/* libguestfs - the guestfsd daemon
- * Copyright (C) 2009 Red Hat Inc.
+ * Copyright (C) 2009 Red Hat Inc.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
#include <config.h>
-#define _GNU_SOURCE /* for futimens(2) and getline(3) */
-
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "actions.h"
int
-do_touch (const char *path)
+do_touch (char *path)
{
int fd;
+ int r;
NEED_ROOT (-1);
ABS_PATH (path, -1);
CHROOT_IN;
- fd = open (path, O_WRONLY | O_CREAT | O_NOCTTY | O_NONBLOCK, 0666);
+ fd = open (path, O_WRONLY | O_CREAT | O_NOCTTY, 0666);
CHROOT_OUT;
if (fd == -1) {
return -1;
}
- if (futimens (fd, NULL) == -1) {
+#ifdef HAVE_FUTIMENS
+ r = futimens (fd, NULL);
+#else
+ r = futimes (fd, NULL);
+#endif
+ if (r == -1) {
reply_with_perror ("futimens: %s", path);
close (fd);
return -1;
}
- close (fd);
+ if (close (fd) == -1) {
+ reply_with_perror ("close: %s", path);
+ return -1;
+ }
+
return 0;
}
char *
-do_cat (const char *path)
+do_cat (char *path)
{
int fd;
int alloc, size, r, max;
}
char **
-do_read_lines (const char *path)
+do_read_lines (char *path)
{
char **r = NULL;
int size = 0, alloc = 0;
}
int
-do_rm (const char *path)
+do_rm (char *path)
{
int r;
}
int
-do_chmod (int mode, const char *path)
+do_chmod (int mode, char *path)
{
int r;
}
int
-do_chown (int owner, int group, const char *path)
+do_chown (int owner, int group, char *path)
{
int r;
return 0;
}
+
+int
+do_exists (char *path)
+{
+ int r;
+
+ NEED_ROOT (-1);
+ ABS_PATH (path, -1);
+
+ CHROOT_IN;
+ r = access (path, F_OK);
+ CHROOT_OUT;
+
+ return r == 0;
+}
+
+int
+do_is_file (char *path)
+{
+ int r;
+ struct stat buf;
+
+ NEED_ROOT (-1);
+ ABS_PATH (path, -1);
+
+ CHROOT_IN;
+ r = lstat (path, &buf);
+ CHROOT_OUT;
+
+ if (r == -1) {
+ if (errno != ENOENT && errno != ENOTDIR) {
+ reply_with_perror ("stat: %s", path);
+ return -1;
+ }
+ else
+ return 0; /* Not a file. */
+ }
+
+ return S_ISREG (buf.st_mode);
+}
+
+int
+do_write_file (char *path, char *content, int size)
+{
+ int fd;
+
+ NEED_ROOT (-1);
+ ABS_PATH (path, -1);
+
+ if (size == 0)
+ size = strlen (content);
+
+ CHROOT_IN;
+ fd = open (path, O_WRONLY | O_TRUNC | O_CREAT | O_NOCTTY, 0666);
+ CHROOT_OUT;
+
+ if (fd == -1) {
+ reply_with_perror ("open: %s", path);
+ return -1;
+ }
+
+ if (xwrite (fd, content, size) == -1) {
+ reply_with_perror ("write");
+ close (fd);
+ return -1;
+ }
+
+ if (close (fd) == -1) {
+ reply_with_perror ("close: %s", path);
+ return -1;
+ }
+
+ return 0;
+}
+
+char *
+do_read_file (char *path, size_t *size_r)
+{
+ int fd;
+ struct stat statbuf;
+ char *r;
+
+ NEED_ROOT (NULL);
+ ABS_PATH (path, NULL);
+
+ CHROOT_IN;
+ fd = open (path, O_RDONLY);
+ CHROOT_OUT;
+
+ if (fd == -1) {
+ reply_with_perror ("open: %s", path);
+ return NULL;
+ }
+
+ if (fstat (fd, &statbuf) == -1) {
+ reply_with_perror ("fstat: %s", path);
+ close (fd);
+ return NULL;
+ }
+
+ *size_r = statbuf.st_size;
+ /* The actual limit on messages is smaller than this. This
+ * check just limits the amount of memory we'll try and allocate
+ * here. If the message is larger than the real limit, that will
+ * be caught later when we try to serialize the message.
+ */
+ if (*size_r >= GUESTFS_MESSAGE_MAX) {
+ reply_with_error ("read_file: %s: file is too large for the protocol, use guestfs_download instead", path);
+ close (fd);
+ return NULL;
+ }
+ r = malloc (*size_r);
+ if (r == NULL) {
+ reply_with_perror ("malloc");
+ close (fd);
+ return NULL;
+ }
+
+ if (xread (fd, r, *size_r) == -1) {
+ reply_with_perror ("read: %s", path);
+ close (fd);
+ free (r);
+ return NULL;
+ }
+
+ if (close (fd) == -1) {
+ reply_with_perror ("close: %s", path);
+ free (r);
+ return NULL;
+ }
+
+ return r;
+}
+
+/* This runs the 'file' command. */
+char *
+do_file (char *path)
+{
+ char *out, *err;
+ int r, freeit = 0;
+ char *buf;
+ int len;
+
+ NEED_ROOT_OR_IS_DEVICE (path, NULL);
+ ABS_PATH (path, NULL);
+
+ if (strncmp (path, "/dev/", 5) == 0)
+ buf = (char *) path;
+ else {
+ buf = sysroot_path (path);
+ if (!buf) {
+ reply_with_perror ("malloc");
+ return NULL;
+ }
+ freeit = 1;
+ }
+
+ /* file(1) manpage claims "file returns 0 on success, and non-zero on
+ * error", but this is evidently not true. It always returns 0, in
+ * every scenario I can think up. So check the target is readable
+ * first.
+ */
+ if (access (buf, R_OK) == -1) {
+ if (freeit) free (buf);
+ reply_with_perror ("access: %s", path);
+ return NULL;
+ }
+
+ r = command (&out, &err, "file", "-zbsL", buf, NULL);
+ if (freeit) free (buf);
+
+ if (r == -1) {
+ free (out);
+ reply_with_error ("file: %s: %s", path, err);
+ free (err);
+ return NULL;
+ }
+ free (err);
+
+ /* We need to remove the trailing \n from output of file(1). */
+ len = strlen (out);
+ if (out[len-1] == '\n')
+ out[len-1] = '\0';
+
+ return out; /* caller frees */
+}
+
+/* zcat | file */
+char *
+do_zfile (char *method, char *path)
+{
+ int len;
+ const char *zcat;
+ char *cmd;
+ FILE *fp;
+ char line[256];
+
+ NEED_ROOT (NULL);
+ ABS_PATH (path, NULL);
+
+ if (strcmp (method, "gzip") == 0 || strcmp (method, "compress") == 0)
+ zcat = "zcat";
+ else if (strcmp (method, "bzip2") == 0)
+ zcat = "bzcat";
+ else {
+ reply_with_error ("zfile: unknown method");
+ return NULL;
+ }
+
+ if (asprintf_nowarn (&cmd, "%s %R | file -bsL -", zcat, path) == -1) {
+ reply_with_perror ("asprintf");
+ return NULL;
+ }
+
+ if (verbose)
+ fprintf (stderr, "%s\n", cmd);
+
+ fp = popen (cmd, "r");
+ if (fp == NULL) {
+ reply_with_perror ("%s", cmd);
+ free (cmd);
+ return NULL;
+ }
+
+ free (cmd);
+
+ if (fgets (line, sizeof line, fp) == NULL) {
+ reply_with_perror ("zfile: fgets");
+ fclose (fp);
+ return NULL;
+ }
+
+ if (fclose (fp) == -1) {
+ reply_with_perror ("zfile: fclose");
+ return NULL;
+ }
+
+ len = strlen (line);
+ if (len > 0 && line[len-1] == '\n')
+ line[len-1] = '\0';
+
+ return strdup (line);
+}