1/*	$NetBSD: create.c,v 1.73 2014/04/24 17:22:41 christos Exp $	*/
2
3/*-
4 * Copyright (c) 1989, 1993
5 *	The Regents of the University of California.  All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 *    notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in the
14 *    documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 *    may be used to endorse or promote products derived from this software
17 *    without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32#if HAVE_NBTOOL_CONFIG_H
33#include "nbtool_config.h"
34#endif
35
36#include <sys/cdefs.h>
37#if defined(__RCSID) && !defined(lint)
38#if 0
39static char sccsid[] = "@(#)create.c	8.1 (Berkeley) 6/6/93";
40#else
41__RCSID("$NetBSD: create.c,v 1.73 2014/04/24 17:22:41 christos Exp $");
42#endif
43#endif /* not lint */
44
45#include <sys/param.h>
46#include <sys/stat.h>
47
48#if ! HAVE_NBTOOL_CONFIG_H
49#include <dirent.h>
50#endif
51
52#include <errno.h>
53#include <fcntl.h>
54#include <grp.h>
55#include <pwd.h>
56#include <stdio.h>
57#include <stdarg.h>
58#include <stdint.h>
59#include <stdlib.h>
60#include <string.h>
61#include <time.h>
62#include <unistd.h>
63
64#ifndef NO_MD5
65#include <md5.h>
66#endif
67#ifndef NO_RMD160
68#include <rmd160.h>
69#endif
70#ifndef NO_SHA1
71#include <sha1.h>
72#endif
73#ifndef NO_SHA2
74#include <sha2.h>
75#endif
76
77#include "extern.h"
78
79#define	INDENTNAMELEN	15
80#define	MAXLINELEN	80
81
82static gid_t gid;
83static uid_t uid;
84static mode_t mode;
85static u_long flags;
86
87#ifdef __FreeBSD__
88#define	FTS_CONST const
89#else
90#define	FTS_CONST
91#endif
92
93static int	dcmp(const FTSENT *FTS_CONST *, const FTSENT *FTS_CONST *);
94static void	output(FILE *, int, int *, const char *, ...)
95    __printflike(4, 5);
96static int	statd(FILE *, FTS *, FTSENT *, uid_t *, gid_t *, mode_t *,
97    u_long *);
98static void	statf(FILE *, int, FTSENT *);
99
100void
101cwalk(FILE *fp)
102{
103	FTS *t;
104	FTSENT *p;
105	time_t clocktime;
106	char host[MAXHOSTNAMELEN + 1];
107	const char *user;
108	char *argv[2];
109	char  dot[] = ".";
110	int indent = 0;
111
112	argv[0] = dot;
113	argv[1] = NULL;
114
115	time(&clocktime);
116	gethostname(host, sizeof(host));
117	host[sizeof(host) - 1] = '\0';
118	if ((user = getlogin()) == NULL) {
119		struct passwd *pw;
120		user = (pw = getpwuid(getuid())) == NULL ? pw->pw_name :
121		    "<unknown>";
122	}
123
124	if (!nflag)
125		fprintf(fp,
126	    	    "#\t   user: %s\n#\tmachine: %s\n#\t   tree: %s\n"
127		    "#\t   date: %s",
128		    user, host, fullpath, ctime(&clocktime));
129
130	if ((t = fts_open(argv, ftsoptions, dcmp)) == NULL)
131		mtree_err("fts_open: %s", strerror(errno));
132	while ((p = fts_read(t)) != NULL) {
133		if (jflag)
134			indent = p->fts_level * 4;
135		if (check_excludes(p->fts_name, p->fts_path)) {
136			fts_set(t, p, FTS_SKIP);
137			continue;
138		}
139		if (!find_only(p->fts_path)) {
140			fts_set(t, p, FTS_SKIP);
141			continue;
142		}
143		switch(p->fts_info) {
144		case FTS_D:
145			if (!bflag)
146				fprintf(fp, "\n");
147			if (!nflag)
148				fprintf(fp, "# %s\n", p->fts_path);
149			statd(fp, t, p, &uid, &gid, &mode, &flags);
150			statf(fp, indent, p);
151			break;
152		case FTS_DP:
153			if (p->fts_level > 0)
154				if (!nflag)
155					fprintf(fp, "%*s# %s\n", indent, "",
156					    p->fts_path);
157			if (p->fts_level > 0 || flavor == F_FREEBSD9) {
158				fprintf(fp, "%*s..\n", indent, "");
159				if (!bflag)
160					fprintf(fp, "\n");
161			}
162			break;
163		case FTS_DNR:
164		case FTS_ERR:
165		case FTS_NS:
166			mtree_err("%s: %s",
167			    p->fts_path, strerror(p->fts_errno));
168			break;
169		default:
170			if (!dflag)
171				statf(fp, indent, p);
172			break;
173
174		}
175	}
176	fts_close(t);
177	if (sflag && keys & F_CKSUM)
178		mtree_err("%s checksum: %u", fullpath, crc_total);
179}
180
181static void
182statf(FILE *fp, int indent, FTSENT *p)
183{
184	u_int32_t len, val;
185	int fd, offset;
186	const char *name = NULL;
187#if !defined(NO_MD5) || !defined(NO_RMD160) || !defined(NO_SHA1) || !defined(NO_SHA2)
188	char *digestbuf;
189#endif
190
191	offset = fprintf(fp, "%*s%s%s", indent, "",
192	    S_ISDIR(p->fts_statp->st_mode) ? "" : "    ", vispath(p->fts_name));
193
194	if (offset > (INDENTNAMELEN + indent))
195		offset = MAXLINELEN;
196	else
197		offset += fprintf(fp, "%*s",
198		    (INDENTNAMELEN + indent) - offset, "");
199
200	if (!S_ISREG(p->fts_statp->st_mode) && (flavor == F_NETBSD6 || !dflag))
201		output(fp, indent, &offset, "type=%s",
202		    inotype(p->fts_statp->st_mode));
203	if (keys & (F_UID | F_UNAME) && p->fts_statp->st_uid != uid) {
204		if (keys & F_UNAME &&
205		    (name = user_from_uid(p->fts_statp->st_uid, 1)) != NULL)
206			output(fp, indent, &offset, "uname=%s", name);
207		if (keys & F_UID || (keys & F_UNAME && name == NULL))
208			output(fp, indent, &offset, "uid=%u",
209			    p->fts_statp->st_uid);
210	}
211	if (keys & (F_GID | F_GNAME) && p->fts_statp->st_gid != gid) {
212		if (keys & F_GNAME &&
213		    (name = group_from_gid(p->fts_statp->st_gid, 1)) != NULL)
214			output(fp, indent, &offset, "gname=%s", name);
215		if (keys & F_GID || (keys & F_GNAME && name == NULL))
216			output(fp, indent, &offset, "gid=%u",
217			    p->fts_statp->st_gid);
218	}
219	if (keys & F_MODE && (p->fts_statp->st_mode & MBITS) != mode)
220		output(fp, indent, &offset, "mode=%#o",
221		    p->fts_statp->st_mode & MBITS);
222	if (keys & F_DEV &&
223	    (S_ISBLK(p->fts_statp->st_mode) || S_ISCHR(p->fts_statp->st_mode)))
224		output(fp, indent, &offset, "device=%#jx",
225		    (uintmax_t)p->fts_statp->st_rdev);
226	if (keys & F_NLINK && p->fts_statp->st_nlink != 1)
227		output(fp, indent, &offset, "nlink=%u", p->fts_statp->st_nlink);
228	if (keys & F_SIZE &&
229	    (flavor == F_FREEBSD9 || S_ISREG(p->fts_statp->st_mode)))
230		output(fp, indent, &offset, "size=%ju",
231		    (uintmax_t)p->fts_statp->st_size);
232	if (keys & F_TIME)
233#if defined(BSD4_4) && !defined(HAVE_NBTOOL_CONFIG_H)
234		output(fp, indent, &offset, "time=%jd.%09ld",
235		    (intmax_t)p->fts_statp->st_mtimespec.tv_sec,
236		    p->fts_statp->st_mtimespec.tv_nsec);
237#else
238		output(fp, indent, &offset, "time=%jd.%09ld",
239		    (intmax_t)p->fts_statp->st_mtime, (long)0);
240#endif
241	if (keys & F_CKSUM && S_ISREG(p->fts_statp->st_mode)) {
242		if ((fd = open(p->fts_accpath, O_RDONLY, 0)) < 0 ||
243		    crc(fd, &val, &len))
244			mtree_err("%s: %s", p->fts_accpath, strerror(errno));
245		close(fd);
246		output(fp, indent, &offset, "cksum=%lu", (long)val);
247	}
248#ifndef NO_MD5
249	if (keys & F_MD5 && S_ISREG(p->fts_statp->st_mode)) {
250		if ((digestbuf = MD5File(p->fts_accpath, NULL)) == NULL)
251			mtree_err("%s: MD5File failed: %s", p->fts_accpath,
252			    strerror(errno));
253		output(fp, indent, &offset, "%s=%s", MD5KEY, digestbuf);
254		free(digestbuf);
255	}
256#endif	/* ! NO_MD5 */
257#ifndef NO_RMD160
258	if (keys & F_RMD160 && S_ISREG(p->fts_statp->st_mode)) {
259		if ((digestbuf = RMD160File(p->fts_accpath, NULL)) == NULL)
260			mtree_err("%s: RMD160File failed: %s", p->fts_accpath,
261			    strerror(errno));
262		output(fp, indent, &offset, "%s=%s", RMD160KEY, digestbuf);
263		free(digestbuf);
264	}
265#endif	/* ! NO_RMD160 */
266#ifndef NO_SHA1
267	if (keys & F_SHA1 && S_ISREG(p->fts_statp->st_mode)) {
268		if ((digestbuf = SHA1File(p->fts_accpath, NULL)) == NULL)
269			mtree_err("%s: SHA1File failed: %s", p->fts_accpath,
270			    strerror(errno));
271		output(fp, indent, &offset, "%s=%s", SHA1KEY, digestbuf);
272		free(digestbuf);
273	}
274#endif	/* ! NO_SHA1 */
275#ifndef NO_SHA2
276	if (keys & F_SHA256 && S_ISREG(p->fts_statp->st_mode)) {
277		if ((digestbuf = SHA256_File(p->fts_accpath, NULL)) == NULL)
278			mtree_err("%s: SHA256_File failed: %s", p->fts_accpath,
279			    strerror(errno));
280		output(fp, indent, &offset, "%s=%s", SHA256KEY, digestbuf);
281		free(digestbuf);
282	}
283#ifdef SHA384_BLOCK_LENGTH
284	if (keys & F_SHA384 && S_ISREG(p->fts_statp->st_mode)) {
285		if ((digestbuf = SHA384_File(p->fts_accpath, NULL)) == NULL)
286			mtree_err("%s: SHA384_File failed: %s", p->fts_accpath,
287			    strerror(errno));
288		output(fp, indent, &offset, "%s=%s", SHA384KEY, digestbuf);
289		free(digestbuf);
290	}
291#endif
292	if (keys & F_SHA512 && S_ISREG(p->fts_statp->st_mode)) {
293		if ((digestbuf = SHA512_File(p->fts_accpath, NULL)) == NULL)
294			mtree_err("%s: SHA512_File failed: %s", p->fts_accpath,
295			    strerror(errno));
296		output(fp, indent, &offset, "%s=%s", SHA512KEY, digestbuf);
297		free(digestbuf);
298	}
299#endif	/* ! NO_SHA2 */
300	if (keys & F_SLINK &&
301	    (p->fts_info == FTS_SL || p->fts_info == FTS_SLNONE))
302		output(fp, indent, &offset, "link=%s",
303		    vispath(rlink(p->fts_accpath)));
304#if HAVE_STRUCT_STAT_ST_FLAGS
305	if (keys & F_FLAGS && p->fts_statp->st_flags != flags) {
306		char *str = flags_to_string(p->fts_statp->st_flags, "none");
307		output(fp, indent, &offset, "flags=%s", str);
308		free(str);
309	}
310#endif
311	putchar('\n');
312}
313
314/* XXX
315 * FLAGS2INDEX will fail once the user and system settable bits need more
316 * than one byte, respectively.
317 */
318#define FLAGS2INDEX(x)  (((x >> 8) & 0x0000ff00) | (x & 0x000000ff))
319
320#define	MTREE_MAXGID	5000
321#define	MTREE_MAXUID	5000
322#define	MTREE_MAXMODE	(MBITS + 1)
323#if HAVE_STRUCT_STAT_ST_FLAGS
324#define	MTREE_MAXFLAGS  (FLAGS2INDEX(CH_MASK) + 1)   /* 1808 */
325#else
326#define MTREE_MAXFLAGS	1
327#endif
328#define	MTREE_MAXS 16
329
330static int
331statd(FILE *fp, FTS *t, FTSENT *parent, uid_t *puid, gid_t *pgid, mode_t *pmode,
332    u_long *pflags)
333{
334	FTSENT *p;
335	gid_t sgid;
336	uid_t suid;
337	mode_t smode;
338	u_long sflags = 0;
339	const char *name = NULL;
340	gid_t savegid;
341	uid_t saveuid;
342	mode_t savemode;
343	u_long saveflags;
344	u_short maxgid, maxuid, maxmode, maxflags;
345	u_short g[MTREE_MAXGID], u[MTREE_MAXUID],
346		m[MTREE_MAXMODE], f[MTREE_MAXFLAGS];
347	static int first = 1;
348
349	savegid = *pgid;
350	saveuid = *puid;
351	savemode = *pmode;
352	saveflags = *pflags;
353	if ((p = fts_children(t, 0)) == NULL) {
354		if (errno)
355			mtree_err("%s: %s", RP(parent), strerror(errno));
356		return (1);
357	}
358
359	memset(g, 0, sizeof(g));
360	memset(u, 0, sizeof(u));
361	memset(m, 0, sizeof(m));
362	memset(f, 0, sizeof(f));
363
364	maxuid = maxgid = maxmode = maxflags = 0;
365	for (; p; p = p->fts_link) {
366		if (flavor == F_NETBSD6 || !dflag ||
367		    (dflag && S_ISDIR(p->fts_statp->st_mode))) {
368			smode = p->fts_statp->st_mode & MBITS;
369			if (smode < MTREE_MAXMODE && ++m[smode] > maxmode) {
370				savemode = smode;
371				maxmode = m[smode];
372			}
373			sgid = p->fts_statp->st_gid;
374			if (sgid < MTREE_MAXGID && ++g[sgid] > maxgid) {
375				savegid = sgid;
376				maxgid = g[sgid];
377			}
378			suid = p->fts_statp->st_uid;
379			if (suid < MTREE_MAXUID && ++u[suid] > maxuid) {
380				saveuid = suid;
381				maxuid = u[suid];
382			}
383
384#if HAVE_STRUCT_STAT_ST_FLAGS
385			sflags = FLAGS2INDEX(p->fts_statp->st_flags);
386			if (sflags < MTREE_MAXFLAGS && ++f[sflags] > maxflags) {
387				saveflags = p->fts_statp->st_flags;
388				maxflags = f[sflags];
389			}
390#endif
391		}
392	}
393	/*
394	 * If the /set record is the same as the last one we do not need to
395	 * output a new one.  So first we check to see if anything changed.
396	 * Note that we always output a /set record for the first directory.
397	 */
398	if (((keys & (F_UNAME | F_UID)) && (*puid != saveuid)) ||
399	    ((keys & (F_GNAME | F_GID)) && (*pgid != savegid)) ||
400	    ((keys & F_MODE) && (*pmode != savemode)) ||
401	    ((keys & F_FLAGS) && (*pflags != saveflags)) ||
402	    first) {
403		first = 0;
404		if (flavor != F_NETBSD6 && dflag)
405			fprintf(fp, "/set type=dir");
406		else
407			fprintf(fp, "/set type=file");
408		if (keys & (F_UID | F_UNAME)) {
409			if (keys & F_UNAME &&
410			    (name = user_from_uid(saveuid, 1)) != NULL)
411				fprintf(fp, " uname=%s", name);
412			if (keys & F_UID || (keys & F_UNAME && name == NULL))
413				fprintf(fp, " uid=%lu", (u_long)saveuid);
414		}
415		if (keys & (F_GID | F_GNAME)) {
416			if (keys & F_GNAME &&
417			    (name = group_from_gid(savegid, 1)) != NULL)
418				fprintf(fp, " gname=%s", name);
419			if (keys & F_GID || (keys & F_GNAME && name == NULL))
420				fprintf(fp, " gid=%lu", (u_long)savegid);
421		}
422		if (keys & F_MODE)
423			fprintf(fp, " mode=%#lo", (u_long)savemode);
424		if (keys & F_NLINK)
425			fprintf(fp, " nlink=1");
426		if (keys & F_FLAGS) {
427			char *str = flags_to_string(saveflags, "none");
428			fprintf(fp, " flags=%s", str);
429			free(str);
430		}
431		fprintf(fp, "\n");
432		*puid = saveuid;
433		*pgid = savegid;
434		*pmode = savemode;
435		*pflags = saveflags;
436	}
437	return (0);
438}
439
440/*
441 * dcmp --
442 *	used as a comparison function passed to fts_open() to control
443 *	the order in which fts_read() returns results.	We make
444 *	directories sort after non-directories, but otherwise sort in
445 *	strcmp() order.
446 *
447 * Keep this in sync with nodecmp() in spec.c.
448 */
449static int
450dcmp(const FTSENT *FTS_CONST *a, const FTSENT *FTS_CONST *b)
451{
452
453	if (S_ISDIR((*a)->fts_statp->st_mode)) {
454		if (!S_ISDIR((*b)->fts_statp->st_mode))
455			return (1);
456	} else if (S_ISDIR((*b)->fts_statp->st_mode))
457		return (-1);
458	return (strcmp((*a)->fts_name, (*b)->fts_name));
459}
460
461void
462output(FILE *fp, int indent, int *offset, const char *fmt, ...)
463{
464	va_list ap;
465	char buf[1024];
466
467	va_start(ap, fmt);
468	vsnprintf(buf, sizeof(buf), fmt, ap);
469	va_end(ap);
470
471	if (*offset + strlen(buf) > MAXLINELEN - 3) {
472		fprintf(fp, " \\\n%*s", INDENTNAMELEN + indent, "");
473		*offset = INDENTNAMELEN + indent;
474	}
475	*offset += fprintf(fp, " %s", buf) + 1;
476}
477