correct sizeof usage.
[rsync/rsync.git] / rsync.c
CommitLineData
7a2fd68b 1/*
c627d613
AT
2 Copyright (C) Andrew Tridgell 1996
3 Copyright (C) Paul Mackerras 1996
7a2fd68b 4
c627d613
AT
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation; either version 2 of the License, or
8 (at your option) any later version.
7a2fd68b 9
c627d613
AT
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
7a2fd68b 14
c627d613
AT
15 You should have received a copy of the GNU General Public License
16 along with this program; if not, write to the Free Software
17 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
18*/
19
2f03f956
AT
20/* this file contains code used by more than one part of the rsync
21 process */
c627d613 22
2f03f956 23#include "rsync.h"
43a481dc 24
c627d613 25extern int verbose;
c627d613 26extern int dry_run;
2f03f956 27extern int preserve_times;
7b8356d0 28extern int am_root;
c3e5e585
WD
29extern int am_server;
30extern int am_sender;
31extern int am_generator;
2f03f956
AT
32extern int preserve_uid;
33extern int preserve_gid;
34extern int preserve_perms;
35extern int make_backups;
fe055c71
AT
36
37
c627d613
AT
38/*
39 free a sums struct
40 */
2f03f956 41void free_sums(struct sum_struct *s)
c627d613 42{
298c10d5
AT
43 if (s->sums) free(s->sums);
44 free(s);
c627d613
AT
45}
46
47
3cb6f5d6 48/*
7a2fd68b
WD
49 * delete a file or directory. If force_delete is set then delete
50 * recursively
3cb6f5d6 51 */
2f03f956 52int delete_file(char *fname)
3cb6f5d6
AT
53{
54 DIR *d;
55 struct dirent *di;
56 char buf[MAXPATHLEN];
57 extern int force_delete;
bcacc18b 58 STRUCT_STAT st;
3cb6f5d6 59 int ret;
05848a2c 60 extern int recurse;
3cb6f5d6 61
3cb6f5d6 62#if SUPPORT_LINKS
bcacc18b 63 ret = do_lstat(fname, &st);
3cb6f5d6 64#else
bcacc18b 65 ret = do_stat(fname, &st);
3cb6f5d6
AT
66#endif
67 if (ret) {
3cb6f5d6
AT
68 return -1;
69 }
70
71 if (!S_ISDIR(st.st_mode)) {
1d2c275f 72 if (robust_unlink(fname) == 0 || errno == ENOENT) return 0;
ea42541f
WD
73 rprintf(FERROR, "delete_file: unlink %s failed: %s\n",
74 full_fname(fname), strerror(errno));
3cb6f5d6
AT
75 return -1;
76 }
77
78 if (do_rmdir(fname) == 0 || errno == ENOENT) return 0;
7a2fd68b 79 if (!force_delete || !recurse ||
05848a2c 80 (errno != ENOTEMPTY && errno != EEXIST)) {
ea42541f
WD
81 rprintf(FERROR, "delete_file: rmdir %s failed: %s\n",
82 full_fname(fname), strerror(errno));
3cb6f5d6
AT
83 return -1;
84 }
85
86 /* now we do a recsursive delete on the directory ... */
87 d = opendir(fname);
88 if (!d) {
ea42541f
WD
89 rprintf(FERROR, "delete_file: opendir %s failed: %s\n",
90 full_fname(fname), strerror(errno));
3cb6f5d6
AT
91 return -1;
92 }
93
6a7cc46c 94 for (errno = 0, di = readdir(d); di; errno = 0, di = readdir(d)) {
d6e6ecbd 95 char *dname = d_name(di);
6a7cc46c
S
96 if (strcmp(dname,".") == 0
97 || strcmp(dname,"..") == 0)
3cb6f5d6 98 continue;
a7725e6d 99 pathjoin(buf, sizeof buf, fname, dname);
3cb6f5d6 100 if (verbose > 0)
9486289c 101 rprintf(FINFO,"deleting %s\n", buf);
3cb6f5d6
AT
102 if (delete_file(buf) != 0) {
103 closedir(d);
104 return -1;
105 }
7a2fd68b 106 }
6a7cc46c 107 if (errno) {
7a2fd68b
WD
108 rprintf(FERROR, "delete_file: readdir %s failed: %s\n",
109 full_fname(fname), strerror(errno));
6a7cc46c
S
110 closedir(d);
111 return -1;
112 }
3cb6f5d6
AT
113
114 closedir(d);
7a2fd68b 115
3cb6f5d6 116 if (do_rmdir(fname) != 0) {
ea42541f
WD
117 rprintf(FERROR, "delete_file: rmdir %s failed: %s\n",
118 full_fname(fname), strerror(errno));
3cb6f5d6
AT
119 return -1;
120 }
121
122 return 0;
123}
c627d613 124
2f03f956 125int set_perms(char *fname,struct file_struct *file,STRUCT_STAT *st,
6a7cc46c 126 int report)
c627d613 127{
667e72a1
AT
128 int updated = 0;
129 STRUCT_STAT st2;
460f6b99 130 int change_uid, change_gid;
c627d613 131
667e72a1 132 if (dry_run) return 0;
c627d613 133
667e72a1
AT
134 if (!st) {
135 if (link_stat(fname,&st2) != 0) {
ea42541f
WD
136 rprintf(FERROR, "stat %s failed: %s\n",
137 full_fname(fname), strerror(errno));
667e72a1
AT
138 return 0;
139 }
140 st = &st2;
141 }
c627d613 142
667e72a1 143 if (preserve_times && !S_ISLNK(st->st_mode) &&
5b56cc19 144 cmp_modtime(st->st_mtime, file->modtime) != 0) {
8d249b63
AT
145 /* don't complain about not setting times on directories
146 because some filesystems can't do it */
147 if (set_modtime(fname,file->modtime) != 0 &&
148 !S_ISDIR(st->st_mode)) {
ea42541f
WD
149 rprintf(FERROR, "failed to set times on %s: %s\n",
150 full_fname(fname), strerror(errno));
667e72a1 151 return 0;
8d249b63
AT
152 } else {
153 updated = 1;
667e72a1
AT
154 }
155 }
156
460f6b99 157 change_uid = am_root && preserve_uid && st->st_uid != file->uid;
a60e2dca 158 change_gid = preserve_gid && file->gid != GID_NONE
7352b873 159 && st->st_gid != file->gid;
460f6b99 160 if (change_uid || change_gid) {
667e72a1 161 if (do_lchown(fname,
460f6b99
DD
162 change_uid?file->uid:st->st_uid,
163 change_gid?file->gid:st->st_gid) != 0) {
164 /* shouldn't have attempted to change uid or gid
165 unless have the privilege */
baa4212a
WD
166 rprintf(FERROR, "%s %s failed: %s\n",
167 change_uid ? "chown" : "chgrp",
ea42541f 168 full_fname(fname), strerror(errno));
460f6b99 169 return 0;
667e72a1 170 }
a5827a28
AT
171 /* a lchown had been done - we have to re-stat if the
172 destination had the setuid or setgid bits set due
173 to the side effect of the chown call */
174 if (st->st_mode & (S_ISUID | S_ISGID)) {
175 link_stat(fname, st);
176 }
460f6b99 177 updated = 1;
667e72a1 178 }
c627d613
AT
179
180#ifdef HAVE_CHMOD
972a3619 181 if (!S_ISLNK(st->st_mode)) {
b0d791bb 182 if ((st->st_mode & CHMOD_BITS) != (file->mode & CHMOD_BITS)) {
972a3619 183 updated = 1;
b0d791bb 184 if (do_chmod(fname,(file->mode & CHMOD_BITS)) != 0) {
ea42541f
WD
185 rprintf(FERROR, "failed to set permissions on %s: %s\n",
186 full_fname(fname), strerror(errno));
972a3619
DD
187 return 0;
188 }
667e72a1
AT
189 }
190 }
c627d613 191#endif
6a7cc46c 192
667e72a1
AT
193 if (verbose > 1 && report) {
194 if (updated)
195 rprintf(FINFO,"%s\n",fname);
196 else
197 rprintf(FINFO,"%s is uptodate\n",fname);
198 }
199 return updated;
c627d613
AT
200}
201
202
34ccb63e
AT
203void sig_int(void)
204{
d5a0b483
WD
205 /* KLUGE: if the user hits Ctrl-C while ssh is prompting
206 * for a password, then our cleanup's sending of a SIGUSR1
207 * signal to all our children may kill ssh before it has a
208 * chance to restore the tty settings (i.e. turn echo back
209 * on). By sleeping for a short time, ssh gets a bigger
210 * chance to do the right thing. If child processes are
211 * not ssh waiting for a password, then this tiny delay
212 * shouldn't hurt anything. */
213 msleep(400);
65417579 214 exit_cleanup(RERR_SIGNAL);
c627d613
AT
215}
216
217
c95da96a
AT
218/* finish off a file transfer, renaming the file and setting the permissions
219 and ownership */
2f03f956 220void finish_transfer(char *fname, char *fnametmp, struct file_struct *file)
c95da96a 221{
53dd3135
DD
222 if (make_backups && !make_backup(fname))
223 return;
c95da96a
AT
224
225 /* move tmp file over real file */
c7c11a0d 226 if (robust_rename(fnametmp,fname) != 0) {
c95da96a 227 if (errno == EXDEV) {
6a7cc46c 228 /* rename failed on cross-filesystem link.
c95da96a 229 Copy the file instead. */
972a3619 230 if (copy_file(fnametmp,fname, file->mode & INITACCESSPERMS)) {
ea42541f
WD
231 rprintf(FERROR, "copy %s -> \"%s\": %s\n",
232 full_fname(fnametmp), fname,
233 strerror(errno));
c95da96a
AT
234 } else {
235 set_perms(fname,file,NULL,0);
236 }
c95da96a 237 } else {
ea42541f
WD
238 rprintf(FERROR,"rename %s -> \"%s\": %s\n",
239 full_fname(fnametmp), fname, strerror(errno));
c95da96a 240 }
c7c11a0d 241 do_unlink(fnametmp);
c95da96a
AT
242 } else {
243 set_perms(fname,file,NULL,0);
244 }
245}
c3e5e585
WD
246
247const char *who_am_i(void)
248{
249 return am_sender ? "sender" : am_generator ? "generator" : "receiver";
250}