]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/basic/conf-files.c
util: introduce memcmp_safe()
[thirdparty/systemd.git] / src / basic / conf-files.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <dirent.h>
4 #include <errno.h>
5 #include <stdarg.h>
6 #include <stdio.h>
7 #include <stdlib.h>
8 #include <string.h>
9
10 #include "conf-files.h"
11 #include "def.h"
12 #include "dirent-util.h"
13 #include "fd-util.h"
14 #include "hashmap.h"
15 #include "log.h"
16 #include "macro.h"
17 #include "missing.h"
18 #include "path-util.h"
19 #include "set.h"
20 #include "stat-util.h"
21 #include "string-util.h"
22 #include "strv.h"
23 #include "terminal-util.h"
24 #include "util.h"
25
26 static int files_add(
27 Hashmap *h,
28 Set *masked,
29 const char *suffix,
30 const char *root,
31 unsigned flags,
32 const char *path) {
33
34 _cleanup_closedir_ DIR *dir = NULL;
35 const char *dirpath;
36 struct dirent *de;
37 int r;
38
39 assert(h);
40 assert((flags & CONF_FILES_FILTER_MASKED) == 0 || masked);
41 assert(path);
42
43 dirpath = prefix_roota(root, path);
44
45 dir = opendir(dirpath);
46 if (!dir) {
47 if (errno == ENOENT)
48 return 0;
49
50 return log_debug_errno(errno, "Failed to open directory '%s': %m", dirpath);
51 }
52
53 FOREACH_DIRENT(de, dir, return -errno) {
54 struct stat st;
55 char *p, *key;
56
57 /* Does this match the suffix? */
58 if (suffix && !endswith(de->d_name, suffix))
59 continue;
60
61 /* Has this file already been found in an earlier directory? */
62 if (hashmap_contains(h, de->d_name)) {
63 log_debug("Skipping overridden file '%s/%s'.", dirpath, de->d_name);
64 continue;
65 }
66
67 /* Has this been masked in an earlier directory? */
68 if ((flags & CONF_FILES_FILTER_MASKED) && set_contains(masked, de->d_name)) {
69 log_debug("File '%s/%s' is masked by previous entry.", dirpath, de->d_name);
70 continue;
71 }
72
73 /* Read file metadata if we shall validate the check for file masks, for node types or whether the node is marked executable. */
74 if (flags & (CONF_FILES_FILTER_MASKED|CONF_FILES_REGULAR|CONF_FILES_DIRECTORY|CONF_FILES_EXECUTABLE))
75 if (fstatat(dirfd(dir), de->d_name, &st, 0) < 0) {
76 log_debug_errno(errno, "Failed to stat '%s/%s', ignoring: %m", dirpath, de->d_name);
77 continue;
78 }
79
80 /* Is this a masking entry? */
81 if ((flags & CONF_FILES_FILTER_MASKED))
82 if (null_or_empty(&st)) {
83 /* Mark this one as masked */
84 r = set_put_strdup(masked, de->d_name);
85 if (r < 0)
86 return r;
87
88 log_debug("File '%s/%s' is a mask.", dirpath, de->d_name);
89 continue;
90 }
91
92 /* Does this node have the right type? */
93 if (flags & (CONF_FILES_REGULAR|CONF_FILES_DIRECTORY))
94 if (!((flags & CONF_FILES_DIRECTORY) && S_ISDIR(st.st_mode)) &&
95 !((flags & CONF_FILES_REGULAR) && S_ISREG(st.st_mode))) {
96 log_debug("Ignoring '%s/%s', as it is not a of the right type.", dirpath, de->d_name);
97 continue;
98 }
99
100 /* Does this node have the executable bit set? */
101 if (flags & CONF_FILES_EXECUTABLE)
102 /* As requested: check if the file is marked exectuable. Note that we don't check access(X_OK)
103 * here, as we care about whether the file is marked executable at all, and not whether it is
104 * executable for us, because if so, such errors are stuff we should log about. */
105
106 if ((st.st_mode & 0111) == 0) { /* not executable */
107 log_debug("Ignoring '%s/%s', as it is not marked executable.", dirpath, de->d_name);
108 continue;
109 }
110
111 if (flags & CONF_FILES_BASENAME) {
112 p = strdup(de->d_name);
113 if (!p)
114 return -ENOMEM;
115
116 key = p;
117 } else {
118 p = strjoin(dirpath, "/", de->d_name);
119 if (!p)
120 return -ENOMEM;
121
122 key = basename(p);
123 }
124
125 r = hashmap_put(h, key, p);
126 if (r < 0) {
127 free(p);
128 return log_debug_errno(r, "Failed to add item to hashmap: %m");
129 }
130
131 assert(r > 0);
132 }
133
134 return 0;
135 }
136
137 static int base_cmp(const void *a, const void *b) {
138 const char *s1, *s2;
139
140 s1 = *(char * const *)a;
141 s2 = *(char * const *)b;
142 return strcmp(basename(s1), basename(s2));
143 }
144
145 static int conf_files_list_strv_internal(char ***strv, const char *suffix, const char *root, unsigned flags, char **dirs) {
146 _cleanup_hashmap_free_ Hashmap *fh = NULL;
147 _cleanup_set_free_free_ Set *masked = NULL;
148 char **files, **p;
149 int r;
150
151 assert(strv);
152
153 /* This alters the dirs string array */
154 if (!path_strv_resolve_uniq(dirs, root))
155 return -ENOMEM;
156
157 fh = hashmap_new(&path_hash_ops);
158 if (!fh)
159 return -ENOMEM;
160
161 if (flags & CONF_FILES_FILTER_MASKED) {
162 masked = set_new(&path_hash_ops);
163 if (!masked)
164 return -ENOMEM;
165 }
166
167 STRV_FOREACH(p, dirs) {
168 r = files_add(fh, masked, suffix, root, flags, *p);
169 if (r == -ENOMEM)
170 return r;
171 if (r < 0)
172 log_debug_errno(r, "Failed to search for files in %s, ignoring: %m", *p);
173 }
174
175 files = hashmap_get_strv(fh);
176 if (!files)
177 return -ENOMEM;
178
179 qsort_safe(files, hashmap_size(fh), sizeof(char *), base_cmp);
180 *strv = files;
181
182 return 0;
183 }
184
185 int conf_files_insert(char ***strv, const char *root, char **dirs, const char *path) {
186 /* Insert a path into strv, at the place honouring the usual sorting rules:
187 * - we first compare by the basename
188 * - and then we compare by dirname, allowing just one file with the given
189 * basename.
190 * This means that we will
191 * - add a new entry if basename(path) was not on the list,
192 * - do nothing if an entry with higher priority was already present,
193 * - do nothing if our new entry matches the existing entry,
194 * - replace the existing entry if our new entry has higher priority.
195 */
196 size_t i;
197 char *t;
198 int r;
199
200 for (i = 0; i < strv_length(*strv); i++) {
201 int c;
202
203 c = base_cmp(*strv + i, &path);
204 if (c == 0) {
205 char **dir;
206
207 /* Oh, we found our spot and it already contains something. */
208 STRV_FOREACH(dir, dirs) {
209 char *p1, *p2;
210
211 p1 = path_startswith((*strv)[i], root);
212 if (p1)
213 /* Skip "/" in *dir, because p1 is without "/" too */
214 p1 = path_startswith(p1, *dir + 1);
215 if (p1)
216 /* Existing entry with higher priority
217 * or same priority, no need to do anything. */
218 return 0;
219
220 p2 = path_startswith(path, *dir);
221 if (p2) {
222 /* Our new entry has higher priority */
223 t = path_join(root, path, NULL);
224 if (!t)
225 return log_oom();
226
227 return free_and_replace((*strv)[i], t);
228 }
229 }
230
231 } else if (c > 0)
232 /* Following files have lower priority, let's go insert our
233 * new entry. */
234 break;
235
236 /* … we are not there yet, let's continue */
237 }
238
239 t = path_join(root, path, NULL);
240 if (!t)
241 return log_oom();
242
243 r = strv_insert(strv, i, t);
244 if (r < 0)
245 free(t);
246 return r;
247 }
248
249 int conf_files_insert_nulstr(char ***strv, const char *root, const char *dirs, const char *path) {
250 _cleanup_strv_free_ char **d = NULL;
251
252 assert(strv);
253
254 d = strv_split_nulstr(dirs);
255 if (!d)
256 return -ENOMEM;
257
258 return conf_files_insert(strv, root, d, path);
259 }
260
261 int conf_files_list_strv(char ***strv, const char *suffix, const char *root, unsigned flags, const char* const* dirs) {
262 _cleanup_strv_free_ char **copy = NULL;
263
264 assert(strv);
265
266 copy = strv_copy((char**) dirs);
267 if (!copy)
268 return -ENOMEM;
269
270 return conf_files_list_strv_internal(strv, suffix, root, flags, copy);
271 }
272
273 int conf_files_list(char ***strv, const char *suffix, const char *root, unsigned flags, const char *dir, ...) {
274 _cleanup_strv_free_ char **dirs = NULL;
275 va_list ap;
276
277 assert(strv);
278
279 va_start(ap, dir);
280 dirs = strv_new_ap(dir, ap);
281 va_end(ap);
282
283 if (!dirs)
284 return -ENOMEM;
285
286 return conf_files_list_strv_internal(strv, suffix, root, flags, dirs);
287 }
288
289 int conf_files_list_nulstr(char ***strv, const char *suffix, const char *root, unsigned flags, const char *dirs) {
290 _cleanup_strv_free_ char **d = NULL;
291
292 assert(strv);
293
294 d = strv_split_nulstr(dirs);
295 if (!d)
296 return -ENOMEM;
297
298 return conf_files_list_strv_internal(strv, suffix, root, flags, d);
299 }
300
301 int conf_files_list_with_replacement(
302 const char *root,
303 char **config_dirs,
304 const char *replacement,
305 char ***files,
306 char **replace_file) {
307
308 _cleanup_strv_free_ char **f = NULL;
309 _cleanup_free_ char *p = NULL;
310 int r;
311
312 assert(config_dirs);
313 assert(files);
314 assert(replace_file || !replacement);
315
316 r = conf_files_list_strv(&f, ".conf", root, 0, (const char* const*) config_dirs);
317 if (r < 0)
318 return log_error_errno(r, "Failed to enumerate config files: %m");
319
320 if (replacement) {
321 r = conf_files_insert(&f, root, config_dirs, replacement);
322 if (r < 0)
323 return log_error_errno(r, "Failed to extend config file list: %m");
324
325 p = path_join(root, replacement, NULL);
326 if (!p)
327 return log_oom();
328 }
329
330 *files = TAKE_PTR(f);
331 if (replace_file)
332 *replace_file = TAKE_PTR(p);
333 return 0;
334 }
335
336 int conf_files_cat(const char *root, const char *name) {
337 _cleanup_strv_free_ char **dirs = NULL, **files = NULL;
338 _cleanup_free_ char *path = NULL;
339 const char *dir;
340 char **t;
341 int r;
342
343 NULSTR_FOREACH(dir, CONF_PATHS_NULSTR("")) {
344 assert(endswith(dir, "/"));
345 r = strv_extendf(&dirs, "%s%s.d", dir, name);
346 if (r < 0)
347 return log_error_errno(r, "Failed to build directory list: %m");
348 }
349
350 r = conf_files_list_strv(&files, ".conf", root, 0, (const char* const*) dirs);
351 if (r < 0)
352 return log_error_errno(r, "Failed to query file list: %m");
353
354 path = path_join(root, "/etc", name);
355 if (!path)
356 return log_oom();
357
358 if (DEBUG_LOGGING) {
359 log_debug("Looking for configuration in:");
360 log_debug(" %s", path);
361 STRV_FOREACH(t, dirs)
362 log_debug(" %s/*.conf", *t);
363 }
364
365 /* show */
366 return cat_files(path, files, CAT_FLAGS_MAIN_FILE_OPTIONAL);
367 }