Commit | Line | Data |
---|---|---|
0f78b815 WD |
1 | /* |
2 | * The filter include/exclude routines. | |
0f2ac855 | 3 | * |
0f78b815 WD |
4 | * Copyright (C) 1996-2001 Andrew Tridgell <tridge@samba.org> |
5 | * Copyright (C) 1996 Paul Mackerras | |
6 | * Copyright (C) 2002 Martin Pool | |
7 | * Copyright (C) 2003, 2004, 2005, 2006 Wayne Davison | |
0f2ac855 | 8 | * |
07a874fd MP |
9 | * This program is free software; you can redistribute it and/or modify |
10 | * it under the terms of the GNU General Public License as published by | |
11 | * the Free Software Foundation; either version 2 of the License, or | |
12 | * (at your option) any later version. | |
0f2ac855 | 13 | * |
07a874fd MP |
14 | * This program is distributed in the hope that it will be useful, |
15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
17 | * GNU General Public License for more details. | |
0f2ac855 | 18 | * |
e7c67065 WD |
19 | * You should have received a copy of the GNU General Public License along |
20 | * with this program; if not, write to the Free Software Foundation, Inc., | |
21 | * 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. | |
07a874fd | 22 | */ |
c627d613 | 23 | |
c627d613 AT |
24 | #include "rsync.h" |
25 | ||
26 | extern int verbose; | |
5a016db9 | 27 | extern int am_server; |
fdc79501 | 28 | extern int am_sender; |
40d38dc0 WD |
29 | extern int eol_nulls; |
30 | extern int list_only; | |
31 | extern int recurse; | |
6dfd07d0 | 32 | extern int io_error; |
1412da7c | 33 | extern int local_server; |
d5782b52 | 34 | extern int prune_empty_dirs; |
ccdb23bb | 35 | extern int ignore_perishable; |
fdc79501 WD |
36 | extern int delete_mode; |
37 | extern int delete_excluded; | |
38 | extern int cvs_exclude; | |
6dfd07d0 WD |
39 | extern int sanitize_paths; |
40 | extern int protocol_version; | |
bf39270e | 41 | extern int module_id; |
40d38dc0 WD |
42 | |
43 | extern char curr_dir[]; | |
6dfd07d0 WD |
44 | extern unsigned int curr_dir_len; |
45 | extern unsigned int module_dirlen; | |
c627d613 | 46 | |
7842418b | 47 | struct filter_list_struct filter_list = { 0, 0, "" }; |
c81a20fb WD |
48 | struct filter_list_struct cvs_filter_list = { 0, 0, " [global CVS]" }; |
49 | struct filter_list_struct server_filter_list = { 0, 0, " [daemon]" }; | |
c627d613 | 50 | |
6dfd07d0 | 51 | /* Need room enough for ":MODS " prefix plus some room to grow. */ |
7842418b | 52 | #define MAX_RULE_PREFIX (16) |
6dfd07d0 | 53 | |
d727f0ff | 54 | #define MODIFIERS_MERGE_FILE "-+Cenw" |
ccdb23bb WD |
55 | #define MODIFIERS_INCL_EXCL "/!Crsp" |
56 | #define MODIFIERS_HIDE_PROTECT "/!p" | |
b6f06b8e | 57 | |
7842418b | 58 | /* The dirbuf is set by push_local_filters() to the current subdirectory |
6dfd07d0 WD |
59 | * relative to curr_dir that is being processed. The path always has a |
60 | * trailing slash appended, and the variable dirbuf_len contains the length | |
61 | * of this path prefix. The path is always absolute. */ | |
62 | static char dirbuf[MAXPATHLEN+1]; | |
63 | static unsigned int dirbuf_len = 0; | |
64 | static int dirbuf_depth; | |
65 | ||
66 | /* This is True when we're scanning parent dirs for per-dir merge-files. */ | |
67 | static BOOL parent_dirscan = False; | |
68 | ||
69 | /* This array contains a list of all the currently active per-dir merge | |
70 | * files. This makes it easier to save the appropriate values when we | |
71 | * "push" down into each subdirectory. */ | |
7842418b | 72 | static struct filter_struct **mergelist_parents; |
6dfd07d0 WD |
73 | static int mergelist_cnt = 0; |
74 | static int mergelist_size = 0; | |
75 | ||
7842418b | 76 | /* Each filter_list_struct describes a singly-linked list by keeping track |
6dfd07d0 WD |
77 | * of both the head and tail pointers. The list is slightly unusual in that |
78 | * a parent-dir's content can be appended to the end of the local list in a | |
79 | * special way: the last item in the local list has its "next" pointer set | |
80 | * to point to the inherited list, but the local list's tail pointer points | |
81 | * at the end of the local list. Thus, if the local list is empty, the head | |
82 | * will be pointing at the inherited content but the tail will be NULL. To | |
83 | * help you visualize this, here are the possible list arrangements: | |
84 | * | |
85 | * Completely Empty Local Content Only | |
86 | * ================================== ==================================== | |
87 | * head -> NULL head -> Local1 -> Local2 -> NULL | |
88 | * tail -> NULL tail -------------^ | |
89 | * | |
90 | * Inherited Content Only Both Local and Inherited Content | |
91 | * ================================== ==================================== | |
92 | * head -> Parent1 -> Parent2 -> NULL head -> L1 -> L2 -> P1 -> P2 -> NULL | |
93 | * tail -> NULL tail ---------^ | |
94 | * | |
95 | * This means that anyone wanting to traverse the whole list to use it just | |
96 | * needs to start at the head and use the "next" pointers until it goes | |
97 | * NULL. To add new local content, we insert the item after the tail item | |
98 | * and update the tail (obviously, if "tail" was NULL, we insert it at the | |
99 | * head). To clear the local list, WE MUST NOT FREE THE INHERITED CONTENT | |
100 | * because it is shared between the current list and our parent list(s). | |
101 | * The easiest way to handle this is to simply truncate the list after the | |
102 | * tail item and then free the local list from the head. When inheriting | |
7842418b | 103 | * the list for a new local dir, we just save off the filter_list_struct |
6dfd07d0 WD |
104 | * values (so we can pop back to them later) and set the tail to NULL. |
105 | */ | |
106 | ||
7842418b | 107 | static void free_filter(struct filter_struct *ex) |
6dfd07d0 WD |
108 | { |
109 | if (ex->match_flags & MATCHFLG_PERDIR_MERGE) { | |
110 | free(ex->u.mergelist->debug_type); | |
111 | free(ex->u.mergelist); | |
112 | mergelist_cnt--; | |
113 | } | |
114 | free(ex->pattern); | |
115 | free(ex); | |
116 | } | |
117 | ||
7842418b | 118 | /* Build a filter structure given a filter pattern. The value in "pat" |
6dfd07d0 | 119 | * is not null-terminated. */ |
fdc79501 WD |
120 | static void add_rule(struct filter_list_struct *listp, const char *pat, |
121 | unsigned int pat_len, uint32 mflags, int xflags) | |
c627d613 | 122 | { |
7842418b | 123 | struct filter_struct *ret; |
f8f72644 | 124 | const char *cp; |
5e972dcf | 125 | unsigned int ex_len; |
c627d613 | 126 | |
6dfd07d0 | 127 | if (verbose > 2) { |
fdc79501 WD |
128 | rprintf(FINFO, "[%s] add_rule(%s%.*s%s)%s\n", |
129 | who_am_i(), get_rule_prefix(mflags, pat, 0, NULL), | |
130 | (int)pat_len, pat, | |
131 | (mflags & MATCHFLG_DIRECTORY) ? "/" : "", | |
6dfd07d0 WD |
132 | listp->debug_type); |
133 | } | |
134 | ||
4fc8140a | 135 | /* These flags also indicate that we're reading a list that |
6d7b3d52 | 136 | * needs to be filtered now, not post-filtered later. */ |
4fc8140a | 137 | if (xflags & (XFLG_ANCHORED2ABS|XFLG_ABS_IF_SLASH)) { |
6d7b3d52 WD |
138 | uint32 mf = mflags & (MATCHFLG_RECEIVER_SIDE|MATCHFLG_SENDER_SIDE); |
139 | if (am_sender) { | |
140 | if (mf == MATCHFLG_RECEIVER_SIDE) | |
141 | return; | |
142 | } else { | |
143 | if (mf == MATCHFLG_SENDER_SIDE) | |
144 | return; | |
145 | } | |
146 | } | |
147 | ||
fdc79501 WD |
148 | if (!(ret = new(struct filter_struct))) |
149 | out_of_memory("add_rule"); | |
5f5be796 | 150 | memset(ret, 0, sizeof ret[0]); |
2b6b4d53 | 151 | |
4fc8140a WD |
152 | if (!(mflags & (MATCHFLG_ABS_PATH | MATCHFLG_MERGE_FILE)) |
153 | && ((xflags & (XFLG_ANCHORED2ABS|XFLG_ABS_IF_SLASH) && *pat == '/') | |
154 | || (xflags & XFLG_ABS_IF_SLASH && strchr(pat, '/') != NULL))) { | |
bf39270e | 155 | mflags |= MATCHFLG_ABS_PATH; |
4fc8140a WD |
156 | if (*pat == '/') |
157 | ex_len = dirbuf_len - module_dirlen - 1; | |
158 | else | |
159 | ex_len = 0; | |
6dfd07d0 | 160 | } else |
f8f72644 | 161 | ex_len = 0; |
fdc79501 WD |
162 | if (!(ret->pattern = new_array(char, ex_len + pat_len + 1))) |
163 | out_of_memory("add_rule"); | |
f8f72644 | 164 | if (ex_len) |
6dfd07d0 | 165 | memcpy(ret->pattern, dirbuf + module_dirlen, ex_len); |
5e972dcf | 166 | strlcpy(ret->pattern + ex_len, pat, pat_len + 1); |
f8f72644 WD |
167 | pat_len += ex_len; |
168 | ||
169 | if (strpbrk(ret->pattern, "*[?")) { | |
5e972dcf | 170 | mflags |= MATCHFLG_WILD; |
96d3590a | 171 | if ((cp = strstr(ret->pattern, "**")) != NULL) { |
5e972dcf | 172 | mflags |= MATCHFLG_WILD2; |
170381c0 | 173 | /* If the pattern starts with **, note that. */ |
96d3590a | 174 | if (cp == ret->pattern) |
5e972dcf | 175 | mflags |= MATCHFLG_WILD2_PREFIX; |
e5daa273 WD |
176 | /* If the pattern ends with ***, note that. */ |
177 | if (pat_len >= 3 | |
178 | && ret->pattern[pat_len-3] == '*' | |
179 | && ret->pattern[pat_len-2] == '*' | |
180 | && ret->pattern[pat_len-1] == '*') | |
181 | mflags |= MATCHFLG_WILD3_SUFFIX; | |
0f2ac855 | 182 | } |
2bca43f6 | 183 | } |
c627d613 | 184 | |
5be7fa93 WD |
185 | if (pat_len > 1 && ret->pattern[pat_len-1] == '/') { |
186 | ret->pattern[pat_len-1] = 0; | |
5e972dcf | 187 | mflags |= MATCHFLG_DIRECTORY; |
2b6b4d53 | 188 | } |
c627d613 | 189 | |
6dfd07d0 | 190 | if (mflags & MATCHFLG_PERDIR_MERGE) { |
7842418b | 191 | struct filter_list_struct *lp; |
6dfd07d0 WD |
192 | unsigned int len; |
193 | int i; | |
194 | ||
195 | if ((cp = strrchr(ret->pattern, '/')) != NULL) | |
196 | cp++; | |
197 | else | |
198 | cp = ret->pattern; | |
199 | ||
200 | /* If the local merge file was already mentioned, don't | |
201 | * add it again. */ | |
202 | for (i = 0; i < mergelist_cnt; i++) { | |
7842418b | 203 | struct filter_struct *ex = mergelist_parents[i]; |
6dfd07d0 WD |
204 | const char *s = strrchr(ex->pattern, '/'); |
205 | if (s) | |
bf39270e | 206 | s++; |
6dfd07d0 | 207 | else |
bf39270e | 208 | s = ex->pattern; |
6dfd07d0 WD |
209 | len = strlen(s); |
210 | if (len == pat_len - (cp - ret->pattern) | |
211 | && memcmp(s, cp, len) == 0) { | |
7842418b | 212 | free_filter(ret); |
6dfd07d0 WD |
213 | return; |
214 | } | |
215 | } | |
216 | ||
7842418b | 217 | if (!(lp = new_array(struct filter_list_struct, 1))) |
fdc79501 | 218 | out_of_memory("add_rule"); |
6dfd07d0 | 219 | lp->head = lp->tail = NULL; |
fdc79501 WD |
220 | if (asprintf(&lp->debug_type, " [per-dir %s]", cp) < 0) |
221 | out_of_memory("add_rule"); | |
6dfd07d0 WD |
222 | ret->u.mergelist = lp; |
223 | ||
224 | if (mergelist_cnt == mergelist_size) { | |
225 | mergelist_size += 5; | |
226 | mergelist_parents = realloc_array(mergelist_parents, | |
7842418b | 227 | struct filter_struct *, |
6dfd07d0 WD |
228 | mergelist_size); |
229 | if (!mergelist_parents) | |
fdc79501 | 230 | out_of_memory("add_rule"); |
6dfd07d0 WD |
231 | } |
232 | mergelist_parents[mergelist_cnt++] = ret; | |
233 | } else { | |
234 | for (cp = ret->pattern; (cp = strchr(cp, '/')) != NULL; cp++) | |
235 | ret->u.slash_cnt++; | |
236 | } | |
0944563e | 237 | |
c1b29492 WD |
238 | ret->match_flags = mflags; |
239 | ||
6dfd07d0 WD |
240 | if (!listp->tail) { |
241 | ret->next = listp->head; | |
b2aa573b | 242 | listp->head = listp->tail = ret; |
6dfd07d0 WD |
243 | } else { |
244 | ret->next = listp->tail->next; | |
b2aa573b WD |
245 | listp->tail->next = ret; |
246 | listp->tail = ret; | |
247 | } | |
2b6b4d53 AT |
248 | } |
249 | ||
7842418b | 250 | static void clear_filter_list(struct filter_list_struct *listp) |
2b6b4d53 | 251 | { |
6dfd07d0 | 252 | if (listp->tail) { |
7842418b | 253 | struct filter_struct *ent, *next; |
6dfd07d0 WD |
254 | /* Truncate any inherited items from the local list. */ |
255 | listp->tail->next = NULL; | |
256 | /* Now free everything that is left. */ | |
257 | for (ent = listp->head; ent; ent = next) { | |
258 | next = ent->next; | |
7842418b | 259 | free_filter(ent); |
6dfd07d0 WD |
260 | } |
261 | } | |
262 | ||
263 | listp->head = listp->tail = NULL; | |
2b6b4d53 | 264 | } |
c627d613 | 265 | |
6dfd07d0 WD |
266 | /* This returns an expanded (absolute) filename for the merge-file name if |
267 | * the name has any slashes in it OR if the parent_dirscan var is True; | |
268 | * otherwise it returns the original merge_file name. If the len_ptr value | |
269 | * is non-NULL the merge_file name is limited by the referenced length | |
270 | * value and will be updated with the length of the resulting name. We | |
271 | * always return a name that is null terminated, even if the merge_file | |
272 | * name was not. */ | |
273 | static char *parse_merge_name(const char *merge_file, unsigned int *len_ptr, | |
274 | unsigned int prefix_skip) | |
5be7fa93 | 275 | { |
6dfd07d0 WD |
276 | static char buf[MAXPATHLEN]; |
277 | char *fn, tmpbuf[MAXPATHLEN]; | |
278 | unsigned int fn_len; | |
279 | ||
280 | if (!parent_dirscan && *merge_file != '/') { | |
281 | /* Return the name unchanged it doesn't have any slashes. */ | |
282 | if (len_ptr) { | |
283 | const char *p = merge_file + *len_ptr; | |
284 | while (--p > merge_file && *p != '/') {} | |
285 | if (p == merge_file) { | |
286 | strlcpy(buf, merge_file, *len_ptr + 1); | |
287 | return buf; | |
288 | } | |
289 | } else if (strchr(merge_file, '/') == NULL) | |
290 | return (char *)merge_file; | |
291 | } | |
5be7fa93 | 292 | |
6dfd07d0 WD |
293 | fn = *merge_file == '/' ? buf : tmpbuf; |
294 | if (sanitize_paths) { | |
295 | const char *r = prefix_skip ? "/" : NULL; | |
296 | /* null-terminate the name if it isn't already */ | |
297 | if (len_ptr && merge_file[*len_ptr]) { | |
298 | char *to = fn == buf ? tmpbuf : buf; | |
299 | strlcpy(to, merge_file, *len_ptr + 1); | |
300 | merge_file = to; | |
301 | } | |
91f4b31f | 302 | if (!sanitize_path(fn, merge_file, r, dirbuf_depth, NULL)) { |
6dfd07d0 | 303 | rprintf(FERROR, "merge-file name overflows: %s\n", |
45c49b52 | 304 | merge_file); |
6dfd07d0 WD |
305 | return NULL; |
306 | } | |
798cde47 | 307 | fn_len = strlen(fn); |
6dfd07d0 WD |
308 | } else { |
309 | strlcpy(fn, merge_file, len_ptr ? *len_ptr + 1 : MAXPATHLEN); | |
798cde47 | 310 | fn_len = clean_fname(fn, 1); |
b2aa573b | 311 | } |
0f78b815 | 312 | |
798cde47 WD |
313 | /* If the name isn't in buf yet, it's wasn't absolute. */ |
314 | if (fn != buf) { | |
315 | if (dirbuf_len + fn_len >= MAXPATHLEN) { | |
316 | rprintf(FERROR, "merge-file name overflows: %s\n", fn); | |
317 | return NULL; | |
318 | } | |
319 | memcpy(buf, dirbuf + prefix_skip, dirbuf_len - prefix_skip); | |
320 | memcpy(buf + dirbuf_len - prefix_skip, fn, fn_len + 1); | |
321 | fn_len = clean_fname(buf, 1); | |
6dfd07d0 | 322 | } |
6dfd07d0 | 323 | |
6dfd07d0 WD |
324 | if (len_ptr) |
325 | *len_ptr = fn_len; | |
326 | return buf; | |
327 | } | |
5be7fa93 | 328 | |
6dfd07d0 | 329 | /* Sets the dirbuf and dirbuf_len values. */ |
7842418b | 330 | void set_filter_dir(const char *dir, unsigned int dirlen) |
6dfd07d0 WD |
331 | { |
332 | unsigned int len; | |
333 | if (*dir != '/') { | |
334 | memcpy(dirbuf, curr_dir, curr_dir_len); | |
335 | dirbuf[curr_dir_len] = '/'; | |
336 | len = curr_dir_len + 1; | |
337 | if (len + dirlen >= MAXPATHLEN) | |
338 | dirlen = 0; | |
339 | } else | |
340 | len = 0; | |
341 | memcpy(dirbuf + len, dir, dirlen); | |
342 | dirbuf[dirlen + len] = '\0'; | |
343 | dirbuf_len = clean_fname(dirbuf, 1); | |
344 | if (dirbuf_len > 1 && dirbuf[dirbuf_len-1] == '.' | |
345 | && dirbuf[dirbuf_len-2] == '/') | |
346 | dirbuf_len -= 2; | |
347 | if (dirbuf_len != 1) | |
348 | dirbuf[dirbuf_len++] = '/'; | |
349 | dirbuf[dirbuf_len] = '\0'; | |
350 | if (sanitize_paths) | |
351 | dirbuf_depth = count_dir_elements(dirbuf + module_dirlen); | |
352 | } | |
353 | ||
354 | /* This routine takes a per-dir merge-file entry and finishes its setup. | |
355 | * If the name has a path portion then we check to see if it refers to a | |
356 | * parent directory of the first transfer dir. If it does, we scan all the | |
357 | * dirs from that point through the parent dir of the transfer dir looking | |
358 | * for the per-dir merge-file in each one. */ | |
7842418b | 359 | static BOOL setup_merge_file(struct filter_struct *ex, |
b6f06b8e | 360 | struct filter_list_struct *lp) |
6dfd07d0 WD |
361 | { |
362 | char buf[MAXPATHLEN]; | |
363 | char *x, *y, *pat = ex->pattern; | |
364 | unsigned int len; | |
365 | ||
366 | if (!(x = parse_merge_name(pat, NULL, 0)) || *x != '/') | |
367 | return 0; | |
368 | ||
369 | y = strrchr(x, '/'); | |
370 | *y = '\0'; | |
371 | ex->pattern = strdup(y+1); | |
372 | if (!*x) | |
373 | x = "/"; | |
374 | if (*x == '/') | |
375 | strlcpy(buf, x, MAXPATHLEN); | |
376 | else | |
377 | pathjoin(buf, MAXPATHLEN, dirbuf, x); | |
378 | ||
379 | len = clean_fname(buf, 1); | |
380 | if (len != 1 && len < MAXPATHLEN-1) { | |
381 | buf[len++] = '/'; | |
382 | buf[len] = '\0'; | |
383 | } | |
384 | /* This ensures that the specified dir is a parent of the transfer. */ | |
385 | for (x = buf, y = dirbuf; *x && *x == *y; x++, y++) {} | |
386 | if (*x) | |
387 | y += strlen(y); /* nope -- skip the scan */ | |
388 | ||
389 | parent_dirscan = True; | |
390 | while (*y) { | |
391 | char save[MAXPATHLEN]; | |
392 | strlcpy(save, y, MAXPATHLEN); | |
393 | *y = '\0'; | |
394 | dirbuf_len = y - dirbuf; | |
395 | strlcpy(x, ex->pattern, MAXPATHLEN - (x - buf)); | |
fdc79501 | 396 | parse_filter_file(lp, buf, ex->match_flags, XFLG_ANCHORED2ABS); |
6dfd07d0 WD |
397 | if (ex->match_flags & MATCHFLG_NO_INHERIT) |
398 | lp->head = NULL; | |
399 | lp->tail = NULL; | |
400 | strlcpy(y, save, MAXPATHLEN); | |
401 | while ((*x++ = *y++) != '/') {} | |
402 | } | |
403 | parent_dirscan = False; | |
404 | free(pat); | |
405 | return 1; | |
406 | } | |
407 | ||
408 | /* Each time rsync changes to a new directory it call this function to | |
409 | * handle all the per-dir merge-files. The "dir" value is the current path | |
410 | * relative to curr_dir (which might not be null-terminated). We copy it | |
411 | * into dirbuf so that we can easily append a file name on the end. */ | |
7842418b | 412 | void *push_local_filters(const char *dir, unsigned int dirlen) |
6dfd07d0 | 413 | { |
7842418b | 414 | struct filter_list_struct *ap, *push; |
6dfd07d0 WD |
415 | int i; |
416 | ||
7842418b | 417 | set_filter_dir(dir, dirlen); |
6dfd07d0 | 418 | |
a2b371cd WD |
419 | if (!mergelist_cnt) |
420 | return NULL; | |
421 | ||
7842418b | 422 | push = new_array(struct filter_list_struct, mergelist_cnt); |
6dfd07d0 | 423 | if (!push) |
7842418b | 424 | out_of_memory("push_local_filters"); |
6dfd07d0 WD |
425 | |
426 | for (i = 0, ap = push; i < mergelist_cnt; i++) { | |
427 | memcpy(ap++, mergelist_parents[i]->u.mergelist, | |
7842418b | 428 | sizeof (struct filter_list_struct)); |
6dfd07d0 WD |
429 | } |
430 | ||
fdc79501 | 431 | /* Note: parse_filter_file() might increase mergelist_cnt, so keep |
6dfd07d0 WD |
432 | * this loop separate from the above loop. */ |
433 | for (i = 0; i < mergelist_cnt; i++) { | |
7842418b WD |
434 | struct filter_struct *ex = mergelist_parents[i]; |
435 | struct filter_list_struct *lp = ex->u.mergelist; | |
6dfd07d0 WD |
436 | |
437 | if (verbose > 2) { | |
7842418b | 438 | rprintf(FINFO, "[%s] pushing filter list%s\n", |
6dfd07d0 WD |
439 | who_am_i(), lp->debug_type); |
440 | } | |
441 | ||
442 | lp->tail = NULL; /* Switch any local rules to inherited. */ | |
443 | if (ex->match_flags & MATCHFLG_NO_INHERIT) | |
444 | lp->head = NULL; | |
6dfd07d0 WD |
445 | |
446 | if (ex->match_flags & MATCHFLG_FINISH_SETUP) { | |
447 | ex->match_flags &= ~MATCHFLG_FINISH_SETUP; | |
b6f06b8e | 448 | if (setup_merge_file(ex, lp)) |
7842418b | 449 | set_filter_dir(dir, dirlen); |
6dfd07d0 WD |
450 | } |
451 | ||
452 | if (strlcpy(dirbuf + dirbuf_len, ex->pattern, | |
b6f06b8e | 453 | MAXPATHLEN - dirbuf_len) < MAXPATHLEN - dirbuf_len) { |
fdc79501 WD |
454 | parse_filter_file(lp, dirbuf, ex->match_flags, |
455 | XFLG_ANCHORED2ABS); | |
b6f06b8e | 456 | } else { |
6dfd07d0 WD |
457 | io_error |= IOERR_GENERAL; |
458 | rprintf(FINFO, | |
7842418b | 459 | "cannot add local filter rules in long-named directory: %s\n", |
6dfd07d0 WD |
460 | full_fname(dirbuf)); |
461 | } | |
462 | dirbuf[dirbuf_len] = '\0'; | |
463 | } | |
464 | ||
465 | return (void*)push; | |
466 | } | |
467 | ||
7842418b | 468 | void pop_local_filters(void *mem) |
6dfd07d0 | 469 | { |
7842418b | 470 | struct filter_list_struct *ap, *pop = (struct filter_list_struct*)mem; |
6dfd07d0 WD |
471 | int i; |
472 | ||
473 | for (i = mergelist_cnt; i-- > 0; ) { | |
7842418b WD |
474 | struct filter_struct *ex = mergelist_parents[i]; |
475 | struct filter_list_struct *lp = ex->u.mergelist; | |
6dfd07d0 WD |
476 | |
477 | if (verbose > 2) { | |
7842418b | 478 | rprintf(FINFO, "[%s] popping filter list%s\n", |
6dfd07d0 WD |
479 | who_am_i(), lp->debug_type); |
480 | } | |
481 | ||
7842418b | 482 | clear_filter_list(lp); |
6dfd07d0 WD |
483 | } |
484 | ||
a2b371cd WD |
485 | if (!pop) |
486 | return; | |
487 | ||
6dfd07d0 WD |
488 | for (i = 0, ap = pop; i < mergelist_cnt; i++) { |
489 | memcpy(mergelist_parents[i]->u.mergelist, ap++, | |
7842418b | 490 | sizeof (struct filter_list_struct)); |
6dfd07d0 WD |
491 | } |
492 | ||
493 | free(pop); | |
5be7fa93 WD |
494 | } |
495 | ||
7842418b | 496 | static int rule_matches(char *name, struct filter_struct *ex, int name_is_dir) |
2b6b4d53 | 497 | { |
e5daa273 | 498 | int slash_handling, str_cnt = 0, anchored_match = 0; |
f2ae9e85 | 499 | int ret_match = ex->match_flags & MATCHFLG_NEGATE ? 0 : 1; |
e5daa273 WD |
500 | char *p, *pattern = ex->pattern; |
501 | const char *strings[16]; /* more than enough */ | |
2b6b4d53 | 502 | |
29930a9f WD |
503 | if (*name == '/') |
504 | name++; | |
9f186578 WD |
505 | if (!*name) |
506 | return 0; | |
507 | ||
6dfd07d0 | 508 | if (!ex->u.slash_cnt && !(ex->match_flags & MATCHFLG_WILD2)) { |
770de899 WD |
509 | /* If the pattern does not have any slashes AND it does |
510 | * not have a "**" (which could match a slash), then we | |
511 | * just match the name portion of the path. */ | |
5be7fa93 WD |
512 | if ((p = strrchr(name,'/')) != NULL) |
513 | name = p+1; | |
770de899 | 514 | } else if (ex->match_flags & MATCHFLG_ABS_PATH && *name != '/' |
6dfd07d0 | 515 | && curr_dir_len > module_dirlen + 1) { |
770de899 WD |
516 | /* If we're matching against an absolute-path pattern, |
517 | * we need to prepend our full path info. */ | |
e5daa273 WD |
518 | strings[str_cnt++] = curr_dir + module_dirlen + 1; |
519 | strings[str_cnt++] = "/"; | |
520 | } else if (ex->match_flags & MATCHFLG_WILD2_PREFIX && *name != '/') { | |
521 | /* Allow "**"+"/" to match at the start of the string. */ | |
522 | strings[str_cnt++] = "/"; | |
5be7fa93 | 523 | } |
e5daa273 WD |
524 | strings[str_cnt++] = name; |
525 | if (name_is_dir) { | |
526 | /* Allow a trailing "/"+"***" to match the directory. */ | |
527 | if (ex->match_flags & MATCHFLG_WILD3_SUFFIX) | |
528 | strings[str_cnt++] = "/"; | |
529 | } else if (ex->match_flags & MATCHFLG_DIRECTORY) | |
f2ae9e85 | 530 | return !ret_match; |
e5daa273 | 531 | strings[str_cnt] = NULL; |
2b6b4d53 | 532 | |
170381c0 | 533 | if (*pattern == '/') { |
770de899 | 534 | anchored_match = 1; |
2b6b4d53 AT |
535 | pattern++; |
536 | } | |
537 | ||
e5daa273 WD |
538 | if (!anchored_match && ex->u.slash_cnt |
539 | && !(ex->match_flags & MATCHFLG_WILD2)) { | |
170381c0 WD |
540 | /* A non-anchored match with an infix slash and no "**" |
541 | * needs to match the last slash_cnt+1 name elements. */ | |
e5daa273 WD |
542 | slash_handling = ex->u.slash_cnt + 1; |
543 | } else if (!anchored_match && !(ex->match_flags & MATCHFLG_WILD2_PREFIX) | |
544 | && ex->match_flags & MATCHFLG_WILD2) { | |
545 | /* A non-anchored match with an infix or trailing "**" (but not | |
546 | * a prefixed "**") needs to try matching after every slash. */ | |
547 | slash_handling = -1; | |
548 | } else { | |
549 | /* The pattern matches only at the start of the path or name. */ | |
550 | slash_handling = 0; | |
551 | } | |
552 | ||
553 | if (ex->match_flags & MATCHFLG_WILD) { | |
554 | if (wildmatch_array(pattern, strings, slash_handling)) | |
555 | return ret_match; | |
556 | } else if (str_cnt > 1) { | |
557 | if (litmatch_array(pattern, strings, slash_handling)) | |
f2ae9e85 | 558 | return ret_match; |
770de899 | 559 | } else if (anchored_match) { |
48ecccce | 560 | if (strcmp(name, pattern) == 0) |
f2ae9e85 | 561 | return ret_match; |
2b6b4d53 AT |
562 | } else { |
563 | int l1 = strlen(name); | |
ea2111d1 | 564 | int l2 = strlen(pattern); |
0f2ac855 | 565 | if (l2 <= l1 && |
ea2111d1 | 566 | strcmp(name+(l1-l2),pattern) == 0 && |
170381c0 | 567 | (l1==l2 || name[l1-(l2+1)] == '/')) { |
f2ae9e85 | 568 | return ret_match; |
c36cd317 | 569 | } |
2b6b4d53 AT |
570 | } |
571 | ||
f2ae9e85 | 572 | return !ret_match; |
c627d613 AT |
573 | } |
574 | ||
575 | ||
7842418b WD |
576 | static void report_filter_result(char const *name, |
577 | struct filter_struct const *ent, | |
578 | int name_is_dir, const char *type) | |
d567322f | 579 | { |
0f2ac855 | 580 | /* If a trailing slash is present to match only directories, |
fdc79501 | 581 | * then it is stripped out by add_rule(). So as a special |
0f2ac855 WD |
582 | * case we add it back in here. */ |
583 | ||
ea847c62 | 584 | if (verbose >= 2) { |
d5782b52 WD |
585 | static char *actions[2][2] |
586 | = { {"show", "hid"}, {"risk", "protect"} }; | |
587 | const char *w = who_am_i(); | |
588 | rprintf(FINFO, "[%s] %sing %s %s because of pattern %s%s%s\n", | |
589 | w, actions[*w!='s'][!(ent->match_flags&MATCHFLG_INCLUDE)], | |
590 | name_is_dir ? "directory" : "file", name, ent->pattern, | |
591 | ent->match_flags & MATCHFLG_DIRECTORY ? "/" : "", type); | |
ea847c62 | 592 | } |
d567322f MP |
593 | } |
594 | ||
595 | ||
596 | /* | |
a6536635 WD |
597 | * Return -1 if file "name" is defined to be excluded by the specified |
598 | * exclude list, 1 if it is included, and 0 if it was not matched. | |
d567322f | 599 | */ |
7842418b | 600 | int check_filter(struct filter_list_struct *listp, char *name, int name_is_dir) |
c627d613 | 601 | { |
7842418b | 602 | struct filter_struct *ent; |
c627d613 | 603 | |
b2aa573b | 604 | for (ent = listp->head; ent; ent = ent->next) { |
ccdb23bb WD |
605 | if (ignore_perishable && ent->match_flags & MATCHFLG_PERISHABLE) |
606 | continue; | |
6dfd07d0 | 607 | if (ent->match_flags & MATCHFLG_PERDIR_MERGE) { |
7842418b WD |
608 | int rc = check_filter(ent->u.mergelist, name, |
609 | name_is_dir); | |
6dfd07d0 WD |
610 | if (rc) |
611 | return rc; | |
612 | continue; | |
613 | } | |
fdc79501 WD |
614 | if (ent->match_flags & MATCHFLG_CVS_IGNORE) { |
615 | int rc = check_filter(&cvs_filter_list, name, | |
616 | name_is_dir); | |
617 | if (rc) | |
618 | return rc; | |
619 | continue; | |
620 | } | |
7842418b WD |
621 | if (rule_matches(name, ent, name_is_dir)) { |
622 | report_filter_result(name, ent, name_is_dir, | |
67340e95 | 623 | listp->debug_type); |
5e972dcf | 624 | return ent->match_flags & MATCHFLG_INCLUDE ? 1 : -1; |
0f2ac855 | 625 | } |
2b6b4d53 | 626 | } |
c627d613 | 627 | |
2b6b4d53 | 628 | return 0; |
c627d613 AT |
629 | } |
630 | ||
345e0988 | 631 | #define RULE_STRCMP(s,r) rule_strcmp((s), (r), sizeof (r) - 1) |
a1ac8edd | 632 | |
4adbb5f2 | 633 | static const uchar *rule_strcmp(const uchar *str, const char *rule, int rule_len) |
a1ac8edd | 634 | { |
4adbb5f2 | 635 | if (strncmp((char*)str, rule, rule_len) != 0) |
a1ac8edd WD |
636 | return NULL; |
637 | if (isspace(str[rule_len]) || str[rule_len] == '_' || !str[rule_len]) | |
638 | return str + rule_len - 1; | |
639 | if (str[rule_len] == ',') | |
640 | return str + rule_len; | |
641 | return NULL; | |
642 | } | |
c627d613 | 643 | |
f8f72644 WD |
644 | /* Get the next include/exclude arg from the string. The token will not |
645 | * be '\0' terminated, so use the returned length to limit the string. | |
646 | * Also, be sure to add this length to the returned pointer before passing | |
e425fbe8 | 647 | * it back to ask for the next token. This routine parses the "!" (list- |
b6f06b8e WD |
648 | * clearing) token and (depending on the mflags) the various prefixes. |
649 | * The *mflags_ptr value will be set on exit to the new MATCHFLG_* bits | |
650 | * for the current token. */ | |
fdc79501 WD |
651 | static const char *parse_rule_tok(const char *p, uint32 mflags, int xflags, |
652 | unsigned int *len_ptr, uint32 *mflags_ptr) | |
f8f72644 | 653 | { |
fdc79501 WD |
654 | const uchar *s = (const uchar *)p; |
655 | uint32 new_mflags; | |
656 | unsigned int len; | |
f8f72644 | 657 | |
b6f06b8e | 658 | if (mflags & MATCHFLG_WORD_SPLIT) { |
96d3590a WD |
659 | /* Skip over any initial whitespace. */ |
660 | while (isspace(*s)) | |
f8f72644 | 661 | s++; |
6dfd07d0 | 662 | /* Update to point to real start of rule. */ |
abca4eba | 663 | p = (const char *)s; |
f8f72644 | 664 | } |
6dfd07d0 WD |
665 | if (!*s) |
666 | return NULL; | |
667 | ||
b6f06b8e WD |
668 | new_mflags = mflags & MATCHFLGS_FROM_CONTAINER; |
669 | ||
670 | /* Figure out what kind of a filter rule "s" is pointing at. Note | |
671 | * that if MATCHFLG_NO_PREFIXES is set, the rule is either an include | |
672 | * or an exclude based on the inheritance of the MATCHFLG_INCLUDE | |
673 | * flag (above). XFLG_OLD_PREFIXES indicates a compatibility mode | |
674 | * for old include/exclude patterns where just "+ " and "- " are | |
675 | * allowed as optional prefixes. */ | |
676 | if (mflags & MATCHFLG_NO_PREFIXES) { | |
a1ac8edd | 677 | if (*s == '!' && mflags & MATCHFLG_CVS_IGNORE) |
b6f06b8e WD |
678 | new_mflags |= MATCHFLG_CLEAR_LIST; /* Tentative! */ |
679 | } else if (xflags & XFLG_OLD_PREFIXES) { | |
680 | if (*s == '-' && s[1] == ' ') { | |
681 | new_mflags &= ~MATCHFLG_INCLUDE; | |
682 | s += 2; | |
683 | } else if (*s == '+' && s[1] == ' ') { | |
684 | new_mflags |= MATCHFLG_INCLUDE; | |
685 | s += 2; | |
664cf327 | 686 | } else if (*s == '!') |
b6f06b8e WD |
687 | new_mflags |= MATCHFLG_CLEAR_LIST; /* Tentative! */ |
688 | } else { | |
a1ac8edd | 689 | char ch = 0, *mods = ""; |
6dfd07d0 | 690 | switch (*s) { |
a1ac8edd | 691 | case 'c': |
345e0988 | 692 | if ((s = RULE_STRCMP(s, "clear")) != NULL) |
a1ac8edd WD |
693 | ch = '!'; |
694 | break; | |
695 | case 'd': | |
345e0988 | 696 | if ((s = RULE_STRCMP(s, "dir-merge")) != NULL) |
a1ac8edd WD |
697 | ch = ':'; |
698 | break; | |
699 | case 'e': | |
345e0988 | 700 | if ((s = RULE_STRCMP(s, "exclude")) != NULL) |
a1ac8edd WD |
701 | ch = '-'; |
702 | break; | |
ed243f8c WD |
703 | case 'h': |
704 | if ((s = RULE_STRCMP(s, "hide")) != NULL) | |
705 | ch = 'H'; | |
706 | break; | |
a1ac8edd | 707 | case 'i': |
345e0988 | 708 | if ((s = RULE_STRCMP(s, "include")) != NULL) |
a1ac8edd WD |
709 | ch = '+'; |
710 | break; | |
711 | case 'm': | |
345e0988 | 712 | if ((s = RULE_STRCMP(s, "merge")) != NULL) |
a1ac8edd WD |
713 | ch = '.'; |
714 | break; | |
ed243f8c WD |
715 | case 'p': |
716 | if ((s = RULE_STRCMP(s, "protect")) != NULL) | |
717 | ch = 'P'; | |
718 | break; | |
719 | case 'r': | |
720 | if ((s = RULE_STRCMP(s, "risk")) != NULL) | |
721 | ch = 'R'; | |
722 | break; | |
723 | case 's': | |
724 | if ((s = RULE_STRCMP(s, "show")) != NULL) | |
725 | ch = 'S'; | |
726 | break; | |
a1ac8edd WD |
727 | default: |
728 | ch = *s; | |
64b761c1 WD |
729 | if (s[1] == ',') |
730 | s++; | |
a1ac8edd WD |
731 | break; |
732 | } | |
733 | switch (ch) { | |
6dfd07d0 | 734 | case ':': |
b6f06b8e WD |
735 | new_mflags |= MATCHFLG_PERDIR_MERGE |
736 | | MATCHFLG_FINISH_SETUP; | |
6dfd07d0 WD |
737 | /* FALL THROUGH */ |
738 | case '.': | |
b6f06b8e WD |
739 | new_mflags |= MATCHFLG_MERGE_FILE; |
740 | mods = MODIFIERS_INCL_EXCL MODIFIERS_MERGE_FILE; | |
6dfd07d0 WD |
741 | break; |
742 | case '+': | |
b6f06b8e | 743 | new_mflags |= MATCHFLG_INCLUDE; |
bf39270e | 744 | /* FALL THROUGH */ |
6dfd07d0 | 745 | case '-': |
b6f06b8e | 746 | mods = MODIFIERS_INCL_EXCL; |
6dfd07d0 | 747 | break; |
ed243f8c WD |
748 | case 'S': |
749 | new_mflags |= MATCHFLG_INCLUDE; | |
750 | /* FALL THROUGH */ | |
751 | case 'H': | |
752 | new_mflags |= MATCHFLG_SENDER_SIDE; | |
753 | mods = MODIFIERS_HIDE_PROTECT; | |
754 | break; | |
755 | case 'R': | |
756 | new_mflags |= MATCHFLG_INCLUDE; | |
757 | /* FALL THROUGH */ | |
758 | case 'P': | |
759 | new_mflags |= MATCHFLG_RECEIVER_SIDE; | |
760 | mods = MODIFIERS_HIDE_PROTECT; | |
761 | break; | |
6dfd07d0 | 762 | case '!': |
b6f06b8e | 763 | new_mflags |= MATCHFLG_CLEAR_LIST; |
6dfd07d0 WD |
764 | mods = NULL; |
765 | break; | |
766 | default: | |
ac1cb938 | 767 | rprintf(FERROR, "Unknown filter rule: `%s'\n", p); |
6dfd07d0 WD |
768 | exit_cleanup(RERR_SYNTAX); |
769 | } | |
bf39270e | 770 | while (mods && *++s && *s != ' ' && *s != '_') { |
6dfd07d0 | 771 | if (strchr(mods, *s) == NULL) { |
b6f06b8e | 772 | if (mflags & MATCHFLG_WORD_SPLIT && isspace(*s)) { |
6dfd07d0 WD |
773 | s--; |
774 | break; | |
775 | } | |
b6f06b8e | 776 | invalid: |
6dfd07d0 | 777 | rprintf(FERROR, |
b6f06b8e | 778 | "invalid modifier sequence at '%c' in filter rule: %s\n", |
6dfd07d0 WD |
779 | *s, p); |
780 | exit_cleanup(RERR_SYNTAX); | |
781 | } | |
782 | switch (*s) { | |
783 | case '-': | |
b6f06b8e WD |
784 | if (new_mflags & MATCHFLG_NO_PREFIXES) |
785 | goto invalid; | |
786 | new_mflags |= MATCHFLG_NO_PREFIXES; | |
6dfd07d0 WD |
787 | break; |
788 | case '+': | |
b6f06b8e WD |
789 | if (new_mflags & MATCHFLG_NO_PREFIXES) |
790 | goto invalid; | |
791 | new_mflags |= MATCHFLG_NO_PREFIXES | |
792 | | MATCHFLG_INCLUDE; | |
6dfd07d0 | 793 | break; |
bf39270e | 794 | case '/': |
b6f06b8e | 795 | new_mflags |= MATCHFLG_ABS_PATH; |
bf39270e | 796 | break; |
f2ae9e85 | 797 | case '!': |
b6f06b8e | 798 | new_mflags |= MATCHFLG_NEGATE; |
f2ae9e85 | 799 | break; |
6dfd07d0 | 800 | case 'C': |
b6f06b8e WD |
801 | if (new_mflags & MATCHFLG_NO_PREFIXES) |
802 | goto invalid; | |
b6f06b8e WD |
803 | new_mflags |= MATCHFLG_NO_PREFIXES |
804 | | MATCHFLG_WORD_SPLIT | |
fdc79501 WD |
805 | | MATCHFLG_NO_INHERIT |
806 | | MATCHFLG_CVS_IGNORE; | |
6dfd07d0 WD |
807 | break; |
808 | case 'e': | |
b6f06b8e | 809 | new_mflags |= MATCHFLG_EXCLUDE_SELF; |
6dfd07d0 WD |
810 | break; |
811 | case 'n': | |
b6f06b8e | 812 | new_mflags |= MATCHFLG_NO_INHERIT; |
6dfd07d0 | 813 | break; |
ccdb23bb WD |
814 | case 'p': |
815 | new_mflags |= MATCHFLG_PERISHABLE; | |
816 | break; | |
ed243f8c WD |
817 | case 'r': |
818 | new_mflags |= MATCHFLG_RECEIVER_SIDE; | |
819 | break; | |
820 | case 's': | |
821 | new_mflags |= MATCHFLG_SENDER_SIDE; | |
822 | break; | |
0b2901b7 | 823 | case 'w': |
b6f06b8e | 824 | new_mflags |= MATCHFLG_WORD_SPLIT; |
6dfd07d0 WD |
825 | break; |
826 | } | |
827 | } | |
828 | if (*s) | |
829 | s++; | |
6dfd07d0 WD |
830 | } |
831 | ||
b6f06b8e | 832 | if (mflags & MATCHFLG_WORD_SPLIT) { |
fdc79501 | 833 | const uchar *cp = s; |
96d3590a WD |
834 | /* Token ends at whitespace or the end of the string. */ |
835 | while (!isspace(*cp) && *cp != '\0') | |
836 | cp++; | |
837 | len = cp - s; | |
838 | } else | |
0eeb1cf8 | 839 | len = strlen((char*)s); |
96d3590a | 840 | |
b6f06b8e | 841 | if (new_mflags & MATCHFLG_CLEAR_LIST) { |
35a388b1 WD |
842 | if (!(mflags & MATCHFLG_NO_PREFIXES) |
843 | && !(xflags & XFLG_OLD_PREFIXES) && len) { | |
6dfd07d0 WD |
844 | rprintf(FERROR, |
845 | "'!' rule has trailing characters: %s\n", p); | |
846 | exit_cleanup(RERR_SYNTAX); | |
847 | } | |
848 | if (len > 1) | |
b6f06b8e | 849 | new_mflags &= ~MATCHFLG_CLEAR_LIST; |
fdc79501 | 850 | } else if (!len && !(new_mflags & MATCHFLG_CVS_IGNORE)) { |
6dfd07d0 WD |
851 | rprintf(FERROR, "unexpected end of filter rule: %s\n", p); |
852 | exit_cleanup(RERR_SYNTAX); | |
853 | } | |
854 | ||
f1678790 | 855 | /* --delete-excluded turns an un-modified include/exclude into a |
48ecccce WD |
856 | * sender-side rule. We also affect per-dir merge files that take |
857 | * no prefixes as a simple optimization. */ | |
f1678790 WD |
858 | if (delete_excluded |
859 | && !(new_mflags & (MATCHFLG_RECEIVER_SIDE|MATCHFLG_SENDER_SIDE)) | |
48ecccce WD |
860 | && (!(new_mflags & MATCHFLG_PERDIR_MERGE) |
861 | || new_mflags & MATCHFLG_NO_PREFIXES)) | |
f1678790 WD |
862 | new_mflags |= MATCHFLG_SENDER_SIDE; |
863 | ||
96d3590a | 864 | *len_ptr = len; |
b6f06b8e | 865 | *mflags_ptr = new_mflags; |
96d3590a | 866 | return (const char *)s; |
f8f72644 WD |
867 | } |
868 | ||
869 | ||
0f78b815 | 870 | static char default_cvsignore[] = |
46db1850 WD |
871 | /* These default ignored items come from the CVS manual. */ |
872 | "RCS SCCS CVS CVS.adm RCSLOG cvslog.* tags TAGS" | |
873 | " .make.state .nse_depinfo *~ #* .#* ,* _$* *$" | |
874 | " *.old *.bak *.BAK *.orig *.rej .del-*" | |
875 | " *.a *.olb *.o *.obj *.so *.exe" | |
876 | " *.Z *.elc *.ln core" | |
877 | /* The rest we added to suit ourself. */ | |
55c41263 | 878 | " .svn/ .bzr/"; |
46db1850 WD |
879 | |
880 | static void get_cvs_excludes(uint32 mflags) | |
881 | { | |
46db1850 | 882 | static int initialized = 0; |
c2f0e4d9 | 883 | char *p, fname[MAXPATHLEN]; |
46db1850 WD |
884 | |
885 | if (initialized) | |
886 | return; | |
887 | initialized = 1; | |
888 | ||
c2f0e4d9 WD |
889 | parse_rule(&cvs_filter_list, default_cvsignore, |
890 | mflags | (protocol_version >= 30 ? MATCHFLG_PERISHABLE : 0), | |
891 | 0); | |
46db1850 WD |
892 | |
893 | p = module_id >= 0 && lp_use_chroot(module_id) ? "/" : getenv("HOME"); | |
894 | if (p && pathjoin(fname, MAXPATHLEN, p, ".cvsignore") < MAXPATHLEN) | |
895 | parse_filter_file(&cvs_filter_list, fname, mflags, 0); | |
896 | ||
897 | parse_rule(&cvs_filter_list, getenv("CVSIGNORE"), mflags, 0); | |
898 | } | |
899 | ||
900 | ||
fdc79501 WD |
901 | void parse_rule(struct filter_list_struct *listp, const char *pattern, |
902 | uint32 mflags, int xflags) | |
c627d613 | 903 | { |
fdc79501 WD |
904 | unsigned int pat_len; |
905 | uint32 new_mflags; | |
6dfd07d0 | 906 | const char *cp, *p; |
5be7fa93 | 907 | |
f8f72644 | 908 | if (!pattern) |
5e7dbaca | 909 | return; |
f8f72644 | 910 | |
b2aa573b | 911 | while (1) { |
6dfd07d0 | 912 | /* Remember that the returned string is NOT '\0' terminated! */ |
fdc79501 | 913 | cp = parse_rule_tok(pattern, mflags, xflags, |
b6f06b8e | 914 | &pat_len, &new_mflags); |
6dfd07d0 | 915 | if (!cp) |
b2aa573b | 916 | break; |
969f7ed5 WD |
917 | |
918 | pattern = cp + pat_len; | |
919 | ||
6dfd07d0 | 920 | if (pat_len >= MAXPATHLEN) { |
969f7ed5 | 921 | rprintf(FERROR, "discarding over-long filter: %.*s\n", |
e8b21fe4 | 922 | (int)pat_len, cp); |
6dfd07d0 WD |
923 | continue; |
924 | } | |
5e972dcf | 925 | |
b6f06b8e | 926 | if (new_mflags & MATCHFLG_CLEAR_LIST) { |
de91e757 WD |
927 | if (verbose > 2) { |
928 | rprintf(FINFO, | |
7842418b | 929 | "[%s] clearing filter list%s\n", |
de91e757 WD |
930 | who_am_i(), listp->debug_type); |
931 | } | |
7842418b | 932 | clear_filter_list(listp); |
5e972dcf WD |
933 | continue; |
934 | } | |
b2aa573b | 935 | |
b6f06b8e | 936 | if (new_mflags & MATCHFLG_MERGE_FILE) { |
fdc79501 WD |
937 | unsigned int len; |
938 | if (!pat_len) { | |
939 | cp = ".cvsignore"; | |
940 | pat_len = 10; | |
941 | } | |
942 | len = pat_len; | |
b6f06b8e | 943 | if (new_mflags & MATCHFLG_EXCLUDE_SELF) { |
969f7ed5 WD |
944 | const char *name = cp + len; |
945 | while (name > cp && name[-1] != '/') name--; | |
946 | len -= name - cp; | |
fdc79501 | 947 | add_rule(listp, name, len, 0, 0); |
b6f06b8e | 948 | new_mflags &= ~MATCHFLG_EXCLUDE_SELF; |
6dfd07d0 WD |
949 | len = pat_len; |
950 | } | |
b6f06b8e | 951 | if (new_mflags & MATCHFLG_PERDIR_MERGE) { |
6dfd07d0 | 952 | if (parent_dirscan) { |
b6f06b8e WD |
953 | if (!(p = parse_merge_name(cp, &len, |
954 | module_dirlen))) | |
6dfd07d0 | 955 | continue; |
fdc79501 | 956 | add_rule(listp, p, len, new_mflags, 0); |
6dfd07d0 WD |
957 | continue; |
958 | } | |
959 | } else { | |
6dfd07d0 WD |
960 | if (!(p = parse_merge_name(cp, &len, 0))) |
961 | continue; | |
fdc79501 WD |
962 | parse_filter_file(listp, p, new_mflags, |
963 | XFLG_FATAL_ERRORS); | |
6dfd07d0 WD |
964 | continue; |
965 | } | |
f8f72644 | 966 | } |
6dfd07d0 | 967 | |
fdc79501 WD |
968 | add_rule(listp, cp, pat_len, new_mflags, xflags); |
969 | ||
970 | if (new_mflags & MATCHFLG_CVS_IGNORE | |
971 | && !(new_mflags & MATCHFLG_MERGE_FILE)) | |
46db1850 | 972 | get_cvs_excludes(new_mflags); |
8c35542d | 973 | } |
c627d613 AT |
974 | } |
975 | ||
c627d613 | 976 | |
fdc79501 WD |
977 | void parse_filter_file(struct filter_list_struct *listp, const char *fname, |
978 | uint32 mflags, int xflags) | |
c627d613 | 979 | { |
5e7dbaca | 980 | FILE *fp; |
3fac51e2 | 981 | char line[BIGPATHBUFLEN]; |
7cd72c79 | 982 | char *eob = line + sizeof line - 1; |
b6f06b8e | 983 | int word_split = mflags & MATCHFLG_WORD_SPLIT; |
ccdff3eb | 984 | |
5be7fa93 WD |
985 | if (!fname || !*fname) |
986 | return; | |
987 | ||
5a016db9 WD |
988 | if (*fname != '-' || fname[1] || am_server) { |
989 | if (server_filter_list.head) { | |
990 | strlcpy(line, fname, sizeof line); | |
991 | clean_fname(line, 1); | |
992 | if (check_filter(&server_filter_list, line, 0) < 0) | |
993 | fp = NULL; | |
994 | else | |
995 | fp = fopen(line, "rb"); | |
996 | } else | |
997 | fp = fopen(fname, "rb"); | |
998 | } else | |
5e7dbaca | 999 | fp = stdin; |
bf39270e WD |
1000 | |
1001 | if (verbose > 2) { | |
fdc79501 | 1002 | rprintf(FINFO, "[%s] parse_filter_file(%s,%x,%x)%s\n", |
45c49b52 | 1003 | who_am_i(), fname, mflags, xflags, |
bf39270e WD |
1004 | fp ? "" : " [not found]"); |
1005 | } | |
1006 | ||
5e7dbaca | 1007 | if (!fp) { |
f8f72644 | 1008 | if (xflags & XFLG_FATAL_ERRORS) { |
a039749b | 1009 | rsyserr(FERROR, errno, |
6dfd07d0 | 1010 | "failed to open %sclude file %s", |
b6f06b8e | 1011 | mflags & MATCHFLG_INCLUDE ? "in" : "ex", |
45c49b52 | 1012 | fname); |
65417579 | 1013 | exit_cleanup(RERR_FILEIO); |
2b6b4d53 | 1014 | } |
5be7fa93 | 1015 | return; |
2b6b4d53 | 1016 | } |
6dfd07d0 WD |
1017 | dirbuf[dirbuf_len] = '\0'; |
1018 | ||
ccdff3eb | 1019 | while (1) { |
5e7dbaca | 1020 | char *s = line; |
619d21ff | 1021 | int ch, overflow = 0; |
ccdff3eb | 1022 | while (1) { |
5e7dbaca | 1023 | if ((ch = getc(fp)) == EOF) { |
61e16468 WD |
1024 | if (ferror(fp) && errno == EINTR) { |
1025 | clearerr(fp); | |
ccdff3eb | 1026 | continue; |
61e16468 | 1027 | } |
ccdff3eb WD |
1028 | break; |
1029 | } | |
40d38dc0 WD |
1030 | if (word_split && isspace(ch)) |
1031 | break; | |
ccdff3eb WD |
1032 | if (eol_nulls? !ch : (ch == '\n' || ch == '\r')) |
1033 | break; | |
1034 | if (s < eob) | |
1035 | *s++ = ch; | |
619d21ff WD |
1036 | else |
1037 | overflow = 1; | |
1038 | } | |
1039 | if (overflow) { | |
7842418b | 1040 | rprintf(FERROR, "discarding over-long filter: %s...\n", line); |
619d21ff | 1041 | s = line; |
ccdff3eb WD |
1042 | } |
1043 | *s = '\0'; | |
7f0feb4d WD |
1044 | /* Skip an empty token and (when line parsing) comments. */ |
1045 | if (*line && (word_split || (*line != ';' && *line != '#'))) | |
fdc79501 | 1046 | parse_rule(listp, line, mflags, xflags); |
5e7dbaca | 1047 | if (ch == EOF) |
ccdff3eb | 1048 | break; |
2b6b4d53 | 1049 | } |
5e7dbaca | 1050 | fclose(fp); |
c627d613 AT |
1051 | } |
1052 | ||
a261103c | 1053 | /* If the "for_xfer" flag is set, the prefix is made compatible with the |
fdc79501 WD |
1054 | * current protocol_version (if possible) or a NULL is returned (if not |
1055 | * possible). */ | |
a261103c | 1056 | char *get_rule_prefix(int match_flags, const char *pat, int for_xfer, |
fdc79501 | 1057 | unsigned int *plen_ptr) |
417b5999 WD |
1058 | { |
1059 | static char buf[MAX_RULE_PREFIX+1]; | |
1060 | char *op = buf; | |
2217b30a | 1061 | int legal_len = for_xfer && protocol_version < 29 ? 1 : MAX_RULE_PREFIX-1; |
417b5999 WD |
1062 | |
1063 | if (match_flags & MATCHFLG_PERDIR_MERGE) { | |
fdc79501 WD |
1064 | if (legal_len == 1) |
1065 | return NULL; | |
417b5999 | 1066 | *op++ = ':'; |
fdc79501 WD |
1067 | } else if (match_flags & MATCHFLG_INCLUDE) |
1068 | *op++ = '+'; | |
1069 | else if (legal_len != 1 | |
1070 | || ((*pat == '-' || *pat == '+') && pat[1] == ' ')) | |
1071 | *op++ = '-'; | |
1072 | else | |
1073 | legal_len = 0; | |
1074 | ||
2a28dd32 WD |
1075 | if (match_flags & MATCHFLG_NEGATE) |
1076 | *op++ = '!'; | |
fdc79501 WD |
1077 | if (match_flags & MATCHFLG_CVS_IGNORE) |
1078 | *op++ = 'C'; | |
1079 | else { | |
417b5999 WD |
1080 | if (match_flags & MATCHFLG_NO_INHERIT) |
1081 | *op++ = 'n'; | |
d09e800a WD |
1082 | if (match_flags & MATCHFLG_WORD_SPLIT) |
1083 | *op++ = 'w'; | |
417b5999 WD |
1084 | if (match_flags & MATCHFLG_NO_PREFIXES) { |
1085 | if (match_flags & MATCHFLG_INCLUDE) | |
1086 | *op++ = '+'; | |
1087 | else | |
1088 | *op++ = '-'; | |
1089 | } | |
417b5999 | 1090 | } |
46db1850 WD |
1091 | if (match_flags & MATCHFLG_EXCLUDE_SELF) |
1092 | *op++ = 'e'; | |
ed243f8c WD |
1093 | if (match_flags & MATCHFLG_SENDER_SIDE |
1094 | && (!for_xfer || protocol_version >= 29)) | |
1095 | *op++ = 's'; | |
1096 | if (match_flags & MATCHFLG_RECEIVER_SIDE | |
1097 | && (!for_xfer || protocol_version >= 29 | |
1098 | || (delete_excluded && am_sender))) | |
1099 | *op++ = 'r'; | |
ccdb23bb WD |
1100 | if (match_flags & MATCHFLG_PERISHABLE) { |
1101 | if (!for_xfer || protocol_version >= 30) | |
1102 | *op++ = 'p'; | |
1103 | else if (am_sender) | |
1104 | return NULL; | |
1105 | } | |
448797a1 WD |
1106 | if (op - buf > legal_len) |
1107 | return NULL; | |
2217b30a WD |
1108 | if (legal_len) |
1109 | *op++ = ' '; | |
417b5999 WD |
1110 | *op = '\0'; |
1111 | if (plen_ptr) | |
1112 | *plen_ptr = op - buf; | |
417b5999 WD |
1113 | return buf; |
1114 | } | |
c627d613 | 1115 | |
fdc79501 | 1116 | static void send_rules(int f_out, struct filter_list_struct *flp) |
c627d613 | 1117 | { |
ed243f8c | 1118 | struct filter_struct *ent, *prev = NULL; |
25cf8893 | 1119 | |
fdc79501 | 1120 | for (ent = flp->head; ent; ent = ent->next) { |
417b5999 | 1121 | unsigned int len, plen, dlen; |
ed243f8c | 1122 | int elide = 0; |
417b5999 | 1123 | char *p; |
2fb139c1 | 1124 | |
f1678790 WD |
1125 | /* Note we need to check delete_excluded here in addition to |
1126 | * the code in parse_rule_tok() because some rules may have | |
48ecccce WD |
1127 | * been added before we found the --delete-excluded option. |
1128 | * We must also elide any CVS merge-file rules to avoid a | |
1129 | * backward compatibility problem, and we elide any no-prefix | |
1130 | * merge files as an optimization (since they can only have | |
1131 | * include/exclude rules). */ | |
ed243f8c WD |
1132 | if (ent->match_flags & MATCHFLG_SENDER_SIDE) |
1133 | elide = am_sender ? 1 : -1; | |
1134 | if (ent->match_flags & MATCHFLG_RECEIVER_SIDE) | |
1135 | elide = elide ? 0 : am_sender ? -1 : 1; | |
97bf86f8 | 1136 | else if (delete_excluded && !elide |
48ecccce WD |
1137 | && (!(ent->match_flags & MATCHFLG_PERDIR_MERGE) |
1138 | || ent->match_flags & MATCHFLG_NO_PREFIXES)) | |
ed243f8c WD |
1139 | elide = am_sender ? 1 : -1; |
1140 | if (elide < 0) { | |
1141 | if (prev) | |
1142 | prev->next = ent->next; | |
1143 | else | |
1144 | flp->head = ent->next; | |
1145 | } else | |
1146 | prev = ent; | |
1147 | if (elide > 0) | |
1148 | continue; | |
fdc79501 WD |
1149 | if (ent->match_flags & MATCHFLG_CVS_IGNORE |
1150 | && !(ent->match_flags & MATCHFLG_MERGE_FILE)) { | |
98e47414 | 1151 | int f = am_sender || protocol_version < 29 ? f_out : -2; |
ed243f8c | 1152 | send_rules(f, &cvs_filter_list); |
98e47414 | 1153 | if (f == f_out) |
417b5999 | 1154 | continue; |
fdc79501 WD |
1155 | } |
1156 | p = get_rule_prefix(ent->match_flags, ent->pattern, 1, &plen); | |
1157 | if (!p) { | |
417b5999 | 1158 | rprintf(FERROR, |
fdc79501 | 1159 | "filter rules are too modern for remote rsync.\n"); |
caf8299e | 1160 | exit_cleanup(RERR_PROTOCOL); |
5f5be796 | 1161 | } |
ed243f8c WD |
1162 | if (f_out < 0) |
1163 | continue; | |
fdc79501 | 1164 | len = strlen(ent->pattern); |
417b5999 | 1165 | dlen = ent->match_flags & MATCHFLG_DIRECTORY ? 1 : 0; |
fdc79501 WD |
1166 | if (!(plen + len + dlen)) |
1167 | continue; | |
1168 | write_int(f_out, plen + len + dlen); | |
417b5999 | 1169 | if (plen) |
fdc79501 WD |
1170 | write_buf(f_out, p, plen); |
1171 | write_buf(f_out, ent->pattern, len); | |
417b5999 | 1172 | if (dlen) |
fdc79501 | 1173 | write_byte(f_out, '/'); |
0f2ac855 | 1174 | } |
ed243f8c | 1175 | flp->tail = prev; |
c627d613 AT |
1176 | } |
1177 | ||
fdc79501 WD |
1178 | /* This is only called by the client. */ |
1179 | void send_filter_list(int f_out) | |
1180 | { | |
d5782b52 WD |
1181 | int receiver_wants_list = prune_empty_dirs |
1182 | || (delete_mode && (!delete_excluded || protocol_version >= 29)); | |
448797a1 WD |
1183 | |
1184 | if (local_server || (am_sender && !receiver_wants_list)) | |
fdc79501 WD |
1185 | f_out = -1; |
1186 | if (cvs_exclude && am_sender) { | |
1187 | if (protocol_version >= 29) | |
1188 | parse_rule(&filter_list, ":C", 0, 0); | |
1189 | parse_rule(&filter_list, "-C", 0, 0); | |
1190 | } | |
c627d613 | 1191 | |
fdc79501 WD |
1192 | /* This is a complete hack - blame Rusty. FIXME! |
1193 | * Remove this hack when older rsyncs (below 2.6.4) are gone. */ | |
1194 | if (list_only == 1 && !recurse) | |
1195 | parse_rule(&filter_list, "/*/*", MATCHFLG_NO_PREFIXES, 0); | |
1196 | ||
ed243f8c WD |
1197 | send_rules(f_out, &filter_list); |
1198 | ||
1199 | if (f_out >= 0) | |
fdc79501 | 1200 | write_int(f_out, 0); |
fdc79501 WD |
1201 | |
1202 | if (cvs_exclude) { | |
1203 | if (!am_sender || protocol_version < 29) | |
1204 | parse_rule(&filter_list, ":C", 0, 0); | |
1205 | if (!am_sender) | |
1206 | parse_rule(&filter_list, "-C", 0, 0); | |
1207 | } | |
1208 | } | |
1209 | ||
1210 | /* This is only called by the server. */ | |
1211 | void recv_filter_list(int f_in) | |
c627d613 | 1212 | { |
3fac51e2 | 1213 | char line[BIGPATHBUFLEN]; |
fdc79501 | 1214 | int xflags = protocol_version >= 29 ? 0 : XFLG_OLD_PREFIXES; |
d5782b52 | 1215 | int receiver_wants_list = prune_empty_dirs |
e257c6c2 WD |
1216 | || (delete_mode |
1217 | && (!delete_excluded || protocol_version >= 29)); | |
fdc79501 WD |
1218 | unsigned int len; |
1219 | ||
448797a1 | 1220 | if (!local_server && (am_sender || receiver_wants_list)) { |
fdc79501 WD |
1221 | while ((len = read_int(f_in)) != 0) { |
1222 | if (len >= sizeof line) | |
a1f99493 | 1223 | overflow_exit("recv_rules"); |
fdc79501 WD |
1224 | read_sbuf(f_in, line, len); |
1225 | parse_rule(&filter_list, line, 0, xflags); | |
1226 | } | |
1227 | } | |
9dd891bb | 1228 | |
fdc79501 | 1229 | if (cvs_exclude) { |
1412da7c | 1230 | if (local_server || am_sender || protocol_version < 29) |
fdc79501 | 1231 | parse_rule(&filter_list, ":C", 0, 0); |
1412da7c | 1232 | if (local_server || am_sender) |
fdc79501 | 1233 | parse_rule(&filter_list, "-C", 0, 0); |
651443a7 | 1234 | } |
ed243f8c WD |
1235 | |
1236 | if (local_server) /* filter out any rules that aren't for us. */ | |
1237 | send_rules(-1, &filter_list); | |
651443a7 | 1238 | } |