]>
Commit | Line | Data |
---|---|---|
0f78b815 WD |
1 | /* |
2 | * Command-line (and received via daemon-socket) option parsing. | |
dfa32483 | 3 | * |
0f78b815 WD |
4 | * Copyright (C) 1998-2001 Andrew Tridgell <tridge@samba.org> |
5 | * Copyright (C) 2000, 2001, 2002 Martin Pool <mbp@samba.org> | |
c5fabfb0 | 6 | * Copyright (C) 2002-2020 Wayne Davison |
dfa32483 | 7 | * |
dafe63ca | 8 | * This program is free software; you can redistribute it and/or modify |
8e41b68e WD |
9 | * it under the terms of the GNU General Public License as published by |
10 | * the Free Software Foundation; either version 3 of the License, or | |
11 | * (at your option) any later version. | |
dfa32483 | 12 | * |
dafe63ca MP |
13 | * This program is distributed in the hope that it will be useful, |
14 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
15 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
16 | * GNU General Public License for more details. | |
dfa32483 | 17 | * |
e7c67065 | 18 | * You should have received a copy of the GNU General Public License along |
4fd842f9 | 19 | * with this program; if not, visit the http://fsf.org website. |
dafe63ca | 20 | */ |
7a6421fa | 21 | |
7a6421fa | 22 | #include "rsync.h" |
5dd14f0c | 23 | #include "itypes.h" |
11eb67ee | 24 | #include "ifuncs.h" |
35bf8fa0 | 25 | #include <popt.h> |
7a6421fa | 26 | |
7bc90b30 | 27 | extern int module_id; |
53936ef9 | 28 | extern int local_server; |
7be73df4 | 29 | extern int sanitize_paths; |
a1018691 | 30 | extern unsigned int module_dirlen; |
7b6c5c77 WD |
31 | extern filter_rule_list filter_list; |
32 | extern filter_rule_list daemon_filter_list; | |
8645af1d | 33 | |
7a6421fa | 34 | int make_backups = 0; |
1bfbf40b MP |
35 | |
36 | /** | |
dfa32483 | 37 | * If 1, send the whole file as literal data rather than trying to |
dafe63ca | 38 | * create an incremental diff. |
1bfbf40b | 39 | * |
dfa32483 | 40 | * If -1, then look at whether we're local or remote and go by that. |
dafe63ca MP |
41 | * |
42 | * @sa disable_deltas_p() | |
1bfbf40b | 43 | **/ |
dfa32483 | 44 | int whole_file = -1; |
1bfbf40b | 45 | |
a015788d | 46 | int append_mode = 0; |
716e73d4 | 47 | int keep_dirlinks = 0; |
2dbf36ef | 48 | int copy_dirlinks = 0; |
7a6421fa | 49 | int copy_links = 0; |
9e9d33a2 | 50 | int write_devices = 0; |
7a6421fa AT |
51 | int preserve_links = 0; |
52 | int preserve_hard_links = 0; | |
1c3344a1 | 53 | int preserve_acls = 0; |
16edf865 | 54 | int preserve_xattrs = 0; |
7a6421fa | 55 | int preserve_perms = 0; |
344f9ba7 | 56 | int preserve_executability = 0; |
7a6421fa | 57 | int preserve_devices = 0; |
b5c6a6ae | 58 | int preserve_specials = 0; |
7a6421fa AT |
59 | int preserve_uid = 0; |
60 | int preserve_gid = 0; | |
61 | int preserve_times = 0; | |
b9367410 | 62 | int preserve_atimes = 0; |
974f49e2 | 63 | int preserve_crtimes = 0; |
7a6421fa | 64 | int update_only = 0; |
87257f86 | 65 | int open_noatime = 0; |
7a6421fa | 66 | int cvs_exclude = 0; |
a5c11139 | 67 | int dry_run = 0; |
11e758a4 | 68 | int do_xfers = 1; |
a5c11139 WD |
69 | int ignore_times = 0; |
70 | int delete_mode = 0; | |
a51b3168 | 71 | int delete_during = 0; |
51d48398 WD |
72 | int delete_before = 0; |
73 | int delete_after = 0; | |
a5c11139 | 74 | int delete_excluded = 0; |
47c11975 | 75 | int remove_source_files = 0; |
a5c11139 | 76 | int one_file_system = 0; |
4f3e9a0f | 77 | int protocol_version = PROTOCOL_VERSION; |
a5c11139 | 78 | int sparse_files = 0; |
28b519c9 | 79 | int preallocate_files = 0; |
a5c11139 | 80 | int do_compression = 0; |
d999efe6 | 81 | int do_compression_level = CLVL_NOT_SPECIFIED; |
9439c0cb | 82 | int am_root = 0; /* 0 = normal, 1 = root, 2 = --super, -1 = --fake-super */ |
7f2a1f65 WD |
83 | int am_server = 0; |
84 | int am_sender = 0; | |
7f2a1f65 | 85 | int am_starting_up = 1; |
ea5164d1 WD |
86 | int relative_paths = -1; |
87 | int implied_dirs = 1; | |
42d8ec61 | 88 | int missing_args = 0; /* 0 = FERROR_XFER, 1 = ignore, 2 = delete */ |
7a6421fa | 89 | int numeric_ids = 0; |
d8941be8 | 90 | int msgs2stderr = 2; /* Default: send errors to stderr for local & remote-shell transfers */ |
5974c662 | 91 | int allow_8bit_chars = 0; |
7a6421fa AT |
92 | int force_delete = 0; |
93 | int io_timeout = 0; | |
876c9936 | 94 | int prune_empty_dirs = 0; |
8487f9cf | 95 | int use_qsort = 0; |
ea5164d1 WD |
96 | char *files_from = NULL; |
97 | int filesfrom_fd = -1; | |
305666bf | 98 | char *filesfrom_host = NULL; |
ea5164d1 | 99 | int eol_nulls = 0; |
4c4a2962 | 100 | int protect_args = -1; |
adc2476f | 101 | int human_readable = 1; |
7a6421fa | 102 | int recurse = 0; |
01742c07 | 103 | int mkpath_dest_arg = 0; |
5275029d | 104 | int allow_inc_recurse = 1; |
b6164938 | 105 | int xfer_dirs = -1; |
1312d9fc | 106 | int am_daemon = 0; |
ba22c9e2 | 107 | int connect_timeout = 0; |
a5c11139 WD |
108 | int keep_partial = 0; |
109 | int safe_symlinks = 0; | |
110 | int copy_unsafe_links = 0; | |
41adbcec | 111 | int munge_symlinks = 0; |
a5c11139 | 112 | int size_only = 0; |
9fb08441 | 113 | int daemon_bwlimit = 0; |
a5c11139 | 114 | int bwlimit = 0; |
c4ed1487 | 115 | int fuzzy_basis = 0; |
3c74c3a3 | 116 | size_t bwlimit_writemax = 0; |
e90aab49 WD |
117 | int ignore_existing = 0; |
118 | int ignore_non_existing = 0; | |
07c6ae7d | 119 | int need_messages_from_generator = 0; |
7b9598b2 | 120 | int max_delete = INT_MIN; |
9510fa9a WD |
121 | OFF_T max_size = -1; |
122 | OFF_T min_size = -1; | |
a5c11139 WD |
123 | int ignore_errors = 0; |
124 | int modify_window = 0; | |
125 | int blocking_io = -1; | |
2289bf64 | 126 | int checksum_seed = 0; |
a3221d2a | 127 | int inplace = 0; |
f06e7082 | 128 | int delay_updates = 0; |
66ca4fc9 | 129 | int32 block_size = 0; |
91fff802 | 130 | time_t stop_at_utime = 0; |
b1e436ec | 131 | char *skip_compress = NULL; |
08650cb1 | 132 | char *copy_as = NULL; |
2206abf8 | 133 | item_list dparam_list = EMPTY_ITEM_LIST; |
b35d0d8e | 134 | |
13e29995 | 135 | /** Network address family. **/ |
24d677fc | 136 | int default_af_hint |
4f5b0756 | 137 | #ifdef INET6 |
24d677fc | 138 | = 0; /* Any protocol */ |
6ab6d4bf | 139 | #else |
24d677fc WD |
140 | = AF_INET; /* Must use IPv4 */ |
141 | # ifdef AF_INET6 | |
142 | # undef AF_INET6 | |
143 | # endif | |
144 | # define AF_INET6 AF_INET /* make -6 option a no-op */ | |
6ab6d4bf | 145 | #endif |
06963d0f | 146 | |
13e29995 MP |
147 | /** Do not go into the background when run as --daemon. Good |
148 | * for debugging and required for running as a service on W32, | |
149 | * or under Unix process-monitors. **/ | |
1f35babc WD |
150 | int no_detach |
151 | #if defined _WIN32 || defined __WIN32__ | |
152 | = 1; | |
153 | #else | |
154 | = 0; | |
155 | #endif | |
13e29995 | 156 | |
088aac85 DD |
157 | int write_batch = 0; |
158 | int read_batch = 0; | |
d175d7e1 WD |
159 | int backup_dir_len = 0; |
160 | int backup_suffix_len; | |
e0391f81 | 161 | unsigned int backup_dir_remainder; |
6902ed17 | 162 | |
d175d7e1 | 163 | char *backup_suffix = NULL; |
7a6421fa | 164 | char *tmpdir = NULL; |
a7260c40 | 165 | char *partial_dir = NULL; |
e012f858 | 166 | char *basis_dir[MAX_BASIS_DIRS+1]; |
30e8c8e1 | 167 | char *config_file = NULL; |
7a6421fa | 168 | char *shell_cmd = NULL; |
87c0f9d6 WD |
169 | char *logfile_name = NULL; |
170 | char *logfile_format = NULL; | |
b3e4e7ef | 171 | char *stdout_format = NULL; |
65575e96 | 172 | char *password_file = NULL; |
e16b2275 | 173 | char *early_input_file = NULL; |
41bd28fe | 174 | char *rsync_path = RSYNC_PATH; |
66203a98 | 175 | char *backup_dir = NULL; |
e0391f81 | 176 | char backup_dir_buf[MAXPATHLEN]; |
831f06a5 | 177 | char *sockopts = NULL; |
2df20057 WD |
178 | char *usermap = NULL; |
179 | char *groupmap = NULL; | |
0c56b1ad | 180 | int rsync_port = 0; |
1d6c9676 | 181 | int alt_dest_type = 0; |
ce0b384f | 182 | int basis_dir_cnt = 0; |
7a6421fa | 183 | |
11eb67ee WD |
184 | #define DEFAULT_MAX_ALLOC (1024L * 1024 * 1024) |
185 | size_t max_alloc = DEFAULT_MAX_ALLOC; | |
186 | char *max_alloc_arg; | |
187 | ||
6b237b0f | 188 | static int version_opt_cnt = 0; |
7a2eca41 WD |
189 | static int remote_option_alloc = 0; |
190 | int remote_option_cnt = 0; | |
191 | const char **remote_options = NULL; | |
a5a7d3a2 | 192 | const char *checksum_choice = NULL; |
2f84a6bd | 193 | const char *compress_choice = NULL; |
7a2eca41 | 194 | |
b86f0cef | 195 | int quiet = 0; |
dc1f7b9e | 196 | int output_motd = 1; |
e7651884 | 197 | int log_before_transfer = 0; |
b3e4e7ef WD |
198 | int stdout_format_has_i = 0; |
199 | int stdout_format_has_o_or_i = 0; | |
87c0f9d6 | 200 | int logfile_format_has_i = 0; |
87c0f9d6 | 201 | int logfile_format_has_o_or_i = 0; |
7a6421fa | 202 | int always_checksum = 0; |
f7632fc6 | 203 | int list_only = 0; |
7a6421fa | 204 | |
9b3318b0 WD |
205 | #define MAX_BATCH_NAME_LEN 256 /* Must be less than MAXPATHLEN-13 */ |
206 | char *batch_name = NULL; | |
6902ed17 | 207 | |
332cf6df | 208 | int need_unsorted_flist = 0; |
2c681b87 | 209 | char *iconv_opt = |
f7a76b9c | 210 | #ifdef ICONV_OPTION |
2c681b87 WD |
211 | ICONV_OPTION; |
212 | #else | |
213 | NULL; | |
332cf6df WD |
214 | #endif |
215 | ||
dd32e2c3 WD |
216 | struct chmod_mode_struct *chmod_modes = NULL; |
217 | ||
d239efa3 | 218 | static const char *debug_verbosity[] = { |
951e826b WD |
219 | /*0*/ NULL, |
220 | /*1*/ NULL, | |
261808da | 221 | /*2*/ "BIND,CMD,CONNECT,DEL,DELTASUM,DUP,FILTER,FLIST,ICONV", |
7ae666d2 | 222 | /*3*/ "ACL,BACKUP,CONNECT2,DELTASUM2,DEL2,EXIT,FILTER2,FLIST2,FUZZY,GENR,OWN,RECV,SEND,TIME", |
261808da WD |
223 | /*4*/ "CMD2,DELTASUM3,DEL3,EXIT2,FLIST3,ICONV2,OWN2,PROTO,TIME2", |
224 | /*5*/ "CHDIR,DELTASUM4,FLIST4,FUZZY2,HASH,HLINK", | |
951e826b WD |
225 | }; |
226 | ||
227 | #define MAX_VERBOSITY ((int)(sizeof debug_verbosity / sizeof debug_verbosity[0]) - 1) | |
228 | ||
d239efa3 | 229 | static const char *info_verbosity[1+MAX_VERBOSITY] = { |
951e826b | 230 | /*0*/ NULL, |
261808da | 231 | /*1*/ "COPY,DEL,FLIST,MISC,NAME,STATS,SYMSAFE", |
3b8f8192 | 232 | /*2*/ "BACKUP,MISC2,MOUNT,NAME2,REMOVE,SKIP", |
951e826b WD |
233 | }; |
234 | ||
235 | #define MAX_OUT_LEVEL 4 /* The largest N allowed for any flagN word. */ | |
236 | ||
237 | short info_levels[COUNT_INFO], debug_levels[COUNT_DEBUG]; | |
238 | ||
239 | #define DEFAULT_PRIORITY 0 /* Default/implied/--verbose set values. */ | |
240 | #define HELP_PRIORITY 1 /* The help output uses this level. */ | |
241 | #define USER_PRIORITY 2 /* User-specified via --info or --debug */ | |
242 | #define LIMIT_PRIORITY 3 /* Overriding priority when limiting values. */ | |
243 | ||
244 | #define W_CLI (1<<0) /* client side */ | |
245 | #define W_SRV (1<<1) /* server side */ | |
246 | #define W_SND (1<<2) /* sending side */ | |
247 | #define W_REC (1<<3) /* receiving side */ | |
248 | ||
249 | struct output_struct { | |
250 | char *name; /* The name of the info/debug flag. */ | |
251 | char *help; /* The description of the info/debug flag. */ | |
d239efa3 WD |
252 | uchar namelen; /* The length of the name string. */ |
253 | uchar flag; /* The flag's value, for consistency check. */ | |
254 | uchar where; /* Bits indicating where the flag is used. */ | |
255 | uchar priority; /* See *_PRIORITY defines. */ | |
951e826b WD |
256 | }; |
257 | ||
d239efa3 | 258 | #define INFO_WORD(flag, where, help) { #flag, help, sizeof #flag - 1, INFO_##flag, where, 0 } |
951e826b | 259 | |
75d96978 | 260 | static struct output_struct info_words[COUNT_INFO+1] = { |
951e826b WD |
261 | INFO_WORD(BACKUP, W_REC, "Mention files backed up"), |
262 | INFO_WORD(COPY, W_REC, "Mention files copied locally on the receiving side"), | |
263 | INFO_WORD(DEL, W_REC, "Mention deletions on the receiving side"), | |
264 | INFO_WORD(FLIST, W_CLI, "Mention file-list receiving/sending (levels 1-2)"), | |
3b8f8192 | 265 | INFO_WORD(MISC, W_SND|W_REC, "Mention miscellaneous information (levels 1-2)"), |
951e826b WD |
266 | INFO_WORD(MOUNT, W_SND|W_REC, "Mention mounts that were found or skipped"), |
267 | INFO_WORD(NAME, W_SND|W_REC, "Mention 1) updated file/dir names, 2) unchanged names"), | |
268 | INFO_WORD(PROGRESS, W_CLI, "Mention 1) per-file progress or 2) total transfer progress"), | |
269 | INFO_WORD(REMOVE, W_SND, "Mention files removed on the sending side"), | |
270 | INFO_WORD(SKIP, W_REC, "Mention files that are skipped due to options used"), | |
271 | INFO_WORD(STATS, W_CLI|W_SRV, "Mention statistics at end of run (levels 1-3)"), | |
272 | INFO_WORD(SYMSAFE, W_SND|W_REC, "Mention symlinks that are unsafe"), | |
d239efa3 | 273 | { NULL, "--info", 0, 0, 0, 0 } |
951e826b WD |
274 | }; |
275 | ||
d239efa3 | 276 | #define DEBUG_WORD(flag, where, help) { #flag, help, sizeof #flag - 1, DEBUG_##flag, where, 0 } |
951e826b | 277 | |
75d96978 | 278 | static struct output_struct debug_words[COUNT_DEBUG+1] = { |
951e826b WD |
279 | DEBUG_WORD(ACL, W_SND|W_REC, "Debug extra ACL info"), |
280 | DEBUG_WORD(BACKUP, W_REC, "Debug backup actions (levels 1-2)"), | |
281 | DEBUG_WORD(BIND, W_CLI, "Debug socket bind actions"), | |
282 | DEBUG_WORD(CHDIR, W_CLI|W_SRV, "Debug when the current directory changes"), | |
7ae666d2 | 283 | DEBUG_WORD(CONNECT, W_CLI, "Debug connection events (levels 1-2)"), |
951e826b WD |
284 | DEBUG_WORD(CMD, W_CLI, "Debug commands+options that are issued (levels 1-2)"), |
285 | DEBUG_WORD(DEL, W_REC, "Debug delete actions (levels 1-3)"), | |
5a18b34d | 286 | DEBUG_WORD(DELTASUM, W_SND|W_REC, "Debug delta-transfer checksumming (levels 1-4)"), |
951e826b | 287 | DEBUG_WORD(DUP, W_REC, "Debug weeding of duplicate names"), |
0c2e8f93 | 288 | DEBUG_WORD(EXIT, W_CLI|W_SRV, "Debug exit events (levels 1-3)"), |
951e826b WD |
289 | DEBUG_WORD(FILTER, W_SND|W_REC, "Debug filter actions (levels 1-2)"), |
290 | DEBUG_WORD(FLIST, W_SND|W_REC, "Debug file-list operations (levels 1-4)"), | |
291 | DEBUG_WORD(FUZZY, W_REC, "Debug fuzzy scoring (levels 1-2)"), | |
292 | DEBUG_WORD(GENR, W_REC, "Debug generator functions"), | |
b3347e2a | 293 | DEBUG_WORD(HASH, W_SND|W_REC, "Debug hashtable code"), |
86be7a0e | 294 | DEBUG_WORD(HLINK, W_SND|W_REC, "Debug hard-link actions (levels 1-3)"), |
c9f540f3 | 295 | DEBUG_WORD(ICONV, W_CLI|W_SRV, "Debug iconv character conversions (levels 1-2)"), |
20caffd2 | 296 | DEBUG_WORD(IO, W_CLI|W_SRV, "Debug I/O routines (levels 1-4)"), |
2f84a6bd | 297 | DEBUG_WORD(NSTR, W_CLI|W_SRV, "Debug negotiation strings"), |
951e826b WD |
298 | DEBUG_WORD(OWN, W_REC, "Debug ownership changes in users & groups (levels 1-2)"), |
299 | DEBUG_WORD(PROTO, W_CLI|W_SRV, "Debug protocol information"), | |
300 | DEBUG_WORD(RECV, W_REC, "Debug receiver functions"), | |
301 | DEBUG_WORD(SEND, W_SND, "Debug sender functions"), | |
302 | DEBUG_WORD(TIME, W_REC, "Debug setting of modified times (levels 1-2)"), | |
d239efa3 | 303 | { NULL, "--debug", 0, 0, 0, 0 } |
951e826b WD |
304 | }; |
305 | ||
306 | static int verbose = 0; | |
307 | static int do_stats = 0; | |
308 | static int do_progress = 0; | |
e1add893 | 309 | static int daemon_opt; /* sets am_daemon after option error-reporting */ |
f9998046 | 310 | static int omit_dir_times = 0; |
2624e005 | 311 | static int omit_link_times = 0; |
aa4d3b4c | 312 | static int F_option_cnt = 0; |
5b56cc19 | 313 | static int modify_window_set; |
624d6be2 | 314 | static int itemize_changes = 0; |
854a1aad | 315 | static int refused_delete, refused_archive_part, refused_compress; |
3296f91b | 316 | static int refused_partial, refused_progress, refused_delete_before; |
e0e32031 | 317 | static int refused_delete_during; |
0b52f94d | 318 | static int refused_inplace, refused_no_iconv; |
2df20057 | 319 | static BOOL usermap_via_chown, groupmap_via_chown; |
6686b93a | 320 | static char *outbuf_mode; |
ce795fcd | 321 | static char *bwlimit_arg, *max_size_arg, *min_size_arg; |
77860bac | 322 | static char tmp_partialdir[] = ".~tmp~"; |
5b56cc19 | 323 | |
06963d0f | 324 | /** Local address to bind. As a character string because it's |
fdf57ede | 325 | * interpreted by the IPv6 layer: should be a numeric IP4 or IP6 |
06963d0f MP |
326 | * address, or a hostname. **/ |
327 | char *bind_address; | |
5c9730a4 | 328 | |
951e826b WD |
329 | static void output_item_help(struct output_struct *words); |
330 | ||
331 | /* This constructs a string that represents all the options set for either | |
332 | * the --info or --debug setting, skipping any implied options (by -v, etc.). | |
333 | * This is used both when conveying the user's options to the server, and | |
334 | * when the help output wants to tell the user what options are implied. */ | |
d239efa3 | 335 | static char *make_output_option(struct output_struct *words, short *levels, uchar where) |
951e826b WD |
336 | { |
337 | char *str = words == info_words ? "--info=" : "--debug="; | |
338 | int j, counts[MAX_OUT_LEVEL+1], pos, skipped = 0, len = 0, max = 0, lev = 0; | |
339 | int word_count = words == info_words ? COUNT_INFO : COUNT_DEBUG; | |
340 | char *buf; | |
341 | ||
342 | memset(counts, 0, sizeof counts); | |
343 | ||
344 | for (j = 0; words[j].name; j++) { | |
345 | if (words[j].flag != j) { | |
346 | rprintf(FERROR, "rsync: internal error on %s%s: %d != %d\n", | |
347 | words == info_words ? "INFO_" : "DEBUG_", | |
348 | words[j].name, words[j].flag, j); | |
349 | exit_cleanup(RERR_UNSUPPORTED); | |
350 | } | |
351 | if (!(words[j].where & where)) | |
352 | continue; | |
353 | if (words[j].priority == DEFAULT_PRIORITY) { | |
354 | /* Implied items don't need to be mentioned. */ | |
355 | skipped++; | |
356 | continue; | |
357 | } | |
358 | len += len ? 1 : strlen(str); | |
359 | len += strlen(words[j].name); | |
360 | len += levels[j] == 1 ? 0 : 1; | |
361 | ||
362 | if (words[j].priority == HELP_PRIORITY) | |
363 | continue; /* no abbreviating for help */ | |
364 | ||
365 | assert(levels[j] <= MAX_OUT_LEVEL); | |
366 | if (++counts[levels[j]] > max) { | |
367 | /* Determine which level has the most items. */ | |
368 | lev = levels[j]; | |
369 | max = counts[lev]; | |
370 | } | |
371 | } | |
372 | ||
373 | /* Sanity check the COUNT_* define against the length of the table. */ | |
374 | if (j != word_count) { | |
375 | rprintf(FERROR, "rsync: internal error: %s is wrong! (%d != %d)\n", | |
376 | words == info_words ? "COUNT_INFO" : "COUNT_DEBUG", | |
377 | j, word_count); | |
378 | exit_cleanup(RERR_UNSUPPORTED); | |
379 | } | |
380 | ||
381 | if (!len) | |
382 | return NULL; | |
383 | ||
384 | len++; | |
11eb67ee | 385 | buf = new_array(char, len); |
951e826b WD |
386 | pos = 0; |
387 | ||
388 | if (skipped || max < 5) | |
389 | lev = -1; | |
390 | else { | |
391 | if (lev == 0) | |
392 | pos += snprintf(buf, len, "%sNONE", str); | |
393 | else if (lev == 1) | |
394 | pos += snprintf(buf, len, "%sALL", str); | |
395 | else | |
396 | pos += snprintf(buf, len, "%sALL%d", str, lev); | |
397 | } | |
398 | ||
399 | for (j = 0; words[j].name && pos < len; j++) { | |
400 | if (words[j].priority == DEFAULT_PRIORITY || levels[j] == lev || !(words[j].where & where)) | |
401 | continue; | |
402 | if (pos) | |
403 | buf[pos++] = ','; | |
404 | else | |
405 | pos += strlcpy(buf+pos, str, len-pos); | |
406 | if (pos < len) | |
407 | pos += strlcpy(buf+pos, words[j].name, len-pos); | |
408 | /* Level 1 is implied by the name alone. */ | |
409 | if (levels[j] != 1 && pos < len) | |
410 | buf[pos++] = '0' + levels[j]; | |
411 | } | |
412 | ||
413 | buf[pos] = '\0'; | |
414 | ||
415 | return buf; | |
416 | } | |
417 | ||
e63ff70e | 418 | static void parse_output_words(struct output_struct *words, short *levels, const char *str, uchar priority) |
951e826b WD |
419 | { |
420 | const char *s; | |
421 | int j, len, lev; | |
422 | ||
cbc42b9c | 423 | for ( ; str; str = s) { |
951e826b WD |
424 | if ((s = strchr(str, ',')) != NULL) |
425 | len = s++ - str; | |
426 | else | |
427 | len = strlen(str); | |
cbc42b9c WD |
428 | if (!len) |
429 | continue; | |
430 | if (!isDigit(str)) { | |
431 | while (len && isDigit(str+len-1)) | |
432 | len--; | |
433 | } | |
951e826b WD |
434 | lev = isDigit(str+len) ? atoi(str+len) : 1; |
435 | if (lev > MAX_OUT_LEVEL) | |
436 | lev = MAX_OUT_LEVEL; | |
437 | if (len == 4 && strncasecmp(str, "help", 4) == 0) { | |
438 | output_item_help(words); | |
439 | exit_cleanup(0); | |
440 | } | |
441 | if (len == 4 && strncasecmp(str, "none", 4) == 0) | |
442 | len = lev = 0; | |
443 | else if (len == 3 && strncasecmp(str, "all", 3) == 0) | |
444 | len = 0; | |
445 | for (j = 0; words[j].name; j++) { | |
446 | if (!len | |
d239efa3 | 447 | || (len == words[j].namelen && strncasecmp(str, words[j].name, len) == 0)) { |
951e826b WD |
448 | if (priority >= words[j].priority) { |
449 | words[j].priority = priority; | |
450 | levels[j] = lev; | |
451 | } | |
452 | if (len) | |
453 | break; | |
454 | } | |
455 | } | |
2f84a6bd | 456 | if (len && !words[j].name && !am_server) { |
75d96978 WD |
457 | rprintf(FERROR, "Unknown %s item: \"%.*s\"\n", |
458 | words[j].help, len, str); | |
951e826b WD |
459 | exit_cleanup(RERR_SYNTAX); |
460 | } | |
951e826b WD |
461 | } |
462 | } | |
463 | ||
464 | /* Tell the user what all the info or debug flags mean. */ | |
465 | static void output_item_help(struct output_struct *words) | |
466 | { | |
467 | short *levels = words == info_words ? info_levels : debug_levels; | |
d239efa3 | 468 | const char **verbosity = words == info_words ? info_verbosity : debug_verbosity; |
951e826b WD |
469 | char buf[128], *opt, *fmt = "%-10s %s\n"; |
470 | int j; | |
471 | ||
75d96978 WD |
472 | reset_output_levels(); |
473 | ||
951e826b WD |
474 | rprintf(FINFO, "Use OPT or OPT1 for level 1 output, OPT2 for level 2, etc.; OPT0 silences.\n"); |
475 | rprintf(FINFO, "\n"); | |
476 | for (j = 0; words[j].name; j++) | |
477 | rprintf(FINFO, fmt, words[j].name, words[j].help); | |
478 | rprintf(FINFO, "\n"); | |
479 | ||
480 | snprintf(buf, sizeof buf, "Set all %s options (e.g. all%d)", | |
481 | words[j].help, MAX_OUT_LEVEL); | |
482 | rprintf(FINFO, fmt, "ALL", buf); | |
483 | ||
484 | snprintf(buf, sizeof buf, "Silence all %s options (same as all0)", | |
485 | words[j].help); | |
486 | rprintf(FINFO, fmt, "NONE", buf); | |
487 | ||
488 | rprintf(FINFO, fmt, "HELP", "Output this help message"); | |
489 | rprintf(FINFO, "\n"); | |
490 | rprintf(FINFO, "Options added for each increase in verbose level:\n"); | |
491 | ||
492 | for (j = 1; j <= MAX_VERBOSITY; j++) { | |
75d96978 | 493 | parse_output_words(words, levels, verbosity[j], HELP_PRIORITY); |
951e826b WD |
494 | opt = make_output_option(words, levels, W_CLI|W_SRV|W_SND|W_REC); |
495 | if (opt) { | |
496 | rprintf(FINFO, "%d) %s\n", j, strchr(opt, '=')+1); | |
497 | free(opt); | |
498 | } | |
75d96978 | 499 | reset_output_levels(); |
951e826b | 500 | } |
951e826b WD |
501 | } |
502 | ||
503 | /* The --verbose option now sets info+debug flags. */ | |
d239efa3 | 504 | static void set_output_verbosity(int level, uchar priority) |
951e826b WD |
505 | { |
506 | int j; | |
507 | ||
508 | if (level > MAX_VERBOSITY) | |
509 | level = MAX_VERBOSITY; | |
510 | ||
511 | for (j = 1; j <= level; j++) { | |
512 | parse_output_words(info_words, info_levels, info_verbosity[j], priority); | |
513 | parse_output_words(debug_words, debug_levels, debug_verbosity[j], priority); | |
514 | } | |
515 | } | |
516 | ||
517 | /* Limit the info+debug flag levels given a verbose-option level limit. */ | |
518 | void limit_output_verbosity(int level) | |
519 | { | |
520 | short info_limits[COUNT_INFO], debug_limits[COUNT_DEBUG]; | |
521 | int j; | |
522 | ||
523 | if (level > MAX_VERBOSITY) | |
524 | return; | |
525 | ||
526 | memset(info_limits, 0, sizeof info_limits); | |
527 | memset(debug_limits, 0, sizeof debug_limits); | |
528 | ||
529 | /* Compute the level limits in the above arrays. */ | |
530 | for (j = 1; j <= level; j++) { | |
531 | parse_output_words(info_words, info_limits, info_verbosity[j], LIMIT_PRIORITY); | |
532 | parse_output_words(debug_words, debug_limits, debug_verbosity[j], LIMIT_PRIORITY); | |
533 | } | |
534 | ||
535 | for (j = 0; j < COUNT_INFO; j++) { | |
536 | if (info_levels[j] > info_limits[j]) | |
537 | info_levels[j] = info_limits[j]; | |
538 | } | |
539 | ||
540 | for (j = 0; j < COUNT_DEBUG; j++) { | |
541 | if (debug_levels[j] > debug_limits[j]) | |
542 | debug_levels[j] = debug_limits[j]; | |
543 | } | |
544 | } | |
545 | ||
546 | void reset_output_levels(void) | |
547 | { | |
548 | int j; | |
549 | ||
550 | memset(info_levels, 0, sizeof info_levels); | |
551 | memset(debug_levels, 0, sizeof debug_levels); | |
552 | ||
553 | for (j = 0; j < COUNT_INFO; j++) | |
554 | info_words[j].priority = DEFAULT_PRIORITY; | |
555 | ||
556 | for (j = 0; j < COUNT_DEBUG; j++) | |
557 | debug_words[j].priority = DEFAULT_PRIORITY; | |
558 | } | |
559 | ||
560 | void negate_output_levels(void) | |
561 | { | |
562 | int j; | |
563 | ||
564 | for (j = 0; j < COUNT_INFO; j++) | |
565 | info_levels[j] *= -1; | |
566 | ||
567 | for (j = 0; j < COUNT_DEBUG; j++) | |
568 | debug_levels[j] *= -1; | |
569 | } | |
7a24c346 | 570 | |
342579aa | 571 | enum {OPT_SERVER = 1000, OPT_DAEMON, OPT_SENDER, OPT_EXCLUDE, OPT_EXCLUDE_FROM, |
05724c07 | 572 | OPT_FILTER, OPT_COMPARE_DEST, OPT_COPY_DEST, OPT_LINK_DEST, OPT_HELP, |
e16adcdf | 573 | OPT_INCLUDE, OPT_INCLUDE_FROM, OPT_MODIFY_WINDOW, OPT_MIN_SIZE, OPT_CHMOD, |
9ac756c6 | 574 | OPT_READ_BATCH, OPT_WRITE_BATCH, OPT_ONLY_WRITE_BATCH, OPT_MAX_SIZE, |
66ca4fc9 | 575 | OPT_NO_D, OPT_APPEND, OPT_NO_ICONV, OPT_INFO, OPT_DEBUG, OPT_BLOCK_SIZE, |
21ecc833 | 576 | OPT_USERMAP, OPT_GROUPMAP, OPT_CHOWN, OPT_BWLIMIT, OPT_STDERR, |
64d5ea39 | 577 | OPT_OLD_COMPRESS, OPT_NEW_COMPRESS, OPT_NO_COMPRESS, |
af531cf7 | 578 | OPT_STOP_AFTER, OPT_STOP_AT, |
342579aa | 579 | OPT_REFUSED_BASE = 9000}; |
7a6421fa | 580 | |
2855f61f MP |
581 | static struct poptOption long_options[] = { |
582 | /* longName, shortName, argInfo, argPtr, value, descrip, argDesc */ | |
05724c07 | 583 | {"help", 0, POPT_ARG_NONE, 0, OPT_HELP, 0, 0 }, |
342579aa | 584 | {"version", 'V', POPT_ARG_NONE, 0, 'V', 0, 0}, |
e86e2fa1 | 585 | {"verbose", 'v', POPT_ARG_NONE, 0, 'v', 0, 0 }, |
b6164938 | 586 | {"no-verbose", 0, POPT_ARG_VAL, &verbose, 0, 0, 0 }, |
4afcb709 | 587 | {"no-v", 0, POPT_ARG_VAL, &verbose, 0, 0, 0 }, |
951e826b WD |
588 | {"info", 0, POPT_ARG_STRING, 0, OPT_INFO, 0, 0 }, |
589 | {"debug", 0, POPT_ARG_STRING, 0, OPT_DEBUG, 0, 0 }, | |
21ecc833 | 590 | {"stderr", 0, POPT_ARG_STRING, 0, OPT_STDERR, 0, 0 }, |
592059c8 | 591 | {"msgs2stderr", 0, POPT_ARG_VAL, &msgs2stderr, 1, 0, 0 }, |
c0268d92 | 592 | {"no-msgs2stderr", 0, POPT_ARG_VAL, &msgs2stderr, 0, 0, 0 }, |
e86e2fa1 | 593 | {"quiet", 'q', POPT_ARG_NONE, 0, 'q', 0, 0 }, |
dc1f7b9e WD |
594 | {"motd", 0, POPT_ARG_VAL, &output_motd, 1, 0, 0 }, |
595 | {"no-motd", 0, POPT_ARG_VAL, &output_motd, 0, 0, 0 }, | |
e86e2fa1 | 596 | {"stats", 0, POPT_ARG_NONE, &do_stats, 0, 0, 0 }, |
3ca9e5d8 | 597 | {"human-readable", 'h', POPT_ARG_NONE, 0, 'h', 0, 0}, |
8487f9cf WD |
598 | {"no-human-readable",0, POPT_ARG_VAL, &human_readable, 0, 0, 0}, |
599 | {"no-h", 0, POPT_ARG_VAL, &human_readable, 0, 0, 0}, | |
e86e2fa1 | 600 | {"dry-run", 'n', POPT_ARG_NONE, &dry_run, 0, 0, 0 }, |
b6164938 WD |
601 | {"archive", 'a', POPT_ARG_NONE, 0, 'a', 0, 0 }, |
602 | {"recursive", 'r', POPT_ARG_VAL, &recurse, 2, 0, 0 }, | |
603 | {"no-recursive", 0, POPT_ARG_VAL, &recurse, 0, 0, 0 }, | |
8487f9cf | 604 | {"no-r", 0, POPT_ARG_VAL, &recurse, 0, 0, 0 }, |
5275029d | 605 | {"inc-recursive", 0, POPT_ARG_VAL, &allow_inc_recurse, 1, 0, 0 }, |
5275029d | 606 | {"no-inc-recursive", 0, POPT_ARG_VAL, &allow_inc_recurse, 0, 0, 0 }, |
d6ca255c WD |
607 | {"i-r", 0, POPT_ARG_VAL, &allow_inc_recurse, 1, 0, 0 }, |
608 | {"no-i-r", 0, POPT_ARG_VAL, &allow_inc_recurse, 0, 0, 0 }, | |
e86e2fa1 | 609 | {"dirs", 'd', POPT_ARG_VAL, &xfer_dirs, 2, 0, 0 }, |
b6164938 WD |
610 | {"no-dirs", 0, POPT_ARG_VAL, &xfer_dirs, 0, 0, 0 }, |
611 | {"no-d", 0, POPT_ARG_VAL, &xfer_dirs, 0, 0, 0 }, | |
73cb6738 WD |
612 | {"old-dirs", 0, POPT_ARG_VAL, &xfer_dirs, 4, 0, 0 }, |
613 | {"old-d", 0, POPT_ARG_VAL, &xfer_dirs, 4, 0, 0 }, | |
b6164938 WD |
614 | {"perms", 'p', POPT_ARG_VAL, &preserve_perms, 1, 0, 0 }, |
615 | {"no-perms", 0, POPT_ARG_VAL, &preserve_perms, 0, 0, 0 }, | |
616 | {"no-p", 0, POPT_ARG_VAL, &preserve_perms, 0, 0, 0 }, | |
344f9ba7 | 617 | {"executability", 'E', POPT_ARG_NONE, &preserve_executability, 0, 0, 0 }, |
1c3344a1 WD |
618 | {"acls", 'A', POPT_ARG_NONE, 0, 'A', 0, 0 }, |
619 | {"no-acls", 0, POPT_ARG_VAL, &preserve_acls, 0, 0, 0 }, | |
620 | {"no-A", 0, POPT_ARG_VAL, &preserve_acls, 0, 0, 0 }, | |
16edf865 WD |
621 | {"xattrs", 'X', POPT_ARG_NONE, 0, 'X', 0, 0 }, |
622 | {"no-xattrs", 0, POPT_ARG_VAL, &preserve_xattrs, 0, 0, 0 }, | |
623 | {"no-X", 0, POPT_ARG_VAL, &preserve_xattrs, 0, 0, 0 }, | |
2624e005 | 624 | {"times", 't', POPT_ARG_VAL, &preserve_times, 1, 0, 0 }, |
b6164938 WD |
625 | {"no-times", 0, POPT_ARG_VAL, &preserve_times, 0, 0, 0 }, |
626 | {"no-t", 0, POPT_ARG_VAL, &preserve_times, 0, 0, 0 }, | |
b9367410 WD |
627 | {"atimes", 'U', POPT_ARG_NONE, 0, 'U', 0, 0 }, |
628 | {"no-atimes", 0, POPT_ARG_VAL, &preserve_atimes, 0, 0, 0 }, | |
629 | {"no-U", 0, POPT_ARG_VAL, &preserve_atimes, 0, 0, 0 }, | |
87257f86 WD |
630 | {"open-noatime", 0, POPT_ARG_VAL, &open_noatime, 1, 0, 0 }, |
631 | {"no-open-noatime", 0, POPT_ARG_VAL, &open_noatime, 0, 0, 0 }, | |
974f49e2 WD |
632 | {"crtimes", 'N', POPT_ARG_VAL, &preserve_crtimes, 1, 0, 0 }, |
633 | {"no-crtimes", 0, POPT_ARG_VAL, &preserve_crtimes, 0, 0, 0 }, | |
634 | {"no-N", 0, POPT_ARG_VAL, &preserve_crtimes, 0, 0, 0 }, | |
f9998046 | 635 | {"omit-dir-times", 'O', POPT_ARG_VAL, &omit_dir_times, 1, 0, 0 }, |
eb7a6e09 WD |
636 | {"no-omit-dir-times",0, POPT_ARG_VAL, &omit_dir_times, 0, 0, 0 }, |
637 | {"no-O", 0, POPT_ARG_VAL, &omit_dir_times, 0, 0, 0 }, | |
2624e005 WD |
638 | {"omit-link-times", 'J', POPT_ARG_VAL, &omit_link_times, 1, 0, 0 }, |
639 | {"no-omit-link-times",0, POPT_ARG_VAL, &omit_link_times, 0, 0, 0 }, | |
640 | {"no-J", 0, POPT_ARG_VAL, &omit_link_times, 0, 0, 0 }, | |
839dbff2 | 641 | {"modify-window", '@', POPT_ARG_INT, &modify_window, OPT_MODIFY_WINDOW, 0, 0 }, |
def97ff9 WD |
642 | {"super", 0, POPT_ARG_VAL, &am_root, 2, 0, 0 }, |
643 | {"no-super", 0, POPT_ARG_VAL, &am_root, 0, 0, 0 }, | |
9439c0cb | 644 | {"fake-super", 0, POPT_ARG_VAL, &am_root, -1, 0, 0 }, |
b6164938 WD |
645 | {"owner", 'o', POPT_ARG_VAL, &preserve_uid, 1, 0, 0 }, |
646 | {"no-owner", 0, POPT_ARG_VAL, &preserve_uid, 0, 0, 0 }, | |
647 | {"no-o", 0, POPT_ARG_VAL, &preserve_uid, 0, 0, 0 }, | |
648 | {"group", 'g', POPT_ARG_VAL, &preserve_gid, 1, 0, 0 }, | |
649 | {"no-group", 0, POPT_ARG_VAL, &preserve_gid, 0, 0, 0 }, | |
650 | {"no-g", 0, POPT_ARG_VAL, &preserve_gid, 0, 0, 0 }, | |
b5c6a6ae WD |
651 | {0, 'D', POPT_ARG_NONE, 0, 'D', 0, 0 }, |
652 | {"no-D", 0, POPT_ARG_NONE, 0, OPT_NO_D, 0, 0 }, | |
653 | {"devices", 0, POPT_ARG_VAL, &preserve_devices, 1, 0, 0 }, | |
b6164938 | 654 | {"no-devices", 0, POPT_ARG_VAL, &preserve_devices, 0, 0, 0 }, |
9e9d33a2 WD |
655 | {"write-devices", 0, POPT_ARG_VAL, &write_devices, 1, 0, 0 }, |
656 | {"no-write-devices", 0, POPT_ARG_VAL, &write_devices, 0, 0, 0 }, | |
b5c6a6ae WD |
657 | {"specials", 0, POPT_ARG_VAL, &preserve_specials, 1, 0, 0 }, |
658 | {"no-specials", 0, POPT_ARG_VAL, &preserve_specials, 0, 0, 0 }, | |
e86e2fa1 | 659 | {"links", 'l', POPT_ARG_VAL, &preserve_links, 1, 0, 0 }, |
b6164938 WD |
660 | {"no-links", 0, POPT_ARG_VAL, &preserve_links, 0, 0, 0 }, |
661 | {"no-l", 0, POPT_ARG_VAL, &preserve_links, 0, 0, 0 }, | |
e86e2fa1 WD |
662 | {"copy-links", 'L', POPT_ARG_NONE, ©_links, 0, 0, 0 }, |
663 | {"copy-unsafe-links",0, POPT_ARG_NONE, ©_unsafe_links, 0, 0, 0 }, | |
664 | {"safe-links", 0, POPT_ARG_NONE, &safe_symlinks, 0, 0, 0 }, | |
41adbcec WD |
665 | {"munge-links", 0, POPT_ARG_VAL, &munge_symlinks, 1, 0, 0 }, |
666 | {"no-munge-links", 0, POPT_ARG_VAL, &munge_symlinks, 0, 0, 0 }, | |
2dbf36ef | 667 | {"copy-dirlinks", 'k', POPT_ARG_NONE, ©_dirlinks, 0, 0, 0 }, |
e86e2fa1 | 668 | {"keep-dirlinks", 'K', POPT_ARG_NONE, &keep_dirlinks, 0, 0, 0 }, |
e0e32031 | 669 | {"hard-links", 'H', POPT_ARG_NONE, 0, 'H', 0, 0 }, |
beab3078 WD |
670 | {"no-hard-links", 0, POPT_ARG_VAL, &preserve_hard_links, 0, 0, 0 }, |
671 | {"no-H", 0, POPT_ARG_VAL, &preserve_hard_links, 0, 0, 0 }, | |
e86e2fa1 WD |
672 | {"relative", 'R', POPT_ARG_VAL, &relative_paths, 1, 0, 0 }, |
673 | {"no-relative", 0, POPT_ARG_VAL, &relative_paths, 0, 0, 0 }, | |
b6164938 | 674 | {"no-R", 0, POPT_ARG_VAL, &relative_paths, 0, 0, 0 }, |
2dbf36ef | 675 | {"implied-dirs", 0, POPT_ARG_VAL, &implied_dirs, 1, 0, 0 }, |
e86e2fa1 | 676 | {"no-implied-dirs", 0, POPT_ARG_VAL, &implied_dirs, 0, 0, 0 }, |
d6ca255c WD |
677 | {"i-d", 0, POPT_ARG_VAL, &implied_dirs, 1, 0, 0 }, |
678 | {"no-i-d", 0, POPT_ARG_VAL, &implied_dirs, 0, 0, 0 }, | |
e16adcdf | 679 | {"chmod", 0, POPT_ARG_STRING, 0, OPT_CHMOD, 0, 0 }, |
afb6e945 WD |
680 | {"ignore-times", 'I', POPT_ARG_NONE, &ignore_times, 0, 0, 0 }, |
681 | {"size-only", 0, POPT_ARG_NONE, &size_only, 0, 0, 0 }, | |
243c995f | 682 | {"one-file-system", 'x', POPT_ARG_NONE, 0, 'x', 0, 0 }, |
8b48c682 WD |
683 | {"no-one-file-system",0, POPT_ARG_VAL, &one_file_system, 0, 0, 0 }, |
684 | {"no-x", 0, POPT_ARG_VAL, &one_file_system, 0, 0, 0 }, | |
e86e2fa1 | 685 | {"update", 'u', POPT_ARG_NONE, &update_only, 0, 0, 0 }, |
e90aab49 | 686 | {"existing", 0, POPT_ARG_NONE, &ignore_non_existing, 0, 0, 0 }, |
e90aab49 | 687 | {"ignore-non-existing",0,POPT_ARG_NONE, &ignore_non_existing, 0, 0, 0 }, |
d2da915c | 688 | {"ignore-existing", 0, POPT_ARG_NONE, &ignore_existing, 0, 0, 0 }, |
aeb213ea | 689 | {"max-size", 0, POPT_ARG_STRING, &max_size_arg, OPT_MAX_SIZE, 0, 0 }, |
74de13d1 | 690 | {"min-size", 0, POPT_ARG_STRING, &min_size_arg, OPT_MIN_SIZE, 0, 0 }, |
11eb67ee | 691 | {"max-alloc", 0, POPT_ARG_STRING, &max_alloc_arg, 0, 0, 0 }, |
852e763b WD |
692 | {"sparse", 'S', POPT_ARG_VAL, &sparse_files, 1, 0, 0 }, |
693 | {"no-sparse", 0, POPT_ARG_VAL, &sparse_files, 0, 0, 0 }, | |
694 | {"no-S", 0, POPT_ARG_VAL, &sparse_files, 0, 0, 0 }, | |
28b519c9 | 695 | {"preallocate", 0, POPT_ARG_NONE, &preallocate_files, 0, 0, 0}, |
852e763b WD |
696 | {"inplace", 0, POPT_ARG_VAL, &inplace, 1, 0, 0 }, |
697 | {"no-inplace", 0, POPT_ARG_VAL, &inplace, 0, 0, 0 }, | |
936fa865 WD |
698 | {"append", 0, POPT_ARG_NONE, 0, OPT_APPEND, 0, 0 }, |
699 | {"append-verify", 0, POPT_ARG_VAL, &append_mode, 2, 0, 0 }, | |
700 | {"no-append", 0, POPT_ARG_VAL, &append_mode, 0, 0, 0 }, | |
3671987f | 701 | {"del", 0, POPT_ARG_NONE, &delete_during, 0, 0, 0 }, |
3359acb8 | 702 | {"delete", 0, POPT_ARG_NONE, &delete_mode, 0, 0, 0 }, |
e0e32031 | 703 | {"delete-before", 0, POPT_ARG_NONE, &delete_before, 0, 0, 0 }, |
b0cacef1 WD |
704 | {"delete-during", 0, POPT_ARG_VAL, &delete_during, 1, 0, 0 }, |
705 | {"delete-delay", 0, POPT_ARG_VAL, &delete_during, 2, 0, 0 }, | |
51d48398 WD |
706 | {"delete-after", 0, POPT_ARG_NONE, &delete_after, 0, 0, 0 }, |
707 | {"delete-excluded", 0, POPT_ARG_NONE, &delete_excluded, 0, 0, 0 }, | |
42d8ec61 WD |
708 | {"delete-missing-args",0,POPT_BIT_SET, &missing_args, 2, 0, 0 }, |
709 | {"ignore-missing-args",0,POPT_BIT_SET, &missing_args, 1, 0, 0 }, | |
47c11975 WD |
710 | {"remove-sent-files",0, POPT_ARG_VAL, &remove_source_files, 2, 0, 0 }, /* deprecated */ |
711 | {"remove-source-files",0,POPT_ARG_VAL, &remove_source_files, 1, 0, 0 }, | |
852e763b WD |
712 | {"force", 0, POPT_ARG_VAL, &force_delete, 1, 0, 0 }, |
713 | {"no-force", 0, POPT_ARG_VAL, &force_delete, 0, 0, 0 }, | |
714 | {"ignore-errors", 0, POPT_ARG_VAL, &ignore_errors, 1, 0, 0 }, | |
715 | {"no-ignore-errors", 0, POPT_ARG_VAL, &ignore_errors, 0, 0, 0 }, | |
e86e2fa1 WD |
716 | {"max-delete", 0, POPT_ARG_INT, &max_delete, 0, 0, 0 }, |
717 | {0, 'F', POPT_ARG_NONE, 0, 'F', 0, 0 }, | |
aa4d3b4c | 718 | {"filter", 'f', POPT_ARG_STRING, 0, OPT_FILTER, 0, 0 }, |
8db7cc2c WD |
719 | {"exclude", 0, POPT_ARG_STRING, 0, OPT_EXCLUDE, 0, 0 }, |
720 | {"include", 0, POPT_ARG_STRING, 0, OPT_INCLUDE, 0, 0 }, | |
721 | {"exclude-from", 0, POPT_ARG_STRING, 0, OPT_EXCLUDE_FROM, 0, 0 }, | |
722 | {"include-from", 0, POPT_ARG_STRING, 0, OPT_INCLUDE_FROM, 0, 0 }, | |
afb6e945 | 723 | {"cvs-exclude", 'C', POPT_ARG_NONE, &cvs_exclude, 0, 0, 0 }, |
afb6e945 WD |
724 | {"whole-file", 'W', POPT_ARG_VAL, &whole_file, 1, 0, 0 }, |
725 | {"no-whole-file", 0, POPT_ARG_VAL, &whole_file, 0, 0, 0 }, | |
b6164938 | 726 | {"no-W", 0, POPT_ARG_VAL, &whole_file, 0, 0, 0 }, |
8487f9cf WD |
727 | {"checksum", 'c', POPT_ARG_VAL, &always_checksum, 1, 0, 0 }, |
728 | {"no-checksum", 0, POPT_ARG_VAL, &always_checksum, 0, 0, 0 }, | |
729 | {"no-c", 0, POPT_ARG_VAL, &always_checksum, 0, 0, 0 }, | |
64d5ea39 WD |
730 | {"checksum-choice", 0, POPT_ARG_STRING, &checksum_choice, 0, 0, 0 }, |
731 | {"cc", 0, POPT_ARG_STRING, &checksum_choice, 0, 0, 0 }, | |
66ca4fc9 | 732 | {"block-size", 'B', POPT_ARG_STRING, 0, OPT_BLOCK_SIZE, 0, 0 }, |
e012f858 | 733 | {"compare-dest", 0, POPT_ARG_STRING, 0, OPT_COMPARE_DEST, 0, 0 }, |
1de3e99b | 734 | {"copy-dest", 0, POPT_ARG_STRING, 0, OPT_COPY_DEST, 0, 0 }, |
e012f858 | 735 | {"link-dest", 0, POPT_ARG_STRING, 0, OPT_LINK_DEST, 0, 0 }, |
48b51d00 | 736 | {"fuzzy", 'y', POPT_ARG_NONE, 0, 'y', 0, 0 }, |
852e763b | 737 | {"no-fuzzy", 0, POPT_ARG_VAL, &fuzzy_basis, 0, 0, 0 }, |
492ad042 | 738 | {"no-y", 0, POPT_ARG_VAL, &fuzzy_basis, 0, 0, 0 }, |
854a1aad | 739 | {"compress", 'z', POPT_ARG_NONE, 0, 'z', 0, 0 }, |
64d5ea39 WD |
740 | {"old-compress", 0, POPT_ARG_NONE, 0, OPT_OLD_COMPRESS, 0, 0 }, |
741 | {"new-compress", 0, POPT_ARG_NONE, 0, OPT_NEW_COMPRESS, 0, 0 }, | |
742 | {"no-compress", 0, POPT_ARG_NONE, 0, OPT_NO_COMPRESS, 0, 0 }, | |
743 | {"no-z", 0, POPT_ARG_NONE, 0, OPT_NO_COMPRESS, 0, 0 }, | |
744 | {"compress-choice", 0, POPT_ARG_STRING, &compress_choice, 0, 0, 0 }, | |
24ce3e9d | 745 | {"zc", 0, POPT_ARG_STRING, &compress_choice, 0, 0, 0 }, |
852e763b | 746 | {"skip-compress", 0, POPT_ARG_STRING, &skip_compress, 0, 0, 0 }, |
d999efe6 | 747 | {"compress-level", 0, POPT_ARG_INT, &do_compression_level, 0, 0, 0 }, |
30945523 | 748 | {"zl", 0, POPT_ARG_INT, &do_compression_level, 0, 0, 0 }, |
11bfaf63 | 749 | {0, 'P', POPT_ARG_NONE, 0, 'P', 0, 0 }, |
b6164938 WD |
750 | {"progress", 0, POPT_ARG_VAL, &do_progress, 1, 0, 0 }, |
751 | {"no-progress", 0, POPT_ARG_VAL, &do_progress, 0, 0, 0 }, | |
752 | {"partial", 0, POPT_ARG_VAL, &keep_partial, 1, 0, 0 }, | |
753 | {"no-partial", 0, POPT_ARG_VAL, &keep_partial, 0, 0, 0 }, | |
a7260c40 | 754 | {"partial-dir", 0, POPT_ARG_STRING, &partial_dir, 0, 0, 0 }, |
8487f9cf WD |
755 | {"delay-updates", 0, POPT_ARG_VAL, &delay_updates, 1, 0, 0 }, |
756 | {"no-delay-updates", 0, POPT_ARG_VAL, &delay_updates, 0, 0, 0 }, | |
852e763b WD |
757 | {"prune-empty-dirs",'m', POPT_ARG_VAL, &prune_empty_dirs, 1, 0, 0 }, |
758 | {"no-prune-empty-dirs",0,POPT_ARG_VAL, &prune_empty_dirs, 0, 0, 0 }, | |
759 | {"no-m", 0, POPT_ARG_VAL, &prune_empty_dirs, 0, 0, 0 }, | |
87c0f9d6 | 760 | {"log-file", 0, POPT_ARG_STRING, &logfile_name, 0, 0, 0 }, |
b3e4e7ef WD |
761 | {"log-file-format", 0, POPT_ARG_STRING, &logfile_format, 0, 0, 0 }, |
762 | {"out-format", 0, POPT_ARG_STRING, &stdout_format, 0, 0, 0 }, | |
763 | {"log-format", 0, POPT_ARG_STRING, &stdout_format, 0, 0, 0 }, /* DEPRECATED */ | |
487094a0 | 764 | {"itemize-changes", 'i', POPT_ARG_NONE, 0, 'i', 0, 0 }, |
8487f9cf WD |
765 | {"no-itemize-changes",0, POPT_ARG_VAL, &itemize_changes, 0, 0, 0 }, |
766 | {"no-i", 0, POPT_ARG_VAL, &itemize_changes, 0, 0, 0 }, | |
ce795fcd | 767 | {"bwlimit", 0, POPT_ARG_STRING, &bwlimit_arg, OPT_BWLIMIT, 0, 0 }, |
8487f9cf WD |
768 | {"no-bwlimit", 0, POPT_ARG_VAL, &bwlimit, 0, 0, 0 }, |
769 | {"backup", 'b', POPT_ARG_VAL, &make_backups, 1, 0, 0 }, | |
770 | {"no-backup", 0, POPT_ARG_VAL, &make_backups, 0, 0, 0 }, | |
afb6e945 | 771 | {"backup-dir", 0, POPT_ARG_STRING, &backup_dir, 0, 0, 0 }, |
e86e2fa1 WD |
772 | {"suffix", 0, POPT_ARG_STRING, &backup_suffix, 0, 0, 0 }, |
773 | {"list-only", 0, POPT_ARG_VAL, &list_only, 2, 0, 0 }, | |
8db7cc2c WD |
774 | {"read-batch", 0, POPT_ARG_STRING, &batch_name, OPT_READ_BATCH, 0, 0 }, |
775 | {"write-batch", 0, POPT_ARG_STRING, &batch_name, OPT_WRITE_BATCH, 0, 0 }, | |
11e758a4 | 776 | {"only-write-batch", 0, POPT_ARG_STRING, &batch_name, OPT_ONLY_WRITE_BATCH, 0, 0 }, |
ea5164d1 | 777 | {"files-from", 0, POPT_ARG_STRING, &files_from, 0, 0, 0 }, |
8487f9cf WD |
778 | {"from0", '0', POPT_ARG_VAL, &eol_nulls, 1, 0, 0}, |
779 | {"no-from0", 0, POPT_ARG_VAL, &eol_nulls, 0, 0, 0}, | |
c35d6e35 WD |
780 | {"protect-args", 's', POPT_ARG_VAL, &protect_args, 1, 0, 0}, |
781 | {"no-protect-args", 0, POPT_ARG_VAL, &protect_args, 0, 0, 0}, | |
782 | {"no-s", 0, POPT_ARG_VAL, &protect_args, 0, 0, 0}, | |
8487f9cf WD |
783 | {"numeric-ids", 0, POPT_ARG_VAL, &numeric_ids, 1, 0, 0 }, |
784 | {"no-numeric-ids", 0, POPT_ARG_VAL, &numeric_ids, 0, 0, 0 }, | |
2df20057 WD |
785 | {"usermap", 0, POPT_ARG_STRING, 0, OPT_USERMAP, 0, 0 }, |
786 | {"groupmap", 0, POPT_ARG_STRING, 0, OPT_GROUPMAP, 0, 0 }, | |
787 | {"chown", 0, POPT_ARG_STRING, 0, OPT_CHOWN, 0, 0 }, | |
e86e2fa1 | 788 | {"timeout", 0, POPT_ARG_INT, &io_timeout, 0, 0, 0 }, |
8487f9cf | 789 | {"no-timeout", 0, POPT_ARG_VAL, &io_timeout, 0, 0, 0 }, |
ba22c9e2 | 790 | {"contimeout", 0, POPT_ARG_INT, &connect_timeout, 0, 0, 0 }, |
852e763b | 791 | {"no-contimeout", 0, POPT_ARG_VAL, &connect_timeout, 0, 0, 0 }, |
af531cf7 WD |
792 | {"stop-after", 0, POPT_ARG_STRING, 0, OPT_STOP_AFTER, 0, 0 }, |
793 | {"time-limit", 0, POPT_ARG_STRING, 0, OPT_STOP_AFTER, 0, 0 }, /* earlier stop-after name */ | |
794 | {"stop-at", 0, POPT_ARG_STRING, 0, OPT_STOP_AT, 0, 0 }, | |
e86e2fa1 WD |
795 | {"rsh", 'e', POPT_ARG_STRING, &shell_cmd, 0, 0, 0 }, |
796 | {"rsync-path", 0, POPT_ARG_STRING, &rsync_path, 0, 0, 0 }, | |
797 | {"temp-dir", 'T', POPT_ARG_STRING, &tmpdir, 0, 0, 0 }, | |
332cf6df | 798 | {"iconv", 0, POPT_ARG_STRING, &iconv_opt, 0, 0, 0 }, |
0b52f94d | 799 | {"no-iconv", 0, POPT_ARG_NONE, 0, OPT_NO_ICONV, 0, 0 }, |
3dd22903 WD |
800 | {"ipv4", '4', POPT_ARG_VAL, &default_af_hint, AF_INET, 0, 0 }, |
801 | {"ipv6", '6', POPT_ARG_VAL, &default_af_hint, AF_INET6, 0, 0 }, | |
852e763b WD |
802 | {"8-bit-output", '8', POPT_ARG_VAL, &allow_8bit_chars, 1, 0, 0 }, |
803 | {"no-8-bit-output", 0, POPT_ARG_VAL, &allow_8bit_chars, 0, 0, 0 }, | |
804 | {"no-8", 0, POPT_ARG_VAL, &allow_8bit_chars, 0, 0, 0 }, | |
01742c07 WD |
805 | {"mkpath", 0, POPT_ARG_VAL, &mkpath_dest_arg, 1, 0, 0 }, |
806 | {"no-mkpath", 0, POPT_ARG_VAL, &mkpath_dest_arg, 0, 0, 0 }, | |
8487f9cf | 807 | {"qsort", 0, POPT_ARG_NONE, &use_qsort, 0, 0, 0 }, |
08650cb1 | 808 | {"copy-as", 0, POPT_ARG_STRING, ©_as, 0, 0, 0 }, |
e86e2fa1 WD |
809 | {"address", 0, POPT_ARG_STRING, &bind_address, 0, 0, 0 }, |
810 | {"port", 0, POPT_ARG_INT, &rsync_port, 0, 0, 0 }, | |
831f06a5 | 811 | {"sockopts", 0, POPT_ARG_STRING, &sockopts, 0, 0, 0 }, |
e86e2fa1 | 812 | {"password-file", 0, POPT_ARG_STRING, &password_file, 0, 0, 0 }, |
e16b2275 | 813 | {"early-input", 0, POPT_ARG_STRING, &early_input_file, 0, 0, 0 }, |
e86e2fa1 WD |
814 | {"blocking-io", 0, POPT_ARG_VAL, &blocking_io, 1, 0, 0 }, |
815 | {"no-blocking-io", 0, POPT_ARG_VAL, &blocking_io, 0, 0, 0 }, | |
6686b93a | 816 | {"outbuf", 0, POPT_ARG_STRING, &outbuf_mode, 0, 0, 0 }, |
7a2eca41 | 817 | {"remote-option", 'M', POPT_ARG_STRING, 0, 'M', 0, 0 }, |
e86e2fa1 WD |
818 | {"protocol", 0, POPT_ARG_INT, &protocol_version, 0, 0, 0 }, |
819 | {"checksum-seed", 0, POPT_ARG_INT, &checksum_seed, 0, 0, 0 }, | |
0ccffd7c | 820 | {"server", 0, POPT_ARG_NONE, 0, OPT_SERVER, 0, 0 }, |
e86e2fa1 WD |
821 | {"sender", 0, POPT_ARG_NONE, 0, OPT_SENDER, 0, 0 }, |
822 | /* All the following options switch us into daemon-mode option-parsing. */ | |
3ac7f5d4 WD |
823 | {"config", 0, POPT_ARG_STRING, 0, OPT_DAEMON, 0, 0 }, |
824 | {"daemon", 0, POPT_ARG_NONE, 0, OPT_DAEMON, 0, 0 }, | |
2206abf8 | 825 | {"dparam", 0, POPT_ARG_STRING, 0, OPT_DAEMON, 0, 0 }, |
1f35babc | 826 | {"detach", 0, POPT_ARG_NONE, 0, OPT_DAEMON, 0, 0 }, |
3ac7f5d4 | 827 | {"no-detach", 0, POPT_ARG_NONE, 0, OPT_DAEMON, 0, 0 }, |
3ac7f5d4 WD |
828 | {0,0,0,0, 0, 0, 0} |
829 | }; | |
830 | ||
3ac7f5d4 WD |
831 | static struct poptOption long_daemon_options[] = { |
832 | /* longName, shortName, argInfo, argPtr, value, descrip, argDesc */ | |
833 | {"address", 0, POPT_ARG_STRING, &bind_address, 0, 0, 0 }, | |
9fb08441 | 834 | {"bwlimit", 0, POPT_ARG_INT, &daemon_bwlimit, 0, 0, 0 }, |
3ac7f5d4 WD |
835 | {"config", 0, POPT_ARG_STRING, &config_file, 0, 0, 0 }, |
836 | {"daemon", 0, POPT_ARG_NONE, &daemon_opt, 0, 0, 0 }, | |
2206abf8 | 837 | {"dparam", 'M', POPT_ARG_STRING, 0, 'M', 0, 0 }, |
3ac7f5d4 WD |
838 | {"ipv4", '4', POPT_ARG_VAL, &default_af_hint, AF_INET, 0, 0 }, |
839 | {"ipv6", '6', POPT_ARG_VAL, &default_af_hint, AF_INET6, 0, 0 }, | |
1f35babc | 840 | {"detach", 0, POPT_ARG_VAL, &no_detach, 0, 0, 0 }, |
8487f9cf | 841 | {"no-detach", 0, POPT_ARG_VAL, &no_detach, 1, 0, 0 }, |
87c0f9d6 | 842 | {"log-file", 0, POPT_ARG_STRING, &logfile_name, 0, 0, 0 }, |
232658d9 | 843 | {"log-file-format", 0, POPT_ARG_STRING, &logfile_format, 0, 0, 0 }, |
3ac7f5d4 | 844 | {"port", 0, POPT_ARG_INT, &rsync_port, 0, 0, 0 }, |
831f06a5 | 845 | {"sockopts", 0, POPT_ARG_STRING, &sockopts, 0, 0, 0 }, |
3ac7f5d4 WD |
846 | {"protocol", 0, POPT_ARG_INT, &protocol_version, 0, 0, 0 }, |
847 | {"server", 0, POPT_ARG_NONE, &am_server, 0, 0, 0 }, | |
b8cc3587 | 848 | {"temp-dir", 'T', POPT_ARG_STRING, &tmpdir, 0, 0, 0 }, |
1bd9db74 | 849 | {"verbose", 'v', POPT_ARG_NONE, 0, 'v', 0, 0 }, |
b6e22a47 WD |
850 | {"no-verbose", 0, POPT_ARG_VAL, &verbose, 0, 0, 0 }, |
851 | {"no-v", 0, POPT_ARG_VAL, &verbose, 0, 0, 0 }, | |
3ac7f5d4 | 852 | {"help", 'h', POPT_ARG_NONE, 0, 'h', 0, 0 }, |
ad715008 | 853 | {0,0,0,0, 0, 0, 0} |
2855f61f | 854 | }; |
7a6421fa | 855 | |
06963d0f | 856 | |
e51094b7 | 857 | static char err_buf[200]; |
cd8185f2 | 858 | |
2855f61f | 859 | |
dafe63ca MP |
860 | /** |
861 | * Store the option error message, if any, so that we can log the | |
862 | * connection attempt (which requires parsing the options), and then | |
863 | * show the error later on. | |
864 | **/ | |
cd8185f2 AT |
865 | void option_error(void) |
866 | { | |
e51094b7 | 867 | if (!err_buf[0]) { |
c9bce0b8 WD |
868 | strlcpy(err_buf, "Error parsing options: option may " |
869 | "be supported on client but not on server?\n", | |
870 | sizeof err_buf); | |
cd8185f2 | 871 | } |
e51094b7 | 872 | |
e51094b7 | 873 | rprintf(FERROR, RSYNC_NAME ": %s", err_buf); |
f60bd811 | 874 | io_flush(MSG_FLUSH); |
8f1dc165 | 875 | msleep(20); |
cd8185f2 AT |
876 | } |
877 | ||
dafe63ca | 878 | |
3b36bde9 | 879 | static void parse_one_refuse_match(int negated, const char *ref, const struct poptOption *list_end) |
b3a1a0ca WD |
880 | { |
881 | struct poptOption *op; | |
882 | char shortName[2]; | |
883 | int is_wild = strpbrk(ref, "*?[") != NULL; | |
884 | int found_match = 0; | |
885 | ||
886 | shortName[1] = '\0'; | |
887 | ||
888 | if (strcmp("a", ref) == 0 || strcmp("archive", ref) == 0) { | |
889 | ref = "[ardlptgoD]"; | |
890 | is_wild = 1; | |
891 | } | |
892 | ||
893 | for (op = long_options; op != list_end; op++) { | |
894 | *shortName = op->shortName; | |
895 | if ((op->longName && wildmatch(ref, op->longName)) | |
896 | || (*shortName && wildmatch(ref, shortName))) { | |
be7af36c WD |
897 | if (op->descrip[1] == '*') |
898 | op->descrip = negated ? "a*" : "r*"; | |
b3a1a0ca | 899 | else if (!is_wild) |
be7af36c | 900 | op->descrip = negated ? "a=" : "r="; |
b3a1a0ca WD |
901 | found_match = 1; |
902 | if (!is_wild) | |
903 | break; | |
904 | } | |
905 | } | |
906 | ||
907 | if (!found_match) | |
908 | rprintf(FLOG, "No match for refuse-options string \"%s\"\n", ref); | |
909 | } | |
910 | ||
911 | ||
dafe63ca | 912 | /** |
27ed20f7 WD |
913 | * Tweak the option table to disable all options that the rsyncd.conf |
914 | * file has told us to refuse. | |
dafe63ca | 915 | **/ |
b3a1a0ca | 916 | static void set_refuse_options(void) |
cd8185f2 | 917 | { |
b3a1a0ca WD |
918 | struct poptOption *op, *list_end = NULL; |
919 | char *cp, *ref = lp_refuse_options(module_id); | |
920 | int negated; | |
093e816c | 921 | |
b3a1a0ca WD |
922 | if (!ref) |
923 | ref = ""; | |
27ed20f7 | 924 | |
d4fc18f3 WD |
925 | if (!am_daemon) |
926 | ref = ""; | |
b3a1a0ca WD |
927 | |
928 | /* We abuse the descrip field in poptOption to make it easy to flag which options | |
929 | * are refused (since we don't use it otherwise). Start by marking all options | |
be7af36c | 930 | * as "a"ccepted with a few options also marked as non-wild. */ |
b3a1a0ca WD |
931 | for (op = long_options; ; op++) { |
932 | const char *longName = op->longName ? op->longName : ""; | |
933 | if (!op->longName && !op->shortName) { | |
934 | list_end = op; | |
06a50542 | 935 | break; |
d73e7f6e | 936 | } |
d4fc18f3 WD |
937 | if (!am_daemon |
938 | || op->shortName == 'e' /* Required for compatibility flags */ | |
b3a1a0ca WD |
939 | || op->shortName == '0' /* --from0 just modifies --files-from, so refuse that instead (or not) */ |
940 | || op->shortName == 's' /* --protect-args is always OK */ | |
941 | || op->shortName == 'n' /* --dry-run is always OK */ | |
b3a1a0ca WD |
942 | || strcmp("iconv", longName) == 0 |
943 | || strcmp("no-iconv", longName) == 0 | |
944 | || strcmp("checksum-seed", longName) == 0 | |
945 | || strcmp("write-devices", longName) == 0 /* disable wild-match (it gets refused below) */ | |
be7af36c WD |
946 | || strcmp("log-format", longName) == 0 /* aka out-format (NOT log-file-format) */ |
947 | || strcmp("sender", longName) == 0 | |
948 | || strcmp("server", longName) == 0) | |
949 | op->descrip = "a="; /* exact-match only */ | |
b3a1a0ca | 950 | else |
be7af36c | 951 | op->descrip = "a*"; /* wild-card-able */ |
b3a1a0ca WD |
952 | } |
953 | assert(list_end != NULL); | |
954 | ||
d4fc18f3 | 955 | if (am_daemon) { /* Refused by default, but can be accepted via a negated exact match. */ |
3b36bde9 | 956 | parse_one_refuse_match(0, "write-devices", list_end); |
d4fc18f3 | 957 | } |
b3a1a0ca WD |
958 | |
959 | while (1) { | |
960 | while (*ref == ' ') ref++; | |
961 | if (!*ref) | |
962 | break; | |
963 | if ((cp = strchr(ref, ' ')) != NULL) | |
964 | *cp = '\0'; | |
965 | negated = *ref == '!'; | |
966 | if (negated && ref[1]) | |
967 | ref++; | |
3b36bde9 | 968 | parse_one_refuse_match(negated, ref, list_end); |
27ed20f7 WD |
969 | if (!cp) |
970 | break; | |
971 | *cp = ' '; | |
b3a1a0ca WD |
972 | ref = cp + 1; |
973 | } | |
974 | ||
975 | if (am_daemon) { | |
976 | #ifdef ICONV_OPTION | |
977 | if (!*lp_charset(module_id)) | |
3b36bde9 | 978 | parse_one_refuse_match(0, "iconv", list_end); |
b3a1a0ca | 979 | #endif |
3b36bde9 | 980 | parse_one_refuse_match(0, "log-file*", list_end); |
b3a1a0ca WD |
981 | } |
982 | ||
2b439c1f WD |
983 | #ifndef SUPPORT_ATIMES |
984 | parse_one_refuse_match(0, "atimes", list_end); | |
985 | #endif | |
1d6c9676 WD |
986 | #ifndef SUPPORT_HARD_LINKS |
987 | parse_one_refuse_match(0, "link-dest", list_end); | |
988 | #endif | |
af531cf7 WD |
989 | #ifndef HAVE_MKTIME |
990 | parse_one_refuse_match(0, "stop-at", list_end); | |
991 | #endif | |
d4fc18f3 WD |
992 | #ifndef ICONV_OPTION |
993 | parse_one_refuse_match(0, "iconv", list_end); | |
994 | #endif | |
995 | #ifndef HAVE_SETVBUF | |
996 | parse_one_refuse_match(0, "outbuf", list_end); | |
997 | #endif | |
974f49e2 WD |
998 | #ifndef SUPPORT_CRTIMES |
999 | parse_one_refuse_match(0, "crtimes", list_end); | |
1000 | #endif | |
d4fc18f3 | 1001 | |
b3a1a0ca WD |
1002 | /* Now we use the descrip values to actually mark the options for refusal. */ |
1003 | for (op = long_options; op != list_end; op++) { | |
be7af36c | 1004 | int refused = op->descrip[0] == 'r'; |
b3a1a0ca WD |
1005 | op->descrip = NULL; |
1006 | if (!refused) | |
1007 | continue; | |
1008 | if (op->argInfo == POPT_ARG_VAL) | |
1009 | op->argInfo = POPT_ARG_NONE; | |
1010 | op->val = (op - long_options) + OPT_REFUSED_BASE; | |
1011 | /* The following flags are set to let us easily check an implied option later in the code. */ | |
1012 | switch (op->shortName) { | |
1013 | case 'r': case 'd': case 'l': case 'p': | |
1014 | case 't': case 'g': case 'o': case 'D': | |
1015 | refused_archive_part = op->val; | |
1016 | break; | |
1017 | case 'z': | |
1018 | refused_compress = op->val; | |
1019 | break; | |
1020 | case '\0': | |
1021 | if (strcmp("delete", op->longName) == 0) | |
1022 | refused_delete = op->val; | |
1023 | else if (strcmp("delete-before", op->longName) == 0) | |
1024 | refused_delete_before = op->val; | |
1025 | else if (strcmp("delete-during", op->longName) == 0) | |
1026 | refused_delete_during = op->val; | |
1027 | else if (strcmp("partial", op->longName) == 0) | |
1028 | refused_partial = op->val; | |
1029 | else if (strcmp("progress", op->longName) == 0) | |
1030 | refused_progress = op->val; | |
1031 | else if (strcmp("inplace", op->longName) == 0) | |
1032 | refused_inplace = op->val; | |
1033 | else if (strcmp("no-iconv", op->longName) == 0) | |
1034 | refused_no_iconv = op->val; | |
1035 | break; | |
1036 | } | |
cd8185f2 | 1037 | } |
cd8185f2 AT |
1038 | } |
1039 | ||
1040 | ||
8db7cc2c | 1041 | static int count_args(const char **argv) |
2855f61f | 1042 | { |
dfa32483 | 1043 | int i = 0; |
2855f61f | 1044 | |
8db7cc2c WD |
1045 | if (argv) { |
1046 | while (argv[i] != NULL) | |
1047 | i++; | |
1048 | } | |
dfa32483 WD |
1049 | |
1050 | return i; | |
2855f61f MP |
1051 | } |
1052 | ||
11eb67ee WD |
1053 | /* If the size_arg is an invalid string or the value is < min_value, an error |
1054 | * is put into err_buf & the return is -1. Note that this parser does NOT | |
1055 | * support negative numbers, so a min_value < 0 doesn't make any sense. */ | |
66ca4fc9 WD |
1056 | static ssize_t parse_size_arg(const char *size_arg, char def_suf, const char *opt_name, |
1057 | ssize_t min_value, ssize_t max_value, BOOL unlimited_0) | |
95e107db | 1058 | { |
66ca4fc9 WD |
1059 | int reps, mult, len; |
1060 | const char *arg, *err = "invalid", *min_max = NULL; | |
1061 | ssize_t limit = -1, size = 1; | |
95e107db | 1062 | |
11eb67ee | 1063 | for (arg = size_arg; isDigit(arg); arg++) {} |
da7a3506 | 1064 | if (*arg == '.' || *arg == get_decimal_point()) /* backward compatibility: always allow '.' */ |
2dc7b8bd | 1065 | for (arg++; isDigit(arg); arg++) {} |
3c19f72c | 1066 | switch (*arg && *arg != '+' && *arg != '-' ? *arg++ : def_suf) { |
837d01dd | 1067 | case 'b': case 'B': |
3c19f72c | 1068 | reps = 0; |
837d01dd | 1069 | break; |
95e107db | 1070 | case 'k': case 'K': |
3c19f72c | 1071 | reps = 1; |
95e107db WD |
1072 | break; |
1073 | case 'm': case 'M': | |
3c19f72c | 1074 | reps = 2; |
95e107db WD |
1075 | break; |
1076 | case 'g': case 'G': | |
3c19f72c | 1077 | reps = 3; |
95e107db | 1078 | break; |
11eb67ee WD |
1079 | case 't': case 'T': |
1080 | reps = 4; | |
1081 | break; | |
1082 | case 'p': case 'P': | |
1083 | reps = 5; | |
1084 | break; | |
95e107db | 1085 | default: |
11eb67ee | 1086 | goto failure; |
95e107db | 1087 | } |
3c19f72c | 1088 | if (*arg == 'b' || *arg == 'B') |
11eb67ee | 1089 | mult = 1000, arg++; |
3c19f72c WD |
1090 | else if (!*arg || *arg == '+' || *arg == '-') |
1091 | mult = 1024; | |
1092 | else if (strncasecmp(arg, "ib", 2) == 0) | |
1093 | mult = 1024, arg += 2; | |
1094 | else | |
11eb67ee | 1095 | goto failure; |
3c19f72c WD |
1096 | while (reps--) |
1097 | size *= mult; | |
11eb67ee | 1098 | size *= atof(size_arg); |
d07c2992 | 1099 | if ((*arg == '+' || *arg == '-') && arg[1] == '1' && arg != size_arg) |
11eb67ee | 1100 | size += atoi(arg), arg += 2; |
3c19f72c | 1101 | if (*arg) |
11eb67ee | 1102 | goto failure; |
66ca4fc9 WD |
1103 | if (size < 0 || (max_value >= 0 && size > max_value)) { |
1104 | err = "too large"; | |
1105 | min_max = "max"; | |
1106 | limit = max_value; | |
1107 | goto failure; | |
1108 | } | |
1109 | if (size < min_value && (!unlimited_0 || size != 0)) { | |
1110 | err = "too small"; | |
1111 | min_max = "min"; | |
1112 | limit = min_value; | |
11eb67ee | 1113 | goto failure; |
aeb213ea | 1114 | } |
95e107db | 1115 | return size; |
95e107db | 1116 | |
11eb67ee | 1117 | failure: |
66ca4fc9 WD |
1118 | len = snprintf(err_buf, sizeof err_buf - 1, "--%s=%s is %s", opt_name, size_arg, err); |
1119 | if (min_max && limit >= 0 && len < (int)sizeof err_buf - 10) { | |
1120 | len += snprintf(err_buf + len, sizeof err_buf - len - 1, " (%s: %s%s)", | |
1121 | min_max, do_big_num(limit, 3, NULL), | |
1122 | unlimited_0 && min_max[1] == 'i' ? " or 0 for unlimited" : ""); | |
1123 | } | |
1124 | err_buf[len] = '\n'; | |
1125 | err_buf[len+1] = '\0'; | |
11eb67ee WD |
1126 | return -1; |
1127 | } | |
95e107db | 1128 | |
af531cf7 WD |
1129 | #ifdef HAVE_MKTIME |
1130 | /* Allow the user to specify a time in the format yyyy-mm-ddThh:mm while | |
1131 | * also allowing abbreviated data. For instance, if the time is omitted, | |
1132 | * it defaults to midnight. If the date is omitted, it defaults to the | |
1133 | * next possible date in the future with the specified time. Even the | |
1134 | * year or year-month can be omitted, again defaulting to the next date | |
1135 | * in the future that matches the specified information. A 2-digit year | |
1136 | * is also OK, as is using '/' instead of '-'. */ | |
1137 | static time_t parse_time(const char *arg) | |
1138 | { | |
1139 | const char *cp; | |
1140 | time_t val, now = time(NULL); | |
1141 | struct tm t, *today = localtime(&now); | |
1142 | int in_date, old_mday, n; | |
1143 | ||
1144 | memset(&t, 0, sizeof t); | |
1145 | t.tm_year = t.tm_mon = t.tm_mday = -1; | |
1146 | t.tm_hour = t.tm_min = t.tm_isdst = -1; | |
1147 | cp = arg; | |
1148 | if (*cp == 'T' || *cp == 't' || *cp == ':') { | |
1149 | in_date = *cp == ':' ? 0 : -1; | |
1150 | cp++; | |
1151 | } else | |
1152 | in_date = 1; | |
1153 | for ( ; ; cp++) { | |
1154 | if (!isDigit(cp)) | |
1155 | return (time_t)-1; | |
1156 | n = 0; | |
1157 | do { | |
1158 | n = n * 10 + *cp++ - '0'; | |
1159 | } while (isDigit(cp)); | |
1160 | if (*cp == ':') | |
1161 | in_date = 0; | |
1162 | if (in_date > 0) { | |
1163 | if (t.tm_year != -1) | |
1164 | return (time_t)-1; | |
1165 | t.tm_year = t.tm_mon; | |
1166 | t.tm_mon = t.tm_mday; | |
1167 | t.tm_mday = n; | |
1168 | if (!*cp) | |
1169 | break; | |
1170 | if (*cp == 'T' || *cp == 't') { | |
1171 | if (!cp[1]) | |
1172 | break; | |
1173 | in_date = -1; | |
1174 | } else if (*cp != '-' && *cp != '/') | |
1175 | return (time_t)-1; | |
1176 | continue; | |
1177 | } | |
1178 | if (t.tm_hour != -1) | |
1179 | return (time_t)-1; | |
1180 | t.tm_hour = t.tm_min; | |
1181 | t.tm_min = n; | |
1182 | if (!*cp) { | |
1183 | if (in_date < 0) | |
1184 | return (time_t)-1; | |
1185 | break; | |
1186 | } | |
1187 | if (*cp != ':') | |
1188 | return (time_t)-1; | |
1189 | in_date = 0; | |
1190 | } | |
1191 | ||
1192 | in_date = 0; | |
1193 | if (t.tm_year < 0) { | |
1194 | t.tm_year = today->tm_year; | |
1195 | in_date = 1; | |
1196 | } else if (t.tm_year < 100) { | |
1197 | while (t.tm_year < today->tm_year) | |
1198 | t.tm_year += 100; | |
1199 | } else | |
1200 | t.tm_year -= 1900; | |
1201 | if (t.tm_mon < 0) { | |
1202 | t.tm_mon = today->tm_mon; | |
1203 | in_date = 2; | |
1204 | } else | |
1205 | t.tm_mon--; | |
1206 | if (t.tm_mday < 0) { | |
1207 | t.tm_mday = today->tm_mday; | |
1208 | in_date = 3; | |
1209 | } | |
1210 | ||
1211 | n = 0; | |
1212 | if (t.tm_min < 0) { | |
1213 | t.tm_hour = t.tm_min = 0; | |
1214 | } else if (t.tm_hour < 0) { | |
1215 | if (in_date != 3) | |
1216 | return (time_t)-1; | |
1217 | in_date = 0; | |
1218 | t.tm_hour = today->tm_hour; | |
1219 | n = 60*60; | |
1220 | } | |
1221 | ||
1222 | /* Note that mktime() might change a too-large tm_mday into the start of | |
1223 | * the following month which we need to undo in the following code! */ | |
1224 | old_mday = t.tm_mday; | |
1225 | if (t.tm_hour > 23 || t.tm_min > 59 | |
1226 | || t.tm_mon < 0 || t.tm_mon >= 12 | |
1227 | || t.tm_mday < 1 || t.tm_mday > 31 | |
1228 | || (val = mktime(&t)) == (time_t)-1) | |
1229 | return (time_t)-1; | |
1230 | ||
1231 | while (in_date && (val <= now || t.tm_mday < old_mday)) { | |
1232 | switch (in_date) { | |
1233 | case 3: | |
1234 | old_mday = ++t.tm_mday; | |
1235 | break; | |
1236 | case 2: | |
1237 | if (t.tm_mday < old_mday) | |
1238 | t.tm_mday = old_mday; /* The month already got bumped forward */ | |
1239 | else if (++t.tm_mon == 12) { | |
1240 | t.tm_mon = 0; | |
1241 | t.tm_year++; | |
1242 | } | |
1243 | break; | |
1244 | case 1: | |
1245 | if (t.tm_mday < old_mday) { | |
1246 | /* mon==1 mday==29 got bumped to mon==2 */ | |
1247 | if (t.tm_mon != 2 || old_mday != 29) | |
1248 | return (time_t)-1; | |
1249 | t.tm_mon = 1; | |
1250 | t.tm_mday = 29; | |
1251 | } | |
1252 | t.tm_year++; | |
1253 | break; | |
1254 | } | |
1255 | if ((val = mktime(&t)) == (time_t)-1) { | |
1256 | /* This code shouldn't be needed, as mktime() should auto-round to the next month. */ | |
1257 | if (in_date != 3 || t.tm_mday <= 28) | |
1258 | return (time_t)-1; | |
1259 | t.tm_mday = old_mday = 1; | |
1260 | in_date = 2; | |
1261 | } | |
1262 | } | |
1263 | if (n) { | |
1264 | while (val <= now) | |
1265 | val += n; | |
1266 | } | |
1267 | return val; | |
1268 | } | |
1269 | #endif | |
1270 | ||
3671987f WD |
1271 | static void create_refuse_error(int which) |
1272 | { | |
d4fc18f3 WD |
1273 | const char *msg; |
1274 | if (am_daemon) | |
1275 | msg = "The server is configured to refuse"; | |
1276 | else if (am_server) | |
1277 | msg = "The server does not support"; | |
1278 | else | |
1279 | msg = "This rsync does not support"; | |
1280 | ||
3671987f WD |
1281 | /* The "which" value is the index + OPT_REFUSED_BASE. */ |
1282 | struct poptOption *op = &long_options[which - OPT_REFUSED_BASE]; | |
d4fc18f3 WD |
1283 | int n = snprintf(err_buf, sizeof err_buf, "%s --%s\n", msg, op->longName) - 1; |
1284 | if (op->shortName) | |
1285 | snprintf(err_buf + n, sizeof err_buf - n, " (-%c)\n", op->shortName); | |
3671987f WD |
1286 | } |
1287 | ||
9e7b8ab7 WD |
1288 | /* This is used to make sure that --daemon & --server cannot be aliased to |
1289 | * something else. These options have always disabled popt aliases for the | |
1290 | * parsing of a daemon or server command-line, but we have to make sure that | |
1291 | * these options cannot vanish so that the alias disabling can take effect. */ | |
1292 | static void popt_unalias(poptContext con, const char *opt) | |
1293 | { | |
1294 | struct poptAlias unalias; | |
1295 | ||
bb484a79 WD |
1296 | memset(&unalias, 0, sizeof unalias); |
1297 | ||
9e7b8ab7 | 1298 | unalias.longName = opt + 2; /* point past the leading "--" */ |
9e7b8ab7 | 1299 | unalias.argc = 1; |
bb484a79 | 1300 | unalias.argv = new_array0(const char*, 2); |
9e7b8ab7 WD |
1301 | unalias.argv[0] = strdup(opt); |
1302 | ||
1303 | poptAddAlias(con, unalias, 0); | |
1304 | } | |
3671987f | 1305 | |
cdf58a7a | 1306 | char *alt_dest_opt(int type) |
1d6c9676 WD |
1307 | { |
1308 | if (!type) | |
1309 | type = alt_dest_type; | |
1310 | ||
1311 | switch (type) { | |
1312 | case COMPARE_DEST: | |
1313 | return "--compare-dest"; | |
1314 | case COPY_DEST: | |
1315 | return "--copy-dest"; | |
1316 | case LINK_DEST: | |
1317 | return "--link-dest"; | |
1318 | default: | |
ab110fc8 | 1319 | NOISY_DEATH("Unknown alt_dest_opt type"); |
1d6c9676 WD |
1320 | } |
1321 | } | |
1322 | ||
dafe63ca MP |
1323 | /** |
1324 | * Process command line arguments. Called on both local and remote. | |
1325 | * | |
1326 | * @retval 1 if all options are OK; with globals set to appropriate | |
1327 | * values | |
1328 | * | |
1329 | * @retval 0 on error, with err_buf containing an explanation | |
1330 | **/ | |
53936ef9 | 1331 | int parse_arguments(int *argc_p, const char ***argv_p) |
7a6421fa | 1332 | { |
7a4addaa | 1333 | static poptContext pc; |
ffbffc64 WD |
1334 | const char *arg, **argv = *argv_p; |
1335 | int argc = *argc_p; | |
1d6c9676 | 1336 | int opt, want_dest_type; |
77063038 | 1337 | int orig_protect_args = protect_args; |
d853783f | 1338 | |
a3668685 WD |
1339 | if (argc == 0) { |
1340 | strlcpy(err_buf, "argc is zero!\n", sizeof err_buf); | |
1341 | return 0; | |
1342 | } | |
b3a1a0ca WD |
1343 | |
1344 | set_refuse_options(); | |
27ed20f7 | 1345 | |
332cf6df | 1346 | #ifdef ICONV_OPTION |
4c4a2962 | 1347 | if (!am_daemon && protect_args <= 0 && (arg = getenv("RSYNC_ICONV")) != NULL && *arg) |
332cf6df WD |
1348 | iconv_opt = strdup(arg); |
1349 | #endif | |
1350 | ||
dfa32483 | 1351 | /* TODO: Call poptReadDefaultConfig; handle errors. */ |
cd8185f2 | 1352 | |
dfa32483 WD |
1353 | /* The context leaks in case of an error, but if there's a |
1354 | * problem we always exit anyhow. */ | |
7a4addaa WD |
1355 | if (pc) |
1356 | poptFreeContext(pc); | |
1357 | pc = poptGetContext(RSYNC_NAME, argc, argv, long_options, 0); | |
9e7b8ab7 | 1358 | if (!am_server) { |
7a4addaa | 1359 | poptReadDefaultConfig(pc, 0); |
9e7b8ab7 WD |
1360 | popt_unalias(pc, "--daemon"); |
1361 | popt_unalias(pc, "--server"); | |
1362 | } | |
2855f61f MP |
1363 | |
1364 | while ((opt = poptGetNextOpt(pc)) != -1) { | |
dfa32483 WD |
1365 | /* most options are handled automatically by popt; |
1366 | * only special cases are returned and listed here. */ | |
2855f61f | 1367 | |
d853783f | 1368 | switch (opt) { |
342579aa | 1369 | case 'V': |
6b237b0f WD |
1370 | version_opt_cnt++; |
1371 | break; | |
dfa32483 | 1372 | |
0ccffd7c WD |
1373 | case OPT_SERVER: |
1374 | if (!am_server) { | |
1375 | /* Disable popt aliases on the server side and | |
1376 | * then start parsing the options again. */ | |
1377 | poptFreeContext(pc); | |
e63ff70e | 1378 | pc = poptGetContext(RSYNC_NAME, argc, argv, long_options, 0); |
0ccffd7c WD |
1379 | am_server = 1; |
1380 | } | |
332cf6df WD |
1381 | #ifdef ICONV_OPTION |
1382 | iconv_opt = NULL; | |
1383 | #endif | |
0ccffd7c WD |
1384 | break; |
1385 | ||
1386 | case OPT_SENDER: | |
1387 | if (!am_server) { | |
1388 | usage(FERROR); | |
1389 | exit_cleanup(RERR_SYNTAX); | |
1390 | } | |
1391 | am_sender = 1; | |
1392 | break; | |
1393 | ||
3ac7f5d4 WD |
1394 | case OPT_DAEMON: |
1395 | if (am_daemon) { | |
c9bce0b8 WD |
1396 | strlcpy(err_buf, |
1397 | "Attempt to hack rsync thwarted!\n", | |
1398 | sizeof err_buf); | |
3ac7f5d4 WD |
1399 | return 0; |
1400 | } | |
332cf6df WD |
1401 | #ifdef ICONV_OPTION |
1402 | iconv_opt = NULL; | |
1403 | #endif | |
4c4a2962 | 1404 | protect_args = 0; |
3ac7f5d4 | 1405 | poptFreeContext(pc); |
e63ff70e | 1406 | pc = poptGetContext(RSYNC_NAME, argc, argv, long_daemon_options, 0); |
3ac7f5d4 | 1407 | while ((opt = poptGetNextOpt(pc)) != -1) { |
2206abf8 | 1408 | char **cpp; |
3ac7f5d4 WD |
1409 | switch (opt) { |
1410 | case 'h': | |
1411 | daemon_usage(FINFO); | |
1412 | exit_cleanup(0); | |
1413 | ||
2206abf8 WD |
1414 | case 'M': |
1415 | arg = poptGetOptArg(pc); | |
1416 | if (!strchr(arg, '=')) { | |
1417 | rprintf(FERROR, | |
e63ff70e WD |
1418 | "--dparam value is missing an '=': %s\n", |
1419 | arg); | |
2206abf8 WD |
1420 | goto daemon_error; |
1421 | } | |
1422 | cpp = EXPAND_ITEM_LIST(&dparam_list, char *, 4); | |
1423 | *cpp = strdup(arg); | |
1424 | break; | |
1425 | ||
1bd9db74 WD |
1426 | case 'v': |
1427 | verbose++; | |
1428 | break; | |
1429 | ||
3ac7f5d4 WD |
1430 | default: |
1431 | rprintf(FERROR, | |
e63ff70e WD |
1432 | "rsync: %s: %s (in daemon mode)\n", |
1433 | poptBadOption(pc, POPT_BADOPTION_NOALIAS), | |
1434 | poptStrerror(opt)); | |
3ac7f5d4 WD |
1435 | goto daemon_error; |
1436 | } | |
1437 | } | |
b6e22a47 | 1438 | |
2206abf8 WD |
1439 | if (dparam_list.count && !set_dparams(1)) |
1440 | exit_cleanup(RERR_SYNTAX); | |
1441 | ||
b6e22a47 WD |
1442 | if (tmpdir && strlen(tmpdir) >= MAXPATHLEN - 10) { |
1443 | snprintf(err_buf, sizeof err_buf, | |
1444 | "the --temp-dir path is WAY too long.\n"); | |
1445 | return 0; | |
1446 | } | |
1447 | ||
3ac7f5d4 WD |
1448 | if (!daemon_opt) { |
1449 | rprintf(FERROR, "Daemon option(s) used without --daemon.\n"); | |
1450 | daemon_error: | |
e63ff70e | 1451 | rprintf(FERROR, "(Type \"rsync --daemon --help\" for assistance with daemon mode.)\n"); |
3ac7f5d4 WD |
1452 | exit_cleanup(RERR_SYNTAX); |
1453 | } | |
b6e22a47 | 1454 | |
ffbffc64 WD |
1455 | *argv_p = argv = poptGetArgs(pc); |
1456 | *argc_p = argc = count_args(argv); | |
7f2a1f65 | 1457 | am_starting_up = 0; |
3ac7f5d4 WD |
1458 | daemon_opt = 0; |
1459 | am_daemon = 1; | |
1460 | return 1; | |
1461 | ||
5b56cc19 | 1462 | case OPT_MODIFY_WINDOW: |
dfa32483 WD |
1463 | /* The value has already been set by popt, but |
1464 | * we need to remember that we're using a | |
1465 | * non-default setting. */ | |
5b56cc19 AT |
1466 | modify_window_set = 1; |
1467 | break; | |
1de50993 | 1468 | |
aa4d3b4c | 1469 | case OPT_FILTER: |
c8fa85b2 MM |
1470 | parse_filter_str(&filter_list, poptGetOptArg(pc), |
1471 | rule_template(0), 0); | |
d853783f AT |
1472 | break; |
1473 | ||
aa4d3b4c | 1474 | case OPT_EXCLUDE: |
c8fa85b2 MM |
1475 | parse_filter_str(&filter_list, poptGetOptArg(pc), |
1476 | rule_template(0), XFLG_OLD_PREFIXES); | |
aa4d3b4c WD |
1477 | break; |
1478 | ||
d853783f | 1479 | case OPT_INCLUDE: |
c8fa85b2 MM |
1480 | parse_filter_str(&filter_list, poptGetOptArg(pc), |
1481 | rule_template(FILTRULE_INCLUDE), XFLG_OLD_PREFIXES); | |
d853783f AT |
1482 | break; |
1483 | ||
1484 | case OPT_EXCLUDE_FROM: | |
93695764 | 1485 | case OPT_INCLUDE_FROM: |
7be73df4 | 1486 | arg = poptGetOptArg(pc); |
1a7f3d99 | 1487 | if (sanitize_paths) |
d48810ba | 1488 | arg = sanitize_path(NULL, arg, NULL, 0, SP_DEFAULT); |
819bfe45 | 1489 | if (daemon_filter_list.head) { |
200aec7d | 1490 | int rej; |
2907af47 | 1491 | char *cp = strdup(arg); |
3671987f | 1492 | if (!*cp) |
2907af47 WD |
1493 | rej = 1; |
1494 | else { | |
1495 | char *dir = cp + (*cp == '/' ? module_dirlen : 0); | |
1496 | clean_fname(dir, CFN_COLLAPSE_DOT_DOT_DIRS); | |
1497 | rej = check_filter(&daemon_filter_list, FLOG, dir, 0) < 0; | |
1498 | } | |
d3ef9859 | 1499 | free(cp); |
200aec7d WD |
1500 | if (rej) |
1501 | goto options_rejected; | |
ba3db479 | 1502 | } |
3a5e9224 | 1503 | parse_filter_file(&filter_list, arg, |
c8fa85b2 | 1504 | rule_template(opt == OPT_INCLUDE_FROM ? FILTRULE_INCLUDE : 0), |
3a5e9224 | 1505 | XFLG_FATAL_ERRORS | XFLG_OLD_PREFIXES); |
93695764 DD |
1506 | break; |
1507 | ||
b6164938 WD |
1508 | case 'a': |
1509 | if (refused_archive_part) { | |
1510 | create_refuse_error(refused_archive_part); | |
1511 | return 0; | |
1512 | } | |
1513 | if (!recurse) /* preserve recurse == 2 */ | |
1514 | recurse = 1; | |
1515 | #ifdef SUPPORT_LINKS | |
1516 | preserve_links = 1; | |
1517 | #endif | |
1518 | preserve_perms = 1; | |
2624e005 | 1519 | preserve_times = 1; |
b6164938 WD |
1520 | preserve_gid = 1; |
1521 | preserve_uid = 1; | |
1522 | preserve_devices = 1; | |
b5c6a6ae WD |
1523 | preserve_specials = 1; |
1524 | break; | |
1525 | ||
1526 | case 'D': | |
1527 | preserve_devices = preserve_specials = 1; | |
1528 | break; | |
1529 | ||
1530 | case OPT_NO_D: | |
1531 | preserve_devices = preserve_specials = 0; | |
b6164938 WD |
1532 | break; |
1533 | ||
3ca9e5d8 WD |
1534 | case 'h': |
1535 | human_readable++; | |
1536 | break; | |
1537 | ||
e0e32031 WD |
1538 | case 'H': |
1539 | preserve_hard_links++; | |
1540 | break; | |
1541 | ||
487094a0 WD |
1542 | case 'i': |
1543 | itemize_changes++; | |
1544 | break; | |
1545 | ||
b9367410 WD |
1546 | case 'U': |
1547 | if (++preserve_atimes > 1) | |
b3a1a0ca | 1548 | open_noatime = 1; |
b9367410 WD |
1549 | break; |
1550 | ||
d853783f AT |
1551 | case 'v': |
1552 | verbose++; | |
1553 | break; | |
7a6421fa | 1554 | |
48b51d00 WD |
1555 | case 'y': |
1556 | fuzzy_basis++; | |
1557 | break; | |
1558 | ||
b86f0cef | 1559 | case 'q': |
53936ef9 | 1560 | quiet++; |
b86f0cef DD |
1561 | break; |
1562 | ||
243c995f WD |
1563 | case 'x': |
1564 | one_file_system++; | |
1565 | break; | |
1566 | ||
aa4d3b4c WD |
1567 | case 'F': |
1568 | switch (++F_option_cnt) { | |
1569 | case 1: | |
c8fa85b2 | 1570 | parse_filter_str(&filter_list,": /.rsync-filter",rule_template(0),0); |
aa4d3b4c WD |
1571 | break; |
1572 | case 2: | |
c8fa85b2 | 1573 | parse_filter_str(&filter_list,"- .rsync-filter",rule_template(0),0); |
aa4d3b4c WD |
1574 | break; |
1575 | } | |
1576 | break; | |
1577 | ||
d9fcc198 | 1578 | case 'P': |
3671987f | 1579 | if (refused_partial || refused_progress) { |
e63ff70e | 1580 | create_refuse_error(refused_partial ? refused_partial : refused_progress); |
3671987f WD |
1581 | return 0; |
1582 | } | |
d9fcc198 AT |
1583 | do_progress = 1; |
1584 | keep_partial = 1; | |
1585 | break; | |
1586 | ||
854a1aad | 1587 | case 'z': |
22a3ac0b | 1588 | do_compression++; |
854a1aad WD |
1589 | break; |
1590 | ||
64d5ea39 WD |
1591 | case OPT_OLD_COMPRESS: |
1592 | compress_choice = "zlib"; | |
1593 | break; | |
1594 | ||
1595 | case OPT_NEW_COMPRESS: | |
1596 | compress_choice = "zlibx"; | |
1597 | break; | |
1598 | ||
1599 | case OPT_NO_COMPRESS: | |
1600 | do_compression = 0; | |
1601 | compress_choice = NULL; | |
1602 | break; | |
1603 | ||
7a2eca41 WD |
1604 | case 'M': |
1605 | arg = poptGetOptArg(pc); | |
1606 | if (*arg != '-') { | |
1607 | snprintf(err_buf, sizeof err_buf, | |
1608 | "Remote option must start with a dash: %s\n", arg); | |
1609 | return 0; | |
1610 | } | |
1611 | if (remote_option_cnt+2 >= remote_option_alloc) { | |
1612 | remote_option_alloc += 16; | |
1613 | remote_options = realloc_array(remote_options, | |
1614 | const char *, remote_option_alloc); | |
7a2eca41 WD |
1615 | if (!remote_option_cnt) |
1616 | remote_options[0] = "ARG0"; | |
1617 | } | |
1618 | remote_options[++remote_option_cnt] = arg; | |
1619 | remote_options[remote_option_cnt+1] = NULL; | |
1620 | break; | |
1621 | ||
088aac85 | 1622 | case OPT_WRITE_BATCH: |
9b3318b0 | 1623 | /* batch_name is already set */ |
088aac85 DD |
1624 | write_batch = 1; |
1625 | break; | |
1626 | ||
11e758a4 WD |
1627 | case OPT_ONLY_WRITE_BATCH: |
1628 | /* batch_name is already set */ | |
1629 | write_batch = -1; | |
1630 | break; | |
1631 | ||
76f79ba7 | 1632 | case OPT_READ_BATCH: |
9b3318b0 | 1633 | /* batch_name is already set */ |
6902ed17 MP |
1634 | read_batch = 1; |
1635 | break; | |
ea5164d1 | 1636 | |
0b52f94d | 1637 | case OPT_NO_ICONV: |
15dbffc2 | 1638 | #ifdef ICONV_OPTION |
0b52f94d | 1639 | iconv_opt = NULL; |
15dbffc2 | 1640 | #endif |
0b52f94d WD |
1641 | break; |
1642 | ||
66ca4fc9 WD |
1643 | case OPT_BLOCK_SIZE: { |
1644 | /* We may not know the real protocol_version at this point if this is the client | |
1645 | * option parsing, but we still want to check it so that the client can specify | |
1646 | * a --protocol=29 option with a larger block size. */ | |
1647 | int max_blength = protocol_version < 30 ? OLD_MAX_BLOCK_SIZE : MAX_BLOCK_SIZE; | |
1648 | ssize_t size; | |
1649 | arg = poptGetOptArg(pc); | |
1650 | if ((size = parse_size_arg(arg, 'b', "block-size", 0, max_blength, False)) < 0) | |
1651 | return 0; | |
1652 | block_size = (int32)size; | |
1653 | break; | |
1654 | } | |
1655 | ||
7d5acf1d | 1656 | case OPT_MAX_SIZE: |
66ca4fc9 | 1657 | if ((max_size = parse_size_arg(max_size_arg, 'b', "max-size", 0, -1, False)) < 0) |
e012f858 | 1658 | return 0; |
da7a3506 | 1659 | max_size_arg = strdup(do_big_num(max_size, 0, NULL)); |
7d5acf1d WD |
1660 | break; |
1661 | ||
74de13d1 | 1662 | case OPT_MIN_SIZE: |
66ca4fc9 | 1663 | if ((min_size = parse_size_arg(min_size_arg, 'b', "min-size", 0, -1, False)) < 0) |
74de13d1 | 1664 | return 0; |
da7a3506 | 1665 | min_size_arg = strdup(do_big_num(min_size, 0, NULL)); |
74de13d1 WD |
1666 | break; |
1667 | ||
11eb67ee | 1668 | case OPT_BWLIMIT: { |
66ca4fc9 | 1669 | ssize_t size = parse_size_arg(bwlimit_arg, 'K', "bwlimit", 512, -1, True); |
11eb67ee WD |
1670 | if (size < 0) |
1671 | return 0; | |
da7a3506 | 1672 | bwlimit_arg = strdup(do_big_num(size, 0, NULL)); |
11eb67ee | 1673 | bwlimit = (size + 512) / 1024; |
ce795fcd | 1674 | break; |
11eb67ee | 1675 | } |
ce795fcd | 1676 | |
936fa865 WD |
1677 | case OPT_APPEND: |
1678 | if (am_server) | |
1679 | append_mode++; | |
1680 | else | |
1681 | append_mode = 1; | |
1682 | break; | |
1683 | ||
59c95e42 | 1684 | case OPT_LINK_DEST: |
1d6c9676 | 1685 | want_dest_type = LINK_DEST; |
e012f858 | 1686 | goto set_dest_dir; |
59c95e42 | 1687 | |
1de3e99b | 1688 | case OPT_COPY_DEST: |
1d6c9676 | 1689 | want_dest_type = COPY_DEST; |
1de3e99b WD |
1690 | goto set_dest_dir; |
1691 | ||
e012f858 | 1692 | case OPT_COMPARE_DEST: |
1d6c9676 WD |
1693 | want_dest_type = COMPARE_DEST; |
1694 | ||
e012f858 | 1695 | set_dest_dir: |
1d6c9676 WD |
1696 | if (alt_dest_type && alt_dest_type != want_dest_type) { |
1697 | snprintf(err_buf, sizeof err_buf, | |
1698 | "ERROR: the %s option conflicts with the %s option\n", | |
cdf58a7a | 1699 | alt_dest_opt(want_dest_type), alt_dest_opt(0)); |
1d6c9676 WD |
1700 | return 0; |
1701 | } | |
1702 | alt_dest_type = want_dest_type; | |
1703 | ||
3b26bba0 | 1704 | if (basis_dir_cnt >= MAX_BASIS_DIRS) { |
e012f858 WD |
1705 | snprintf(err_buf, sizeof err_buf, |
1706 | "ERROR: at most %d %s args may be specified\n", | |
cdf58a7a | 1707 | MAX_BASIS_DIRS, alt_dest_opt(0)); |
e012f858 WD |
1708 | return 0; |
1709 | } | |
ad77db8b WD |
1710 | /* We defer sanitizing this arg until we know what |
1711 | * our destination directory is going to be. */ | |
1712 | basis_dir[basis_dir_cnt++] = (char *)poptGetOptArg(pc); | |
e012f858 WD |
1713 | break; |
1714 | ||
e16adcdf WD |
1715 | case OPT_CHMOD: |
1716 | arg = poptGetOptArg(pc); | |
bbe42182 | 1717 | if (!parse_chmod(arg, &chmod_modes)) { |
e16adcdf | 1718 | snprintf(err_buf, sizeof err_buf, |
e63ff70e WD |
1719 | "Invalid argument passed to --chmod (%s)\n", |
1720 | arg); | |
e16adcdf WD |
1721 | return 0; |
1722 | } | |
1723 | break; | |
1724 | ||
951e826b WD |
1725 | case OPT_INFO: |
1726 | arg = poptGetOptArg(pc); | |
1727 | parse_output_words(info_words, info_levels, arg, USER_PRIORITY); | |
1728 | break; | |
1729 | ||
1730 | case OPT_DEBUG: | |
1731 | arg = poptGetOptArg(pc); | |
1732 | parse_output_words(debug_words, debug_levels, arg, USER_PRIORITY); | |
1733 | break; | |
1734 | ||
2df20057 WD |
1735 | case OPT_USERMAP: |
1736 | if (usermap) { | |
1737 | if (usermap_via_chown) { | |
1738 | snprintf(err_buf, sizeof err_buf, | |
e63ff70e | 1739 | "--usermap conflicts with prior --chown.\n"); |
2df20057 WD |
1740 | return 0; |
1741 | } | |
1742 | snprintf(err_buf, sizeof err_buf, | |
e63ff70e | 1743 | "You can only specify --usermap once.\n"); |
2df20057 WD |
1744 | return 0; |
1745 | } | |
1746 | usermap = (char *)poptGetOptArg(pc); | |
1747 | usermap_via_chown = False; | |
1748 | break; | |
1749 | ||
1750 | case OPT_GROUPMAP: | |
1751 | if (groupmap) { | |
1752 | if (groupmap_via_chown) { | |
1753 | snprintf(err_buf, sizeof err_buf, | |
e63ff70e | 1754 | "--groupmap conflicts with prior --chown.\n"); |
2df20057 WD |
1755 | return 0; |
1756 | } | |
1757 | snprintf(err_buf, sizeof err_buf, | |
e63ff70e | 1758 | "You can only specify --groupmap once.\n"); |
2df20057 WD |
1759 | return 0; |
1760 | } | |
1761 | groupmap = (char *)poptGetOptArg(pc); | |
1762 | groupmap_via_chown = False; | |
1763 | break; | |
1764 | ||
1765 | case OPT_CHOWN: { | |
1766 | const char *chown = poptGetOptArg(pc); | |
1767 | int len; | |
1768 | if ((arg = strchr(chown, ':')) != NULL) | |
1769 | len = arg++ - chown; | |
1770 | else | |
1771 | len = strlen(chown); | |
1772 | if (len) { | |
1773 | if (usermap) { | |
1774 | if (!usermap_via_chown) { | |
1775 | snprintf(err_buf, sizeof err_buf, | |
e63ff70e | 1776 | "--chown conflicts with prior --usermap.\n"); |
2df20057 WD |
1777 | return 0; |
1778 | } | |
1779 | snprintf(err_buf, sizeof err_buf, | |
e63ff70e | 1780 | "You can only specify a user-affecting --chown once.\n"); |
2df20057 WD |
1781 | return 0; |
1782 | } | |
1783 | if (asprintf(&usermap, "*:%.*s", len, chown) < 0) | |
1784 | out_of_memory("parse_arguments"); | |
1785 | usermap_via_chown = True; | |
1786 | } | |
1787 | if (arg && *arg) { | |
1788 | if (groupmap) { | |
1789 | if (!groupmap_via_chown) { | |
1790 | snprintf(err_buf, sizeof err_buf, | |
e63ff70e | 1791 | "--chown conflicts with prior --groupmap.\n"); |
2df20057 WD |
1792 | return 0; |
1793 | } | |
1794 | snprintf(err_buf, sizeof err_buf, | |
e63ff70e | 1795 | "You can only specify a group-affecting --chown once.\n"); |
2df20057 WD |
1796 | return 0; |
1797 | } | |
1798 | if (asprintf(&groupmap, "*:%s", arg) < 0) | |
1799 | out_of_memory("parse_arguments"); | |
1800 | groupmap_via_chown = True; | |
1801 | } | |
1802 | break; | |
1803 | } | |
1804 | ||
f5a910dd WD |
1805 | case OPT_HELP: |
1806 | usage(FINFO); | |
1807 | exit_cleanup(0); | |
1808 | ||
1c3344a1 WD |
1809 | case 'A': |
1810 | #ifdef SUPPORT_ACLS | |
1811 | preserve_acls = 1; | |
1812 | preserve_perms = 1; | |
1813 | break; | |
1814 | #else | |
1815 | /* FIXME: this should probably be ignored with a | |
eb8f5c74 WD |
1816 | * warning and then countermeasures taken to |
1817 | * restrict group and other access in the presence | |
1818 | * of any more restrictive ACLs, but this is safe | |
1c3344a1 WD |
1819 | * for now */ |
1820 | snprintf(err_buf,sizeof(err_buf), | |
8475e0e4 | 1821 | "ACLs are not supported on this %s\n", |
1c3344a1 WD |
1822 | am_server ? "server" : "client"); |
1823 | return 0; | |
1824 | #endif | |
1825 | ||
16edf865 WD |
1826 | case 'X': |
1827 | #ifdef SUPPORT_XATTRS | |
524eaa82 | 1828 | preserve_xattrs++; |
16edf865 WD |
1829 | break; |
1830 | #else | |
1831 | snprintf(err_buf,sizeof(err_buf), | |
1832 | "extended attributes are not supported on this %s\n", | |
1833 | am_server ? "server" : "client"); | |
1834 | return 0; | |
1835 | #endif | |
1c3344a1 | 1836 | |
af531cf7 WD |
1837 | case OPT_STOP_AFTER: { |
1838 | long val; | |
1839 | arg = poptGetOptArg(pc); | |
1840 | stop_at_utime = time(NULL); | |
91fff802 | 1841 | if ((val = atol(arg) * 60) <= 0 || LONG_MAX - val < stop_at_utime || (long)(time_t)val != val) { |
af531cf7 WD |
1842 | snprintf(err_buf, sizeof err_buf, "invalid --stop-after value: %s\n", arg); |
1843 | return 0; | |
1844 | } | |
1845 | stop_at_utime += val; | |
1846 | break; | |
1847 | } | |
1848 | ||
1849 | #ifdef HAVE_MKTIME | |
1850 | case OPT_STOP_AT: | |
1851 | arg = poptGetOptArg(pc); | |
1852 | if ((stop_at_utime = parse_time(arg)) == (time_t)-1) { | |
1853 | snprintf(err_buf, sizeof err_buf, "invalid --stop-at format: %s\n", arg); | |
1854 | return 0; | |
1855 | } | |
1856 | if (stop_at_utime <= time(NULL)) { | |
1857 | snprintf(err_buf, sizeof err_buf, "--stop-at time is not in the future: %s\n", arg); | |
1858 | return 0; | |
1859 | } | |
1860 | break; | |
1861 | #endif | |
1862 | ||
21ecc833 WD |
1863 | case OPT_STDERR: { |
1864 | int len; | |
1865 | arg = poptGetOptArg(pc); | |
1866 | len = strlen(arg); | |
1867 | if (len && strncmp("errors", arg, len) == 0) | |
1868 | msgs2stderr = 2; | |
1869 | else if (len && strncmp("all", arg, len) == 0) | |
1870 | msgs2stderr = 1; | |
1871 | else if (len && strncmp("client", arg, len) == 0) | |
1872 | msgs2stderr = 0; | |
1873 | else { | |
1874 | snprintf(err_buf, sizeof err_buf, | |
1875 | "--stderr mode \"%s\" is not one of errors, all, or client\n", arg); | |
1876 | return 0; | |
1877 | } | |
1878 | break; | |
1879 | } | |
1880 | ||
d853783f | 1881 | default: |
55afbb52 | 1882 | /* A large opt value means that set_refuse_options() |
3671987f | 1883 | * turned this option off. */ |
c67d1386 | 1884 | if (opt >= OPT_REFUSED_BASE) { |
3671987f WD |
1885 | create_refuse_error(opt); |
1886 | return 0; | |
27ed20f7 | 1887 | } |
3671987f WD |
1888 | snprintf(err_buf, sizeof err_buf, "%s%s: %s\n", |
1889 | am_server ? "on remote machine: " : "", | |
1890 | poptBadOption(pc, POPT_BADOPTION_NOALIAS), | |
1891 | poptStrerror(opt)); | |
dfa32483 | 1892 | return 0; |
d853783f | 1893 | } |
7a6421fa | 1894 | } |
2855f61f | 1895 | |
6b237b0f WD |
1896 | if (version_opt_cnt) { |
1897 | print_rsync_version(FINFO); | |
1898 | exit_cleanup(0); | |
1899 | } | |
1900 | ||
11eb67ee WD |
1901 | if (!max_alloc_arg) { |
1902 | max_alloc_arg = getenv("RSYNC_MAX_ALLOC"); | |
1903 | if (max_alloc_arg && !*max_alloc_arg) | |
1904 | max_alloc_arg = NULL; | |
1905 | } | |
1906 | if (max_alloc_arg) { | |
66ca4fc9 | 1907 | ssize_t size = parse_size_arg(max_alloc_arg, 'B', "max-alloc", 1024*1024, -1, True); |
11eb67ee WD |
1908 | if (size < 0) |
1909 | return 0; | |
1910 | max_alloc = size; | |
1911 | } | |
1912 | ||
4c4a2962 | 1913 | if (protect_args < 0) { |
2b2a4738 WD |
1914 | if (am_server) |
1915 | protect_args = 0; | |
1916 | else if ((arg = getenv("RSYNC_PROTECT_ARGS")) != NULL && *arg) | |
1917 | protect_args = atoi(arg) ? 1 : 0; | |
1918 | else { | |
4c4a2962 | 1919 | #ifdef RSYNC_USE_PROTECTED_ARGS |
4c4a2962 | 1920 | protect_args = 1; |
2b2a4738 | 1921 | #else |
4c4a2962 | 1922 | protect_args = 0; |
2b2a4738 WD |
1923 | #endif |
1924 | } | |
4c4a2962 WD |
1925 | } |
1926 | ||
4f6c8c66 | 1927 | if (checksum_choice && strcasecmp(checksum_choice, "auto") != 0 && strcasecmp(checksum_choice, "auto,auto") != 0) { |
a5a7d3a2 WD |
1928 | /* Call this early to verify the args and figure out if we need to force |
1929 | * --whole-file. Note that the parse function will get called again later, | |
1930 | * just in case an "auto" choice needs to know the protocol_version. */ | |
55bb4dab | 1931 | parse_checksum_choice(0); |
a5a7d3a2 WD |
1932 | } else |
1933 | checksum_choice = NULL; | |
1934 | ||
adc2476f | 1935 | if (human_readable > 1 && argc == 2 && !am_server) { |
3ca9e5d8 | 1936 | /* Allow the old meaning of 'h' (--help) on its own. */ |
05724c07 WD |
1937 | usage(FINFO); |
1938 | exit_cleanup(0); | |
1939 | } | |
1940 | ||
64d5ea39 WD |
1941 | if (!compress_choice && do_compression > 1) |
1942 | compress_choice = "zlibx"; | |
1943 | if (compress_choice && strcasecmp(compress_choice, "auto") != 0) | |
4496e0e8 | 1944 | parse_compress_choice(0); /* Twiddles do_compression and can possibly NULL-out compress_choice. */ |
64d5ea39 WD |
1945 | else |
1946 | compress_choice = NULL; | |
1947 | ||
d999efe6 WD |
1948 | if (do_compression || do_compression_level != CLVL_NOT_SPECIFIED) { |
1949 | if (!do_compression) | |
1950 | do_compression = CPRES_AUTO; | |
22a3ac0b WD |
1951 | if (do_compression && refused_compress) { |
1952 | create_refuse_error(refused_compress); | |
1953 | return 0; | |
1954 | } | |
22a3ac0b WD |
1955 | } |
1956 | ||
6686b93a WD |
1957 | #ifdef HAVE_SETVBUF |
1958 | if (outbuf_mode && !am_server) { | |
1959 | int mode = *(uchar *)outbuf_mode; | |
1960 | if (islower(mode)) | |
1961 | mode = toupper(mode); | |
1962 | fflush(stdout); /* Just in case... */ | |
1963 | switch (mode) { | |
1964 | case 'N': /* None */ | |
1965 | case 'U': /* Unbuffered */ | |
1966 | mode = _IONBF; | |
1967 | break; | |
1968 | case 'L': /* Line */ | |
1969 | mode = _IOLBF; | |
1970 | break; | |
1971 | case 'B': /* Block */ | |
1972 | case 'F': /* Full */ | |
1973 | mode = _IOFBF; | |
1974 | break; | |
1975 | default: | |
1976 | snprintf(err_buf, sizeof err_buf, | |
1977 | "Invalid --outbuf setting -- specify N, L, or B.\n"); | |
1978 | return 0; | |
1979 | } | |
1980 | setvbuf(stdout, (char *)NULL, mode, 0); | |
1981 | } | |
0dfd2a64 | 1982 | |
d8941be8 | 1983 | if (msgs2stderr == 1) { /* Are all messages going to stderr? */ |
0dfd2a64 WD |
1984 | /* Make stderr line buffered for better sharing of the stream. */ |
1985 | fflush(stderr); /* Just in case... */ | |
1986 | setvbuf(stderr, (char *)NULL, _IOLBF, 0); | |
1987 | } | |
6686b93a WD |
1988 | #endif |
1989 | ||
951e826b WD |
1990 | set_output_verbosity(verbose, DEFAULT_PRIORITY); |
1991 | ||
abd32c95 | 1992 | if (do_stats) { |
951e826b WD |
1993 | parse_output_words(info_words, info_levels, |
1994 | verbose > 1 ? "stats3" : "stats2", DEFAULT_PRIORITY); | |
1995 | } | |
1996 | ||
332cf6df | 1997 | #ifdef ICONV_OPTION |
a4453606 | 1998 | if (iconv_opt && protect_args != 2) { |
332cf6df WD |
1999 | if (!am_server && strcmp(iconv_opt, "-") == 0) |
2000 | iconv_opt = NULL; | |
2001 | else | |
2002 | need_unsorted_flist = 1; | |
2003 | } | |
0b52f94d WD |
2004 | if (refused_no_iconv && !iconv_opt) { |
2005 | create_refuse_error(refused_no_iconv); | |
2006 | return 0; | |
2007 | } | |
332cf6df WD |
2008 | #endif |
2009 | ||
48b51d00 WD |
2010 | if (fuzzy_basis > 1) |
2011 | fuzzy_basis = basis_dir_cnt + 1; | |
2012 | ||
77063038 JO |
2013 | /* Don't let the client reset protect_args if it was already processed */ |
2014 | if (orig_protect_args == 2 && am_server) | |
2015 | protect_args = orig_protect_args; | |
2016 | ||
53936ef9 WD |
2017 | if (protect_args == 1 && am_server) |
2018 | return 1; | |
a4453606 | 2019 | |
73cb6738 WD |
2020 | *argv_p = argv = poptGetArgs(pc); |
2021 | *argc_p = argc = count_args(argv); | |
2022 | ||
4f5b0756 | 2023 | #ifndef SUPPORT_LINKS |
54e87b4b | 2024 | if (preserve_links && !am_sender) { |
e1add893 WD |
2025 | snprintf(err_buf, sizeof err_buf, |
2026 | "symlinks are not supported on this %s\n", | |
2027 | am_server ? "server" : "client"); | |
e1add893 WD |
2028 | return 0; |
2029 | } | |
2030 | #endif | |
2031 | ||
4f5b0756 | 2032 | #ifndef SUPPORT_HARD_LINKS |
e1add893 WD |
2033 | if (preserve_hard_links) { |
2034 | snprintf(err_buf, sizeof err_buf, | |
2035 | "hard links are not supported on this %s\n", | |
2036 | am_server ? "server" : "client"); | |
e1add893 WD |
2037 | return 0; |
2038 | } | |
2039 | #endif | |
2040 | ||
cbbd8e2e WD |
2041 | #ifdef SUPPORT_XATTRS |
2042 | if (am_root < 0 && preserve_xattrs > 1) { | |
2043 | snprintf(err_buf, sizeof err_buf, | |
2044 | "--fake-super conflicts with -XX\n"); | |
2045 | return 0; | |
2046 | } | |
2047 | #else | |
9439c0cb WD |
2048 | if (am_root < 0) { |
2049 | snprintf(err_buf, sizeof err_buf, | |
2050 | "--fake-super requires an rsync with extended attributes enabled\n"); | |
2051 | return 0; | |
2052 | } | |
2053 | #endif | |
2054 | ||
088aac85 | 2055 | if (write_batch && read_batch) { |
c3ea0990 | 2056 | snprintf(err_buf, sizeof err_buf, |
36119893 | 2057 | "--write-batch and --read-batch can not be used together\n"); |
c3ea0990 | 2058 | return 0; |
088aac85 | 2059 | } |
11e758a4 | 2060 | if (write_batch > 0 || read_batch) { |
94327ff0 WD |
2061 | if (am_server) { |
2062 | rprintf(FINFO, | |
2063 | "ignoring --%s-batch option sent to server\n", | |
2064 | write_batch ? "write" : "read"); | |
2065 | /* We don't actually exit_cleanup(), so that we can | |
2066 | * still service older version clients that still send | |
2067 | * batch args to server. */ | |
2068 | read_batch = write_batch = 0; | |
2069 | batch_name = NULL; | |
254ee3ba WD |
2070 | } else if (dry_run) |
2071 | write_batch = 0; | |
69e2b4ee WD |
2072 | } else if (write_batch < 0 && dry_run) |
2073 | write_batch = 0; | |
36119893 | 2074 | if (read_batch && files_from) { |
c3ea0990 | 2075 | snprintf(err_buf, sizeof err_buf, |
36119893 | 2076 | "--read-batch cannot be used with --files-from\n"); |
c3ea0990 | 2077 | return 0; |
36119893 | 2078 | } |
9eaba726 WD |
2079 | if (read_batch && remove_source_files) { |
2080 | snprintf(err_buf, sizeof err_buf, | |
2081 | "--read-batch cannot be used with --remove-%s-files\n", | |
2082 | remove_source_files == 1 ? "source" : "sent"); | |
2083 | return 0; | |
2084 | } | |
9b3318b0 | 2085 | if (batch_name && strlen(batch_name) > MAX_BATCH_NAME_LEN) { |
c3ea0990 | 2086 | snprintf(err_buf, sizeof err_buf, |
9b3318b0 WD |
2087 | "the batch-file name must be %d characters or less.\n", |
2088 | MAX_BATCH_NAME_LEN); | |
c3ea0990 | 2089 | return 0; |
beb93684 | 2090 | } |
088aac85 | 2091 | |
ce58b1b4 | 2092 | if (tmpdir && strlen(tmpdir) >= MAXPATHLEN - 10) { |
c3ea0990 WD |
2093 | snprintf(err_buf, sizeof err_buf, |
2094 | "the --temp-dir path is WAY too long.\n"); | |
2095 | return 0; | |
ce58b1b4 WD |
2096 | } |
2097 | ||
7b9598b2 WD |
2098 | if (max_delete < 0 && max_delete != INT_MIN) { |
2099 | /* Negative numbers are treated as "no deletions". */ | |
2100 | max_delete = 0; | |
2101 | } | |
2102 | ||
b6164938 WD |
2103 | if (files_from) { |
2104 | if (recurse == 1) /* preserve recurse == 2 */ | |
2105 | recurse = 0; | |
550d4e23 | 2106 | if (xfer_dirs < 0) |
b6164938 | 2107 | xfer_dirs = 1; |
dfa32483 | 2108 | } |
51d48398 | 2109 | |
20893751 | 2110 | if (argc < 2 && !read_batch && !am_server) |
73cb6738 WD |
2111 | list_only |= 1; |
2112 | ||
2113 | if (xfer_dirs >= 4) { | |
c8fa85b2 | 2114 | parse_filter_str(&filter_list, "- /*/*", rule_template(0), 0); |
73cb6738 WD |
2115 | recurse = xfer_dirs = 1; |
2116 | } else if (recurse) | |
2117 | xfer_dirs = 1; | |
2118 | else if (xfer_dirs < 0) | |
2119 | xfer_dirs = list_only ? 1 : 0; | |
dfa32483 | 2120 | |
ea5164d1 WD |
2121 | if (relative_paths < 0) |
2122 | relative_paths = files_from? 1 : 0; | |
89f2a4c2 WD |
2123 | if (!relative_paths) |
2124 | implied_dirs = 0; | |
ea5164d1 | 2125 | |
e0e32031 | 2126 | if (delete_before + !!delete_during + delete_after > 1) { |
3359acb8 | 2127 | snprintf(err_buf, sizeof err_buf, |
c6eb7fad | 2128 | "You may not combine multiple --delete-WHEN options.\n"); |
3359acb8 WD |
2129 | return 0; |
2130 | } | |
f5a910dd | 2131 | if (delete_before || delete_during || delete_after) |
51d48398 | 2132 | delete_mode = 1; |
3296f91b | 2133 | else if (delete_mode || delete_excluded) { |
e0e32031 | 2134 | /* Only choose now between before & during if one is refused. */ |
3296f91b | 2135 | if (refused_delete_before) { |
e0e32031 WD |
2136 | if (!refused_delete_during) |
2137 | delete_during = 1; | |
2138 | else { | |
2139 | create_refuse_error(refused_delete_before); | |
2140 | return 0; | |
2141 | } | |
2142 | } else if (refused_delete_during) | |
2143 | delete_before = 1; | |
2144 | delete_mode = 1; | |
3296f91b | 2145 | } |
89fb5026 WD |
2146 | if (!xfer_dirs && delete_mode) { |
2147 | snprintf(err_buf, sizeof err_buf, | |
44d7d045 | 2148 | "--delete does not work without --recursive (-r) or --dirs (-d).\n"); |
89fb5026 | 2149 | return 0; |
f5a910dd | 2150 | } |
51d48398 | 2151 | |
42d8ec61 WD |
2152 | if (missing_args == 3) /* simplify if both options were specified */ |
2153 | missing_args = 2; | |
2154 | if (refused_delete && (delete_mode || missing_args == 2)) { | |
3671987f WD |
2155 | create_refuse_error(refused_delete); |
2156 | return 0; | |
2157 | } | |
2158 | ||
47c11975 WD |
2159 | if (remove_source_files) { |
2160 | /* We only want to infer this refusal of --remove-source-files | |
07c6ae7d WD |
2161 | * via the refusal of "delete", not any of the "delete-FOO" |
2162 | * options. */ | |
2163 | if (refused_delete && am_sender) { | |
2164 | create_refuse_error(refused_delete); | |
2165 | return 0; | |
2166 | } | |
2167 | need_messages_from_generator = 1; | |
2168 | } | |
2169 | ||
41adbcec WD |
2170 | if (munge_symlinks && !am_daemon) { |
2171 | STRUCT_STAT st; | |
2172 | char prefix[SYMLINK_PREFIX_LEN]; /* NOT +1 ! */ | |
2173 | strlcpy(prefix, SYMLINK_PREFIX, sizeof prefix); /* trim the trailing slash */ | |
2174 | if (do_stat(prefix, &st) == 0 && S_ISDIR(st.st_mode)) { | |
2175 | rprintf(FERROR, "Symlink munging is unsafe when a %s directory exists.\n", | |
2176 | prefix); | |
2177 | exit_cleanup(RERR_UNSUPPORTED); | |
2178 | } | |
2179 | } | |
2180 | ||
7be73df4 WD |
2181 | if (sanitize_paths) { |
2182 | int i; | |
ffbffc64 | 2183 | for (i = argc; i-- > 0; ) |
d48810ba | 2184 | argv[i] = sanitize_path(NULL, argv[i], "", 0, SP_KEEP_DOT_DIRS); |
1a7f3d99 | 2185 | if (tmpdir) |
d48810ba | 2186 | tmpdir = sanitize_path(NULL, tmpdir, NULL, 0, SP_DEFAULT); |
1a7f3d99 | 2187 | if (backup_dir) |
d48810ba | 2188 | backup_dir = sanitize_path(NULL, backup_dir, NULL, 0, SP_DEFAULT); |
7be73df4 | 2189 | } |
819bfe45 | 2190 | if (daemon_filter_list.head && !am_sender) { |
7b6c5c77 | 2191 | filter_rule_list *elp = &daemon_filter_list; |
c3ea0990 | 2192 | if (tmpdir) { |
a1018691 | 2193 | char *dir; |
3671987f WD |
2194 | if (!*tmpdir) |
2195 | goto options_rejected; | |
a1018691 WD |
2196 | dir = tmpdir + (*tmpdir == '/' ? module_dirlen : 0); |
2197 | clean_fname(dir, CFN_COLLAPSE_DOT_DOT_DIRS); | |
1df02d13 | 2198 | if (check_filter(elp, FLOG, dir, 1) < 0) |
c3ea0990 WD |
2199 | goto options_rejected; |
2200 | } | |
c3ea0990 | 2201 | if (backup_dir) { |
a1018691 | 2202 | char *dir; |
3671987f WD |
2203 | if (!*backup_dir) |
2204 | goto options_rejected; | |
a1018691 WD |
2205 | dir = backup_dir + (*backup_dir == '/' ? module_dirlen : 0); |
2206 | clean_fname(dir, CFN_COLLAPSE_DOT_DOT_DIRS); | |
1df02d13 | 2207 | if (check_filter(elp, FLOG, dir, 1) < 0) |
f0fa8c6d | 2208 | goto options_rejected; |
c3ea0990 WD |
2209 | } |
2210 | } | |
7be73df4 | 2211 | |
d175d7e1 | 2212 | if (!backup_suffix) |
e0391f81 | 2213 | backup_suffix = backup_dir ? "" : BACKUP_SUFFIX; |
d175d7e1 | 2214 | backup_suffix_len = strlen(backup_suffix); |
80ddadb7 | 2215 | if (strchr(backup_suffix, '/') != NULL) { |
c3ea0990 WD |
2216 | snprintf(err_buf, sizeof err_buf, |
2217 | "--suffix cannot contain slashes: %s\n", | |
80ddadb7 | 2218 | backup_suffix); |
c3ea0990 | 2219 | return 0; |
80ddadb7 | 2220 | } |
e0391f81 | 2221 | if (backup_dir) { |
14ebc5b6 | 2222 | size_t len; |
e4c9ff58 | 2223 | make_backups = 1; /* --backup-dir implies --backup */ |
3696674b WD |
2224 | while (*backup_dir == '.' && backup_dir[1] == '/') |
2225 | backup_dir += 2; | |
2226 | if (*backup_dir == '.' && backup_dir[1] == '\0') | |
2227 | backup_dir++; | |
14ebc5b6 WD |
2228 | len = strlcpy(backup_dir_buf, backup_dir, sizeof backup_dir_buf); |
2229 | if (len > sizeof backup_dir_buf - 128) { | |
c3ea0990 WD |
2230 | snprintf(err_buf, sizeof err_buf, |
2231 | "the --backup-dir path is WAY too long.\n"); | |
2232 | return 0; | |
e0391f81 | 2233 | } |
14ebc5b6 | 2234 | backup_dir_len = (int)len; |
4e9c7fae WD |
2235 | if (!backup_dir_len) { |
2236 | backup_dir_len = -1; | |
2237 | backup_dir = NULL; | |
2238 | } else if (backup_dir_buf[backup_dir_len - 1] != '/') { | |
e0391f81 WD |
2239 | backup_dir_buf[backup_dir_len++] = '/'; |
2240 | backup_dir_buf[backup_dir_len] = '\0'; | |
2241 | } | |
14ebc5b6 | 2242 | backup_dir_remainder = sizeof backup_dir_buf - backup_dir_len; |
4e9c7fae WD |
2243 | } |
2244 | if (backup_dir) { | |
2245 | /* No need for a suffix or a protect rule. */ | |
8dcf9335 | 2246 | } else if (!backup_suffix_len && (!am_server || !am_sender)) { |
c3ea0990 | 2247 | snprintf(err_buf, sizeof err_buf, |
4e9c7fae WD |
2248 | "--suffix cannot be empty %s\n", backup_dir_len < 0 |
2249 | ? "when --backup-dir is the same as the dest dir" | |
2250 | : "without a --backup-dir"); | |
c3ea0990 | 2251 | return 0; |
eb8f5c74 WD |
2252 | } else if (make_backups && delete_mode && !delete_excluded && !am_server) { |
2253 | snprintf(backup_dir_buf, sizeof backup_dir_buf, | |
f41152d3 | 2254 | "P *%s", backup_suffix); |
c8fa85b2 | 2255 | parse_filter_str(&filter_list, backup_dir_buf, rule_template(0), 0); |
d175d7e1 | 2256 | } |
fbd91cae | 2257 | |
2624e005 WD |
2258 | if (preserve_times) { |
2259 | preserve_times = PRESERVE_FILE_TIMES; | |
2260 | if (!omit_dir_times) | |
2261 | preserve_times |= PRESERVE_DIR_TIMES; | |
2262 | #ifdef CAN_SET_SYMLINK_TIMES | |
2263 | if (!omit_link_times) | |
2264 | preserve_times |= PRESERVE_LINK_TIMES; | |
2265 | #endif | |
2266 | } | |
2267 | ||
fbd91cae WD |
2268 | if (make_backups && !backup_dir) { |
2269 | omit_dir_times = 0; /* Implied, so avoid -O to sender. */ | |
2624e005 | 2270 | preserve_times &= ~PRESERVE_DIR_TIMES; |
fbd91cae | 2271 | } |
d175d7e1 | 2272 | |
b3e4e7ef WD |
2273 | if (stdout_format) { |
2274 | if (am_server && log_format_has(stdout_format, 'I')) | |
2275 | stdout_format_has_i = 2; | |
2276 | else if (log_format_has(stdout_format, 'i')) | |
2277 | stdout_format_has_i = itemize_changes | 1; | |
2278 | if (!log_format_has(stdout_format, 'b') | |
886df221 WD |
2279 | && !log_format_has(stdout_format, 'c') |
2280 | && !log_format_has(stdout_format, 'C')) | |
e7651884 WD |
2281 | log_before_transfer = !am_server; |
2282 | } else if (itemize_changes) { | |
b3e4e7ef WD |
2283 | stdout_format = "%i %n%L"; |
2284 | stdout_format_has_i = itemize_changes; | |
e7651884 WD |
2285 | log_before_transfer = !am_server; |
2286 | } | |
87383697 | 2287 | |
951e826b WD |
2288 | if (do_progress && !am_server) { |
2289 | if (!log_before_transfer && INFO_EQ(NAME, 0)) | |
2290 | parse_output_words(info_words, info_levels, "name", DEFAULT_PRIORITY); | |
2291 | parse_output_words(info_words, info_levels, "flist2,progress", DEFAULT_PRIORITY); | |
bb4e4d88 | 2292 | } |
87383697 | 2293 | |
11e758a4 WD |
2294 | if (dry_run) |
2295 | do_xfers = 0; | |
2296 | ||
9ac756c6 WD |
2297 | set_io_timeout(io_timeout); |
2298 | ||
951e826b | 2299 | if (INFO_GTE(NAME, 1) && !stdout_format) { |
b3e4e7ef | 2300 | stdout_format = "%n%L"; |
87383697 | 2301 | log_before_transfer = !am_server; |
3671987f | 2302 | } |
b3e4e7ef WD |
2303 | if (stdout_format_has_i || log_format_has(stdout_format, 'o')) |
2304 | stdout_format_has_o_or_i = 1; | |
e2559dbe | 2305 | |
232658d9 | 2306 | if (logfile_name && !am_daemon) { |
b3e4e7ef | 2307 | if (!logfile_format) { |
232658d9 | 2308 | logfile_format = "%i %n%L"; |
87c0f9d6 | 2309 | logfile_format_has_i = logfile_format_has_o_or_i = 1; |
b3e4e7ef WD |
2310 | } else { |
2311 | if (log_format_has(logfile_format, 'i')) | |
19b85876 | 2312 | logfile_format_has_i = 1; |
b3e4e7ef WD |
2313 | if (logfile_format_has_i || log_format_has(logfile_format, 'o')) |
2314 | logfile_format_has_o_or_i = 1; | |
87c0f9d6 | 2315 | } |
6dc9b74b | 2316 | log_init(0); |
2873603a WD |
2317 | } else if (!am_daemon) |
2318 | logfile_format = NULL; | |
87c0f9d6 | 2319 | |
9fb08441 WD |
2320 | if (daemon_bwlimit && (!bwlimit || bwlimit > daemon_bwlimit)) |
2321 | bwlimit = daemon_bwlimit; | |
3c74c3a3 WD |
2322 | if (bwlimit) { |
2323 | bwlimit_writemax = (size_t)bwlimit * 128; | |
2324 | if (bwlimit_writemax < 512) | |
2325 | bwlimit_writemax = 512; | |
2326 | } | |
2327 | ||
a015788d WD |
2328 | if (append_mode) { |
2329 | if (whole_file > 0) { | |
2330 | snprintf(err_buf, sizeof err_buf, | |
2331 | "--append cannot be used with --whole-file\n"); | |
2332 | return 0; | |
2333 | } | |
2334 | if (refused_inplace) { | |
2335 | create_refuse_error(refused_inplace); | |
2336 | return 0; | |
2337 | } | |
2338 | inplace = 1; | |
2339 | } | |
2340 | ||
9e9d33a2 WD |
2341 | if (write_devices) { |
2342 | if (refused_inplace) { | |
2343 | create_refuse_error(refused_inplace); | |
2344 | return 0; | |
2345 | } | |
2346 | inplace = 1; | |
2347 | } | |
2348 | ||
f06e7082 | 2349 | if (delay_updates && !partial_dir) |
77860bac | 2350 | partial_dir = tmp_partialdir; |
f06e7082 | 2351 | |
a3221d2a | 2352 | if (inplace) { |
4f5b0756 | 2353 | #ifdef HAVE_FTRUNCATE |
a7260c40 WD |
2354 | if (partial_dir) { |
2355 | snprintf(err_buf, sizeof err_buf, | |
a015788d WD |
2356 | "--%s cannot be used with --%s\n", |
2357 | append_mode ? "append" : "inplace", | |
f06e7082 | 2358 | delay_updates ? "delay-updates" : "partial-dir"); |
a7260c40 WD |
2359 | return 0; |
2360 | } | |
3671987f WD |
2361 | /* --inplace implies --partial for refusal purposes, but we |
2362 | * clear the keep_partial flag for internal logic purposes. */ | |
2363 | if (refused_partial) { | |
2364 | create_refuse_error(refused_partial); | |
2365 | return 0; | |
2366 | } | |
a3221d2a | 2367 | keep_partial = 0; |
ded4daf0 WD |
2368 | #else |
2369 | snprintf(err_buf, sizeof err_buf, | |
a015788d WD |
2370 | "--%s is not supported on this %s\n", |
2371 | append_mode ? "append" : "inplace", | |
ded4daf0 WD |
2372 | am_server ? "server" : "client"); |
2373 | return 0; | |
2374 | #endif | |
075aa18f | 2375 | } else { |
bc880cb8 | 2376 | if (keep_partial && !partial_dir && !am_server) { |
3671987f WD |
2377 | if ((arg = getenv("RSYNC_PARTIAL_DIR")) != NULL && *arg) |
2378 | partial_dir = strdup(arg); | |
2379 | } | |
075aa18f | 2380 | if (partial_dir) { |
3671987f | 2381 | if (*partial_dir) |
b58bfb2f | 2382 | clean_fname(partial_dir, CFN_COLLAPSE_DOT_DOT_DIRS); |
075aa18f WD |
2383 | if (!*partial_dir || strcmp(partial_dir, ".") == 0) |
2384 | partial_dir = NULL; | |
3671987f WD |
2385 | if (!partial_dir && refused_partial) { |
2386 | create_refuse_error(refused_partial); | |
2387 | return 0; | |
2388 | } | |
075aa18f WD |
2389 | keep_partial = 1; |
2390 | } | |
a3221d2a WD |
2391 | } |
2392 | ||
ea5164d1 | 2393 | if (files_from) { |
305666bf WD |
2394 | char *h, *p; |
2395 | int q; | |
da7acc5e | 2396 | if (argc > 2 || (!am_daemon && !am_server && argc == 1)) { |
ea5164d1 WD |
2397 | usage(FERROR); |
2398 | exit_cleanup(RERR_SYNTAX); | |
2399 | } | |
63596e1c | 2400 | if (strcmp(files_from, "-") == 0) { |
ea5164d1 | 2401 | filesfrom_fd = 0; |
63596e1c | 2402 | if (am_server) |
305666bf WD |
2403 | filesfrom_host = ""; /* reading from socket */ |
2404 | } else if ((p = check_for_hostspec(files_from, &h, &q)) != 0) { | |
ea5164d1 | 2405 | if (am_server) { |
305666bf WD |
2406 | snprintf(err_buf, sizeof err_buf, |
2407 | "The --files-from sent to the server cannot specify a host.\n"); | |
2408 | return 0; | |
ea5164d1 | 2409 | } |
305666bf WD |
2410 | files_from = p; |
2411 | filesfrom_host = h; | |
2412 | if (strcmp(files_from, "-") == 0) { | |
c3ea0990 WD |
2413 | snprintf(err_buf, sizeof err_buf, |
2414 | "Invalid --files-from remote filename\n"); | |
2415 | return 0; | |
ea5164d1 WD |
2416 | } |
2417 | } else { | |
305666bf | 2418 | if (sanitize_paths) |
d48810ba | 2419 | files_from = sanitize_path(NULL, files_from, NULL, 0, SP_DEFAULT); |
819bfe45 | 2420 | if (daemon_filter_list.head) { |
a1018691 | 2421 | char *dir; |
305666bf WD |
2422 | if (!*files_from) |
2423 | goto options_rejected; | |
a1018691 WD |
2424 | dir = files_from + (*files_from == '/' ? module_dirlen : 0); |
2425 | clean_fname(dir, CFN_COLLAPSE_DOT_DOT_DIRS); | |
1df02d13 | 2426 | if (check_filter(&daemon_filter_list, FLOG, dir, 0) < 0) |
305666bf WD |
2427 | goto options_rejected; |
2428 | } | |
ea5164d1 WD |
2429 | filesfrom_fd = open(files_from, O_RDONLY|O_BINARY); |
2430 | if (filesfrom_fd < 0) { | |
c3ea0990 WD |
2431 | snprintf(err_buf, sizeof err_buf, |
2432 | "failed to open files-from file %s: %s\n", | |
2433 | files_from, strerror(errno)); | |
2434 | return 0; | |
ea5164d1 WD |
2435 | } |
2436 | } | |
2437 | } | |
2438 | ||
7f2a1f65 WD |
2439 | am_starting_up = 0; |
2440 | ||
b11ed3b1 | 2441 | return 1; |
f0fa8c6d WD |
2442 | |
2443 | options_rejected: | |
2444 | snprintf(err_buf, sizeof err_buf, | |
2445 | "Your options have been rejected by the server.\n"); | |
2446 | return 0; | |
7a6421fa AT |
2447 | } |
2448 | ||
2449 | ||
dafe63ca MP |
2450 | /** |
2451 | * Construct a filtered list of options to pass through from the | |
2452 | * client to the server. | |
2453 | * | |
2454 | * This involves setting options that will tell the server how to | |
2455 | * behave, and also filtering out options that are processed only | |
2456 | * locally. | |
2457 | **/ | |
ffbffc64 | 2458 | void server_options(char **args, int *argc_p) |
7a6421fa | 2459 | { |
74ba98a5 | 2460 | static char argstr[64]; |
ffbffc64 | 2461 | int ac = *argc_p; |
d239efa3 | 2462 | uchar where; |
f98c60bf | 2463 | char *arg; |
d853783f AT |
2464 | int i, x; |
2465 | ||
def97ff9 | 2466 | /* This should always remain first on the server's command-line. */ |
d853783f AT |
2467 | args[ac++] = "--server"; |
2468 | ||
2469 | if (!am_sender) | |
2470 | args[ac++] = "--sender"; | |
2471 | ||
2472 | x = 1; | |
2473 | argstr[0] = '-'; | |
a4453606 WD |
2474 | |
2475 | if (protect_args) | |
2476 | argstr[x++] = 's'; | |
2477 | ||
f98c60bf | 2478 | for (i = 0; i < verbose; i++) |
d853783f | 2479 | argstr[x++] = 'v'; |
f0b36a48 | 2480 | |
c0268d92 WD |
2481 | if (quiet && msgs2stderr) |
2482 | argstr[x++] = 'q'; | |
d853783f AT |
2483 | if (make_backups) |
2484 | argstr[x++] = 'b'; | |
2485 | if (update_only) | |
2486 | argstr[x++] = 'u'; | |
2dbf36ef | 2487 | if (!do_xfers) /* Note: NOT "dry_run"! */ |
d853783f AT |
2488 | argstr[x++] = 'n'; |
2489 | if (preserve_links) | |
2490 | argstr[x++] = 'l'; | |
73cb6738 WD |
2491 | if ((xfer_dirs >= 2 && xfer_dirs < 4) |
2492 | || (xfer_dirs && !recurse && (list_only || (delete_mode && am_sender)))) | |
5454d22a | 2493 | argstr[x++] = 'd'; |
35bf8fa0 WD |
2494 | if (am_sender) { |
2495 | if (keep_dirlinks) | |
2496 | argstr[x++] = 'K'; | |
876c9936 WD |
2497 | if (prune_empty_dirs) |
2498 | argstr[x++] = 'm'; | |
f9998046 | 2499 | if (omit_dir_times) |
35bf8fa0 | 2500 | argstr[x++] = 'O'; |
2624e005 WD |
2501 | if (omit_link_times) |
2502 | argstr[x++] = 'J'; | |
48b51d00 WD |
2503 | if (fuzzy_basis) { |
2504 | argstr[x++] = 'y'; | |
2505 | if (fuzzy_basis > 1) | |
2506 | argstr[x++] = 'y'; | |
2507 | } | |
2dbf36ef WD |
2508 | } else { |
2509 | if (copy_links) | |
2510 | argstr[x++] = 'L'; | |
2511 | if (copy_dirlinks) | |
2512 | argstr[x++] = 'k'; | |
35bf8fa0 | 2513 | } |
1bfbf40b | 2514 | |
dfa32483 | 2515 | if (whole_file > 0) |
d853783f | 2516 | argstr[x++] = 'W'; |
bceec82f MP |
2517 | /* We don't need to send --no-whole-file, because it's the |
2518 | * default for remote transfers, and in any case old versions | |
2519 | * of rsync will not understand it. */ | |
dfa32483 | 2520 | |
e0e32031 | 2521 | if (preserve_hard_links) { |
d853783f | 2522 | argstr[x++] = 'H'; |
e0e32031 WD |
2523 | if (preserve_hard_links > 1) |
2524 | argstr[x++] = 'H'; | |
2525 | } | |
d853783f AT |
2526 | if (preserve_uid) |
2527 | argstr[x++] = 'o'; | |
2528 | if (preserve_gid) | |
2529 | argstr[x++] = 'g'; | |
b5c6a6ae | 2530 | if (preserve_devices) /* ignore preserve_specials here */ |
d853783f AT |
2531 | argstr[x++] = 'D'; |
2532 | if (preserve_times) | |
2533 | argstr[x++] = 't'; | |
b9367410 WD |
2534 | if (preserve_atimes) { |
2535 | argstr[x++] = 'U'; | |
2536 | if (preserve_atimes > 1) | |
2537 | argstr[x++] = 'U'; | |
2538 | } | |
974f49e2 WD |
2539 | #ifdef SUPPORT_CRTIMES |
2540 | if (preserve_crtimes) | |
2541 | argstr[x++] = 'N'; | |
2542 | #endif | |
d853783f AT |
2543 | if (preserve_perms) |
2544 | argstr[x++] = 'p'; | |
344f9ba7 WD |
2545 | else if (preserve_executability && am_sender) |
2546 | argstr[x++] = 'E'; | |
1c3344a1 WD |
2547 | #ifdef SUPPORT_ACLS |
2548 | if (preserve_acls) | |
2549 | argstr[x++] = 'A'; | |
16edf865 WD |
2550 | #endif |
2551 | #ifdef SUPPORT_XATTRS | |
524eaa82 | 2552 | if (preserve_xattrs) { |
16edf865 | 2553 | argstr[x++] = 'X'; |
524eaa82 WD |
2554 | if (preserve_xattrs > 1) |
2555 | argstr[x++] = 'X'; | |
2556 | } | |
1c3344a1 | 2557 | #endif |
aa7a6e87 | 2558 | if (recurse) |
d853783f AT |
2559 | argstr[x++] = 'r'; |
2560 | if (always_checksum) | |
2561 | argstr[x++] = 'c'; | |
2562 | if (cvs_exclude) | |
2563 | argstr[x++] = 'C'; | |
2564 | if (ignore_times) | |
2565 | argstr[x++] = 'I'; | |
2566 | if (relative_paths) | |
2567 | argstr[x++] = 'R'; | |
243c995f | 2568 | if (one_file_system) { |
d853783f | 2569 | argstr[x++] = 'x'; |
243c995f WD |
2570 | if (one_file_system > 1) |
2571 | argstr[x++] = 'x'; | |
2572 | } | |
d853783f AT |
2573 | if (sparse_files) |
2574 | argstr[x++] = 'S'; | |
4496e0e8 | 2575 | if (do_compression == CPRES_ZLIB) |
d853783f | 2576 | argstr[x++] = 'z'; |
f0b36a48 | 2577 | |
29703623 WD |
2578 | set_allow_inc_recurse(); |
2579 | ||
f643330e WD |
2580 | /* We don't really know the actual protocol_version at this point, |
2581 | * but checking the pre-negotiated value allows the user to use a | |
2582 | * --protocol=29 override to avoid the use of this -eFLAGS opt. */ | |
29703623 | 2583 | if (protocol_version >= 30) { |
aca7dd3b WD |
2584 | /* Use "eFlags" alias so that cull_options doesn't think that these are no-arg option letters. */ |
2585 | #define eFlags argstr | |
29703623 WD |
2586 | /* We make use of the -e option to let the server know about |
2587 | * any pre-release protocol version && some behavior flags. */ | |
aca7dd3b | 2588 | eFlags[x++] = 'e'; |
2ed790f3 | 2589 | #if SUBPROTOCOL_VERSION != 0 |
29703623 WD |
2590 | if (protocol_version == PROTOCOL_VERSION) { |
2591 | x += snprintf(argstr+x, sizeof argstr - x, | |
2592 | "%d.%d", | |
2593 | PROTOCOL_VERSION, SUBPROTOCOL_VERSION); | |
2594 | } else | |
2ed790f3 | 2595 | #endif |
aca7dd3b | 2596 | eFlags[x++] = '.'; |
29703623 | 2597 | if (allow_inc_recurse) |
aca7dd3b | 2598 | eFlags[x++] = 'i'; |
accc091f | 2599 | #ifdef CAN_SET_SYMLINK_TIMES |
aca7dd3b | 2600 | eFlags[x++] = 'L'; /* symlink time-setting support */ |
91fd15b8 WD |
2601 | #endif |
2602 | #ifdef ICONV_OPTION | |
aca7dd3b | 2603 | eFlags[x++] = 's'; /* symlink iconv translation support */ |
1ed56a05 | 2604 | #endif |
aca7dd3b WD |
2605 | eFlags[x++] = 'f'; /* flist I/O-error safety support */ |
2606 | eFlags[x++] = 'x'; /* xattr hardlink optimization not desired */ | |
eac85808 | 2607 | eFlags[x++] = 'C'; /* support checksum seed order fix */ |
3a7bf54a | 2608 | eFlags[x++] = 'I'; /* support inplace_partial behavior */ |
4f6c8c66 | 2609 | eFlags[x++] = 'v'; /* use varint for flist & compat flags; negotiate checksum */ |
bb16db17 | 2610 | eFlags[x++] = 'u'; /* include name of uid 0 & gid 0 in the id map */ |
4f6c8c66 | 2611 | /* NOTE: Avoid using 'V' -- it was the high bit of a write_byte() that became write_varint(). */ |
aca7dd3b | 2612 | #undef eFlags |
29703623 WD |
2613 | } |
2614 | ||
951e826b | 2615 | if (x >= (int)sizeof argstr) { /* Not possible... */ |
7a2eca41 WD |
2616 | rprintf(FERROR, "argstr overflow in server_options().\n"); |
2617 | exit_cleanup(RERR_MALLOC); | |
2618 | } | |
2619 | ||
951e826b WD |
2620 | argstr[x] = '\0'; |
2621 | ||
6d301fa3 WD |
2622 | if (x > 1) |
2623 | args[ac++] = argstr; | |
d853783f | 2624 | |
a4453606 WD |
2625 | #ifdef ICONV_OPTION |
2626 | if (iconv_opt) { | |
2627 | char *set = strchr(iconv_opt, ','); | |
2628 | if (set) | |
2629 | set++; | |
2630 | else | |
2631 | set = iconv_opt; | |
2632 | if (asprintf(&arg, "--iconv=%s", set) < 0) | |
2633 | goto oom; | |
2634 | args[ac++] = arg; | |
2635 | } | |
2636 | #endif | |
2637 | ||
53936ef9 | 2638 | if (protect_args && !local_server) /* unprotected args stop here */ |
a4453606 WD |
2639 | args[ac++] = NULL; |
2640 | ||
51d48398 WD |
2641 | if (list_only > 1) |
2642 | args[ac++] = "--list-only"; | |
2643 | ||
f5a910dd WD |
2644 | /* This makes sure that the remote rsync can handle deleting with -d |
2645 | * sans -r because the --no-r option was added at the same time. */ | |
2646 | if (xfer_dirs && !recurse && delete_mode && am_sender) | |
2647 | args[ac++] = "--no-r"; | |
2648 | ||
d999efe6 WD |
2649 | if (do_compression && do_compression_level != CLVL_NOT_SPECIFIED) { |
2650 | if (asprintf(&arg, "--compress-level=%d", do_compression_level) < 0) | |
854a1aad WD |
2651 | goto oom; |
2652 | args[ac++] = arg; | |
2653 | } | |
2654 | ||
b5c6a6ae WD |
2655 | if (preserve_devices) { |
2656 | /* Note: sending "--devices" would not be backward-compatible. */ | |
2657 | if (!preserve_specials) | |
2658 | args[ac++] = "--no-specials"; /* -D is already set. */ | |
2659 | } else if (preserve_specials) | |
2660 | args[ac++] = "--specials"; | |
2661 | ||
5c5e1598 WD |
2662 | /* The server side doesn't use our log-format, but in certain |
2663 | * circumstances they need to know a little about the option. */ | |
b3e4e7ef WD |
2664 | if (stdout_format && am_sender) { |
2665 | /* Use --log-format, not --out-format, for compatibility. */ | |
2666 | if (stdout_format_has_i > 1) | |
487094a0 | 2667 | args[ac++] = "--log-format=%i%I"; |
b3e4e7ef | 2668 | else if (stdout_format_has_i) |
684d7582 | 2669 | args[ac++] = "--log-format=%i"; |
b3e4e7ef | 2670 | else if (stdout_format_has_o_or_i) |
5c5e1598 WD |
2671 | args[ac++] = "--log-format=%o"; |
2672 | else if (!verbose) | |
2673 | args[ac++] = "--log-format=X"; | |
2674 | } | |
1f30a674 | 2675 | |
592059c8 WD |
2676 | if (msgs2stderr == 1) |
2677 | args[ac++] = "--msgs2stderr"; | |
2678 | else if (msgs2stderr == 0) | |
2679 | args[ac++] = "--no-msgs2stderr"; | |
2680 | ||
195bd906 | 2681 | if (block_size) { |
da7a3506 | 2682 | if (asprintf(&arg, "-B%u", (int)block_size) < 0) |
f98c60bf WD |
2683 | goto oom; |
2684 | args[ac++] = arg; | |
dfa32483 | 2685 | } |
d853783f AT |
2686 | |
2687 | if (io_timeout) { | |
f98c60bf WD |
2688 | if (asprintf(&arg, "--timeout=%d", io_timeout) < 0) |
2689 | goto oom; | |
2690 | args[ac++] = arg; | |
dfa32483 | 2691 | } |
d853783f | 2692 | |
ef5d23eb | 2693 | if (bwlimit) { |
f98c60bf WD |
2694 | if (asprintf(&arg, "--bwlimit=%d", bwlimit) < 0) |
2695 | goto oom; | |
2696 | args[ac++] = arg; | |
ef5d23eb DD |
2697 | } |
2698 | ||
d175d7e1 WD |
2699 | if (backup_dir) { |
2700 | args[ac++] = "--backup-dir"; | |
2701 | args[ac++] = backup_dir; | |
2702 | } | |
2703 | ||
2704 | /* Only send --suffix if it specifies a non-default value. */ | |
f98c60bf | 2705 | if (strcmp(backup_suffix, backup_dir ? "" : BACKUP_SUFFIX) != 0) { |
191e40da | 2706 | /* We use the following syntax to avoid weirdness with '~'. */ |
f98c60bf WD |
2707 | if (asprintf(&arg, "--suffix=%s", backup_suffix) < 0) |
2708 | goto oom; | |
2709 | args[ac++] = arg; | |
d853783f AT |
2710 | } |
2711 | ||
a5a7d3a2 WD |
2712 | if (checksum_choice) { |
2713 | if (asprintf(&arg, "--checksum-choice=%s", checksum_choice) < 0) | |
2714 | goto oom; | |
2715 | args[ac++] = arg; | |
2716 | } | |
2717 | ||
4496e0e8 | 2718 | if (do_compression == CPRES_ZLIBX) |
64d5ea39 | 2719 | args[ac++] = "--new-compress"; |
4496e0e8 | 2720 | else if (compress_choice && do_compression == CPRES_ZLIB) |
64d5ea39 WD |
2721 | args[ac++] = "--old-compress"; |
2722 | else if (compress_choice) { | |
2723 | if (asprintf(&arg, "--compress-choice=%s", compress_choice) < 0) | |
2724 | goto oom; | |
2725 | args[ac++] = arg; | |
2726 | } | |
2727 | ||
06a50542 | 2728 | if (am_sender) { |
7b9598b2 WD |
2729 | if (max_delete > 0) { |
2730 | if (asprintf(&arg, "--max-delete=%d", max_delete) < 0) | |
2731 | goto oom; | |
2732 | args[ac++] = arg; | |
2733 | } else if (max_delete == 0) | |
d6ca255c | 2734 | args[ac++] = "--max-delete=-1"; |
9510fa9a | 2735 | if (min_size >= 0) { |
7b9598b2 WD |
2736 | args[ac++] = "--min-size"; |
2737 | args[ac++] = min_size_arg; | |
2738 | } | |
9510fa9a | 2739 | if (max_size >= 0) { |
7b9598b2 WD |
2740 | args[ac++] = "--max-size"; |
2741 | args[ac++] = max_size_arg; | |
2742 | } | |
e0e32031 | 2743 | if (delete_before) |
c6eb7fad | 2744 | args[ac++] = "--delete-before"; |
0d152437 WD |
2745 | else if (delete_during == 2) |
2746 | args[ac++] = "--delete-delay"; | |
2747 | else if (delete_during) | |
2748 | args[ac++] = "--delete-during"; | |
2749 | else if (delete_after) | |
06a50542 | 2750 | args[ac++] = "--delete-after"; |
e0e32031 WD |
2751 | else if (delete_mode && !delete_excluded) |
2752 | args[ac++] = "--delete"; | |
2753 | if (delete_excluded) | |
2754 | args[ac++] = "--delete-excluded"; | |
06a50542 WD |
2755 | if (force_delete) |
2756 | args[ac++] = "--force"; | |
11e758a4 WD |
2757 | if (write_batch < 0) |
2758 | args[ac++] = "--only-write-batch=X"; | |
def97ff9 WD |
2759 | if (am_root > 1) |
2760 | args[ac++] = "--super"; | |
f17e769e WD |
2761 | if (size_only) |
2762 | args[ac++] = "--size-only"; | |
dc6fb11b WD |
2763 | if (do_stats) |
2764 | args[ac++] = "--stats"; | |
b1e436ec WD |
2765 | } else { |
2766 | if (skip_compress) { | |
2767 | if (asprintf(&arg, "--skip-compress=%s", skip_compress) < 0) | |
2768 | goto oom; | |
2769 | args[ac++] = arg; | |
2770 | } | |
06a50542 | 2771 | } |
b33b791e | 2772 | |
11eb67ee WD |
2773 | if (max_alloc_arg && max_alloc != DEFAULT_MAX_ALLOC) { |
2774 | args[ac++] = "--max-alloc"; | |
2775 | args[ac++] = max_alloc_arg; | |
2776 | } | |
2777 | ||
42d8ec61 WD |
2778 | /* --delete-missing-args needs the cooperation of both sides, but |
2779 | * the sender can handle --ignore-missing-args by itself. */ | |
2780 | if (missing_args == 2) | |
ce66f417 | 2781 | args[ac++] = "--delete-missing-args"; |
42d8ec61 WD |
2782 | else if (missing_args == 1 && !am_sender) |
2783 | args[ac++] = "--ignore-missing-args"; | |
ce66f417 | 2784 | |
839dbff2 WD |
2785 | if (modify_window_set && am_sender) { |
2786 | char *fmt = modify_window < 0 ? "-@%d" : "--modify-window=%d"; | |
2787 | if (asprintf(&arg, fmt, modify_window) < 0) | |
f98c60bf WD |
2788 | goto oom; |
2789 | args[ac++] = arg; | |
5b56cc19 AT |
2790 | } |
2791 | ||
c8d895de | 2792 | if (checksum_seed) { |
221ddb94 | 2793 | if (asprintf(&arg, "--checksum-seed=%d", checksum_seed) < 0) |
c8d895de WD |
2794 | goto oom; |
2795 | args[ac++] = arg; | |
2796 | } | |
2797 | ||
a7260c40 | 2798 | if (partial_dir && am_sender) { |
77860bac | 2799 | if (partial_dir != tmp_partialdir) { |
3671987f WD |
2800 | args[ac++] = "--partial-dir"; |
2801 | args[ac++] = partial_dir; | |
2802 | } | |
f06e7082 WD |
2803 | if (delay_updates) |
2804 | args[ac++] = "--delay-updates"; | |
77860bac | 2805 | } else if (keep_partial && am_sender) |
d853783f AT |
2806 | args[ac++] = "--partial"; |
2807 | ||
ef55c686 AT |
2808 | if (ignore_errors) |
2809 | args[ac++] = "--ignore-errors"; | |
2810 | ||
b5313607 DD |
2811 | if (copy_unsafe_links) |
2812 | args[ac++] = "--copy-unsafe-links"; | |
2813 | ||
d853783f AT |
2814 | if (safe_symlinks) |
2815 | args[ac++] = "--safe-links"; | |
2816 | ||
2817 | if (numeric_ids) | |
2818 | args[ac++] = "--numeric-ids"; | |
2819 | ||
95def6d9 WD |
2820 | if (use_qsort) |
2821 | args[ac++] = "--use-qsort"; | |
2822 | ||
4f3797c7 | 2823 | if (am_sender) { |
2df20057 WD |
2824 | if (usermap) { |
2825 | if (asprintf(&arg, "--usermap=%s", usermap) < 0) | |
2826 | goto oom; | |
2827 | args[ac++] = arg; | |
2828 | } | |
2829 | ||
2830 | if (groupmap) { | |
2831 | if (asprintf(&arg, "--groupmap=%s", groupmap) < 0) | |
2832 | goto oom; | |
2833 | args[ac++] = arg; | |
2834 | } | |
2835 | ||
4f3797c7 WD |
2836 | if (ignore_existing) |
2837 | args[ac++] = "--ignore-existing"; | |
2838 | ||
2839 | /* Backward compatibility: send --existing, not --ignore-non-existing. */ | |
2840 | if (ignore_non_existing) | |
2841 | args[ac++] = "--existing"; | |
3d6feada | 2842 | |
4f3797c7 WD |
2843 | if (tmpdir) { |
2844 | args[ac++] = "--temp-dir"; | |
2845 | args[ac++] = tmpdir; | |
2846 | } | |
2847 | ||
2848 | if (basis_dir[0]) { | |
2849 | /* the server only needs this option if it is not the sender, | |
2850 | * and it may be an older version that doesn't know this | |
2851 | * option, so don't send it if client is the sender. | |
2852 | */ | |
4f3797c7 | 2853 | for (i = 0; i < basis_dir_cnt; i++) { |
cdf58a7a | 2854 | args[ac++] = alt_dest_opt(0); |
4f3797c7 WD |
2855 | args[ac++] = basis_dir[i]; |
2856 | } | |
2857 | } | |
2858 | } | |
e90aab49 | 2859 | |
951e826b WD |
2860 | /* What flags do we need to send to the other side? */ |
2861 | where = (am_server ? W_CLI : W_SRV) | (am_sender ? W_REC : W_SND); | |
2862 | arg = make_output_option(info_words, info_levels, where); | |
2863 | if (arg) | |
2864 | args[ac++] = arg; | |
2865 | ||
936fa865 WD |
2866 | if (append_mode) { |
2867 | if (append_mode > 1) | |
2868 | args[ac++] = "--append"; | |
a015788d | 2869 | args[ac++] = "--append"; |
936fa865 | 2870 | } else if (inplace) |
a3221d2a WD |
2871 | args[ac++] = "--inplace"; |
2872 | ||
305666bf WD |
2873 | if (files_from && (!am_sender || filesfrom_host)) { |
2874 | if (filesfrom_host) { | |
ea5164d1 | 2875 | args[ac++] = "--files-from"; |
305666bf | 2876 | args[ac++] = files_from; |
ea5164d1 WD |
2877 | if (eol_nulls) |
2878 | args[ac++] = "--from0"; | |
2879 | } else { | |
2880 | args[ac++] = "--files-from=-"; | |
2881 | args[ac++] = "--from0"; | |
2882 | } | |
c0ab28d1 WD |
2883 | if (!relative_paths) |
2884 | args[ac++] = "--no-relative"; | |
ea5164d1 | 2885 | } |
33a04593 WD |
2886 | /* It's OK that this checks the upper-bound of the protocol_version. */ |
2887 | if (relative_paths && !implied_dirs && (!am_sender || protocol_version >= 30)) | |
3a90ea0a | 2888 | args[ac++] = "--no-implied-dirs"; |
ea5164d1 | 2889 | |
7e70e484 | 2890 | if (write_devices && am_sender) |
9e9d33a2 WD |
2891 | args[ac++] = "--write-devices"; |
2892 | ||
47c11975 WD |
2893 | if (remove_source_files == 1) |
2894 | args[ac++] = "--remove-source-files"; | |
2895 | else if (remove_source_files) | |
07c6ae7d WD |
2896 | args[ac++] = "--remove-sent-files"; |
2897 | ||
28b519c9 WD |
2898 | if (preallocate_files && am_sender) |
2899 | args[ac++] = "--preallocate"; | |
2900 | ||
87257f86 WD |
2901 | if (open_noatime && preserve_atimes <= 1) |
2902 | args[ac++] = "--open-noatime"; | |
b9367410 | 2903 | |
01742c07 WD |
2904 | if (mkpath_dest_arg && am_sender) |
2905 | args[ac++] = "--mkpath"; | |
2906 | ||
7a2eca41 WD |
2907 | if (ac > MAX_SERVER_ARGS) { /* Not possible... */ |
2908 | rprintf(FERROR, "argc overflow in server_options().\n"); | |
2909 | exit_cleanup(RERR_MALLOC); | |
2910 | } | |
2911 | ||
2912 | if (remote_option_cnt) { | |
2913 | int j; | |
2914 | if (ac + remote_option_cnt > MAX_SERVER_ARGS) { | |
2915 | rprintf(FERROR, "too many remote options specified.\n"); | |
2916 | exit_cleanup(RERR_SYNTAX); | |
2917 | } | |
2918 | for (j = 1; j <= remote_option_cnt; j++) | |
2919 | args[ac++] = (char*)remote_options[j]; | |
2920 | } | |
2921 | ||
ffbffc64 | 2922 | *argc_p = ac; |
f98c60bf WD |
2923 | return; |
2924 | ||
2925 | oom: | |
2926 | out_of_memory("server_options"); | |
7a6421fa AT |
2927 | } |
2928 | ||
58cf3547 WD |
2929 | /* If str points to a valid hostspec, return allocated memory containing the |
2930 | * [USER@]HOST part of the string, and set the path_start_ptr to the part of | |
2931 | * the string after the host part. Otherwise, return NULL. If port_ptr is | |
2932 | * non-NULL, we must be parsing an rsync:// URL hostname, and we will set | |
2933 | * *port_ptr if a port number is found. Note that IPv6 IPs will have their | |
2934 | * (required for parsing) [ and ] chars elided from the returned string. */ | |
2935 | static char *parse_hostspec(char *str, char **path_start_ptr, int *port_ptr) | |
2936 | { | |
4d13a2fe | 2937 | char *s, *host_start = str; |
58cf3547 WD |
2938 | int hostlen = 0, userlen = 0; |
2939 | char *ret; | |
2940 | ||
4d13a2fe | 2941 | for (s = str; ; s++) { |
58cf3547 WD |
2942 | if (!*s) { |
2943 | /* It is only OK if we run out of string with rsync:// */ | |
4d13a2fe WD |
2944 | if (!port_ptr) |
2945 | return NULL; | |
2946 | if (!hostlen) | |
2947 | hostlen = s - host_start; | |
2948 | break; | |
58cf3547 WD |
2949 | } |
2950 | if (*s == ':' || *s == '/') { | |
2951 | if (!hostlen) | |
2952 | hostlen = s - host_start; | |
2953 | if (*s++ == '/') { | |
2954 | if (!port_ptr) | |
2955 | return NULL; | |
2956 | } else if (port_ptr) { | |
2957 | *port_ptr = atoi(s); | |
2958 | while (isDigit(s)) s++; | |
4d13a2fe | 2959 | if (*s && *s++ != '/') |
58cf3547 WD |
2960 | return NULL; |
2961 | } | |
2962 | break; | |
2963 | } | |
2964 | if (*s == '@') { | |
2965 | userlen = s - str + 1; | |
2966 | host_start = s + 1; | |
2967 | } else if (*s == '[') { | |
2968 | if (s != host_start++) | |
2969 | return NULL; | |
2970 | while (*s && *s != ']' && *s != '/') s++; /*SHARED ITERATOR*/ | |
2971 | hostlen = s - host_start; | |
2972 | if (*s != ']' || (s[1] && s[1] != '/' && s[1] != ':') || !hostlen) | |
2973 | return NULL; | |
2974 | } | |
2975 | } | |
2976 | ||
2977 | *path_start_ptr = s; | |
2978 | ret = new_array(char, userlen + hostlen + 1); | |
2979 | if (userlen) | |
2980 | strlcpy(ret, str, userlen + 1); | |
2981 | strlcpy(ret + userlen, host_start, hostlen + 1); | |
2982 | return ret; | |
2983 | } | |
2984 | ||
d2970213 | 2985 | /* Look for a HOST specification of the form "HOST:PATH", "HOST::PATH", or |
305666bf WD |
2986 | * "rsync://HOST:PORT/PATH". If found, *host_ptr will be set to some allocated |
2987 | * memory with the HOST. If a daemon-accessing spec was specified, the value | |
2988 | * of *port_ptr will contain a non-0 port number, otherwise it will be set to | |
2989 | * 0. The return value is a pointer to the PATH. Note that the HOST spec can | |
2990 | * be an IPv6 literal address enclosed in '[' and ']' (such as "[::1]" or | |
2991 | * "[::ffff:127.0.0.1]") which is returned without the '[' and ']'. */ | |
2992 | char *check_for_hostspec(char *s, char **host_ptr, int *port_ptr) | |
ea5164d1 | 2993 | { |
58cf3547 | 2994 | char *path; |
305666bf WD |
2995 | |
2996 | if (port_ptr && strncasecmp(URL_PREFIX, s, strlen(URL_PREFIX)) == 0) { | |
58cf3547 WD |
2997 | *host_ptr = parse_hostspec(s + strlen(URL_PREFIX), &path, port_ptr); |
2998 | if (*host_ptr) { | |
2999 | if (!*port_ptr) | |
70cbc66b | 3000 | *port_ptr = -1; /* -1 indicates they want the default */ |
58cf3547 | 3001 | return path; |
305666bf | 3002 | } |
305666bf WD |
3003 | } |
3004 | ||
58cf3547 WD |
3005 | *host_ptr = parse_hostspec(s, &path, NULL); |
3006 | if (!*host_ptr) | |
3007 | return NULL; | |
ea5164d1 | 3008 | |
58cf3547 | 3009 | if (*path == ':') { |
305666bf | 3010 | if (port_ptr && !*port_ptr) |
e2aee6c4 | 3011 | *port_ptr = -1; |
58cf3547 | 3012 | return path + 1; |
305666bf WD |
3013 | } |
3014 | if (port_ptr) | |
3015 | *port_ptr = 0; | |
ea5164d1 | 3016 | |
58cf3547 | 3017 | return path; |
ea5164d1 | 3018 | } |