2 * Bacula File Daemon verify.c Verify files.
4 * Kern Sibbald, October MM
10 Copyright (C) 2000-2003 Kern Sibbald and John Walker
12 This program is free software; you can redistribute it and/or
13 modify it under the terms of the GNU General Public License as
14 published by the Free Software Foundation; either version 2 of
15 the License, or (at your option) any later version.
17 This program is distributed in the hope that it will be useful,
18 but WITHOUT ANY WARRANTY; without even the implied warranty of
19 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
20 General Public License for more details.
22 You should have received a copy of the GNU General Public
23 License along with this program; if not, write to the Free
24 Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
32 static int verify_file(FF_PKT *ff_pkt, void *my_pkt);
35 * Find all the requested files and send attributes
39 void do_verify(JCR *jcr)
41 set_jcr_job_status(jcr, JS_Running);
42 jcr->buf_size = DEFAULT_NETWORK_BUFFER_SIZE;
43 if ((jcr->big_buf = (char *) malloc(jcr->buf_size)) == NULL) {
44 Jmsg1(jcr, M_ABORT, 0, _("Cannot malloc %d network read buffer\n"),
45 DEFAULT_NETWORK_BUFFER_SIZE);
47 set_find_options((FF_PKT *)jcr->ff, jcr->incremental, jcr->mtime, jcr->mtime_only);
48 Dmsg0(10, "Start find files\n");
49 /* Subroutine verify_file() is called for each file */
50 find_files(jcr, (FF_PKT *)jcr->ff, verify_file, (void *)jcr);
51 Dmsg0(10, "End find files\n");
57 set_jcr_job_status(jcr, JS_Terminated);
61 * Called here by find() for each file.
63 * Find the file, compute the MD5 or SHA1 and send it back to the Director
65 static int verify_file(FF_PKT *ff_pkt, void *pkt)
67 char attribs[MAXSTRING];
71 struct MD5Context md5c;
72 struct SHA1Context sha1c;
73 unsigned char signature[25]; /* large enough for either */
75 JCR *jcr = (JCR *)pkt;
77 if (job_canceled(jcr)) {
82 jcr->num_files_examined++; /* bump total file count */
84 switch (ff_pkt->type) {
85 case FT_LNKSAVED: /* Hard linked, file already saved */
86 Dmsg2(30, "FT_LNKSAVED saving: %s => %s\n", ff_pkt->fname, ff_pkt->link);
89 Dmsg1(30, "FT_REGE saving: %s\n", ff_pkt->fname);
92 Dmsg1(30, "FT_REG saving: %s\n", ff_pkt->fname);
95 Dmsg2(30, "FT_LNK saving: %s -> %s\n", ff_pkt->fname, ff_pkt->link);
98 Dmsg1(30, "FT_DIR saving: %s\n", ff_pkt->fname);
101 Dmsg1(30, "FT_SPEC saving: %s\n", ff_pkt->fname);
104 Dmsg1(30, "FT_RAW saving: %s\n", ff_pkt->fname);
107 Dmsg1(30, "FT_FIFO saving: %s\n", ff_pkt->fname);
110 Jmsg(jcr, M_NOTSAVED, -1, _(" Could not access %s: ERR=%s\n"), ff_pkt->fname, strerror(ff_pkt->ff_errno));
114 Jmsg(jcr, M_NOTSAVED, -1, _(" Could not follow link %s: ERR=%s\n"), ff_pkt->fname, strerror(ff_pkt->ff_errno));
118 Jmsg(jcr, M_NOTSAVED, -1, _(" Could not stat %s: ERR=%s\n"), ff_pkt->fname, strerror(ff_pkt->ff_errno));
123 Jmsg(jcr, M_SKIPPED, -1, _(" Unchanged file skipped: %s\n"), ff_pkt->fname);
126 Jmsg(jcr, M_SKIPPED, -1, _(" Archive file skipped: %s\n"), ff_pkt->fname);
129 Jmsg(jcr, M_SKIPPED, -1, _(" Recursion turned off. Directory skipped: %s\n"), ff_pkt->fname);
132 Jmsg(jcr, M_SKIPPED, -1, _(" File system change prohibited. Directory skipped: %s\n"), ff_pkt->fname);
135 Jmsg(jcr, M_NOTSAVED, -1, _(" Could not open directory %s: ERR=%s\n"), ff_pkt->fname, strerror(ff_pkt->ff_errno));
139 Jmsg(jcr, M_NOTSAVED, 0, _(" Unknown file type %d: %s\n"), ff_pkt->type, ff_pkt->fname);
146 if (ff_pkt->type != FT_LNKSAVED && (S_ISREG(ff_pkt->statp.st_mode) &&
147 ff_pkt->statp.st_size > 0) ||
148 ff_pkt->type == FT_RAW || ff_pkt->type == FT_FIFO) {
149 if ((bopen(&bfd, ff_pkt->fname, O_RDONLY | O_BINARY, 0)) < 0) {
150 ff_pkt->ff_errno = errno;
151 Jmsg(jcr, M_NOTSAVED, -1, _(" Cannot open %s: ERR=%s.\n"),
152 ff_pkt->fname, berror(&bfd));
158 encode_stat(attribs, ff_pkt, 0);
161 jcr->JobFiles++; /* increment number of files sent */
162 pm_strcpy(&jcr->last_fname, ff_pkt->fname);
166 * Send file attributes to Director
170 * Filename (full path)
172 * Link name (if type==FT_LNK)
173 * For a directory, link is the same as fname, but with trailing
174 * slash. For a linked file, link is the link.
176 /* Send file attributes to Director (note different format than for Storage) */
177 Dmsg2(400, "send ATTR inx=%d fname=%s\n", jcr->JobFiles, ff_pkt->fname);
178 if (ff_pkt->type == FT_LNK || ff_pkt->type == FT_LNKSAVED) {
179 stat = bnet_fsend(dir, "%d %d %s %s%c%s%c%s%c", jcr->JobFiles,
180 STREAM_UNIX_ATTRIBUTES, ff_pkt->VerifyOpts, ff_pkt->fname,
181 0, attribs, 0, ff_pkt->link, 0);
182 } else if (ff_pkt->type == FT_DIR) {
183 /* Here link is the canonical filename (i.e. with trailing slash) */
184 stat = bnet_fsend(dir,"%d %d %s %s%c%s%c%c", jcr->JobFiles,
185 STREAM_UNIX_ATTRIBUTES, ff_pkt->VerifyOpts, ff_pkt->link,
188 stat = bnet_fsend(dir,"%d %d %s %s%c%s%c%c", jcr->JobFiles,
189 STREAM_UNIX_ATTRIBUTES, ff_pkt->VerifyOpts, ff_pkt->fname,
192 Dmsg2(20, "bfiled>bdird: attribs len=%d: msg=%s\n", dir->msglen, dir->msg);
194 Jmsg(jcr, M_FATAL, 0, _("Network error in send to Director: ERR=%s\n"), bnet_strerror(dir));
195 if (is_bopen(&bfd)) {
201 /* If file opened, compute MD5 or SHA1 hash */
202 if (is_bopen(&bfd) && ff_pkt->flags & FO_MD5) {
203 char MD5buf[40]; /* 24 should do */
205 while ((n=bread(&bfd, jcr->big_buf, jcr->buf_size)) > 0) {
206 MD5Update(&md5c, ((unsigned char *) jcr->big_buf), n);
211 Jmsg(jcr, M_ERROR, -1, _("Error reading file %s: ERR=%s\n"),
212 ff_pkt->fname, berror(&bfd));
215 MD5Final(signature, &md5c);
217 bin_to_base64(MD5buf, (char *)signature, 16); /* encode 16 bytes */
218 Dmsg2(400, "send inx=%d MD5=%s\n", jcr->JobFiles, MD5buf);
219 bnet_fsend(dir, "%d %d %s *MD5-%d*", jcr->JobFiles, STREAM_MD5_SIGNATURE, MD5buf,
221 Dmsg2(20, "bfiled>bdird: MD5 len=%d: msg=%s\n", dir->msglen, dir->msg);
222 } else if (is_bopen(&bfd) && ff_pkt->flags & FO_SHA1) {
223 char SHA1buf[40]; /* 24 should do */
225 while ((n=bread(&bfd, jcr->big_buf, jcr->buf_size)) > 0) {
226 SHA1Update(&sha1c, ((unsigned char *) jcr->big_buf), n);
231 Jmsg(jcr, M_ERROR, -1, _("Error reading file %s: ERR=%s\n"),
232 ff_pkt->fname, berror(&bfd));
235 SHA1Final(&sha1c, signature);
237 bin_to_base64(SHA1buf, (char *)signature, 20); /* encode 20 bytes */
238 Dmsg2(400, "send inx=%d SHA1=%s\n", jcr->JobFiles, SHA1buf);
239 bnet_fsend(dir, "%d %d %s *SHA1-%d*", jcr->JobFiles, STREAM_SHA1_SIGNATURE,
240 SHA1buf, jcr->JobFiles);
241 Dmsg2(20, "bfiled>bdird: SHA1 len=%d: msg=%s\n", dir->msglen, dir->msg);
243 if (is_bopen(&bfd)) {