2 * Bacula File Daemon verify.c Verify files.
4 * Kern Sibbald, October MM
10 Copyright (C) 2000, 2001, 2002 Kern Sibbald and John Walker
12 This program is free software; you can redistribute it and/or
13 modify it under the terms of the GNU General Public License as
14 published by the Free Software Foundation; either version 2 of
15 the License, or (at your option) any later version.
17 This program is distributed in the hope that it will be useful,
18 but WITHOUT ANY WARRANTY; without even the implied warranty of
19 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
20 General Public License for more details.
22 You should have received a copy of the GNU General Public
23 License along with this program; if not, write to the Free
24 Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
32 static int verify_file(FF_PKT *ff_pkt, void *my_pkt);
35 * Find all the requested files and send attributes
39 void do_verify(JCR *jcr)
41 BSOCK *dir = jcr->dir_bsock;
43 jcr->buf_size = MAX_NETWORK_BUFFER_SIZE;
44 if ((jcr->big_buf = (char *) malloc(jcr->buf_size)) == NULL) {
45 Emsg1(M_ABORT, 0, _("Cannot malloc %d network read buffer\n"), MAX_NETWORK_BUFFER_SIZE);
47 set_find_options(jcr->ff, jcr->incremental, jcr->mtime);
48 Dmsg0(10, "Start find files\n");
49 /* Subroutine verify_file() is called for each file */
50 find_files(jcr->ff, verify_file, (void *)jcr);
51 Dmsg0(10, "End find files\n");
53 bnet_sig(dir, BNET_EOD); /* signal end of data */
62 * Called here by find() for each file.
64 *****FIXME***** add FSMs File System Modules
67 * Find the file, compute the MD5 and send it back to the Director
69 static int verify_file(FF_PKT *ff_pkt, void *pkt)
71 char attribs[MAXSTRING];
74 struct MD5Context md5c;
75 unsigned char signature[16];
77 JCR *jcr = (JCR *)pkt;
79 sd = jcr->store_bsock;
82 switch (ff_pkt->type) {
83 case FT_LNKSAVED: /* Hard linked, file already saved */
86 Dmsg1(30, "FT_REGE saving: %s\n", ff_pkt->fname);
89 Dmsg1(30, "FT_REG saving: %s\n", ff_pkt->fname);
92 Dmsg2(30, "FT_LNK saving: %s -> %s\n", ff_pkt->fname, ff_pkt->link);
95 Dmsg1(30, "FT_DIR saving: %s\n", ff_pkt->fname);
98 Dmsg1(30, "FT_SPEC saving: %s\n", ff_pkt->fname);
101 Jmsg(jcr, M_ERROR, -1, _(" Could not access %s: ERR=%s\n"), ff_pkt->fname, strerror(ff_pkt->ff_errno));
104 Jmsg(jcr, M_ERROR, -1, _(" Could not follow link %s: ERR=%s\n"), ff_pkt->fname, strerror(ff_pkt->ff_errno));
107 Jmsg(jcr, M_ERROR, -1, _(" Could not stat %s: ERR=%s\n"), ff_pkt->fname, strerror(ff_pkt->ff_errno));
111 Jmsg(jcr, M_INFO, -1, _(" Unchanged file skipped: %s\n"), ff_pkt->fname);
114 Jmsg(jcr, M_SKIPPED, -1, _(" Archive file skipped: %s\n"), ff_pkt->fname);
117 Jmsg(jcr, M_SKIPPED, -1, _(" Recursion turned off. Directory skipped: %s\n"), ff_pkt->fname);
120 Jmsg(jcr, M_SKIPPED, -1, _(" File system change prohibited. Directory skipped: %s\n"), ff_pkt->fname);
123 Jmsg(jcr, M_ERROR, -1, _(" Could not open directory %s: ERR=%s\n"), ff_pkt->fname, strerror(ff_pkt->ff_errno));
126 Jmsg(jcr, M_ERROR, 0, _("Unknown file type %d: %s\n"), ff_pkt->type, ff_pkt->fname);
131 if (ff_pkt->type != FT_LNKSAVED && S_ISREG(ff_pkt->statp.st_mode) &&
132 ff_pkt->statp.st_size > 0) {
133 if ((fid = open(ff_pkt->fname, O_RDONLY | O_BINARY)) < 0) {
134 ff_pkt->ff_errno = errno;
135 Jmsg(jcr, M_NOTSAVED, -1, _("Cannot open %s: ERR=%s.\n"), ff_pkt->fname, strerror(ff_pkt->ff_errno));
142 encode_stat(attribs, &ff_pkt->statp);
144 jcr->JobFiles++; /* increment number of files sent */
146 if (ff_pkt->VerifyOpts[0] == 0) {
147 ff_pkt->VerifyOpts[0] = 'V';
148 ff_pkt->VerifyOpts[1] = 0;
153 * Send file attributes to Director
157 * Filename (full path)
159 * Link name (if type==FT_LNK)
160 * For a directory, link is the same as fname, but with trailing
161 * slash. For a linked file, link is the link.
163 /* Send file attributes to Director (note different format than for Storage) */
164 Dmsg2(400, "send ATTR inx=%d fname=%s\n", jcr->JobFiles, ff_pkt->fname);
165 if (ff_pkt->type == FT_LNK) {
166 stat = bnet_fsend(dir, "%d %d %s %s%c%s%c%s%c", jcr->JobFiles,
167 STREAM_UNIX_ATTRIBUTES, ff_pkt->VerifyOpts, ff_pkt->fname,
168 0, attribs, 0, ff_pkt->link, 0);
170 stat = bnet_fsend(dir,"%d %d %s %s%c%s%c%c", jcr->JobFiles,
171 STREAM_UNIX_ATTRIBUTES, ff_pkt->VerifyOpts, ff_pkt->fname,
174 Dmsg2(20, "bfiled>bdird: attribs len=%d: msg=%s\n", dir->msglen, dir->msg);
176 Jmsg(jcr, M_ERROR, 0, _("Network error in send to Director: ERR=%s\n"), bnet_strerror(dir));
183 /* If file opened, compute MD5 */
184 if (fid >= 0 && ff_pkt->flags & FO_MD5) {
185 char MD5buf[50]; /* 24 should do */
189 while ((n=read(fid, jcr->big_buf, jcr->buf_size)) > 0) {
190 MD5Update(&md5c, ((unsigned char *) jcr->big_buf), n);
194 Jmsg(jcr, M_WARNING, -1, _(" Error reading file %s: ERR=%s\n"), ff_pkt->fname, strerror(ff_pkt->ff_errno));
197 MD5Final(signature, &md5c);
199 bin_to_base64(MD5buf, (char *)signature, 16); /* encode 16 bytes */
200 Dmsg2(400, "send inx=%d MD5=%s\n", jcr->JobFiles, MD5buf);
201 bnet_fsend(dir, "%d %d %s *MD5-%d*", jcr->JobFiles, STREAM_MD5_SIGNATURE, MD5buf,
203 Dmsg2(20, "bfiled>bdird: MD5 len=%d: msg=%s\n", dir->msglen, dir->msg);