Disable the optimization that treats include-only files as a special case
[rsync/rsync.git] / rsync.c
CommitLineData
c627d613
AT
1/*
2 Copyright (C) Andrew Tridgell 1996
3 Copyright (C) Paul Mackerras 1996
4
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation; either version 2 of the License, or
8 (at your option) any later version.
9
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
14
15 You should have received a copy of the GNU General Public License
16 along with this program; if not, write to the Free Software
17 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
18*/
19
2f03f956
AT
20/* this file contains code used by more than one part of the rsync
21 process */
c627d613 22
2f03f956 23#include "rsync.h"
43a481dc 24
c627d613 25extern int verbose;
c627d613 26extern int dry_run;
2f03f956 27extern int preserve_times;
7b8356d0 28extern int am_root;
2f03f956
AT
29extern int preserve_uid;
30extern int preserve_gid;
31extern int preserve_perms;
32extern int make_backups;
33extern char *backup_suffix;
fe055c71
AT
34
35
c627d613
AT
36/*
37 free a sums struct
38 */
2f03f956 39void free_sums(struct sum_struct *s)
c627d613 40{
298c10d5
AT
41 if (s->sums) free(s->sums);
42 free(s);
c627d613
AT
43}
44
45
3cb6f5d6
AT
46/*
47 * delete a file or directory. If force_delet is set then delete
48 * recursively
49 */
2f03f956 50int delete_file(char *fname)
3cb6f5d6
AT
51{
52 DIR *d;
53 struct dirent *di;
54 char buf[MAXPATHLEN];
55 extern int force_delete;
bcacc18b 56 STRUCT_STAT st;
3cb6f5d6 57 int ret;
05848a2c 58 extern int recurse;
3cb6f5d6
AT
59
60 if (do_unlink(fname) == 0 || errno == ENOENT) return 0;
61
62#if SUPPORT_LINKS
bcacc18b 63 ret = do_lstat(fname, &st);
3cb6f5d6 64#else
bcacc18b 65 ret = do_stat(fname, &st);
3cb6f5d6
AT
66#endif
67 if (ret) {
9486289c 68 rprintf(FERROR,"stat(%s) : %s\n", fname, strerror(errno));
3cb6f5d6
AT
69 return -1;
70 }
71
72 if (!S_ISDIR(st.st_mode)) {
9486289c 73 rprintf(FERROR,"unlink(%s) : %s\n", fname, strerror(errno));
3cb6f5d6
AT
74 return -1;
75 }
76
77 if (do_rmdir(fname) == 0 || errno == ENOENT) return 0;
05848a2c
AT
78 if (!force_delete || !recurse ||
79 (errno != ENOTEMPTY && errno != EEXIST)) {
9486289c 80 rprintf(FERROR,"rmdir(%s) : %s\n", fname, strerror(errno));
3cb6f5d6
AT
81 return -1;
82 }
83
84 /* now we do a recsursive delete on the directory ... */
85 d = opendir(fname);
86 if (!d) {
9486289c 87 rprintf(FERROR,"opendir(%s): %s\n",
3cb6f5d6
AT
88 fname,strerror(errno));
89 return -1;
90 }
91
92 for (di=readdir(d); di; di=readdir(d)) {
d6e6ecbd
AT
93 char *dname = d_name(di);
94 if (strcmp(dname,".")==0 ||
95 strcmp(dname,"..")==0)
3cb6f5d6 96 continue;
37f9805d 97 slprintf(buf, sizeof(buf), "%s/%s", fname, dname);
3cb6f5d6 98 if (verbose > 0)
9486289c 99 rprintf(FINFO,"deleting %s\n", buf);
3cb6f5d6
AT
100 if (delete_file(buf) != 0) {
101 closedir(d);
102 return -1;
103 }
104 }
105
106 closedir(d);
107
108 if (do_rmdir(fname) != 0) {
9486289c 109 rprintf(FERROR,"rmdir(%s) : %s\n", fname, strerror(errno));
3cb6f5d6
AT
110 return -1;
111 }
112
113 return 0;
114}
c627d613 115
460f6b99
DD
116static int is_in_group(gid_t gid)
117{
9422bb3f 118#ifdef GETGROUPS_T
460f6b99
DD
119 static gid_t last_in = (gid_t) -2, last_out;
120 static int ngroups = -2;
9422bb3f 121 static GETGROUPS_T *gidset;
460f6b99
DD
122 int n;
123
124 if (gid == last_in)
125 return last_out;
126 if (ngroups < -1) {
127 /* treat failure (-1) as if not member of any group */
128 ngroups = getgroups(0, 0);
129 if (ngroups > 0) {
9422bb3f 130 gidset = (GETGROUPS_T *) malloc(ngroups * sizeof(GETGROUPS_T));
460f6b99
DD
131 ngroups = getgroups(ngroups, gidset);
132 }
133 }
134
135 last_in = gid;
136 last_out = 0;
137 for (n = 0; n < ngroups; n++) {
138 if (gidset[n] == gid) {
139 last_out = 1;
140 break;
141 }
142 }
143 return last_out;
144
145#else
146 return 0;
147#endif
148}
c627d613 149
2f03f956
AT
150int set_perms(char *fname,struct file_struct *file,STRUCT_STAT *st,
151 int report)
c627d613 152{
667e72a1
AT
153 int updated = 0;
154 STRUCT_STAT st2;
460f6b99 155 int change_uid, change_gid;
667e72a1 156 extern int am_daemon;
c627d613 157
667e72a1 158 if (dry_run) return 0;
c627d613 159
667e72a1
AT
160 if (!st) {
161 if (link_stat(fname,&st2) != 0) {
162 rprintf(FERROR,"stat %s : %s\n",fname,strerror(errno));
163 return 0;
164 }
165 st = &st2;
166 }
c627d613 167
667e72a1
AT
168 if (preserve_times && !S_ISLNK(st->st_mode) &&
169 st->st_mtime != file->modtime) {
8d249b63
AT
170 /* don't complain about not setting times on directories
171 because some filesystems can't do it */
172 if (set_modtime(fname,file->modtime) != 0 &&
173 !S_ISDIR(st->st_mode)) {
667e72a1
AT
174 rprintf(FERROR,"failed to set times on %s : %s\n",
175 fname,strerror(errno));
176 return 0;
8d249b63
AT
177 } else {
178 updated = 1;
667e72a1
AT
179 }
180 }
181
460f6b99 182 change_uid = am_root && preserve_uid && st->st_uid != file->uid;
86692050
DD
183 change_gid = !am_daemon && preserve_gid && file->gid != (gid_t) -1 && \
184 st->st_gid != file->gid;
460f6b99
DD
185 if (change_gid && !am_root) {
186 /* enforce bsd-style group semantics: non-root can only
187 change to groups that the user is a member of */
188 change_gid = is_in_group(file->gid);
189 }
190 if (change_uid || change_gid) {
667e72a1 191 if (do_lchown(fname,
460f6b99
DD
192 change_uid?file->uid:st->st_uid,
193 change_gid?file->gid:st->st_gid) != 0) {
194 /* shouldn't have attempted to change uid or gid
195 unless have the privilege */
196 rprintf(FERROR,"chown %s : %s\n", fname,strerror(errno));
197 return 0;
667e72a1 198 }
460f6b99 199 updated = 1;
667e72a1 200 }
c627d613
AT
201
202#ifdef HAVE_CHMOD
667e72a1 203 if (preserve_perms && !S_ISLNK(st->st_mode) &&
46831d6f 204 (st->st_mode != file->mode ||
5afd8aed 205 (updated && (file->mode & ~INITPERMMASK)))) {
667e72a1
AT
206 updated = 1;
207 if (do_chmod(fname,file->mode) != 0) {
208 rprintf(FERROR,"failed to set permissions on %s : %s\n",
209 fname,strerror(errno));
210 return 0;
211 }
212 }
c627d613 213#endif
c627d613 214
667e72a1
AT
215 if (verbose > 1 && report) {
216 if (updated)
217 rprintf(FINFO,"%s\n",fname);
218 else
219 rprintf(FINFO,"%s is uptodate\n",fname);
220 }
221 return updated;
c627d613
AT
222}
223
224
34ccb63e
AT
225void sig_int(void)
226{
65417579 227 exit_cleanup(RERR_SIGNAL);
c627d613
AT
228}
229
53dd3135
DD
230int make_backup(char *fname)
231{
232 char fnamebak[MAXPATHLEN];
233 if (strlen(fname) + strlen(backup_suffix) > (MAXPATHLEN-1)) {
234 rprintf(FERROR,"backup filename too long\n");
235 return 0;
236 }
237
241fc706 238 slprintf(fnamebak,sizeof(fnamebak),"%s%s",fname,backup_suffix);
53dd3135
DD
239 if (do_rename(fname,fnamebak) != 0) {
240 if (errno != ENOENT) {
241fc706 241 rprintf(FERROR,"rename %s %s : %s\n",fname,fnamebak,strerror(errno));
53dd3135
DD
242 return 0;
243 }
244 } else if (verbose > 1) {
245 rprintf(FINFO,"backed up %s to %s\n",fname,fnamebak);
246 }
247 return 1;
248}
249
c627d613 250
c95da96a
AT
251/* finish off a file transfer, renaming the file and setting the permissions
252 and ownership */
2f03f956 253void finish_transfer(char *fname, char *fnametmp, struct file_struct *file)
c95da96a 254{
53dd3135
DD
255 if (make_backups && !make_backup(fname))
256 return;
c95da96a
AT
257
258 /* move tmp file over real file */
259 if (do_rename(fnametmp,fname) != 0) {
260 if (errno == EXDEV) {
261 /* rename failed on cross-filesystem link.
262 Copy the file instead. */
5afd8aed 263 if (copy_file(fnametmp,fname, file->mode & INITPERMMASK)) {
c95da96a
AT
264 rprintf(FERROR,"copy %s -> %s : %s\n",
265 fnametmp,fname,strerror(errno));
266 } else {
267 set_perms(fname,file,NULL,0);
268 }
269 do_unlink(fnametmp);
270 } else {
271 rprintf(FERROR,"rename %s -> %s : %s\n",
272 fnametmp,fname,strerror(errno));
273 do_unlink(fnametmp);
274 }
275 } else {
276 set_perms(fname,file,NULL,0);
277 }
278}
279
280
dc5ddbcc 281