2016-05-04 06:18:24 +08:00
|
|
|
// Wide character equivalents of various standard unix functions.
|
2005-09-20 21:26:39 +08:00
|
|
|
#include "config.h"
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
#include <assert.h>
|
|
|
|
#include <dirent.h>
|
2005-09-20 21:26:39 +08:00
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
2006-06-14 21:22:40 +08:00
|
|
|
#include <libgen.h>
|
2016-05-04 06:18:24 +08:00
|
|
|
#include <limits.h>
|
2012-02-18 07:55:54 +08:00
|
|
|
#include <pthread.h>
|
2016-05-04 06:18:24 +08:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <wchar.h>
|
2012-02-25 04:13:35 +08:00
|
|
|
#include <map>
|
2016-04-21 14:00:54 +08:00
|
|
|
#include <memory>
|
2016-05-04 06:18:24 +08:00
|
|
|
#include <string>
|
2006-02-28 21:17:16 +08:00
|
|
|
|
2005-09-20 21:26:39 +08:00
|
|
|
#include "common.h"
|
2016-04-21 14:00:54 +08:00
|
|
|
#include "fallback.h" // IWYU pragma: keep
|
2016-05-04 06:18:24 +08:00
|
|
|
#include "wutil.h" // IWYU pragma: keep
|
2005-09-20 21:26:39 +08:00
|
|
|
|
2011-12-27 11:18:46 +08:00
|
|
|
typedef std::string cstring;
|
|
|
|
|
2016-04-03 13:19:44 +08:00
|
|
|
const file_id_t kInvalidFileID = {(dev_t)-1LL, (ino_t)-1LL, (uint64_t)-1LL, -1, -1, -1, -1};
|
2014-04-28 04:34:51 +08:00
|
|
|
|
2006-02-02 23:23:56 +08:00
|
|
|
#ifndef PATH_MAX
|
|
|
|
#ifdef MAXPATHLEN
|
|
|
|
#define PATH_MAX MAXPATHLEN
|
|
|
|
#else
|
2016-05-04 06:18:24 +08:00
|
|
|
/// Fallback length of MAXPATHLEN. Hopefully a sane value.
|
2006-02-02 23:23:56 +08:00
|
|
|
#define PATH_MAX 4096
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
/// Lock to protect wgettext.
|
2012-02-25 04:13:35 +08:00
|
|
|
static pthread_mutex_t wgettext_lock;
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
/// Map used as cache by wgettext.
|
2016-03-19 06:14:16 +08:00
|
|
|
typedef std::map<wcstring, wcstring> wgettext_map_t;
|
2015-07-26 07:01:43 +08:00
|
|
|
static wgettext_map_t wgettext_map;
|
2006-07-20 06:55:49 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
bool wreaddir_resolving(DIR *dir, const std::wstring &dir_path, std::wstring &out_name,
|
|
|
|
bool *out_is_dir) {
|
2012-11-19 08:30:30 +08:00
|
|
|
struct dirent *d = readdir(dir);
|
|
|
|
if (!d) return false;
|
2012-11-18 18:23:22 +08:00
|
|
|
|
2012-02-20 18:13:31 +08:00
|
|
|
out_name = str2wcstring(d->d_name);
|
2016-05-04 06:18:24 +08:00
|
|
|
if (out_is_dir) {
|
|
|
|
// The caller cares if this is a directory, so check.
|
2014-07-07 17:45:30 +08:00
|
|
|
bool is_dir = false;
|
2016-05-04 06:18:24 +08:00
|
|
|
|
|
|
|
// We may be able to skip stat, if the readdir can tell us the file type directly.
|
2014-07-07 17:45:30 +08:00
|
|
|
bool check_with_stat = true;
|
2014-12-11 15:24:42 +08:00
|
|
|
#ifdef HAVE_STRUCT_DIRENT_D_TYPE
|
2016-05-04 06:18:24 +08:00
|
|
|
if (d->d_type == DT_DIR) {
|
|
|
|
// Known directory.
|
2012-02-20 18:13:31 +08:00
|
|
|
is_dir = true;
|
2014-07-07 17:45:30 +08:00
|
|
|
check_with_stat = false;
|
2016-05-04 06:18:24 +08:00
|
|
|
} else if (d->d_type == DT_LNK || d->d_type == DT_UNKNOWN) {
|
|
|
|
// We want to treat symlinks to directories as directories. Use stat to resolve it.
|
2014-07-07 17:45:30 +08:00
|
|
|
check_with_stat = true;
|
2016-05-04 06:18:24 +08:00
|
|
|
} else {
|
|
|
|
// Regular file.
|
2014-07-07 17:45:30 +08:00
|
|
|
is_dir = false;
|
|
|
|
check_with_stat = false;
|
|
|
|
}
|
2016-05-04 06:18:24 +08:00
|
|
|
#endif // HAVE_STRUCT_DIRENT_D_TYPE
|
|
|
|
if (check_with_stat) {
|
|
|
|
// We couldn't determine the file type from the dirent; check by stat'ing it.
|
2012-02-20 18:13:31 +08:00
|
|
|
cstring fullpath = wcs2string(dir_path);
|
|
|
|
fullpath.push_back('/');
|
|
|
|
fullpath.append(d->d_name);
|
|
|
|
struct stat buf;
|
2016-05-04 06:18:24 +08:00
|
|
|
if (stat(fullpath.c_str(), &buf) != 0) {
|
2012-02-20 18:13:31 +08:00
|
|
|
is_dir = false;
|
2016-05-04 06:18:24 +08:00
|
|
|
} else {
|
2012-11-19 08:30:30 +08:00
|
|
|
is_dir = !!(S_ISDIR(buf.st_mode));
|
|
|
|
}
|
|
|
|
}
|
2012-02-20 18:13:31 +08:00
|
|
|
*out_is_dir = is_dir;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
bool wreaddir(DIR *dir, std::wstring &out_name) {
|
2012-11-19 08:30:30 +08:00
|
|
|
struct dirent *d = readdir(dir);
|
|
|
|
if (!d) return false;
|
2012-11-18 18:23:22 +08:00
|
|
|
|
2012-02-20 18:13:31 +08:00
|
|
|
out_name = str2wcstring(d->d_name);
|
2012-02-18 10:08:08 +08:00
|
|
|
return true;
|
2005-09-20 21:26:39 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
bool wreaddir_for_dirs(DIR *dir, wcstring *out_name) {
|
2015-08-09 05:52:04 +08:00
|
|
|
struct dirent *result = NULL;
|
2016-05-04 06:18:24 +08:00
|
|
|
while (result == NULL) {
|
2015-08-09 05:52:04 +08:00
|
|
|
struct dirent *d = readdir(dir);
|
|
|
|
if (!d) break;
|
2016-05-04 06:18:24 +08:00
|
|
|
|
2015-08-09 05:52:04 +08:00
|
|
|
#if HAVE_STRUCT_DIRENT_D_TYPE
|
2016-05-04 06:18:24 +08:00
|
|
|
switch (d->d_type) {
|
2015-08-09 05:52:04 +08:00
|
|
|
case DT_DIR:
|
|
|
|
case DT_LNK:
|
2016-05-04 06:18:24 +08:00
|
|
|
case DT_UNKNOWN: {
|
|
|
|
// These may be directories.
|
2015-08-09 05:52:04 +08:00
|
|
|
result = d;
|
|
|
|
break;
|
2016-05-04 06:18:24 +08:00
|
|
|
}
|
|
|
|
default: {
|
|
|
|
// Nothing else can.
|
2015-08-09 05:52:04 +08:00
|
|
|
break;
|
2016-05-04 06:18:24 +08:00
|
|
|
}
|
2015-08-09 05:52:04 +08:00
|
|
|
}
|
|
|
|
#else
|
2016-05-04 06:18:24 +08:00
|
|
|
// We can't determine if it's a directory or not, so just return it.
|
2015-08-09 05:52:04 +08:00
|
|
|
result = d;
|
|
|
|
#endif
|
|
|
|
}
|
2016-05-04 06:18:24 +08:00
|
|
|
if (result && out_name) {
|
2015-08-09 05:52:04 +08:00
|
|
|
*out_name = str2wcstring(result->d_name);
|
|
|
|
}
|
|
|
|
return result != NULL;
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
const wcstring wgetcwd() {
|
2016-03-11 10:17:39 +08:00
|
|
|
wcstring retval;
|
2012-11-19 08:30:30 +08:00
|
|
|
|
2016-03-11 10:17:39 +08:00
|
|
|
char *res = getcwd(NULL, 0);
|
2016-05-04 06:18:24 +08:00
|
|
|
if (res) {
|
2016-03-11 10:17:39 +08:00
|
|
|
retval = str2wcstring(res);
|
|
|
|
free(res);
|
2016-05-04 06:18:24 +08:00
|
|
|
} else {
|
2016-03-11 10:17:39 +08:00
|
|
|
debug(0, _(L"getcwd() failed with errno %d/%s"), errno, strerror(errno));
|
|
|
|
retval = wcstring();
|
2012-11-19 08:30:30 +08:00
|
|
|
}
|
2012-11-18 18:23:22 +08:00
|
|
|
|
2016-03-11 10:17:39 +08:00
|
|
|
return retval;
|
2005-09-20 21:26:39 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
int wchdir(const wcstring &dir) {
|
2011-12-27 11:18:46 +08:00
|
|
|
cstring tmp = wcs2string(dir);
|
2012-11-19 08:30:30 +08:00
|
|
|
return chdir(tmp.c_str());
|
2005-09-20 21:26:39 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
FILE *wfopen(const wcstring &path, const char *mode) {
|
2012-03-02 16:27:40 +08:00
|
|
|
int permissions = 0, options = 0;
|
2012-03-04 14:48:21 +08:00
|
|
|
size_t idx = 0;
|
2016-05-04 06:18:24 +08:00
|
|
|
switch (mode[idx++]) {
|
|
|
|
case 'r': {
|
2012-11-19 16:31:03 +08:00
|
|
|
permissions = O_RDONLY;
|
|
|
|
break;
|
2016-05-04 06:18:24 +08:00
|
|
|
}
|
|
|
|
case 'w': {
|
2012-11-19 16:31:03 +08:00
|
|
|
permissions = O_WRONLY;
|
|
|
|
options = O_CREAT | O_TRUNC;
|
|
|
|
break;
|
2016-05-04 06:18:24 +08:00
|
|
|
}
|
|
|
|
case 'a': {
|
2012-11-19 16:31:03 +08:00
|
|
|
permissions = O_WRONLY;
|
|
|
|
options = O_CREAT | O_APPEND;
|
|
|
|
break;
|
2016-05-04 06:18:24 +08:00
|
|
|
}
|
|
|
|
default: {
|
2012-11-19 16:31:03 +08:00
|
|
|
errno = EINVAL;
|
|
|
|
return NULL;
|
|
|
|
break;
|
2016-05-04 06:18:24 +08:00
|
|
|
}
|
2012-03-02 16:27:40 +08:00
|
|
|
}
|
2016-05-04 06:18:24 +08:00
|
|
|
// Skip binary.
|
|
|
|
if (mode[idx] == 'b') idx++;
|
2012-11-18 18:23:22 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
// Consider append option.
|
|
|
|
if (mode[idx] == '+') permissions = O_RDWR;
|
2012-11-18 18:23:22 +08:00
|
|
|
|
2012-03-02 16:27:40 +08:00
|
|
|
int fd = wopen_cloexec(path, permissions | options, 0666);
|
2016-05-04 06:18:24 +08:00
|
|
|
if (fd < 0) return NULL;
|
2012-03-02 16:27:40 +08:00
|
|
|
FILE *result = fdopen(fd, mode);
|
2016-05-04 06:18:24 +08:00
|
|
|
if (result == NULL) close(fd);
|
2012-03-02 16:27:40 +08:00
|
|
|
return result;
|
2005-09-20 21:26:39 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
bool set_cloexec(int fd) {
|
2012-03-02 16:27:40 +08:00
|
|
|
int flags = fcntl(fd, F_GETFD, 0);
|
2016-05-04 06:18:24 +08:00
|
|
|
if (flags < 0) {
|
2012-03-02 16:27:40 +08:00
|
|
|
return false;
|
2016-05-04 06:18:24 +08:00
|
|
|
} else if (flags & FD_CLOEXEC) {
|
2012-03-02 16:27:40 +08:00
|
|
|
return true;
|
2016-05-04 06:18:24 +08:00
|
|
|
} else {
|
2012-03-02 16:27:40 +08:00
|
|
|
return fcntl(fd, F_SETFD, flags | FD_CLOEXEC) >= 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
static int wopen_internal(const wcstring &pathname, int flags, mode_t mode, bool cloexec) {
|
2012-03-09 15:21:07 +08:00
|
|
|
ASSERT_IS_NOT_FORKED_CHILD();
|
2011-12-27 11:18:46 +08:00
|
|
|
cstring tmp = wcs2string(pathname);
|
2016-05-04 06:18:24 +08:00
|
|
|
// Prefer to use O_CLOEXEC. It has to both be defined and nonzero.
|
2012-03-03 01:58:29 +08:00
|
|
|
#ifdef O_CLOEXEC
|
2016-05-04 06:18:24 +08:00
|
|
|
if (cloexec && (O_CLOEXEC != 0)) {
|
2012-03-03 01:58:29 +08:00
|
|
|
flags |= O_CLOEXEC;
|
|
|
|
cloexec = false;
|
|
|
|
}
|
|
|
|
#endif
|
2012-03-02 16:27:40 +08:00
|
|
|
int fd = ::open(tmp.c_str(), flags, mode);
|
2016-05-04 06:18:24 +08:00
|
|
|
if (cloexec && fd >= 0 && !set_cloexec(fd)) {
|
2012-03-02 16:27:40 +08:00
|
|
|
close(fd);
|
|
|
|
fd = -1;
|
2011-12-27 11:18:46 +08:00
|
|
|
}
|
2012-03-02 16:27:40 +08:00
|
|
|
return fd;
|
|
|
|
}
|
2005-09-20 21:26:39 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
int wopen_cloexec(const wcstring &pathname, int flags, mode_t mode) {
|
2012-03-02 16:27:40 +08:00
|
|
|
return wopen_internal(pathname, flags, mode, true);
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
DIR *wopendir(const wcstring &name) {
|
2014-04-28 04:34:51 +08:00
|
|
|
const cstring tmp = wcs2string(name);
|
2011-12-27 11:18:46 +08:00
|
|
|
return opendir(tmp.c_str());
|
2005-09-20 21:26:39 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
int wstat(const wcstring &file_name, struct stat *buf) {
|
2014-04-28 04:34:51 +08:00
|
|
|
const cstring tmp = wcs2string(file_name);
|
2011-12-27 11:18:46 +08:00
|
|
|
return stat(tmp.c_str(), buf);
|
2005-09-20 21:26:39 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
int lwstat(const wcstring &file_name, struct stat *buf) {
|
2014-04-28 04:34:51 +08:00
|
|
|
const cstring tmp = wcs2string(file_name);
|
2011-12-27 11:18:46 +08:00
|
|
|
return lstat(tmp.c_str(), buf);
|
2005-09-20 21:26:39 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
int waccess(const wcstring &file_name, int mode) {
|
2014-04-28 04:34:51 +08:00
|
|
|
const cstring tmp = wcs2string(file_name);
|
2011-12-27 11:18:46 +08:00
|
|
|
return access(tmp.c_str(), mode);
|
2005-09-20 21:26:39 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
int wunlink(const wcstring &file_name) {
|
2014-04-28 04:34:51 +08:00
|
|
|
const cstring tmp = wcs2string(file_name);
|
2012-02-16 16:24:27 +08:00
|
|
|
return unlink(tmp.c_str());
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
void wperror(const wchar_t *s) {
|
2012-11-19 08:30:30 +08:00
|
|
|
int e = errno;
|
2016-05-04 06:18:24 +08:00
|
|
|
if (s[0] != L'\0') {
|
2014-04-28 04:34:51 +08:00
|
|
|
fwprintf(stderr, L"%ls: ", s);
|
2012-11-19 08:30:30 +08:00
|
|
|
}
|
|
|
|
fwprintf(stderr, L"%s\n", strerror(e));
|
2005-09-20 21:26:39 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
int make_fd_nonblocking(int fd) {
|
2013-04-08 03:40:08 +08:00
|
|
|
int flags = fcntl(fd, F_GETFL, 0);
|
|
|
|
int err = 0;
|
2016-05-04 06:18:24 +08:00
|
|
|
if (!(flags & O_NONBLOCK)) {
|
2013-04-08 03:40:08 +08:00
|
|
|
err = fcntl(fd, F_SETFL, flags | O_NONBLOCK);
|
|
|
|
}
|
|
|
|
return err == -1 ? errno : 0;
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
int make_fd_blocking(int fd) {
|
2013-04-08 03:40:08 +08:00
|
|
|
int flags = fcntl(fd, F_GETFL, 0);
|
|
|
|
int err = 0;
|
2016-05-04 06:18:24 +08:00
|
|
|
if (flags & O_NONBLOCK) {
|
2013-04-08 03:40:08 +08:00
|
|
|
err = fcntl(fd, F_SETFL, flags & ~O_NONBLOCK);
|
|
|
|
}
|
|
|
|
return err == -1 ? errno : 0;
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
static inline void safe_append(char *buffer, const char *s, size_t buffsize) {
|
2013-01-10 09:06:20 +08:00
|
|
|
strncat(buffer, s, buffsize - strlen(buffer) - 1);
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
// In general, strerror is not async-safe, and therefore we cannot use it directly. So instead we
|
|
|
|
// have to grub through sys_nerr and sys_errlist directly On GNU toolchain, this will produce a
|
|
|
|
// deprecation warning from the linker (!!), which appears impossible to suppress!
|
|
|
|
const char *safe_strerror(int err) {
|
2013-05-26 04:42:16 +08:00
|
|
|
#if defined(__UCLIBC__)
|
2016-05-04 06:18:24 +08:00
|
|
|
// uClibc does not have sys_errlist, however, its strerror is believed to be async-safe.
|
|
|
|
// See issue #808.
|
2013-05-26 04:42:16 +08:00
|
|
|
return strerror(err);
|
2014-12-08 08:43:38 +08:00
|
|
|
#elif defined(HAVE__SYS__ERRS) || defined(HAVE_SYS_ERRLIST)
|
|
|
|
#ifdef HAVE_SYS_ERRLIST
|
2016-05-04 06:18:24 +08:00
|
|
|
if (err >= 0 && err < sys_nerr && sys_errlist[err] != NULL) {
|
2013-01-10 09:06:20 +08:00
|
|
|
return sys_errlist[err];
|
|
|
|
}
|
2014-12-08 08:43:38 +08:00
|
|
|
#elif defined(HAVE__SYS__ERRS)
|
|
|
|
extern const char _sys_errs[];
|
|
|
|
extern const int _sys_index[];
|
|
|
|
extern int _sys_num_err;
|
|
|
|
|
|
|
|
if (err >= 0 && err < _sys_num_err) {
|
2016-05-04 06:18:24 +08:00
|
|
|
return &_sys_errs[_sys_index[err]];
|
2014-12-08 08:43:38 +08:00
|
|
|
}
|
2016-05-04 06:18:24 +08:00
|
|
|
#endif // either HAVE__SYS__ERRS or HAVE_SYS_ERRLIST
|
|
|
|
#endif // defined(HAVE__SYS__ERRS) || defined(HAVE_SYS_ERRLIST)
|
2013-01-13 04:55:23 +08:00
|
|
|
|
2016-05-05 06:19:47 +08:00
|
|
|
int saved_err = errno;
|
|
|
|
static char buff[384]; // use a shared buffer for this case
|
|
|
|
char errnum_buff[64];
|
|
|
|
format_long_safe(errnum_buff, err);
|
2013-01-13 04:55:23 +08:00
|
|
|
|
2016-05-05 06:19:47 +08:00
|
|
|
buff[0] = '\0';
|
|
|
|
safe_append(buff, "unknown error (errno was ", sizeof buff);
|
|
|
|
safe_append(buff, errnum_buff, sizeof buff);
|
|
|
|
safe_append(buff, ")", sizeof buff);
|
2013-01-13 04:55:23 +08:00
|
|
|
|
2016-05-05 06:19:47 +08:00
|
|
|
errno = saved_err;
|
|
|
|
return buff;
|
2013-01-10 09:06:20 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
void safe_perror(const char *message) {
|
|
|
|
// Note we cannot use strerror, because on Linux it uses gettext, which is not safe.
|
2013-01-10 09:06:20 +08:00
|
|
|
int err = errno;
|
2013-01-13 04:55:23 +08:00
|
|
|
|
2013-01-10 09:06:20 +08:00
|
|
|
char buff[384];
|
|
|
|
buff[0] = '\0';
|
2013-01-13 04:55:23 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
if (message) {
|
2013-01-10 09:06:20 +08:00
|
|
|
safe_append(buff, message, sizeof buff);
|
|
|
|
safe_append(buff, ": ", sizeof buff);
|
|
|
|
}
|
|
|
|
safe_append(buff, safe_strerror(err), sizeof buff);
|
|
|
|
safe_append(buff, "\n", sizeof buff);
|
2013-01-13 04:55:23 +08:00
|
|
|
|
2014-04-28 09:27:34 +08:00
|
|
|
write_ignore(STDERR_FILENO, buff, strlen(buff));
|
2013-01-10 09:06:20 +08:00
|
|
|
errno = err;
|
|
|
|
}
|
|
|
|
|
2006-02-02 23:23:56 +08:00
|
|
|
#ifdef HAVE_REALPATH_NULL
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
wchar_t *wrealpath(const wcstring &pathname, wchar_t *resolved_path) {
|
2012-12-20 05:31:06 +08:00
|
|
|
cstring narrow_path = wcs2string(pathname);
|
|
|
|
char *narrow_res = realpath(narrow_path.c_str(), NULL);
|
2012-11-19 08:30:30 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
if (!narrow_res) return NULL;
|
2012-11-19 08:30:30 +08:00
|
|
|
|
2012-12-20 05:31:06 +08:00
|
|
|
wchar_t *res;
|
|
|
|
wcstring wide_res = str2wcstring(narrow_res);
|
2016-05-04 06:18:24 +08:00
|
|
|
if (resolved_path) {
|
2012-12-20 05:31:06 +08:00
|
|
|
wcslcpy(resolved_path, wide_res.c_str(), PATH_MAX);
|
2012-11-19 08:30:30 +08:00
|
|
|
res = resolved_path;
|
2016-05-04 06:18:24 +08:00
|
|
|
} else {
|
2012-12-20 05:31:06 +08:00
|
|
|
res = wcsdup(wide_res.c_str());
|
2012-11-19 08:30:30 +08:00
|
|
|
}
|
|
|
|
|
2016-05-19 08:46:13 +08:00
|
|
|
#if __APPLE__ && __DARWIN_C_LEVEL < 200809L
|
2016-05-28 05:41:16 +08:00
|
|
|
// OS X Snow Leopard is broken with respect to the dynamically allocated buffer returned by
|
|
|
|
// realpath(). It's not dynamically allocated so attempting to free that buffer triggers a
|
|
|
|
// malloc/free error. Thus we don't attempt the free in this case.
|
2016-05-19 08:46:13 +08:00
|
|
|
#else
|
2012-11-19 08:30:30 +08:00
|
|
|
free(narrow_res);
|
2016-05-19 08:46:13 +08:00
|
|
|
#endif
|
2012-11-19 08:30:30 +08:00
|
|
|
|
|
|
|
return res;
|
2006-02-02 23:23:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
wchar_t *wrealpath(const wcstring &pathname, wchar_t *resolved_path) {
|
2011-12-27 11:18:46 +08:00
|
|
|
cstring tmp = wcs2string(pathname);
|
2012-11-19 08:30:30 +08:00
|
|
|
char narrow_buff[PATH_MAX];
|
|
|
|
char *narrow_res = realpath(tmp.c_str(), narrow_buff);
|
|
|
|
wchar_t *res;
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
if (!narrow_res) return 0;
|
2013-01-05 05:09:01 +08:00
|
|
|
|
2012-12-25 12:55:35 +08:00
|
|
|
const wcstring wide_res = str2wcstring(narrow_res);
|
2016-05-04 06:18:24 +08:00
|
|
|
if (resolved_path) {
|
2012-12-25 12:55:35 +08:00
|
|
|
wcslcpy(resolved_path, wide_res.c_str(), PATH_MAX);
|
2012-11-19 08:30:30 +08:00
|
|
|
res = resolved_path;
|
2016-05-04 06:18:24 +08:00
|
|
|
} else {
|
2012-12-25 12:55:35 +08:00
|
|
|
res = wcsdup(wide_res.c_str());
|
2012-11-19 08:30:30 +08:00
|
|
|
}
|
|
|
|
return res;
|
2006-02-02 23:23:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
2006-06-14 21:22:40 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
wcstring wdirname(const wcstring &path) {
|
2011-12-27 11:18:46 +08:00
|
|
|
char *tmp = wcs2str(path.c_str());
|
2012-11-19 08:30:30 +08:00
|
|
|
char *narrow_res = dirname(tmp);
|
2011-12-27 11:18:46 +08:00
|
|
|
wcstring result = format_string(L"%s", narrow_res);
|
|
|
|
free(tmp);
|
|
|
|
return result;
|
2006-06-14 21:22:40 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
wcstring wbasename(const wcstring &path) {
|
2011-12-27 11:18:46 +08:00
|
|
|
char *tmp = wcs2str(path.c_str());
|
2012-11-19 08:30:30 +08:00
|
|
|
char *narrow_res = basename(tmp);
|
2011-12-27 11:18:46 +08:00
|
|
|
wcstring result = format_string(L"%s", narrow_res);
|
|
|
|
free(tmp);
|
|
|
|
return result;
|
2006-06-14 21:22:40 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
// Really init wgettext.
|
|
|
|
static void wgettext_really_init() {
|
2012-02-25 04:13:35 +08:00
|
|
|
pthread_mutex_init(&wgettext_lock, NULL);
|
2013-04-09 01:20:56 +08:00
|
|
|
fish_bindtextdomain(PACKAGE_NAME, LOCALEDIR);
|
|
|
|
fish_textdomain(PACKAGE_NAME);
|
2006-07-20 06:55:49 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
/// For wgettext: Internal init function. Automatically called when a translation is first
|
|
|
|
/// requested.
|
|
|
|
static void wgettext_init_if_necessary() {
|
2012-02-18 07:55:54 +08:00
|
|
|
static pthread_once_t once = PTHREAD_ONCE_INIT;
|
|
|
|
pthread_once(&once, wgettext_really_init);
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
const wchar_t *wgettext(const wchar_t *in) {
|
|
|
|
if (!in) return in;
|
2012-11-18 18:23:22 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
// Preserve errno across this since this is often used in printing error messages.
|
2012-11-19 08:30:30 +08:00
|
|
|
int err = errno;
|
2012-11-18 18:23:22 +08:00
|
|
|
|
2012-02-18 07:55:54 +08:00
|
|
|
wgettext_init_if_necessary();
|
2012-11-18 18:23:22 +08:00
|
|
|
|
2012-11-19 08:30:30 +08:00
|
|
|
wcstring key = in;
|
2016-05-29 13:28:26 +08:00
|
|
|
scoped_lock lock(wgettext_lock); //!OCLINT(has side effects)
|
2012-11-18 18:23:22 +08:00
|
|
|
|
2016-03-19 06:14:16 +08:00
|
|
|
wcstring &val = wgettext_map[key];
|
2016-05-04 06:18:24 +08:00
|
|
|
if (val.empty()) {
|
2012-02-25 04:13:35 +08:00
|
|
|
cstring mbs_in = wcs2string(key);
|
2013-04-09 01:20:56 +08:00
|
|
|
char *out = fish_gettext(mbs_in.c_str());
|
2016-03-28 09:01:19 +08:00
|
|
|
val = format_string(L"%s", out);
|
2012-02-25 04:13:35 +08:00
|
|
|
}
|
2012-11-19 08:30:30 +08:00
|
|
|
errno = err;
|
2016-03-19 06:14:16 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
// The returned string is stored in the map.
|
|
|
|
// TODO: If we want to shrink the map, this would be a problem.
|
2016-03-19 06:14:16 +08:00
|
|
|
return val.c_str();
|
2006-07-20 06:55:49 +08:00
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
int wmkdir(const wcstring &name, int mode) {
|
2012-11-19 08:30:30 +08:00
|
|
|
cstring name_narrow = wcs2string(name);
|
|
|
|
return mkdir(name_narrow.c_str(), mode);
|
2006-09-08 22:11:28 +08:00
|
|
|
}
|
2006-10-21 06:33:47 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
int wrename(const wcstring &old, const wcstring &newv) {
|
2011-12-27 11:18:46 +08:00
|
|
|
cstring old_narrow = wcs2string(old);
|
2016-05-04 06:18:24 +08:00
|
|
|
cstring new_narrow = wcs2string(newv);
|
2012-11-19 08:30:30 +08:00
|
|
|
return rename(old_narrow.c_str(), new_narrow.c_str());
|
2006-10-21 06:33:47 +08:00
|
|
|
}
|
2012-08-05 02:07:42 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
int fish_wcstoi(const wchar_t *str, wchar_t **endptr, int base) {
|
2012-08-05 02:07:42 +08:00
|
|
|
long ret = wcstol(str, endptr, base);
|
2016-05-04 06:18:24 +08:00
|
|
|
if (ret > INT_MAX) {
|
2012-08-05 02:07:42 +08:00
|
|
|
ret = INT_MAX;
|
|
|
|
errno = ERANGE;
|
2016-05-04 06:18:24 +08:00
|
|
|
} else if (ret < INT_MIN) {
|
2012-08-05 02:07:42 +08:00
|
|
|
ret = INT_MIN;
|
|
|
|
errno = ERANGE;
|
|
|
|
}
|
|
|
|
return (int)ret;
|
|
|
|
}
|
2014-04-28 04:34:51 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
file_id_t file_id_t::file_id_from_stat(const struct stat *buf) {
|
2014-04-29 06:14:33 +08:00
|
|
|
assert(buf != NULL);
|
2016-05-04 06:18:24 +08:00
|
|
|
|
2014-04-29 06:14:33 +08:00
|
|
|
file_id_t result = {};
|
|
|
|
result.device = buf->st_dev;
|
|
|
|
result.inode = buf->st_ino;
|
|
|
|
result.size = buf->st_size;
|
|
|
|
result.change_seconds = buf->st_ctime;
|
Attempt to fix the sporadic uvar test failures on Linux
We identify when the universal variable file has changed out from under us by
comparing a bunch of fields from its stat: inode, device, size, high-precision
timestamp, generation. Linux aggressively reuses inodes, and the size may be
the same by coincidence (which is the case in the tests). Also, Linux
officially has nanosecond precision, but in practice it seems to only uses
millisecond precision for storing mtimes. Thus if there are three or more
updates within a millisecond, every field we check may be the same, and we are
vulnerable to the ABA problem. I believe this explains the occasional test
failures.
The solution is to manually set the nanosecond field of the mtime timestamp to
something unlikely to be duplicated, like a random number, or better yet, the
current time (with nanosecond precision). This is more in the spirit of the
timestamp, and it means we're around a million times less likely to collide.
This seems to fix the tests.
2015-11-09 15:48:32 +08:00
|
|
|
result.mod_seconds = buf->st_mtime;
|
2016-05-04 06:18:24 +08:00
|
|
|
|
2014-04-29 06:14:33 +08:00
|
|
|
#if STAT_HAVE_NSEC
|
|
|
|
result.change_nanoseconds = buf->st_ctime_nsec;
|
Attempt to fix the sporadic uvar test failures on Linux
We identify when the universal variable file has changed out from under us by
comparing a bunch of fields from its stat: inode, device, size, high-precision
timestamp, generation. Linux aggressively reuses inodes, and the size may be
the same by coincidence (which is the case in the tests). Also, Linux
officially has nanosecond precision, but in practice it seems to only uses
millisecond precision for storing mtimes. Thus if there are three or more
updates within a millisecond, every field we check may be the same, and we are
vulnerable to the ABA problem. I believe this explains the occasional test
failures.
The solution is to manually set the nanosecond field of the mtime timestamp to
something unlikely to be duplicated, like a random number, or better yet, the
current time (with nanosecond precision). This is more in the spirit of the
timestamp, and it means we're around a million times less likely to collide.
This seems to fix the tests.
2015-11-09 15:48:32 +08:00
|
|
|
result.mod_nanoseconds = buf->st_mtime_nsec;
|
2014-04-29 06:14:33 +08:00
|
|
|
#elif defined(__APPLE__)
|
|
|
|
result.change_nanoseconds = buf->st_ctimespec.tv_nsec;
|
Attempt to fix the sporadic uvar test failures on Linux
We identify when the universal variable file has changed out from under us by
comparing a bunch of fields from its stat: inode, device, size, high-precision
timestamp, generation. Linux aggressively reuses inodes, and the size may be
the same by coincidence (which is the case in the tests). Also, Linux
officially has nanosecond precision, but in practice it seems to only uses
millisecond precision for storing mtimes. Thus if there are three or more
updates within a millisecond, every field we check may be the same, and we are
vulnerable to the ABA problem. I believe this explains the occasional test
failures.
The solution is to manually set the nanosecond field of the mtime timestamp to
something unlikely to be duplicated, like a random number, or better yet, the
current time (with nanosecond precision). This is more in the spirit of the
timestamp, and it means we're around a million times less likely to collide.
This seems to fix the tests.
2015-11-09 15:48:32 +08:00
|
|
|
result.mod_nanoseconds = buf->st_mtimespec.tv_nsec;
|
2014-04-29 06:14:33 +08:00
|
|
|
#elif defined(_BSD_SOURCE) || defined(_SVID_SOURCE) || defined(_XOPEN_SOURCE)
|
|
|
|
result.change_nanoseconds = buf->st_ctim.tv_nsec;
|
Attempt to fix the sporadic uvar test failures on Linux
We identify when the universal variable file has changed out from under us by
comparing a bunch of fields from its stat: inode, device, size, high-precision
timestamp, generation. Linux aggressively reuses inodes, and the size may be
the same by coincidence (which is the case in the tests). Also, Linux
officially has nanosecond precision, but in practice it seems to only uses
millisecond precision for storing mtimes. Thus if there are three or more
updates within a millisecond, every field we check may be the same, and we are
vulnerable to the ABA problem. I believe this explains the occasional test
failures.
The solution is to manually set the nanosecond field of the mtime timestamp to
something unlikely to be duplicated, like a random number, or better yet, the
current time (with nanosecond precision). This is more in the spirit of the
timestamp, and it means we're around a million times less likely to collide.
This seems to fix the tests.
2015-11-09 15:48:32 +08:00
|
|
|
result.mod_nanoseconds = buf->st_mtim.tv_nsec;
|
2014-04-29 06:14:33 +08:00
|
|
|
#else
|
|
|
|
result.change_nanoseconds = 0;
|
Attempt to fix the sporadic uvar test failures on Linux
We identify when the universal variable file has changed out from under us by
comparing a bunch of fields from its stat: inode, device, size, high-precision
timestamp, generation. Linux aggressively reuses inodes, and the size may be
the same by coincidence (which is the case in the tests). Also, Linux
officially has nanosecond precision, but in practice it seems to only uses
millisecond precision for storing mtimes. Thus if there are three or more
updates within a millisecond, every field we check may be the same, and we are
vulnerable to the ABA problem. I believe this explains the occasional test
failures.
The solution is to manually set the nanosecond field of the mtime timestamp to
something unlikely to be duplicated, like a random number, or better yet, the
current time (with nanosecond precision). This is more in the spirit of the
timestamp, and it means we're around a million times less likely to collide.
This seems to fix the tests.
2015-11-09 15:48:32 +08:00
|
|
|
result.mod_nanoseconds = 0;
|
2014-04-29 06:14:33 +08:00
|
|
|
#endif
|
2016-05-04 06:18:24 +08:00
|
|
|
|
2014-04-29 06:14:33 +08:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
file_id_t file_id_for_fd(int fd) {
|
2014-04-28 04:34:51 +08:00
|
|
|
file_id_t result = kInvalidFileID;
|
|
|
|
struct stat buf = {};
|
2016-05-04 06:18:24 +08:00
|
|
|
if (0 == fstat(fd, &buf)) {
|
2014-04-29 06:14:33 +08:00
|
|
|
result = file_id_t::file_id_from_stat(&buf);
|
2014-04-28 04:34:51 +08:00
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
file_id_t file_id_for_path(const wcstring &path) {
|
2014-04-28 04:34:51 +08:00
|
|
|
file_id_t result = kInvalidFileID;
|
|
|
|
struct stat buf = {};
|
2016-05-04 06:18:24 +08:00
|
|
|
if (0 == wstat(path, &buf)) {
|
2014-04-29 06:14:33 +08:00
|
|
|
result = file_id_t::file_id_from_stat(&buf);
|
2014-04-28 04:34:51 +08:00
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
2014-04-29 06:14:33 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
bool file_id_t::operator==(const file_id_t &rhs) const { return this->compare_file_id(rhs) == 0; }
|
2014-04-29 06:14:33 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
bool file_id_t::operator!=(const file_id_t &rhs) const { return !(*this == rhs); }
|
2014-04-29 06:14:33 +08:00
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
template <typename T>
|
|
|
|
int compare(T a, T b) {
|
|
|
|
if (a < b) {
|
2014-04-29 06:14:33 +08:00
|
|
|
return -1;
|
2016-05-04 06:18:24 +08:00
|
|
|
} else if (a > b) {
|
2014-04-29 06:14:33 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
int file_id_t::compare_file_id(const file_id_t &rhs) const {
|
|
|
|
// Compare each field, stopping when we get to a non-equal field.
|
2014-04-29 06:14:33 +08:00
|
|
|
int ret = 0;
|
2016-05-04 06:18:24 +08:00
|
|
|
if (!ret) ret = compare(device, rhs.device);
|
|
|
|
if (!ret) ret = compare(inode, rhs.inode);
|
|
|
|
if (!ret) ret = compare(size, rhs.size);
|
|
|
|
if (!ret) ret = compare(change_seconds, rhs.change_seconds);
|
|
|
|
if (!ret) ret = compare(change_nanoseconds, rhs.change_nanoseconds);
|
|
|
|
if (!ret) ret = compare(mod_seconds, rhs.mod_seconds);
|
|
|
|
if (!ret) ret = compare(mod_nanoseconds, rhs.mod_nanoseconds);
|
Attempt to fix the sporadic uvar test failures on Linux
We identify when the universal variable file has changed out from under us by
comparing a bunch of fields from its stat: inode, device, size, high-precision
timestamp, generation. Linux aggressively reuses inodes, and the size may be
the same by coincidence (which is the case in the tests). Also, Linux
officially has nanosecond precision, but in practice it seems to only uses
millisecond precision for storing mtimes. Thus if there are three or more
updates within a millisecond, every field we check may be the same, and we are
vulnerable to the ABA problem. I believe this explains the occasional test
failures.
The solution is to manually set the nanosecond field of the mtime timestamp to
something unlikely to be duplicated, like a random number, or better yet, the
current time (with nanosecond precision). This is more in the spirit of the
timestamp, and it means we're around a million times less likely to collide.
This seems to fix the tests.
2015-11-09 15:48:32 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-05-04 06:18:24 +08:00
|
|
|
bool file_id_t::operator<(const file_id_t &rhs) const { return this->compare_file_id(rhs) < 0; }
|