xref: /dragonfly/usr.bin/find/find.c (revision 956939d5)
1 /*-
2  * Copyright (c) 1991, 1993, 1994
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * This code is derived from software contributed to Berkeley by
6  * Cimarron D. Taylor of the University of California, Berkeley.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. All advertising materials mentioning features or use of this software
17  *    must display the following acknowledgement:
18  *	This product includes software developed by the University of
19  *	California, Berkeley and its contributors.
20  * 4. Neither the name of the University nor the names of its contributors
21  *    may be used to endorse or promote products derived from this software
22  *    without specific prior written permission.
23  *
24  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34  * SUCH DAMAGE.
35  *
36  * @(#)find.c	8.5 (Berkeley) 8/5/94
37  * $FreeBSD: src/usr.bin/find/find.c,v 1.17 2004/05/28 17:17:15 eik Exp $
38  * $DragonFly: src/usr.bin/find/find.c,v 1.6 2005/02/14 20:31:59 cpressey Exp $
39  */
40 
41 #include <sys/types.h>
42 #include <sys/stat.h>
43 
44 #include <err.h>
45 #include <errno.h>
46 #include <fts.h>
47 #include <regex.h>
48 #include <stdio.h>
49 #include <stdlib.h>
50 #include <string.h>
51 
52 #include "find.h"
53 
54 static int find_compare(const FTSENT * const *s1, const FTSENT * const *s2);
55 
56 /*
57  * find_compare --
58  *	tell fts_open() how to order the traversal of the hierarchy.
59  *	This variant gives lexicographical order, i.e., alphabetical
60  *	order within each directory.
61  */
62 static int
63 find_compare(const FTSENT * const *s1, const FTSENT * const *s2)
64 {
65 
66 	return (strcoll((*s1)->fts_name, (*s2)->fts_name));
67 }
68 
69 /*
70  * find_formplan --
71  *	process the command line and create a "plan" corresponding to the
72  *	command arguments.
73  */
74 PLAN *
75 find_formplan(char *argv[])
76 {
77 	PLAN *plan, *tail, *new;
78 
79 	/*
80 	 * for each argument in the command line, determine what kind of node
81 	 * it is, create the appropriate node type and add the new plan node
82 	 * to the end of the existing plan.  The resulting plan is a linked
83 	 * list of plan nodes.  For example, the string:
84 	 *
85 	 *	% find . -name foo -newer bar -print
86 	 *
87 	 * results in the plan:
88 	 *
89 	 *	[-name foo]--> [-newer bar]--> [-print]
90 	 *
91 	 * in this diagram, `[-name foo]' represents the plan node generated
92 	 * by c_name() with an argument of foo and `-->' represents the
93 	 * plan->next pointer.
94 	 */
95 	for (plan = tail = NULL; *argv;) {
96 		if (!(new = find_create(&argv)))
97 			continue;
98 		if (plan == NULL)
99 			tail = plan = new;
100 		else {
101 			tail->next = new;
102 			tail = new;
103 		}
104 	}
105 
106 	/*
107 	 * if the user didn't specify one of -print, -ok or -exec, then -print
108 	 * is assumed so we bracket the current expression with parens, if
109 	 * necessary, and add a -print node on the end.
110 	 */
111 	if (!isoutput) {
112 		OPTION *p;
113 		char **argv1 = 0;
114 
115 		if (plan == NULL) {
116 			p = lookup_option("-print");
117 			new = (p->create)(p, &argv1);
118 			tail = plan = new;
119 		} else {
120 			p = lookup_option("(");
121 			new = (p->create)(p, &argv1);
122 			new->next = plan;
123 			plan = new;
124 			p = lookup_option(")");
125 			new = (p->create)(p, &argv1);
126 			tail->next = new;
127 			tail = new;
128 			p = lookup_option("-print");
129 			new = (p->create)(p, &argv1);
130 			tail->next = new;
131 			tail = new;
132 		}
133 	}
134 
135 	/*
136 	 * the command line has been completely processed into a search plan
137 	 * except for the (, ), !, and -o operators.  Rearrange the plan so
138 	 * that the portions of the plan which are affected by the operators
139 	 * are moved into operator nodes themselves.  For example:
140 	 *
141 	 *	[!]--> [-name foo]--> [-print]
142 	 *
143 	 * becomes
144 	 *
145 	 *	[! [-name foo] ]--> [-print]
146 	 *
147 	 * and
148 	 *
149 	 *	[(]--> [-depth]--> [-name foo]--> [)]--> [-print]
150 	 *
151 	 * becomes
152 	 *
153 	 *	[expr [-depth]-->[-name foo] ]--> [-print]
154 	 *
155 	 * operators are handled in order of precedence.
156 	 */
157 
158 	plan = paren_squish(plan);		/* ()'s */
159 	plan = not_squish(plan);		/* !'s */
160 	plan = or_squish(plan);			/* -o's */
161 	return (plan);
162 }
163 
164 FTS *tree;			/* pointer to top of FTS hierarchy */
165 
166 /*
167  * find_execute --
168  *	take a search plan and an array of search paths and executes the plan
169  *	over all FTSENT's returned for the given search paths.
170  */
171 int
172 find_execute(PLAN *plan, char *paths[])
173 {
174 	FTSENT *entry;
175 	PLAN *p;
176 	int rval;
177 
178 	tree = fts_open(paths, ftsoptions, issort ? find_compare : NULL);
179 	if (tree == NULL)
180 		err(1, "ftsopen");
181 
182 	for (rval = 0; (entry = fts_read(tree)) != NULL;) {
183 		if (maxdepth != -1 && entry->fts_level >= maxdepth) {
184 			if (fts_set(tree, entry, FTS_SKIP))
185 				err(1, "%s", entry->fts_path);
186 		}
187 
188 		switch (entry->fts_info) {
189 		case FTS_D:
190 			if (isdepth)
191 				continue;
192 			break;
193 		case FTS_DP:
194 			if (!isdepth)
195 				continue;
196 			break;
197 		case FTS_DNR:
198 		case FTS_ERR:
199 		case FTS_NS:
200 			fflush(stdout);
201 			warnx("%s: %s",
202 			    entry->fts_path, strerror(entry->fts_errno));
203 			rval = 1;
204 			continue;
205 #ifdef FTS_W
206 		case FTS_W:
207 			continue;
208 #endif /* FTS_W */
209 		}
210 #define	BADCH	" \t\n\\'\""
211 		if (isxargs && strpbrk(entry->fts_path, BADCH)) {
212 			fflush(stdout);
213 			warnx("%s: illegal path", entry->fts_path);
214 			rval = 1;
215 			continue;
216 		}
217 
218 		if (mindepth != -1 && entry->fts_level < mindepth)
219 			continue;
220 
221 		/*
222 		 * Call all the functions in the execution plan until one is
223 		 * false or all have been executed.  This is where we do all
224 		 * the work specified by the user on the command line.
225 		 */
226 		for (p = plan; p && (p->execute)(p, entry); p = p->next);
227 	}
228 	/* Finish any pending -exec ... {} + functions. */
229 	for (p = plan; p != NULL; p = p->next)
230 		if (p->execute == f_exec && p->flags & F_EXECPLUS)
231 			(p->execute)(p, NULL);
232 	if (errno)
233 		err(1, "fts_read");
234 	return (rval);
235 }
236