2000-02-09 01:28:47 +05:30
|
|
|
/* vi: set sw=4 ts=4: */
|
1999-10-05 21:54:54 +05:30
|
|
|
/*
|
2000-04-05 00:09:50 +05:30
|
|
|
* Mini tar implementation for busybox
|
2000-03-26 19:33:20 +05:30
|
|
|
*
|
2000-04-13 06:48:56 +05:30
|
|
|
* Note, that as of BusyBox-0.43, tar has been completely rewritten from the
|
|
|
|
* ground up. It still has remnents of the old code lying about, but it is
|
|
|
|
* very different now (i.e. cleaner, less global variables, etc)
|
1999-10-21 03:38:37 +05:30
|
|
|
*
|
2000-04-05 00:09:50 +05:30
|
|
|
* Copyright (C) 2000 by Lineo, inc.
|
2000-03-24 06:24:46 +05:30
|
|
|
* Written by Erik Andersen <andersen@lineo.com>, <andersee@debian.org>
|
1999-11-12 07:00:18 +05:30
|
|
|
*
|
2000-03-26 19:33:20 +05:30
|
|
|
* Based in part in the tar implementation in sash
|
|
|
|
* Copyright (c) 1999 by David I. Bell
|
|
|
|
* Permission is granted to use, distribute, or modify this source,
|
|
|
|
* provided that this copyright notice remains intact.
|
|
|
|
* Permission to distribute sash derived code under the GPL has been granted.
|
|
|
|
*
|
2000-04-05 00:09:50 +05:30
|
|
|
* Based in part on the tar implementation from busybox-0.28
|
2000-03-26 19:33:20 +05:30
|
|
|
* Copyright (C) 1995 Bruce Perens
|
|
|
|
* This is free software under the GNU General Public License.
|
|
|
|
*
|
1999-10-21 03:38:37 +05:30
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
*
|
1999-10-05 21:54:54 +05:30
|
|
|
*/
|
|
|
|
|
|
|
|
|
2000-09-26 03:15:58 +05:30
|
|
|
#include "busybox.h"
|
2000-03-24 06:24:46 +05:30
|
|
|
#define BB_DECLARE_EXTERN
|
|
|
|
#define bb_need_io_error
|
2000-11-15 03:45:48 +05:30
|
|
|
#define bb_need_name_longer_than_foo
|
2000-03-24 06:24:46 +05:30
|
|
|
#include "messages.c"
|
1999-10-20 01:33:34 +05:30
|
|
|
#include <stdio.h>
|
|
|
|
#include <dirent.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <time.h>
|
2000-01-04 06:40:25 +05:30
|
|
|
#include <utime.h>
|
1999-11-12 07:00:18 +05:30
|
|
|
#include <sys/types.h>
|
1999-11-19 08:08:58 +05:30
|
|
|
#include <sys/sysmacros.h>
|
2000-09-04 22:21:55 +05:30
|
|
|
#include <getopt.h>
|
2001-01-03 22:52:10 +05:30
|
|
|
#include <fnmatch.h>
|
1999-10-05 21:54:54 +05:30
|
|
|
|
2000-12-10 07:27:30 +05:30
|
|
|
#ifdef BB_FEATURE_TAR_GZIP
|
|
|
|
extern int unzip(int in, int out);
|
|
|
|
extern int gunzip_init();
|
|
|
|
#endif
|
|
|
|
|
2000-03-23 06:39:18 +05:30
|
|
|
/* Tar file constants */
|
2000-03-24 06:24:46 +05:30
|
|
|
#ifndef MAJOR
|
|
|
|
#define MAJOR(dev) (((dev)>>8)&0xff)
|
|
|
|
#define MINOR(dev) ((dev)&0xff)
|
|
|
|
#endif
|
1999-10-05 21:54:54 +05:30
|
|
|
|
2000-09-24 06:24:37 +05:30
|
|
|
#define NAME_SIZE 100
|
1999-10-05 21:54:54 +05:30
|
|
|
|
2000-03-23 06:39:18 +05:30
|
|
|
/* POSIX tar Header Block, from POSIX 1003.1-1990 */
|
|
|
|
struct TarHeader
|
|
|
|
{
|
|
|
|
/* byte offset */
|
2000-09-24 06:24:37 +05:30
|
|
|
char name[NAME_SIZE]; /* 0-99 */
|
2000-04-09 20:47:40 +05:30
|
|
|
char mode[8]; /* 100-107 */
|
|
|
|
char uid[8]; /* 108-115 */
|
|
|
|
char gid[8]; /* 116-123 */
|
|
|
|
char size[12]; /* 124-135 */
|
|
|
|
char mtime[12]; /* 136-147 */
|
|
|
|
char chksum[8]; /* 148-155 */
|
|
|
|
char typeflag; /* 156-156 */
|
2000-09-24 06:24:37 +05:30
|
|
|
char linkname[NAME_SIZE]; /* 157-256 */
|
2000-04-09 20:47:40 +05:30
|
|
|
char magic[6]; /* 257-262 */
|
|
|
|
char version[2]; /* 263-264 */
|
|
|
|
char uname[32]; /* 265-296 */
|
|
|
|
char gname[32]; /* 297-328 */
|
|
|
|
char devmajor[8]; /* 329-336 */
|
|
|
|
char devminor[8]; /* 337-344 */
|
|
|
|
char prefix[155]; /* 345-499 */
|
|
|
|
char padding[12]; /* 500-512 (pad to exactly the TAR_BLOCK_SIZE) */
|
2000-03-23 06:39:18 +05:30
|
|
|
};
|
|
|
|
typedef struct TarHeader TarHeader;
|
|
|
|
|
|
|
|
|
|
|
|
/* A few useful constants */
|
|
|
|
#define TAR_MAGIC "ustar" /* ustar and a null */
|
2000-04-09 20:47:40 +05:30
|
|
|
#define TAR_VERSION " " /* Be compatable with GNU tar format */
|
2000-03-23 06:39:18 +05:30
|
|
|
#define TAR_MAGIC_LEN 6
|
|
|
|
#define TAR_VERSION_LEN 2
|
|
|
|
#define TAR_BLOCK_SIZE 512
|
|
|
|
|
|
|
|
/* A nice enum with all the possible tar file content types */
|
|
|
|
enum TarFileType
|
|
|
|
{
|
|
|
|
REGTYPE = '0', /* regular file */
|
|
|
|
REGTYPE0 = '\0', /* regular file (ancient bug compat)*/
|
|
|
|
LNKTYPE = '1', /* hard link */
|
|
|
|
SYMTYPE = '2', /* symbolic link */
|
|
|
|
CHRTYPE = '3', /* character special */
|
|
|
|
BLKTYPE = '4', /* block special */
|
|
|
|
DIRTYPE = '5', /* directory */
|
|
|
|
FIFOTYPE = '6', /* FIFO special */
|
|
|
|
CONTTYPE = '7', /* reserved */
|
2000-09-24 06:24:37 +05:30
|
|
|
GNULONGLINK = 'K', /* GNU long (>100 chars) link name */
|
|
|
|
GNULONGNAME = 'L', /* GNU long (>100 chars) file name */
|
2000-03-23 06:39:18 +05:30
|
|
|
};
|
|
|
|
typedef enum TarFileType TarFileType;
|
|
|
|
|
|
|
|
/* This struct ignores magic, non-numeric user name,
|
|
|
|
* non-numeric group name, and the checksum, since
|
|
|
|
* these are all ignored by BusyBox tar. */
|
|
|
|
struct TarInfo
|
|
|
|
{
|
|
|
|
int tarFd; /* An open file descriptor for reading from the tarball */
|
|
|
|
char * name; /* File name */
|
|
|
|
mode_t mode; /* Unix mode, including device bits. */
|
|
|
|
uid_t uid; /* Numeric UID */
|
|
|
|
gid_t gid; /* Numeric GID */
|
|
|
|
size_t size; /* Size of file */
|
|
|
|
time_t mtime; /* Last-modified time */
|
|
|
|
enum TarFileType type; /* Regular, directory, link, etc */
|
|
|
|
char * linkname; /* Name for symbolic and hard links */
|
2000-03-24 06:24:46 +05:30
|
|
|
long devmajor; /* Major number for special device */
|
|
|
|
long devminor; /* Minor number for special device */
|
2000-03-23 06:39:18 +05:30
|
|
|
};
|
|
|
|
typedef struct TarInfo TarInfo;
|
|
|
|
|
2000-03-23 09:57:58 +05:30
|
|
|
/* Local procedures to restore files from a tar file. */
|
2001-01-03 05:11:50 +05:30
|
|
|
extern int readTarFile(int tarFd, int extractFlag, int listFlag,
|
2000-09-04 13:55:42 +05:30
|
|
|
int tostdoutFlag, int verboseFlag, char** extractList,
|
|
|
|
char** excludeList);
|
2000-03-24 06:24:46 +05:30
|
|
|
|
2000-01-16 07:00:52 +05:30
|
|
|
#ifdef BB_FEATURE_TAR_CREATE
|
2000-03-26 19:33:20 +05:30
|
|
|
/* Local procedures to save files into a tar file. */
|
2000-11-08 08:05:47 +05:30
|
|
|
static int writeTarFile(const char* tarName, int verboseFlag, char **argv,
|
|
|
|
char** excludeList);
|
2000-01-16 07:00:52 +05:30
|
|
|
#endif
|
|
|
|
|
2000-12-10 07:27:30 +05:30
|
|
|
#ifdef BB_FEATURE_TAR_GZIP
|
|
|
|
/* Signal handler for when child gzip process dies... */
|
|
|
|
void child_died()
|
|
|
|
{
|
|
|
|
fflush(stdout);
|
|
|
|
fflush(stderr);
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
|
|
|
|
2001-01-03 05:11:50 +05:30
|
|
|
extern int tar_unzip_init(int tarFd)
|
2000-12-10 07:27:30 +05:30
|
|
|
{
|
|
|
|
int child_pid;
|
|
|
|
static int unzip_pipe[2];
|
|
|
|
/* Cope if child dies... Otherwise we block forever in read()... */
|
|
|
|
signal(SIGCHLD, child_died);
|
|
|
|
|
|
|
|
if (pipe(unzip_pipe)!=0)
|
|
|
|
error_msg_and_die("pipe error\n");
|
|
|
|
|
|
|
|
if ( (child_pid = fork()) == -1)
|
|
|
|
error_msg_and_die("fork failure\n");
|
|
|
|
|
|
|
|
if (child_pid==0) {
|
|
|
|
/* child process */
|
|
|
|
gunzip_init();
|
|
|
|
unzip(tarFd, unzip_pipe[1]);
|
|
|
|
exit(EXIT_SUCCESS);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
/* return fd of uncompressed data to parent process */
|
|
|
|
return(unzip_pipe[0]);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2000-02-09 01:28:47 +05:30
|
|
|
extern int tar_main(int argc, char **argv)
|
1999-10-05 21:54:54 +05:30
|
|
|
{
|
2000-04-08 08:38:21 +05:30
|
|
|
char** excludeList=NULL;
|
2000-11-30 10:14:54 +05:30
|
|
|
char** extractList=NULL;
|
2000-12-10 07:27:30 +05:30
|
|
|
const char *tarName="-";
|
2000-04-09 20:47:40 +05:30
|
|
|
#if defined BB_FEATURE_TAR_EXCLUDE
|
2000-04-08 08:38:21 +05:30
|
|
|
int excludeListSize=0;
|
2000-12-10 07:27:30 +05:30
|
|
|
char *excludeFileName ="-";
|
|
|
|
FILE *fileList;
|
|
|
|
char file[256];
|
|
|
|
#endif
|
|
|
|
#if defined BB_FEATURE_TAR_GZIP
|
|
|
|
int unzipFlag = FALSE;
|
2000-04-09 20:47:40 +05:30
|
|
|
#endif
|
2000-03-23 06:39:18 +05:30
|
|
|
int listFlag = FALSE;
|
|
|
|
int extractFlag = FALSE;
|
|
|
|
int createFlag = FALSE;
|
|
|
|
int verboseFlag = FALSE;
|
|
|
|
int tostdoutFlag = FALSE;
|
2000-12-02 00:34:52 +05:30
|
|
|
int status = FALSE;
|
|
|
|
int firstOpt = TRUE;
|
2000-09-20 03:05:14 +05:30
|
|
|
int stopIt;
|
2000-02-09 01:28:47 +05:30
|
|
|
|
2000-04-08 08:38:21 +05:30
|
|
|
if (argc <= 1)
|
2000-02-09 01:28:47 +05:30
|
|
|
usage(tar_usage);
|
|
|
|
|
2000-11-08 08:05:47 +05:30
|
|
|
while (*(++argv) && (**argv == '-' || firstOpt == TRUE)) {
|
2000-09-24 04:06:24 +05:30
|
|
|
firstOpt=FALSE;
|
2000-09-20 03:05:14 +05:30
|
|
|
stopIt=FALSE;
|
2000-11-08 08:05:47 +05:30
|
|
|
while (stopIt==FALSE && **argv) {
|
|
|
|
switch (*((*argv)++)) {
|
2000-08-03 00:18:26 +05:30
|
|
|
case 'c':
|
|
|
|
if (extractFlag == TRUE || listFlag == TRUE)
|
2000-04-08 08:38:21 +05:30
|
|
|
goto flagError;
|
2000-08-03 00:18:26 +05:30
|
|
|
createFlag = TRUE;
|
2000-04-08 08:38:21 +05:30
|
|
|
break;
|
|
|
|
case 'x':
|
|
|
|
if (listFlag == TRUE || createFlag == TRUE)
|
|
|
|
goto flagError;
|
|
|
|
extractFlag = TRUE;
|
|
|
|
break;
|
2000-08-03 00:18:26 +05:30
|
|
|
case 't':
|
|
|
|
if (extractFlag == TRUE || createFlag == TRUE)
|
2000-04-08 08:38:21 +05:30
|
|
|
goto flagError;
|
2000-08-03 00:18:26 +05:30
|
|
|
listFlag = TRUE;
|
2000-04-08 08:38:21 +05:30
|
|
|
break;
|
2000-12-10 07:27:30 +05:30
|
|
|
#ifdef BB_FEATURE_TAR_GZIP
|
|
|
|
case 'z':
|
|
|
|
unzipFlag = TRUE;
|
|
|
|
break;
|
|
|
|
#endif
|
2000-04-08 08:38:21 +05:30
|
|
|
case 'v':
|
|
|
|
verboseFlag = TRUE;
|
|
|
|
break;
|
|
|
|
case 'O':
|
|
|
|
tostdoutFlag = TRUE;
|
2000-08-03 00:18:26 +05:30
|
|
|
break;
|
|
|
|
case 'f':
|
|
|
|
if (*tarName != '-')
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg_and_die( "Only one 'f' option allowed\n");
|
2000-09-20 03:05:14 +05:30
|
|
|
tarName = *(++argv);
|
|
|
|
if (tarName == NULL)
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg_and_die( "Option requires an argument: No file specified\n");
|
2000-09-20 03:05:14 +05:30
|
|
|
stopIt=TRUE;
|
2000-04-08 08:38:21 +05:30
|
|
|
break;
|
2000-04-09 20:47:40 +05:30
|
|
|
#if defined BB_FEATURE_TAR_EXCLUDE
|
2000-09-04 22:21:55 +05:30
|
|
|
case 'e':
|
2000-12-05 00:21:09 +05:30
|
|
|
if (strcmp(*argv, "xclude")==0) {
|
2000-12-13 20:58:48 +05:30
|
|
|
excludeList=xrealloc( excludeList,
|
|
|
|
sizeof(char *) * (excludeListSize+2));
|
2000-09-20 03:05:14 +05:30
|
|
|
excludeList[excludeListSize] = *(++argv);
|
2000-11-08 08:05:47 +05:30
|
|
|
if (excludeList[excludeListSize] == NULL)
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg_and_die( "Option requires an argument: No file specified\n");
|
2000-09-20 03:05:14 +05:30
|
|
|
/* Tack a NULL onto the end of the list */
|
|
|
|
excludeList[++excludeListSize] = NULL;
|
|
|
|
stopIt=TRUE;
|
|
|
|
break;
|
|
|
|
}
|
2000-12-13 20:58:48 +05:30
|
|
|
case 'X':
|
|
|
|
if (*excludeFileName != '-')
|
|
|
|
error_msg_and_die("Only one 'X' option allowed\n");
|
|
|
|
excludeFileName = *(++argv);
|
|
|
|
if (excludeFileName == NULL)
|
|
|
|
error_msg_and_die("Option requires an argument: No file specified\n");
|
|
|
|
fileList = fopen (excludeFileName, "r");
|
|
|
|
if (! fileList)
|
|
|
|
error_msg_and_die("Exclude file: file not found\n");
|
|
|
|
while (fgets(file, sizeof(file), fileList) != NULL) {
|
|
|
|
excludeList = xrealloc(excludeList,
|
|
|
|
sizeof(char *) * (excludeListSize+2));
|
|
|
|
if (file[strlen(file)-1] == '\n')
|
|
|
|
file[strlen(file)-1] = '\0';
|
|
|
|
excludeList[excludeListSize] = xstrdup(file);
|
|
|
|
/* Tack a NULL onto the end of the list */
|
|
|
|
excludeList[++excludeListSize] = NULL;
|
|
|
|
}
|
|
|
|
fclose(fileList);
|
|
|
|
stopIt=TRUE;
|
|
|
|
break;
|
2000-04-09 20:47:40 +05:30
|
|
|
#endif
|
2000-09-20 03:05:14 +05:30
|
|
|
case '-':
|
|
|
|
break;
|
2000-04-08 08:38:21 +05:30
|
|
|
default:
|
2000-09-04 22:21:55 +05:30
|
|
|
usage(tar_usage);
|
2000-09-20 03:05:14 +05:30
|
|
|
}
|
2000-02-09 01:28:47 +05:30
|
|
|
}
|
2000-01-23 07:04:05 +05:30
|
|
|
}
|
1999-10-13 03:56:06 +05:30
|
|
|
|
2000-02-09 01:28:47 +05:30
|
|
|
/*
|
|
|
|
* Do the correct type of action supplying the rest of the
|
|
|
|
* command line arguments as the list of files to process.
|
|
|
|
*/
|
|
|
|
if (createFlag == TRUE) {
|
2000-01-23 07:04:05 +05:30
|
|
|
#ifndef BB_FEATURE_TAR_CREATE
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg_and_die( "This version of tar was not compiled with tar creation support.\n");
|
2000-01-23 07:04:05 +05:30
|
|
|
#else
|
2000-12-10 07:27:30 +05:30
|
|
|
#ifdef BB_FEATURE_TAR_GZIP
|
|
|
|
if (unzipFlag==TRUE)
|
|
|
|
error_msg_and_die("Creation of compressed not internally support by tar, pipe to busybox gunzip\n");
|
|
|
|
#endif
|
2000-12-01 08:25:13 +05:30
|
|
|
status = writeTarFile(tarName, verboseFlag, argv, excludeList);
|
2000-02-09 01:28:47 +05:30
|
|
|
#endif
|
2000-05-20 06:10:08 +05:30
|
|
|
}
|
|
|
|
if (listFlag == TRUE || extractFlag == TRUE) {
|
2000-12-10 07:27:30 +05:30
|
|
|
int tarFd;
|
2000-11-30 10:14:54 +05:30
|
|
|
if (*argv)
|
|
|
|
extractList = argv;
|
2000-12-10 07:27:30 +05:30
|
|
|
/* Open the tar file for reading. */
|
|
|
|
if (!strcmp(tarName, "-"))
|
|
|
|
tarFd = fileno(stdin);
|
|
|
|
else
|
|
|
|
tarFd = open(tarName, O_RDONLY);
|
|
|
|
if (tarFd < 0)
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg_and_die("Error opening '%s'", tarName);
|
2000-12-10 07:27:30 +05:30
|
|
|
|
|
|
|
#ifdef BB_FEATURE_TAR_GZIP
|
|
|
|
/* unzip tarFd in a seperate process */
|
|
|
|
if (unzipFlag == TRUE)
|
|
|
|
tarFd = tar_unzip_init(tarFd);
|
|
|
|
#endif
|
|
|
|
status = readTarFile(tarFd, extractFlag, listFlag, tostdoutFlag,
|
2000-12-01 08:25:13 +05:30
|
|
|
verboseFlag, extractList, excludeList);
|
2000-02-09 01:28:47 +05:30
|
|
|
}
|
|
|
|
|
2000-12-01 08:25:13 +05:30
|
|
|
if (status == TRUE)
|
|
|
|
return EXIT_SUCCESS;
|
|
|
|
else
|
|
|
|
return EXIT_FAILURE;
|
|
|
|
|
2000-02-09 01:28:47 +05:30
|
|
|
flagError:
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg_and_die( "Exactly one of 'c', 'x' or 't' must be specified\n");
|
2000-03-23 06:39:18 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2000-04-07 12:25:38 +05:30
|
|
|
fixUpPermissions(TarInfo *header)
|
|
|
|
{
|
|
|
|
struct utimbuf t;
|
|
|
|
/* Now set permissions etc for the new file */
|
|
|
|
chown(header->name, header->uid, header->gid);
|
|
|
|
chmod(header->name, header->mode);
|
|
|
|
/* Reset the time */
|
|
|
|
t.actime = time(0);
|
|
|
|
t.modtime = header->mtime;
|
|
|
|
utime(header->name, &t);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2000-03-24 06:24:46 +05:30
|
|
|
tarExtractRegularFile(TarInfo *header, int extractFlag, int tostdoutFlag)
|
|
|
|
{
|
|
|
|
size_t writeSize;
|
|
|
|
size_t readSize;
|
|
|
|
size_t actualWriteSz;
|
|
|
|
char buffer[BUFSIZ];
|
|
|
|
size_t size = header->size;
|
|
|
|
int outFd=fileno(stdout);
|
|
|
|
|
|
|
|
/* Open the file to be written, if a file is supposed to be written */
|
|
|
|
if (extractFlag==TRUE && tostdoutFlag==FALSE) {
|
|
|
|
/* Create the path to the file, just in case it isn't there...
|
|
|
|
* This should not screw up path permissions or anything. */
|
2000-12-08 01:26:48 +05:30
|
|
|
create_path(header->name, 0777);
|
2000-06-10 02:21:50 +05:30
|
|
|
if ((outFd=open(header->name, O_CREAT|O_TRUNC|O_WRONLY,
|
|
|
|
header->mode & ~S_IFMT)) < 0) {
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg(io_error, header->name, strerror(errno));
|
2000-06-10 02:21:50 +05:30
|
|
|
return( FALSE);
|
|
|
|
}
|
2000-03-24 06:24:46 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
/* Write out the file, if we are supposed to be doing that */
|
|
|
|
while ( size > 0 ) {
|
|
|
|
actualWriteSz=0;
|
|
|
|
if ( size > sizeof(buffer) )
|
|
|
|
writeSize = readSize = sizeof(buffer);
|
|
|
|
else {
|
|
|
|
int mod = size % 512;
|
|
|
|
if ( mod != 0 )
|
|
|
|
readSize = size + (512 - mod);
|
|
|
|
else
|
|
|
|
readSize = size;
|
|
|
|
writeSize = size;
|
|
|
|
}
|
2000-12-08 01:26:48 +05:30
|
|
|
if ( (readSize = full_read(header->tarFd, buffer, readSize)) <= 0 ) {
|
2000-03-24 06:24:46 +05:30
|
|
|
/* Tarball seems to have a problem */
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg("Unexpected EOF in archive\n");
|
2000-04-07 12:25:38 +05:30
|
|
|
return( FALSE);
|
2000-03-24 06:24:46 +05:30
|
|
|
}
|
|
|
|
if ( readSize < writeSize )
|
|
|
|
writeSize = readSize;
|
|
|
|
|
|
|
|
/* Write out the file, if we are supposed to be doing that */
|
|
|
|
if (extractFlag==TRUE) {
|
|
|
|
|
2000-12-08 01:26:48 +05:30
|
|
|
if ((actualWriteSz=full_write(outFd, buffer, writeSize)) != writeSize ) {
|
2000-03-24 06:24:46 +05:30
|
|
|
/* Output file seems to have a problem */
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg(io_error, header->name, strerror(errno));
|
2000-04-07 12:25:38 +05:30
|
|
|
return( FALSE);
|
2000-03-24 06:24:46 +05:30
|
|
|
}
|
2000-04-09 20:47:40 +05:30
|
|
|
} else {
|
|
|
|
actualWriteSz=writeSize;
|
2000-03-24 06:24:46 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
size -= actualWriteSz;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Now we are done writing the file out, so try
|
|
|
|
* and fix up the permissions and whatnot */
|
|
|
|
if (extractFlag==TRUE && tostdoutFlag==FALSE) {
|
|
|
|
close(outFd);
|
2000-04-07 12:25:38 +05:30
|
|
|
fixUpPermissions(header);
|
2000-03-24 06:24:46 +05:30
|
|
|
}
|
2000-04-07 12:25:38 +05:30
|
|
|
return( TRUE);
|
2000-03-24 06:24:46 +05:30
|
|
|
}
|
|
|
|
|
2000-04-07 12:25:38 +05:30
|
|
|
static int
|
2000-03-24 06:24:46 +05:30
|
|
|
tarExtractDirectory(TarInfo *header, int extractFlag, int tostdoutFlag)
|
2000-03-23 09:57:58 +05:30
|
|
|
{
|
2000-03-24 06:24:46 +05:30
|
|
|
|
|
|
|
if (extractFlag==FALSE || tostdoutFlag==TRUE)
|
2000-04-07 12:25:38 +05:30
|
|
|
return( TRUE);
|
2000-03-24 06:24:46 +05:30
|
|
|
|
2000-12-08 01:26:48 +05:30
|
|
|
if (create_path(header->name, header->mode) != TRUE) {
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg("%s: Cannot mkdir", header->name);
|
2000-04-07 12:25:38 +05:30
|
|
|
return( FALSE);
|
2000-03-24 06:24:46 +05:30
|
|
|
}
|
|
|
|
/* make the final component, just in case it was
|
2000-12-08 01:26:48 +05:30
|
|
|
* omitted by create_path() (which will skip the
|
2000-03-24 06:24:46 +05:30
|
|
|
* directory if it doesn't have a terminating '/') */
|
2000-03-26 19:33:20 +05:30
|
|
|
if (mkdir(header->name, header->mode) == 0) {
|
|
|
|
fixUpPermissions(header);
|
|
|
|
}
|
2000-04-07 12:25:38 +05:30
|
|
|
return( TRUE);
|
2000-03-23 09:57:58 +05:30
|
|
|
}
|
|
|
|
|
2000-04-07 12:25:38 +05:30
|
|
|
static int
|
2000-03-24 06:24:46 +05:30
|
|
|
tarExtractHardLink(TarInfo *header, int extractFlag, int tostdoutFlag)
|
2000-03-23 09:57:58 +05:30
|
|
|
{
|
2000-03-24 06:24:46 +05:30
|
|
|
if (extractFlag==FALSE || tostdoutFlag==TRUE)
|
2000-04-07 12:25:38 +05:30
|
|
|
return( TRUE);
|
2000-03-24 06:24:46 +05:30
|
|
|
|
|
|
|
if (link(header->linkname, header->name) < 0) {
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg("%s: Cannot create hard link to '%s'", header->name,
|
|
|
|
header->linkname);
|
2000-04-07 12:25:38 +05:30
|
|
|
return( FALSE);
|
2000-03-24 06:24:46 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
/* Now set permissions etc for the new directory */
|
|
|
|
fixUpPermissions(header);
|
2000-04-07 12:25:38 +05:30
|
|
|
return( TRUE);
|
2000-03-23 09:57:58 +05:30
|
|
|
}
|
|
|
|
|
2000-04-07 12:25:38 +05:30
|
|
|
static int
|
2000-03-24 06:24:46 +05:30
|
|
|
tarExtractSymLink(TarInfo *header, int extractFlag, int tostdoutFlag)
|
2000-03-23 09:57:58 +05:30
|
|
|
{
|
2000-03-24 06:24:46 +05:30
|
|
|
if (extractFlag==FALSE || tostdoutFlag==TRUE)
|
2000-04-07 12:25:38 +05:30
|
|
|
return( TRUE);
|
2000-03-24 06:24:46 +05:30
|
|
|
|
|
|
|
#ifdef S_ISLNK
|
|
|
|
if (symlink(header->linkname, header->name) < 0) {
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg("%s: Cannot create symlink to '%s'", header->name,
|
|
|
|
header->linkname);
|
2000-04-07 12:25:38 +05:30
|
|
|
return( FALSE);
|
2000-03-24 06:24:46 +05:30
|
|
|
}
|
|
|
|
/* Try to change ownership of the symlink.
|
|
|
|
* If libs doesn't support that, don't bother.
|
|
|
|
* Changing the pointed-to-file is the Wrong Thing(tm).
|
|
|
|
*/
|
|
|
|
#if (__GLIBC__ >= 2) && (__GLIBC_MINOR__ >= 1)
|
|
|
|
lchown(header->name, header->uid, header->gid);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Do not change permissions or date on symlink,
|
|
|
|
* since it changes the pointed to file instead. duh. */
|
|
|
|
#else
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg("%s: Cannot create symlink to '%s': %s\n",
|
2000-04-07 12:25:38 +05:30
|
|
|
header->name, header->linkname,
|
|
|
|
"symlinks not supported");
|
2000-03-24 06:24:46 +05:30
|
|
|
#endif
|
2000-04-07 12:25:38 +05:30
|
|
|
return( TRUE);
|
2000-03-23 09:57:58 +05:30
|
|
|
}
|
2000-03-23 06:39:18 +05:30
|
|
|
|
2000-04-07 12:25:38 +05:30
|
|
|
static int
|
2000-03-24 06:24:46 +05:30
|
|
|
tarExtractSpecial(TarInfo *header, int extractFlag, int tostdoutFlag)
|
|
|
|
{
|
|
|
|
if (extractFlag==FALSE || tostdoutFlag==TRUE)
|
2000-04-07 12:25:38 +05:30
|
|
|
return( TRUE);
|
2000-03-24 06:24:46 +05:30
|
|
|
|
|
|
|
if (S_ISCHR(header->mode) || S_ISBLK(header->mode) || S_ISSOCK(header->mode)) {
|
2000-04-07 12:25:38 +05:30
|
|
|
if (mknod(header->name, header->mode, makedev(header->devmajor, header->devminor)) < 0) {
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg("%s: Cannot mknod", header->name);
|
2000-04-07 12:25:38 +05:30
|
|
|
return( FALSE);
|
|
|
|
}
|
2000-03-24 06:24:46 +05:30
|
|
|
} else if (S_ISFIFO(header->mode)) {
|
2000-04-07 12:25:38 +05:30
|
|
|
if (mkfifo(header->name, header->mode) < 0) {
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg("%s: Cannot mkfifo", header->name);
|
2000-04-07 12:25:38 +05:30
|
|
|
return( FALSE);
|
|
|
|
}
|
2000-03-24 06:24:46 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
/* Now set permissions etc for the new directory */
|
|
|
|
fixUpPermissions(header);
|
2000-04-07 12:25:38 +05:30
|
|
|
return( TRUE);
|
2000-03-24 06:24:46 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
/* Read an octal value in a field of the specified width, with optional
|
|
|
|
* spaces on both sides of the number and with an optional null character
|
|
|
|
* at the end. Returns -1 on an illegal format. */
|
|
|
|
static long getOctal(const char *cp, int size)
|
2000-03-23 09:57:58 +05:30
|
|
|
{
|
2000-03-24 06:24:46 +05:30
|
|
|
long val = 0;
|
|
|
|
|
|
|
|
for(;(size > 0) && (*cp == ' '); cp++, size--);
|
2000-12-08 01:26:48 +05:30
|
|
|
if ((size == 0) || !is_octal(*cp))
|
2000-03-24 06:24:46 +05:30
|
|
|
return -1;
|
2000-12-08 01:26:48 +05:30
|
|
|
for(; (size > 0) && is_octal(*cp); size--) {
|
2000-03-24 06:24:46 +05:30
|
|
|
val = val * 8 + *cp++ - '0';
|
|
|
|
}
|
|
|
|
for (;(size > 0) && (*cp == ' '); cp++, size--);
|
|
|
|
if ((size > 0) && *cp)
|
|
|
|
return -1;
|
|
|
|
return val;
|
1999-10-05 21:54:54 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
|
2000-03-24 06:24:46 +05:30
|
|
|
/* Parse the tar header and fill in the nice struct with the details */
|
|
|
|
static int
|
2000-03-28 06:28:14 +05:30
|
|
|
readTarHeader(struct TarHeader *rawHeader, struct TarInfo *header)
|
2000-03-24 06:24:46 +05:30
|
|
|
{
|
|
|
|
int i;
|
2000-04-09 02:28:35 +05:30
|
|
|
long chksum, sum=0;
|
2000-03-24 06:24:46 +05:30
|
|
|
unsigned char *s = (unsigned char *)rawHeader;
|
|
|
|
|
|
|
|
header->name = rawHeader->name;
|
2000-04-09 02:28:35 +05:30
|
|
|
/* Check for and relativify any absolute paths */
|
|
|
|
if ( *(header->name) == '/' ) {
|
|
|
|
static int alreadyWarned=FALSE;
|
|
|
|
|
|
|
|
while (*(header->name) == '/')
|
|
|
|
++*(header->name);
|
|
|
|
|
|
|
|
if (alreadyWarned == FALSE) {
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg("Removing leading '/' from member names\n");
|
2000-04-09 02:28:35 +05:30
|
|
|
alreadyWarned = TRUE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-03-24 06:24:46 +05:30
|
|
|
header->mode = getOctal(rawHeader->mode, sizeof(rawHeader->mode));
|
|
|
|
header->uid = getOctal(rawHeader->uid, sizeof(rawHeader->uid));
|
|
|
|
header->gid = getOctal(rawHeader->gid, sizeof(rawHeader->gid));
|
|
|
|
header->size = getOctal(rawHeader->size, sizeof(rawHeader->size));
|
|
|
|
header->mtime = getOctal(rawHeader->mtime, sizeof(rawHeader->mtime));
|
|
|
|
chksum = getOctal(rawHeader->chksum, sizeof(rawHeader->chksum));
|
|
|
|
header->type = rawHeader->typeflag;
|
|
|
|
header->linkname = rawHeader->linkname;
|
|
|
|
header->devmajor = getOctal(rawHeader->devmajor, sizeof(rawHeader->devmajor));
|
|
|
|
header->devminor = getOctal(rawHeader->devminor, sizeof(rawHeader->devminor));
|
|
|
|
|
|
|
|
/* Check the checksum */
|
2000-04-09 02:28:35 +05:30
|
|
|
for (i = sizeof(*rawHeader); i-- != 0;) {
|
2000-03-24 06:24:46 +05:30
|
|
|
sum += *s++;
|
2000-04-09 02:28:35 +05:30
|
|
|
}
|
|
|
|
/* Remove the effects of the checksum field (replace
|
|
|
|
* with blanks for the purposes of the checksum) */
|
|
|
|
s = rawHeader->chksum;
|
|
|
|
for (i = sizeof(rawHeader->chksum) ; i-- != 0;) {
|
|
|
|
sum -= *s++;
|
|
|
|
}
|
|
|
|
sum += ' ' * sizeof(rawHeader->chksum);
|
2000-03-24 06:24:46 +05:30
|
|
|
if (sum == chksum )
|
|
|
|
return ( TRUE);
|
|
|
|
return( FALSE);
|
|
|
|
}
|
|
|
|
|
2001-01-03 22:52:10 +05:30
|
|
|
int exclude_file(char **excluded_files, const char *file)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (excluded_files == NULL)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
for (i = 0; excluded_files[i] != NULL; i++) {
|
|
|
|
if (excluded_files[i][0] == '/') {
|
|
|
|
if (fnmatch(excluded_files[i], file,
|
|
|
|
FNM_PATHNAME | FNM_LEADING_DIR) == 0)
|
|
|
|
return 1;
|
|
|
|
} else {
|
|
|
|
const char *p;
|
|
|
|
|
|
|
|
for (p = file; p[0] != '\0'; p++) {
|
|
|
|
if ((p == file || p[-1] == '/') && p[0] != '/' &&
|
|
|
|
fnmatch(excluded_files[i], p,
|
|
|
|
FNM_PATHNAME | FNM_LEADING_DIR) == 0)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2000-03-23 09:57:58 +05:30
|
|
|
|
1999-10-05 21:54:54 +05:30
|
|
|
/*
|
|
|
|
* Read a tar file and extract or list the specified files within it.
|
|
|
|
* If the list is empty than all files are extracted or listed.
|
|
|
|
*/
|
2000-12-10 07:27:30 +05:30
|
|
|
extern int readTarFile(int tarFd, int extractFlag, int listFlag,
|
2000-09-04 13:55:42 +05:30
|
|
|
int tostdoutFlag, int verboseFlag, char** extractList,
|
|
|
|
char** excludeList)
|
1999-10-05 21:54:54 +05:30
|
|
|
{
|
2000-12-10 07:27:30 +05:30
|
|
|
int status;
|
2000-03-23 06:39:18 +05:30
|
|
|
int errorFlag=FALSE;
|
2000-09-24 06:24:37 +05:30
|
|
|
int skipNextHeaderFlag=FALSE;
|
2000-03-23 06:39:18 +05:30
|
|
|
TarHeader rawHeader;
|
|
|
|
TarInfo header;
|
2000-04-09 20:47:40 +05:30
|
|
|
char** tmpList;
|
2000-02-09 01:28:47 +05:30
|
|
|
|
2000-03-24 06:24:46 +05:30
|
|
|
/* Set the umask for this process so it doesn't
|
|
|
|
* screw up permission setting for us later. */
|
|
|
|
umask(0);
|
|
|
|
|
|
|
|
/* Read the tar file, and iterate over it one file at a time */
|
2000-12-08 01:26:48 +05:30
|
|
|
while ( (status = full_read(tarFd, (char*)&rawHeader, TAR_BLOCK_SIZE)) == TAR_BLOCK_SIZE ) {
|
2000-03-24 06:24:46 +05:30
|
|
|
|
2000-09-24 06:24:37 +05:30
|
|
|
/* Try to read the header */
|
2000-03-28 06:28:14 +05:30
|
|
|
if ( readTarHeader(&rawHeader, &header) == FALSE ) {
|
2000-03-23 06:39:18 +05:30
|
|
|
if ( *(header.name) == '\0' ) {
|
|
|
|
goto endgame;
|
|
|
|
} else {
|
|
|
|
errorFlag=TRUE;
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg("Bad tar header, skipping\n");
|
2000-03-23 06:39:18 +05:30
|
|
|
continue;
|
2000-02-09 01:28:47 +05:30
|
|
|
}
|
|
|
|
}
|
2000-03-23 06:39:18 +05:30
|
|
|
if ( *(header.name) == '\0' )
|
|
|
|
goto endgame;
|
2000-04-09 20:47:40 +05:30
|
|
|
header.tarFd = tarFd;
|
|
|
|
|
2000-09-24 06:24:37 +05:30
|
|
|
/* Skip funky extra GNU headers that precede long files */
|
|
|
|
if ( (header.type == GNULONGNAME) || (header.type == GNULONGLINK) ) {
|
|
|
|
skipNextHeaderFlag=TRUE;
|
2000-11-18 06:58:57 +05:30
|
|
|
if (tarExtractRegularFile(&header, FALSE, FALSE) == FALSE)
|
|
|
|
errorFlag = TRUE;
|
2000-09-24 06:24:37 +05:30
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if ( skipNextHeaderFlag == TRUE ) {
|
|
|
|
skipNextHeaderFlag=FALSE;
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg(name_longer_than_foo, NAME_SIZE);
|
2000-11-18 06:58:57 +05:30
|
|
|
if (tarExtractRegularFile(&header, FALSE, FALSE) == FALSE)
|
|
|
|
errorFlag = TRUE;
|
2000-09-24 06:24:37 +05:30
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2000-04-09 20:47:40 +05:30
|
|
|
#if defined BB_FEATURE_TAR_EXCLUDE
|
2001-01-03 22:52:10 +05:30
|
|
|
if (exclude_file(excludeList, header.name)) {
|
2000-04-09 20:47:40 +05:30
|
|
|
/* There are not the droids you're looking for, move along */
|
2001-01-03 22:52:10 +05:30
|
|
|
/* If it is a regular file, pretend to extract it with
|
|
|
|
* the extractFlag set to FALSE, so the junk in the tarball
|
|
|
|
* is properly skipped over */
|
|
|
|
if ( header.type==REGTYPE || header.type==REGTYPE0 ) {
|
|
|
|
if (tarExtractRegularFile(&header, FALSE, FALSE) == FALSE)
|
|
|
|
errorFlag = TRUE;
|
|
|
|
}
|
|
|
|
continue;
|
2000-04-09 20:47:40 +05:30
|
|
|
}
|
|
|
|
#endif
|
2001-01-03 22:52:10 +05:30
|
|
|
|
2000-11-30 10:14:54 +05:30
|
|
|
if (extractList != NULL) {
|
2000-09-04 13:55:42 +05:30
|
|
|
int skipFlag = TRUE;
|
|
|
|
for (tmpList = extractList; *tmpList != NULL; tmpList++) {
|
|
|
|
if (strncmp( *tmpList, header.name, strlen(*tmpList))==0 || (
|
|
|
|
header.name[strlen(header.name)-1]=='/'
|
|
|
|
&& strncmp( *tmpList, header.name,
|
|
|
|
MIN(strlen(header.name)-1, strlen(*tmpList)))==0)) {
|
|
|
|
/* If it is a regular file, pretend to extract it with
|
|
|
|
* the extractFlag set to FALSE, so the junk in the tarball
|
|
|
|
* is properly skipped over */
|
|
|
|
skipFlag = FALSE;
|
2000-11-30 10:14:54 +05:30
|
|
|
memmove(extractList+1, extractList,
|
|
|
|
sizeof(*extractList)*(tmpList-extractList));
|
|
|
|
extractList++;
|
2000-09-04 13:55:42 +05:30
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* There are not the droids you're looking for, move along */
|
|
|
|
if (skipFlag == TRUE) {
|
|
|
|
if ( header.type==REGTYPE || header.type==REGTYPE0 )
|
2000-11-18 06:58:57 +05:30
|
|
|
if (tarExtractRegularFile(&header, FALSE, FALSE) == FALSE)
|
|
|
|
errorFlag = TRUE;
|
2000-09-04 13:55:42 +05:30
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
2000-04-07 12:25:38 +05:30
|
|
|
|
2000-09-16 02:48:43 +05:30
|
|
|
if (listFlag == TRUE) {
|
2000-09-16 03:53:41 +05:30
|
|
|
/* Special treatment if the list (-t) flag is on */
|
|
|
|
if (verboseFlag == TRUE) {
|
|
|
|
int len, len1;
|
|
|
|
char buf[35];
|
|
|
|
struct tm *tm = localtime (&(header.mtime));
|
|
|
|
|
2000-12-08 01:26:48 +05:30
|
|
|
len=printf("%s ", mode_string(header.mode));
|
2000-09-16 03:53:41 +05:30
|
|
|
my_getpwuid(buf, header.uid);
|
|
|
|
if (! *buf)
|
|
|
|
len+=printf("%d", header.uid);
|
|
|
|
else
|
|
|
|
len+=printf("%s", buf);
|
|
|
|
my_getgrgid(buf, header.gid);
|
|
|
|
if (! *buf)
|
|
|
|
len+=printf("/%-d ", header.gid);
|
|
|
|
else
|
|
|
|
len+=printf("/%-s ", buf);
|
|
|
|
|
|
|
|
if (header.type==CHRTYPE || header.type==BLKTYPE) {
|
|
|
|
len1=snprintf(buf, sizeof(buf), "%ld,%-ld ",
|
|
|
|
header.devmajor, header.devminor);
|
|
|
|
} else {
|
|
|
|
len1=snprintf(buf, sizeof(buf), "%lu ", (long)header.size);
|
|
|
|
}
|
|
|
|
/* Jump through some hoops to make the columns match up */
|
|
|
|
for(;(len+len1)<31;len++)
|
|
|
|
printf(" ");
|
|
|
|
printf(buf);
|
|
|
|
|
|
|
|
/* Use ISO 8610 time format */
|
|
|
|
if (tm) {
|
|
|
|
printf ("%04d-%02d-%02d %02d:%02d:%02d ",
|
|
|
|
tm->tm_year + 1900, tm->tm_mon + 1, tm->tm_mday,
|
|
|
|
tm->tm_hour, tm->tm_min, tm->tm_sec);
|
|
|
|
}
|
|
|
|
}
|
2000-08-03 00:18:26 +05:30
|
|
|
printf("%s", header.name);
|
2000-09-16 02:48:43 +05:30
|
|
|
if (verboseFlag == TRUE) {
|
|
|
|
if (header.type==LNKTYPE) /* If this is a link, say so */
|
|
|
|
printf(" link to %s", header.linkname);
|
|
|
|
else if (header.type==SYMTYPE)
|
|
|
|
printf(" -> %s", header.linkname);
|
|
|
|
}
|
2000-03-23 09:57:58 +05:30
|
|
|
printf("\n");
|
|
|
|
}
|
2000-03-23 06:39:18 +05:30
|
|
|
|
2000-09-16 03:53:41 +05:30
|
|
|
/* List contents if we are supposed to do that */
|
|
|
|
if (verboseFlag == TRUE && extractFlag == TRUE) {
|
|
|
|
/* Now the normal listing */
|
|
|
|
FILE *vbFd = stdout;
|
|
|
|
if (tostdoutFlag == TRUE) // If the archive goes to stdout, verbose to stderr
|
|
|
|
vbFd = stderr;
|
|
|
|
fprintf(vbFd, "%s\n", header.name);
|
|
|
|
}
|
|
|
|
|
2000-09-01 08:20:48 +05:30
|
|
|
/* Remove files if we would overwrite them */
|
2000-09-01 08:23:01 +05:30
|
|
|
if (extractFlag == TRUE && tostdoutFlag == FALSE)
|
2000-09-01 08:20:48 +05:30
|
|
|
unlink(header.name);
|
2000-03-24 06:24:46 +05:30
|
|
|
|
2000-03-23 06:39:18 +05:30
|
|
|
/* If we got here, we can be certain we have a legitimate
|
|
|
|
* header to work with. So work with it. */
|
|
|
|
switch ( header.type ) {
|
|
|
|
case REGTYPE:
|
|
|
|
case REGTYPE0:
|
|
|
|
/* If the name ends in a '/' then assume it is
|
|
|
|
* supposed to be a directory, and fall through */
|
|
|
|
if (header.name[strlen(header.name)-1] != '/') {
|
2000-04-07 12:25:38 +05:30
|
|
|
if (tarExtractRegularFile(&header, extractFlag, tostdoutFlag)==FALSE)
|
|
|
|
errorFlag=TRUE;
|
2000-03-23 06:39:18 +05:30
|
|
|
break;
|
|
|
|
}
|
2000-03-23 09:57:58 +05:30
|
|
|
case DIRTYPE:
|
2000-04-07 12:25:38 +05:30
|
|
|
if (tarExtractDirectory( &header, extractFlag, tostdoutFlag)==FALSE)
|
|
|
|
errorFlag=TRUE;
|
2000-03-23 06:39:18 +05:30
|
|
|
break;
|
2000-03-23 09:57:58 +05:30
|
|
|
case LNKTYPE:
|
2000-04-07 12:25:38 +05:30
|
|
|
if (tarExtractHardLink( &header, extractFlag, tostdoutFlag)==FALSE)
|
|
|
|
errorFlag=TRUE;
|
2000-03-23 06:39:18 +05:30
|
|
|
break;
|
2000-03-23 09:57:58 +05:30
|
|
|
case SYMTYPE:
|
2000-04-07 12:25:38 +05:30
|
|
|
if (tarExtractSymLink( &header, extractFlag, tostdoutFlag)==FALSE)
|
|
|
|
errorFlag=TRUE;
|
2000-03-23 06:39:18 +05:30
|
|
|
break;
|
2000-03-23 09:57:58 +05:30
|
|
|
case CHRTYPE:
|
|
|
|
case BLKTYPE:
|
|
|
|
case FIFOTYPE:
|
2000-04-07 12:25:38 +05:30
|
|
|
if (tarExtractSpecial( &header, extractFlag, tostdoutFlag)==FALSE)
|
|
|
|
errorFlag=TRUE;
|
2000-03-23 06:39:18 +05:30
|
|
|
break;
|
2000-09-24 06:24:37 +05:30
|
|
|
#if 0
|
|
|
|
/* Handled earlier */
|
|
|
|
case GNULONGNAME:
|
|
|
|
case GNULONGLINK:
|
|
|
|
skipNextHeaderFlag=TRUE;
|
|
|
|
break;
|
|
|
|
#endif
|
2000-03-23 06:39:18 +05:30
|
|
|
default:
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg("Unknown file type '%c' in tar file\n", header.type);
|
2000-03-23 06:39:18 +05:30
|
|
|
close( tarFd);
|
|
|
|
return( FALSE);
|
2000-02-09 01:28:47 +05:30
|
|
|
}
|
1999-10-05 21:54:54 +05:30
|
|
|
}
|
2000-03-23 06:39:18 +05:30
|
|
|
close(tarFd);
|
|
|
|
if (status > 0) {
|
|
|
|
/* Bummer - we read a partial header */
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg("Error reading tar file");
|
2000-03-23 06:39:18 +05:30
|
|
|
return ( FALSE);
|
2000-01-04 06:40:25 +05:30
|
|
|
}
|
2000-04-07 12:25:38 +05:30
|
|
|
else if (errorFlag==TRUE) {
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg( "Error exit delayed from previous errors\n");
|
2000-04-07 12:25:38 +05:30
|
|
|
return( FALSE);
|
|
|
|
} else
|
2000-03-23 06:39:18 +05:30
|
|
|
return( status);
|
|
|
|
|
2000-03-24 06:24:46 +05:30
|
|
|
/* Stuff to do when we are done */
|
2000-03-23 06:39:18 +05:30
|
|
|
endgame:
|
|
|
|
close( tarFd);
|
2000-11-30 10:14:54 +05:30
|
|
|
if (extractList != NULL) {
|
|
|
|
for (; *extractList != NULL; extractList++) {
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg("%s: Not found in archive\n", *extractList);
|
2000-11-30 10:14:54 +05:30
|
|
|
errorFlag = TRUE;
|
|
|
|
}
|
|
|
|
}
|
2000-03-23 06:39:18 +05:30
|
|
|
if ( *(header.name) == '\0' ) {
|
2000-04-07 12:25:38 +05:30
|
|
|
if (errorFlag==TRUE)
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg( "Error exit delayed from previous errors\n");
|
2000-04-07 12:25:38 +05:30
|
|
|
else
|
2000-03-23 06:39:18 +05:30
|
|
|
return( TRUE);
|
|
|
|
}
|
|
|
|
return( FALSE);
|
1999-10-05 21:54:54 +05:30
|
|
|
}
|
|
|
|
|
2000-03-26 19:33:20 +05:30
|
|
|
|
|
|
|
#ifdef BB_FEATURE_TAR_CREATE
|
|
|
|
|
2000-12-07 06:04:58 +05:30
|
|
|
/*
|
|
|
|
** writeTarFile(), writeFileToTarball(), and writeTarHeader() are
|
|
|
|
** the only functions that deal with the HardLinkInfo structure.
|
|
|
|
** Even these functions use the xxxHardLinkInfo() functions.
|
|
|
|
*/
|
|
|
|
typedef struct HardLinkInfo HardLinkInfo;
|
|
|
|
struct HardLinkInfo
|
|
|
|
{
|
|
|
|
HardLinkInfo *next; /* Next entry in list */
|
|
|
|
dev_t dev; /* Device number */
|
|
|
|
ino_t ino; /* Inode number */
|
|
|
|
short linkCount; /* (Hard) Link Count */
|
|
|
|
char name[1]; /* Start of filename (must be last) */
|
|
|
|
};
|
|
|
|
|
2000-04-05 00:09:50 +05:30
|
|
|
/* Some info to be carried along when creating a new tarball */
|
|
|
|
struct TarBallInfo
|
|
|
|
{
|
|
|
|
char* fileName; /* File name of the tarball */
|
|
|
|
int tarFd; /* Open-for-write file descriptor
|
|
|
|
for the tarball */
|
|
|
|
struct stat statBuf; /* Stat info for the tarball, letting
|
|
|
|
us know the inode and device that the
|
|
|
|
tarball lives, so we can avoid trying
|
|
|
|
to include the tarball into itself */
|
|
|
|
int verboseFlag; /* Whether to print extra stuff or not */
|
2000-04-08 08:38:21 +05:30
|
|
|
char** excludeList; /* List of files to not include */
|
2000-12-07 06:04:58 +05:30
|
|
|
HardLinkInfo *hlInfoHead; /* Hard Link Tracking Information */
|
|
|
|
HardLinkInfo *hlInfo; /* Hard Link Info for the current file */
|
2000-04-05 00:09:50 +05:30
|
|
|
};
|
|
|
|
typedef struct TarBallInfo TarBallInfo;
|
|
|
|
|
|
|
|
|
2000-12-07 06:04:58 +05:30
|
|
|
/* Might be faster (and bigger) if the dev/ino were stored in numeric order;) */
|
|
|
|
static void
|
|
|
|
addHardLinkInfo (HardLinkInfo **hlInfoHeadPtr, dev_t dev, ino_t ino,
|
|
|
|
short linkCount, const char *name)
|
|
|
|
{
|
|
|
|
/* Note: hlInfoHeadPtr can never be NULL! */
|
|
|
|
HardLinkInfo *hlInfo;
|
|
|
|
|
|
|
|
hlInfo = (HardLinkInfo *)xmalloc(sizeof(HardLinkInfo)+strlen(name)+1);
|
|
|
|
if (hlInfo) {
|
|
|
|
hlInfo->next = *hlInfoHeadPtr;
|
|
|
|
*hlInfoHeadPtr = hlInfo;
|
|
|
|
hlInfo->dev = dev;
|
|
|
|
hlInfo->ino = ino;
|
|
|
|
hlInfo->linkCount = linkCount;
|
|
|
|
strcpy(hlInfo->name, name);
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
freeHardLinkInfo (HardLinkInfo **hlInfoHeadPtr)
|
|
|
|
{
|
|
|
|
HardLinkInfo *hlInfo = NULL;
|
|
|
|
HardLinkInfo *hlInfoNext = NULL;
|
|
|
|
|
|
|
|
if (hlInfoHeadPtr) {
|
|
|
|
hlInfo = *hlInfoHeadPtr;
|
|
|
|
while (hlInfo) {
|
|
|
|
hlInfoNext = hlInfo->next;
|
|
|
|
free(hlInfo);
|
|
|
|
hlInfo = hlInfoNext;
|
|
|
|
}
|
|
|
|
*hlInfoHeadPtr = NULL;
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Might be faster (and bigger) if the dev/ino were stored in numeric order;) */
|
|
|
|
static HardLinkInfo *
|
|
|
|
findHardLinkInfo (HardLinkInfo *hlInfo, dev_t dev, ino_t ino)
|
|
|
|
{
|
|
|
|
while(hlInfo) {
|
|
|
|
if ((ino == hlInfo->ino) && (dev == hlInfo->dev))
|
|
|
|
break;
|
|
|
|
hlInfo = hlInfo->next;
|
|
|
|
}
|
|
|
|
return(hlInfo);
|
|
|
|
}
|
|
|
|
|
2000-03-26 19:33:20 +05:30
|
|
|
/* Put an octal string into the specified buffer.
|
|
|
|
* The number is zero and space padded and possibly null padded.
|
|
|
|
* Returns TRUE if successful. */
|
|
|
|
static int putOctal (char *cp, int len, long value)
|
|
|
|
{
|
|
|
|
int tempLength;
|
|
|
|
char tempBuffer[32];
|
2000-04-05 06:30:52 +05:30
|
|
|
char *tempString = tempBuffer;
|
2000-03-26 19:33:20 +05:30
|
|
|
|
|
|
|
/* Create a string of the specified length with an initial space,
|
|
|
|
* leading zeroes and the octal number, and a trailing null. */
|
2000-04-05 06:30:52 +05:30
|
|
|
sprintf (tempString, "%0*lo", len - 1, value);
|
2000-03-26 19:33:20 +05:30
|
|
|
|
|
|
|
/* If the string is too large, suppress the leading space. */
|
2000-04-05 06:30:52 +05:30
|
|
|
tempLength = strlen (tempString) + 1;
|
2000-03-26 19:33:20 +05:30
|
|
|
if (tempLength > len) {
|
|
|
|
tempLength--;
|
|
|
|
tempString++;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If the string is still too large, suppress the trailing null. */
|
|
|
|
if (tempLength > len)
|
|
|
|
tempLength--;
|
|
|
|
|
|
|
|
/* If the string is still too large, fail. */
|
|
|
|
if (tempLength > len)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
/* Copy the string to the field. */
|
|
|
|
memcpy (cp, tempString, len);
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2000-04-05 00:09:50 +05:30
|
|
|
/* Write out a tar header for the specified file/directory/whatever */
|
2000-03-28 06:28:14 +05:30
|
|
|
static int
|
2000-12-20 02:15:49 +05:30
|
|
|
writeTarHeader(struct TarBallInfo *tbInfo, const char *header_name,
|
|
|
|
const char *real_name, struct stat *statbuf)
|
2000-03-26 19:33:20 +05:30
|
|
|
{
|
2000-04-05 06:30:52 +05:30
|
|
|
long chksum=0;
|
|
|
|
struct TarHeader header;
|
|
|
|
const unsigned char *cp = (const unsigned char *) &header;
|
|
|
|
ssize_t size = sizeof(struct TarHeader);
|
2000-08-03 00:18:26 +05:30
|
|
|
|
2000-04-05 06:30:52 +05:30
|
|
|
memset( &header, 0, size);
|
2000-04-05 00:09:50 +05:30
|
|
|
|
2000-12-20 02:15:49 +05:30
|
|
|
strncpy(header.name, header_name, sizeof(header.name));
|
2000-04-08 08:38:21 +05:30
|
|
|
|
2000-04-05 06:30:52 +05:30
|
|
|
putOctal(header.mode, sizeof(header.mode), statbuf->st_mode);
|
|
|
|
putOctal(header.uid, sizeof(header.uid), statbuf->st_uid);
|
|
|
|
putOctal(header.gid, sizeof(header.gid), statbuf->st_gid);
|
|
|
|
putOctal(header.size, sizeof(header.size), 0); /* Regular file size is handled later */
|
|
|
|
putOctal(header.mtime, sizeof(header.mtime), statbuf->st_mtime);
|
|
|
|
strncpy(header.magic, TAR_MAGIC TAR_VERSION,
|
|
|
|
TAR_MAGIC_LEN + TAR_VERSION_LEN );
|
|
|
|
|
2000-04-09 02:28:35 +05:30
|
|
|
/* Enter the user and group names (default to root if it fails) */
|
2000-04-05 06:30:52 +05:30
|
|
|
my_getpwuid(header.uname, statbuf->st_uid);
|
|
|
|
if (! *header.uname)
|
2000-04-09 02:28:35 +05:30
|
|
|
strcpy(header.uname, "root");
|
2000-04-05 06:30:52 +05:30
|
|
|
my_getgrgid(header.gname, statbuf->st_gid);
|
|
|
|
if (! *header.uname)
|
2000-04-09 02:28:35 +05:30
|
|
|
strcpy(header.uname, "root");
|
2000-04-05 06:30:52 +05:30
|
|
|
|
2000-12-07 06:04:58 +05:30
|
|
|
if (tbInfo->hlInfo) {
|
|
|
|
/* This is a hard link */
|
|
|
|
header.typeflag = LNKTYPE;
|
|
|
|
strncpy(header.linkname, tbInfo->hlInfo->name, sizeof(header.linkname));
|
|
|
|
} else if (S_ISLNK(statbuf->st_mode)) {
|
2000-06-26 16:24:06 +05:30
|
|
|
int link_size=0;
|
2000-04-05 06:30:52 +05:30
|
|
|
char buffer[BUFSIZ];
|
|
|
|
header.typeflag = SYMTYPE;
|
2000-12-20 02:15:49 +05:30
|
|
|
link_size = readlink(real_name, buffer, sizeof(buffer) - 1);
|
2000-06-26 16:24:06 +05:30
|
|
|
if ( link_size < 0) {
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg("Error reading symlink '%s'", header.name);
|
2000-04-05 06:30:52 +05:30
|
|
|
return ( FALSE);
|
|
|
|
}
|
2000-06-26 16:24:06 +05:30
|
|
|
buffer[link_size] = '\0';
|
2000-04-15 03:15:29 +05:30
|
|
|
strncpy(header.linkname, buffer, sizeof(header.linkname));
|
2000-04-05 00:09:50 +05:30
|
|
|
} else if (S_ISDIR(statbuf->st_mode)) {
|
2000-04-05 06:30:52 +05:30
|
|
|
header.typeflag = DIRTYPE;
|
|
|
|
strncat(header.name, "/", sizeof(header.name));
|
2000-04-05 00:09:50 +05:30
|
|
|
} else if (S_ISCHR(statbuf->st_mode)) {
|
2000-04-05 06:30:52 +05:30
|
|
|
header.typeflag = CHRTYPE;
|
|
|
|
putOctal(header.devmajor, sizeof(header.devmajor), MAJOR(statbuf->st_rdev));
|
|
|
|
putOctal(header.devminor, sizeof(header.devminor), MINOR(statbuf->st_rdev));
|
2000-04-05 00:09:50 +05:30
|
|
|
} else if (S_ISBLK(statbuf->st_mode)) {
|
2000-04-05 06:30:52 +05:30
|
|
|
header.typeflag = BLKTYPE;
|
|
|
|
putOctal(header.devmajor, sizeof(header.devmajor), MAJOR(statbuf->st_rdev));
|
|
|
|
putOctal(header.devminor, sizeof(header.devminor), MINOR(statbuf->st_rdev));
|
2000-04-05 00:09:50 +05:30
|
|
|
} else if (S_ISFIFO(statbuf->st_mode)) {
|
2000-04-05 06:30:52 +05:30
|
|
|
header.typeflag = FIFOTYPE;
|
|
|
|
} else if (S_ISREG(statbuf->st_mode)) {
|
|
|
|
header.typeflag = REGTYPE;
|
|
|
|
putOctal(header.size, sizeof(header.size), statbuf->st_size);
|
2000-04-05 00:09:50 +05:30
|
|
|
} else {
|
2000-12-20 02:15:49 +05:30
|
|
|
error_msg("%s: Unknown file type\n", real_name);
|
2000-04-05 00:09:50 +05:30
|
|
|
return ( FALSE);
|
2000-03-28 06:28:14 +05:30
|
|
|
}
|
|
|
|
|
2000-04-05 06:30:52 +05:30
|
|
|
/* Calculate and store the checksum (i.e. the sum of all of the bytes of
|
|
|
|
* the header). The checksum field must be filled with blanks for the
|
|
|
|
* calculation. The checksum field is formatted differently from the
|
|
|
|
* other fields: it has [6] digits, a null, then a space -- rather than
|
|
|
|
* digits, followed by a null like the other fields... */
|
|
|
|
memset(header.chksum, ' ', sizeof(header.chksum));
|
|
|
|
cp = (const unsigned char *) &header;
|
|
|
|
while (size-- > 0)
|
|
|
|
chksum += *cp++;
|
|
|
|
putOctal(header.chksum, 7, chksum);
|
|
|
|
|
|
|
|
/* Now write the header out to disk */
|
2000-12-08 01:26:48 +05:30
|
|
|
if ((size=full_write(tbInfo->tarFd, (char*)&header, sizeof(struct TarHeader))) < 0) {
|
2000-12-20 02:15:49 +05:30
|
|
|
error_msg(io_error, real_name, strerror(errno));
|
2000-04-05 06:30:52 +05:30
|
|
|
return ( FALSE);
|
|
|
|
}
|
|
|
|
/* Pad the header up to the tar block size */
|
|
|
|
for (; size<TAR_BLOCK_SIZE; size++) {
|
|
|
|
write(tbInfo->tarFd, "\0", 1);
|
|
|
|
}
|
|
|
|
/* Now do the verbose thing (or not) */
|
2000-08-03 00:18:26 +05:30
|
|
|
if (tbInfo->verboseFlag==TRUE) {
|
|
|
|
FILE *vbFd = stdout;
|
|
|
|
if (tbInfo->tarFd == fileno(stdout)) // If the archive goes to stdout, verbose to stderr
|
|
|
|
vbFd = stderr;
|
|
|
|
fprintf(vbFd, "%s\n", header.name);
|
|
|
|
}
|
2000-03-28 06:28:14 +05:30
|
|
|
|
|
|
|
return ( TRUE);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2000-04-05 00:09:50 +05:30
|
|
|
static int writeFileToTarball(const char *fileName, struct stat *statbuf, void* userData)
|
2000-03-28 06:28:14 +05:30
|
|
|
{
|
2000-04-05 00:09:50 +05:30
|
|
|
struct TarBallInfo *tbInfo = (struct TarBallInfo *)userData;
|
2000-12-20 02:15:49 +05:30
|
|
|
const char *header_name;
|
2000-04-05 00:09:50 +05:30
|
|
|
|
2000-12-07 06:04:58 +05:30
|
|
|
/*
|
|
|
|
** Check to see if we are dealing with a hard link.
|
|
|
|
** If so -
|
|
|
|
** Treat the first occurance of a given dev/inode as a file while
|
|
|
|
** treating any additional occurances as hard links. This is done
|
|
|
|
** by adding the file information to the HardLinkInfo linked list.
|
|
|
|
*/
|
|
|
|
tbInfo->hlInfo = NULL;
|
|
|
|
if (statbuf->st_nlink > 1) {
|
|
|
|
tbInfo->hlInfo = findHardLinkInfo(tbInfo->hlInfoHead, statbuf->st_dev,
|
|
|
|
statbuf->st_ino);
|
|
|
|
if (tbInfo->hlInfo == NULL)
|
|
|
|
addHardLinkInfo (&tbInfo->hlInfoHead, statbuf->st_dev,
|
|
|
|
statbuf->st_ino, statbuf->st_nlink, fileName);
|
|
|
|
}
|
|
|
|
|
2000-04-05 00:09:50 +05:30
|
|
|
/* It is against the rules to archive a socket */
|
|
|
|
if (S_ISSOCK(statbuf->st_mode)) {
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg("%s: socket ignored\n", fileName);
|
2000-04-05 00:09:50 +05:30
|
|
|
return( TRUE);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* It is a bad idea to store the archive we are in the process of creating,
|
|
|
|
* so check the device and inode to be sure that this particular file isn't
|
|
|
|
* the new tarball */
|
|
|
|
if (tbInfo->statBuf.st_dev == statbuf->st_dev &&
|
|
|
|
tbInfo->statBuf.st_ino == statbuf->st_ino) {
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg("%s: file is the archive; skipping\n", fileName);
|
2000-04-05 00:09:50 +05:30
|
|
|
return( TRUE);
|
|
|
|
}
|
|
|
|
|
2000-12-20 02:15:49 +05:30
|
|
|
header_name = fileName;
|
|
|
|
while (header_name[0] == '/') {
|
2000-12-19 11:54:08 +05:30
|
|
|
static int alreadyWarned=FALSE;
|
|
|
|
if (alreadyWarned==FALSE) {
|
|
|
|
error_msg("Removing leading '/' from member names\n");
|
|
|
|
alreadyWarned=TRUE;
|
|
|
|
}
|
2000-12-20 02:15:49 +05:30
|
|
|
header_name++;
|
2000-12-19 11:54:08 +05:30
|
|
|
}
|
|
|
|
|
2000-09-24 06:24:37 +05:30
|
|
|
if (strlen(fileName) >= NAME_SIZE) {
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg(name_longer_than_foo, NAME_SIZE);
|
2000-09-24 06:24:37 +05:30
|
|
|
return ( TRUE);
|
|
|
|
}
|
|
|
|
|
2000-12-20 02:15:49 +05:30
|
|
|
if (header_name[0] == '\0')
|
2000-12-19 11:54:08 +05:30
|
|
|
return TRUE;
|
|
|
|
|
|
|
|
#if defined BB_FEATURE_TAR_EXCLUDE
|
2001-01-03 22:52:10 +05:30
|
|
|
if (exclude_file(tbInfo->excludeList, header_name)) {
|
|
|
|
return SKIP;
|
2000-12-19 11:54:08 +05:30
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2000-12-20 02:15:49 +05:30
|
|
|
if (writeTarHeader(tbInfo, header_name, fileName, statbuf)==FALSE) {
|
2000-04-05 06:30:52 +05:30
|
|
|
return( FALSE);
|
2000-04-05 00:09:50 +05:30
|
|
|
}
|
2000-04-05 06:30:52 +05:30
|
|
|
|
|
|
|
/* Now, if the file is a regular file, copy it out to the tarball */
|
2000-12-07 06:04:58 +05:30
|
|
|
if ((tbInfo->hlInfo == NULL)
|
|
|
|
&& (S_ISREG(statbuf->st_mode))) {
|
2000-04-05 06:30:52 +05:30
|
|
|
int inputFileFd;
|
|
|
|
char buffer[BUFSIZ];
|
|
|
|
ssize_t size=0, readSize=0;
|
|
|
|
|
|
|
|
/* open the file we want to archive, and make sure all is well */
|
|
|
|
if ((inputFileFd = open(fileName, O_RDONLY)) < 0) {
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg("%s: Cannot open: %s\n", fileName, strerror(errno));
|
2000-04-05 06:30:52 +05:30
|
|
|
return( FALSE);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* write the file to the archive */
|
2000-12-08 01:26:48 +05:30
|
|
|
while ( (size = full_read(inputFileFd, buffer, sizeof(buffer))) > 0 ) {
|
|
|
|
if (full_write(tbInfo->tarFd, buffer, size) != size ) {
|
2000-04-05 06:30:52 +05:30
|
|
|
/* Output file seems to have a problem */
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg(io_error, fileName, strerror(errno));
|
2000-04-05 06:30:52 +05:30
|
|
|
return( FALSE);
|
|
|
|
}
|
|
|
|
readSize+=size;
|
|
|
|
}
|
|
|
|
if (size == -1) {
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg(io_error, fileName, strerror(errno));
|
2000-04-05 06:30:52 +05:30
|
|
|
return( FALSE);
|
|
|
|
}
|
|
|
|
/* Pad the file up to the tar block size */
|
|
|
|
for (; (readSize%TAR_BLOCK_SIZE) != 0; readSize++) {
|
|
|
|
write(tbInfo->tarFd, "\0", 1);
|
|
|
|
}
|
|
|
|
close( inputFileFd);
|
|
|
|
}
|
2000-04-05 00:09:50 +05:30
|
|
|
|
|
|
|
return( TRUE);
|
2000-03-26 19:33:20 +05:30
|
|
|
}
|
|
|
|
|
2000-11-08 08:05:47 +05:30
|
|
|
static int writeTarFile(const char* tarName, int verboseFlag, char **argv,
|
|
|
|
char** excludeList)
|
2000-03-26 19:33:20 +05:30
|
|
|
{
|
2000-03-28 06:28:14 +05:30
|
|
|
int tarFd=-1;
|
2000-04-05 00:09:50 +05:30
|
|
|
int errorFlag=FALSE;
|
2000-04-05 06:30:52 +05:30
|
|
|
ssize_t size;
|
2000-04-05 00:09:50 +05:30
|
|
|
struct TarBallInfo tbInfo;
|
|
|
|
tbInfo.verboseFlag = verboseFlag;
|
2000-12-07 06:04:58 +05:30
|
|
|
tbInfo.hlInfoHead = NULL;
|
2000-03-28 06:28:14 +05:30
|
|
|
|
|
|
|
/* Make sure there is at least one file to tar up. */
|
2000-11-08 08:05:47 +05:30
|
|
|
if (*argv == NULL)
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg_and_die("Cowardly refusing to create an empty archive\n");
|
2000-03-26 19:33:20 +05:30
|
|
|
|
|
|
|
/* Open the tar file for writing. */
|
2000-11-08 08:05:47 +05:30
|
|
|
if (!strcmp(tarName, "-"))
|
2000-04-05 00:09:50 +05:30
|
|
|
tbInfo.tarFd = fileno(stdout);
|
2000-03-26 19:33:20 +05:30
|
|
|
else
|
2000-04-05 00:09:50 +05:30
|
|
|
tbInfo.tarFd = open (tarName, O_WRONLY | O_CREAT | O_TRUNC, 0644);
|
|
|
|
if (tbInfo.tarFd < 0) {
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg( "Error opening '%s'", tarName);
|
2000-12-07 06:04:58 +05:30
|
|
|
freeHardLinkInfo(&tbInfo.hlInfoHead);
|
2000-03-26 19:33:20 +05:30
|
|
|
return ( FALSE);
|
|
|
|
}
|
2000-04-08 08:38:21 +05:30
|
|
|
tbInfo.excludeList=excludeList;
|
2000-04-05 00:09:50 +05:30
|
|
|
/* Store the stat info for the tarball's file, so
|
|
|
|
* can avoid including the tarball into itself.... */
|
|
|
|
if (fstat(tbInfo.tarFd, &tbInfo.statBuf) < 0)
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg_and_die(io_error, tarName, strerror(errno));
|
2000-03-26 19:33:20 +05:30
|
|
|
|
|
|
|
/* Set the umask for this process so it doesn't
|
|
|
|
* screw up permission setting for us later. */
|
|
|
|
umask(0);
|
|
|
|
|
|
|
|
/* Read the directory/files and iterate over them one at a time */
|
2000-11-08 08:05:47 +05:30
|
|
|
while (*argv != NULL) {
|
2000-12-08 01:26:48 +05:30
|
|
|
if (recursive_action(*argv++, TRUE, FALSE, FALSE,
|
2000-04-05 00:09:50 +05:30
|
|
|
writeFileToTarball, writeFileToTarball,
|
|
|
|
(void*) &tbInfo) == FALSE) {
|
|
|
|
errorFlag = TRUE;
|
2000-03-28 06:28:14 +05:30
|
|
|
}
|
2000-03-26 19:33:20 +05:30
|
|
|
}
|
2000-04-05 06:30:52 +05:30
|
|
|
/* Write two empty blocks to the end of the archive */
|
|
|
|
for (size=0; size<(2*TAR_BLOCK_SIZE); size++) {
|
|
|
|
write(tbInfo.tarFd, "\0", 1);
|
|
|
|
}
|
2000-04-09 20:47:40 +05:30
|
|
|
|
|
|
|
/* To be pedantically correct, we would check if the tarball
|
2000-11-15 03:45:48 +05:30
|
|
|
* is smaller than 20 tar blocks, and pad it if it was smaller,
|
2000-04-09 20:47:40 +05:30
|
|
|
* but that isn't necessary for GNU tar interoperability, and
|
|
|
|
* so is considered a waste of space */
|
|
|
|
|
2000-04-05 00:09:50 +05:30
|
|
|
/* Hang up the tools, close up shop, head home */
|
2000-03-26 19:33:20 +05:30
|
|
|
close(tarFd);
|
2000-04-05 00:09:50 +05:30
|
|
|
if (errorFlag == TRUE) {
|
2000-12-08 01:26:48 +05:30
|
|
|
error_msg("Error exit delayed from previous errors\n");
|
2000-12-07 06:04:58 +05:30
|
|
|
freeHardLinkInfo(&tbInfo.hlInfoHead);
|
2000-04-05 00:09:50 +05:30
|
|
|
return(FALSE);
|
|
|
|
}
|
2000-12-07 06:04:58 +05:30
|
|
|
freeHardLinkInfo(&tbInfo.hlInfoHead);
|
2000-03-26 19:33:20 +05:30
|
|
|
return( TRUE);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|