, &offset
, "nlink=%u", p
->fts_statp
->st_nlink
);
244 output(indent
, &offset
, "size=%jd",
245 (intmax_t)p
->fts_statp
->st_size
);
247 if (tflag
&& !insert_mod
) {
248 output(indent
, &offset
, "time=%ld.%09ld",
249 (long)ts
.tv_sec
, ts
.tv_nsec
);
253 output(indent
, &offset
, "time=%ld.%09ld",
254 (long)p
->fts_statp
->st_mtimespec
.tv_sec
,
255 p
->fts_statp
->st_mtimespec
.tv_nsec
);
258 if (keys
& F_CKSUM
&& S_ISREG(p
->fts_statp
->st_mode
)) {
259 if ((fd
= open(p
->fts_accpath
, O_RDONLY
, 0)) < 0 ||
260 crc(fd
, &val
, &len
)) {
262 RECORD_FAILURE(27450, error
);
263 errc(1, error
, "%s", p
->fts_accpath
);
266 output(indent
, &offset
, "cksum=%lu", (unsigned long)val
);
269 if (keys
& F_MD5
&& S_ISREG(p
->fts_statp
->st_mode
)) {
270 char *digest
, buf
[33];
272 /* clang doesn't like MD5 due to security concerns, but it's used for file data/metadata integrity.. */
273 #pragma clang diagnostic push
274 #pragma clang diagnostic ignored "-Wdeprecated-declarations"
275 digest
= MD5File(p
->fts_accpath
, buf
);
276 #pragma clang diagnostic pop
280 RECORD_FAILURE(81, error
);
281 errc(1, error
, "%s", p
->fts_accpath
);
283 output(indent
, &offset
, "md5digest=%s", digest
);
285 #endif /* ENABLE_MD5 */
287 if (keys
& F_SHA1
&& S_ISREG(p
->fts_statp
->st_mode
)) {
288 char *digest
, buf
[41];
290 /* clang doesn't like SHA1 due to security concerns, but it's used for file data/metadata integrity.. */
291 #pragma clang diagnostic push
292 #pragma clang diagnostic ignored "-Wdeprecated-declarations"
293 digest
= SHA1_File(p
->fts_accpath
, buf
);
294 #pragma clang diagnostic pop
298 RECORD_FAILURE(82, error
);
299 errc(1, error
, "%s", p
->fts_accpath
);
301 output(indent
, &offset
, "sha1digest=%s", digest
);
303 #endif /* ENABLE_SHA1 */
305 if (keys
& F_RMD160
&& S_ISREG(p
->fts_statp
->st_mode
)) {
306 char *digest
, buf
[41];
308 /* clang doesn't like RIPEMD160 due to security concerns, but it's used for file data/metadata integrity.. */
309 #pragma clang diagnostic push
310 #pragma clang diagnostic ignored "-Wdeprecated-declarations"
311 digest
= RIPEMD160_File(p
->fts_accpath
, buf
);
312 #pragma clang diagnostic pop
316 RECORD_FAILURE(83, error
);
317 errc(1, error
, "%s", p
->fts_accpath
);
319 output(indent
, &offset
, "ripemd160digest=%s", digest
);
321 #endif /* ENABLE_RMD160 */
323 if (keys
& F_SHA256
&& S_ISREG(p
->fts_statp
->st_mode
)) {
324 char *digest
, buf
[kSHA256NullTerminatedBuffLen
];
326 digest
= SHA256_File(p
->fts_accpath
, buf
);
329 RECORD_FAILURE(84, error
);
330 errc(1, error
, "%s", p
->fts_accpath
);
332 output(indent
, &offset
, "sha256digest=%s", digest
);
334 #endif /* ENABLE_SHA256 */
335 if (keys
& F_SLINK
&&
336 (p
->fts_info
== FTS_SL
|| p
->fts_info
== FTS_SLNONE
)) {
337 char visbuf
[MAXPATHLEN
* 4];
338 char *s
= rlink(p
->fts_accpath
);
339 strvis(visbuf
, s
, VIS_WHITE
| VIS_OCTAL
);
340 output(indent
, &offset
, "link=%s", visbuf
);
342 if (keys
& F_FLAGS
&& p
->fts_statp
->st_flags
!= flags
) {
343 fflags
= flags_to_string(p
->fts_statp
->st_flags
);
344 output(indent
, &offset
, "flags=%s", fflags
);
347 if (keys
& F_BTIME
) {
348 if (tflag
&& !insert_birth
) {
349 output(indent
, &offset
, "btime=%ld.%09ld",
350 ts
.tv_sec
, ts
.tv_nsec
);
354 output(indent
, &offset
, "btime=%ld.%09ld",
355 p
->fts_statp
->st_birthtimespec
.tv_sec
,
356 p
->fts_statp
->st_birthtimespec
.tv_nsec
);
359 // only check access time on regular files, as traversing a folder will update its access time
360 if (keys
& F_ATIME
&& S_ISREG(p
->fts_statp
->st_mode
)) {
361 if (tflag
&& !insert_access
) {
362 output(indent
, &offset
, "atime=%ld.%09ld",
363 ts
.tv_sec
, ts
.tv_nsec
);
367 output(indent
, &offset
, "atime=%ld.%09ld",
368 p
->fts_statp
->st_atimespec
.tv_sec
,
369 p
->fts_statp
->st_atimespec
.tv_nsec
);
372 if (keys
& F_CTIME
) {
373 if (tflag
&& !insert_change
) {
374 output(indent
, &offset
, "ctime=%ld.%09ld",
375 ts
.tv_sec
, ts
.tv_nsec
);
379 output(indent
, &offset
, "ctime=%ld.%09ld",
380 p
->fts_statp
->st_ctimespec
.tv_sec
,
381 p
->fts_statp
->st_ctimespec
.tv_nsec
);
384 // date added to parent folder is only supported for files and directories
385 if (keys
& F_PTIME
&& (S_ISREG(p
->fts_statp
->st_mode
) ||
386 S_ISDIR(p
->fts_statp
->st_mode
))) {
388 struct timespec ptimespec
= ptime(p
->fts_accpath
, &supported
);
389 if (tflag
&& !insert_parent
) {
390 output(indent
, &offset
, "ptime=%ld.%09ld",
391 ts
.tv_sec
, ts
.tv_nsec
);
394 if (!tflag
&& supported
) {
395 output(indent
, &offset
, "ptime=%ld.%09ld",
400 if (keys
& F_XATTRS
) {
401 char buf
[kSHA256NullTerminatedBuffLen
];
404 ai
= SHA256_Path_XATTRs(p
->fts_accpath
, buf
);
405 if (ai
&& ai
->digest
) {
406 if ((strcmp(ai
->digest
, xattrs
) != 0) || (ai
->xdstream_priv_id
!= xdstream_id
)) {
407 output(indent
, &offset
, "xattrsdigest=%s.%llu", ai
->digest
, ai
->xdstream_priv_id
);
413 if (keys
& F_INODE
) {
414 output(indent
, &offset
, "inode=%llu", p
->fts_statp
->st_ino
);
417 char *digest
, buf
[kSHA256NullTerminatedBuffLen
];
419 digest
= SHA256_Path_ACL(p
->fts_accpath
, buf
);
420 if (digest
&& (strcmp(digest
, acl
) != 0)) {
421 output(indent
, &offset
, "acldigest=%s", digest
);
424 if (keys
& F_SIBLINGID
) {
425 uint64_t sibling_id
= get_sibling_id(p
->fts_accpath
);
426 sibling_id
= (sibling_id
!= p
->fts_statp
->st_ino
) ? sibling_id
: 0;
427 output(indent
, &offset
, "siblingid=%llu", sibling_id
);
435 #define MAXMODE MBITS + 1
440 statd(FTS
*t
, FTSENT
*parent
, uid_t
*puid
, gid_t
*pgid
, mode_t
*pmode
, u_long
*pflags
, char **pxattrs
, char **pacl
, u_quad_t
*xdstream_id
)
450 gid_t savegid
= *pgid
;
451 uid_t saveuid
= *puid
;
452 mode_t savemode
= *pmode
;
453 u_long saveflags
= *pflags
;
454 char *savexattrs
= *pxattrs
;
455 char *saveacl
= *pacl
;
456 u_quad_t savexdstream_id
= *xdstream_id
;
457 u_short maxgid
, maxuid
, maxmode
, maxflags
;
458 u_short g
[MAXGID
], u
[MAXUID
], m
[MAXMODE
], f
[MAXFLAGS
];
460 static int first
= 1;
462 if ((p
= fts_children(t
, 0)) == NULL
) {
465 RECORD_FAILURE(85, error
);
466 errc(1, error
, "%s", RP(parent
));
476 maxuid
= maxgid
= maxmode
= maxflags
= 0;
477 for (; p
; p
= p
->fts_link
) {
478 if (!dflag
|| (dflag
&& S_ISDIR(p
->fts_statp
->st_mode
))) {
479 smode
= p
->fts_statp
->st_mode
& MBITS
;
480 if (smode
< MAXMODE
&& ++m
[smode
] > maxmode
) {
484 sgid
= p
->fts_statp
->st_gid
;
485 if (sgid
< MAXGID
&& ++g
[sgid
] > maxgid
) {
489 suid
= p
->fts_statp
->st_uid
;
490 if (suid
< MAXUID
&& ++u
[suid
] > maxuid
) {
497 * note that we don't count the most common xattr/acl digest
498 * so set will always the default value (none)
503 * note that the below will break when file flags
504 * are extended beyond the first 4 bytes of each
505 * half word of the flags
507 #define FLAGS2IDX(f) ((f & 0xf) | ((f >> 12) & 0xf0))
508 sflags
= p
->fts_statp
->st_flags
;
509 if (FLAGS2IDX(sflags
) < MAXFLAGS
&&
510 ++f
[FLAGS2IDX(sflags
)] > maxflags
) {
512 maxflags
= f
[FLAGS2IDX(sflags
)];
517 * If the /set record is the same as the last one we do not need to output
518 * a new one. So first we check to see if anything changed. Note that we
519 * always output a /set record for the first directory.
521 if ((((keys
& F_UNAME
) | (keys
& F_UID
)) && (*puid
!= saveuid
)) ||
522 (((keys
& F_GNAME
) | (keys
& F_GID
)) && (*pgid
!= savegid
)) ||
523 ((keys
& F_MODE
) && (*pmode
!= savemode
)) ||
524 ((keys
& F_FLAGS
) && (*pflags
!= saveflags
)) ||
528 (void)printf("/set type=dir");
530 (void)printf("/set type=file");
531 if (keys
& F_UNAME
) {
532 pw
= getpwuid(saveuid
);
534 (void)printf(" uname=%s", pw
->pw_name
);
536 RECORD_FAILURE(27451, WARN_UNAME
);
537 warnx( "Could not get uname for uid=%u", saveuid
);
539 RECORD_FAILURE(86, EINVAL
);
540 errx(1, "Could not get uname for uid=%u", saveuid
);
544 (void)printf(" uid=%lu", (u_long
)saveuid
);
545 if (keys
& F_GNAME
) {
546 gr
= getgrgid(savegid
);
548 (void)printf(" gname=%s", gr
->gr_name
);
550 RECORD_FAILURE(27452, WARN_UNAME
);
551 warnx("Could not get gname for gid=%u", savegid
);
553 RECORD_FAILURE(87, EINVAL
);
554 errx(1, "Could not get gname for gid=%u", savegid
);
558 (void)printf(" gid=%lu", (u_long
)savegid
);
560 (void)printf(" mode=%#o", savemode
);
562 (void)printf(" nlink=1");
563 if (keys
& F_FLAGS
) {
564 fflags
= flags_to_string(saveflags
);
565 (void)printf(" flags=%s", fflags
);
569 (void)printf(" xattrsdigest=%s.%llu", savexattrs
, savexdstream_id
);
571 (void)printf(" acldigest=%s", saveacl
);
577 *pxattrs
= savexattrs
;
579 *xdstream_id
= savexdstream_id
;
585 dsort(const FTSENT
**a
, const FTSENT
**b
)
587 if (S_ISDIR((*a
)->fts_statp
->st_mode
)) {
588 if (!S_ISDIR((*b
)->fts_statp
->st_mode
))
590 } else if (S_ISDIR((*b
)->fts_statp
->st_mode
))
592 return (strcmp((*a
)->fts_name
, (*b
)->fts_name
));
598 output(int indent
, int *offset
, const char *fmt
, ...)
603 (void)vsnprintf(buf
, sizeof(buf
), fmt
, ap
);
606 if (*offset
+ strlen(buf
) > MAXLINELEN
- 3) {
607 (void)printf(" \\\n%*s", INDENTNAMELEN
+ indent
, "");
608 *offset
= INDENTNAMELEN
+ indent
;
610 *offset
+= printf(" %s", buf
) + 1;