blob: 2258399da258772913db0fb68d485e95c744837c [file] [log] [blame]
// Class filesystem::directory_entry etc. -*- C++ -*-
// Copyright (C) 2014-2022 Free Software Foundation, Inc.
//
// This file is part of the GNU ISO C++ Library. This library is free
// software; you can redistribute it and/or modify it under the
// terms of the GNU General Public License as published by the
// Free Software Foundation; either version 3, or (at your option)
// any later version.
// This library is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// Under Section 7 of GPL version 3, you are granted additional
// permissions described in the GCC Runtime Library Exception, version
// 3.1, as published by the Free Software Foundation.
// You should have received a copy of the GNU General Public License and
// a copy of the GCC Runtime Library Exception along with this program;
// see the files COPYING3 and COPYING.RUNTIME respectively. If not, see
// <http://www.gnu.org/licenses/>.
#ifndef _GLIBCXX_USE_CXX11_ABI
# define _GLIBCXX_USE_CXX11_ABI 1
#endif
#include <bits/largefile-config.h>
#include <filesystem>
#include <utility>
#include <stack>
#include <string.h>
#include <errno.h>
#define _GLIBCXX_BEGIN_NAMESPACE_FILESYSTEM namespace filesystem {
#define _GLIBCXX_END_NAMESPACE_FILESYSTEM }
#include "../filesystem/dir-common.h"
namespace fs = std::filesystem;
namespace posix = std::filesystem::__gnu_posix;
template class std::__shared_ptr<fs::_Dir>;
template class std::__shared_ptr<fs::recursive_directory_iterator::_Dir_stack>;
struct fs::_Dir : _Dir_base
{
_Dir(const fs::path& p, bool skip_permission_denied, bool nofollow,
[[maybe_unused]] bool filename_only, error_code& ec)
: _Dir_base(p.c_str(), skip_permission_denied, nofollow, ec)
{
#if _GLIBCXX_HAVE_DIRFD && _GLIBCXX_HAVE_OPENAT && _GLIBCXX_HAVE_UNLINKAT
if (filename_only)
return; // Do not store path p when we aren't going to use it.
#endif
if (!ec)
path = p;
}
_Dir(_Dir_base&& d, const path& p) : _Dir_base(std::move(d)), path(p) { }
_Dir(_Dir&&) = default;
// Returns false when the end of the directory entries is reached.
// Reports errors by setting ec.
bool advance(bool skip_permission_denied, error_code& ec) noexcept
{
if (const auto entp = _Dir_base::advance(skip_permission_denied, ec))
{
auto name = path;
name /= entp->d_name;
file_type type = file_type::none;
#ifdef _GLIBCXX_HAVE_STRUCT_DIRENT_D_TYPE
// Even if the OS supports dirent::d_type the filesystem might not:
if (entp->d_type != DT_UNKNOWN)
type = get_file_type(*entp);
#endif
entry = fs::directory_entry{std::move(name), type};
return true;
}
else if (!ec)
{
// reached the end
entry = {};
}
return false;
}
bool advance(error_code& ec) noexcept { return advance(false, ec); }
// Returns false when the end of the directory entries is reached.
// Reports errors by throwing.
bool advance(bool skip_permission_denied = false)
{
error_code ec;
const bool ok = advance(skip_permission_denied, ec);
if (ec)
_GLIBCXX_THROW_OR_ABORT(filesystem_error(
"directory iterator cannot advance", ec));
return ok;
}
bool should_recurse(bool follow_symlink, error_code& ec) const
{
file_type type = entry._M_type;
if (type == file_type::none)
{
type = entry.symlink_status(ec).type();
if (ec)
return false;
}
if (type == file_type::directory)
return true;
if (type == file_type::symlink)
return follow_symlink && is_directory(entry.status(ec));
return false;
}
// Return a pathname for the current directory entry, as an _At_path.
_Dir_base::_At_path
current() const noexcept
{
const fs::path& p = entry.path();
#if _GLIBCXX_HAVE_DIRFD
if (!p.empty()) [[__likely__]]
{
auto len = std::prev(p.end())->native().size();
return {::dirfd(this->dirp), p.c_str(), p.native().size() - len};
}
#endif
return p.c_str();
}
// Create a new _Dir for the directory this->entry.path().
_Dir
open_subdir(bool skip_permission_denied, bool nofollow,
error_code& ec) const noexcept
{
_Dir_base d(current(), skip_permission_denied, nofollow, ec);
// If this->path is empty, the new _Dir should have an empty path too.
const fs::path& p = this->path.empty() ? this->path : this->entry.path();
return _Dir(std::move(d), p);
}
bool
do_unlink(bool is_directory, error_code& ec) const noexcept
{
#if _GLIBCXX_HAVE_UNLINKAT
const auto atp = current();
if (::unlinkat(atp.dir(), atp.path_at_dir(),
is_directory ? AT_REMOVEDIR : 0) == -1)
{
ec.assign(errno, std::generic_category());
return false;
}
else
{
ec.clear();
return true;
}
#else
return fs::remove(entry.path(), ec);
#endif
}
// Remove the non-directory that this->entry refers to.
bool
unlink(error_code& ec) const noexcept
{ return do_unlink(/* is_directory*/ false, ec); }
// Remove the directory that this->entry refers to.
bool
rmdir(error_code& ec) const noexcept
{ return do_unlink(/* is_directory*/ true, ec); }
fs::path path; // Empty if only using unlinkat with file descr.
directory_entry entry;
};
namespace
{
template<typename Bitmask>
inline bool
is_set(Bitmask obj, Bitmask bits)
{
return (obj & bits) != Bitmask::none;
}
// Non-standard directory option flags, currently only for internal use:
//
// Do not allow directory iterator to open a symlink.
// This might seem redundant given directory_options::follow_directory_symlink
// but that is only checked for recursing into sub-directories, and we need
// something that controls the initial opendir() call in the constructor.
constexpr fs::directory_options __directory_iterator_nofollow{64};
// Do not store full paths in std::filesystem::recursive_directory_iterator.
// When fs::remove_all uses recursive_directory_iterator::__erase and unlinkat
// is available in libc, we do not need the parent directory's path, only the
// filenames of the directory entries (and a file descriptor for the parent).
// This flag avoids allocating memory for full paths that won't be needed.
constexpr fs::directory_options __directory_iterator_filename_only{128};
}
fs::directory_iterator::
directory_iterator(const path& p, directory_options options, error_code* ecptr)
{
// Do not report an error for permission denied errors.
const bool skip_permission_denied
= is_set(options, directory_options::skip_permission_denied);
// Do not allow opening a symlink.
const bool nofollow = is_set(options, __directory_iterator_nofollow);
error_code ec;
_Dir dir(p, skip_permission_denied, nofollow, /*filename only*/false, ec);
if (dir.dirp)
{
auto sp = std::__make_shared<fs::_Dir>(std::move(dir));
if (sp->advance(skip_permission_denied, ec))
_M_dir.swap(sp);
}
if (ecptr)
*ecptr = ec;
else if (ec)
_GLIBCXX_THROW_OR_ABORT(fs::filesystem_error(
"directory iterator cannot open directory", p, ec));
}
const fs::directory_entry&
fs::directory_iterator::operator*() const noexcept
{
return _M_dir->entry;
}
fs::directory_iterator&
fs::directory_iterator::operator++()
{
if (!_M_dir)
_GLIBCXX_THROW_OR_ABORT(filesystem_error(
"cannot advance non-dereferenceable directory iterator",
std::make_error_code(errc::invalid_argument)));
if (!_M_dir->advance())
_M_dir.reset();
return *this;
}
fs::directory_iterator&
fs::directory_iterator::increment(error_code& ec)
{
if (!_M_dir)
{
ec = std::make_error_code(errc::invalid_argument);
return *this;
}
if (!_M_dir->advance(ec))
_M_dir.reset();
return *this;
}
struct fs::recursive_directory_iterator::_Dir_stack : std::stack<_Dir>
{
_Dir_stack(directory_options opts, _Dir&& dir)
: options(opts), pending(true)
{
this->push(std::move(dir));
}
path::string_type orig;
const directory_options options;
bool pending;
void clear() { c.clear(); }
path current_path() const
{
path p;
if (top().path.empty())
{
// Reconstruct path that failed from dir stack.
p = orig;
for (auto& d : this->c)
p /= d.entry.path();
}
else
p = top().entry.path();
return p;
}
};
fs::recursive_directory_iterator::
recursive_directory_iterator(const path& p, directory_options options,
error_code* ecptr)
{
// Do not report an error for permission denied errors.
const bool skip_permission_denied
= is_set(options, directory_options::skip_permission_denied);
// Do not allow opening a symlink as the starting directory.
const bool nofollow = is_set(options, __directory_iterator_nofollow);
// Prefer to store only filenames (not full paths) in directory_entry values.
const bool filename_only
= is_set(options, __directory_iterator_filename_only);
error_code ec;
_Dir dir(p, skip_permission_denied, nofollow, filename_only, ec);
if (dir.dirp)
{
auto sp = std::__make_shared<_Dir_stack>(options, std::move(dir));
if (ecptr ? sp->top().advance(skip_permission_denied, *ecptr)
: sp->top().advance(skip_permission_denied))
{
_M_dirs.swap(sp);
if (filename_only) // Need to save original path for error reporting.
_M_dirs->orig = p.native();
}
}
else if (ecptr)
*ecptr = ec;
else if (ec)
_GLIBCXX_THROW_OR_ABORT(fs::filesystem_error(
"recursive directory iterator cannot open directory", p, ec));
}
fs::recursive_directory_iterator::~recursive_directory_iterator() = default;
fs::directory_options
fs::recursive_directory_iterator::options() const noexcept
{
return _M_dirs->options;
}
int
fs::recursive_directory_iterator::depth() const noexcept
{
return int(_M_dirs->size()) - 1;
}
bool
fs::recursive_directory_iterator::recursion_pending() const noexcept
{
return _M_dirs->pending;
}
const fs::directory_entry&
fs::recursive_directory_iterator::operator*() const noexcept
{
return _M_dirs->top().entry;
}
fs::recursive_directory_iterator&
fs::recursive_directory_iterator::
operator=(const recursive_directory_iterator& other) noexcept = default;
fs::recursive_directory_iterator&
fs::recursive_directory_iterator::
operator=(recursive_directory_iterator&& other) noexcept = default;
fs::recursive_directory_iterator&
fs::recursive_directory_iterator::operator++()
{
error_code ec;
increment(ec);
if (ec)
_GLIBCXX_THROW_OR_ABORT(filesystem_error(
"cannot increment recursive directory iterator", ec));
return *this;
}
fs::recursive_directory_iterator&
fs::recursive_directory_iterator::increment(error_code& ec)
{
if (!_M_dirs)
{
ec = std::make_error_code(errc::invalid_argument);
return *this;
}
const bool follow
= is_set(_M_dirs->options, directory_options::follow_directory_symlink);
const bool skip_permission_denied
= is_set(_M_dirs->options, directory_options::skip_permission_denied);
auto& top = _M_dirs->top();
if (std::exchange(_M_dirs->pending, true) && top.should_recurse(follow, ec))
{
_Dir dir = top.open_subdir(skip_permission_denied, !follow, ec);
if (ec)
{
_M_dirs.reset();
return *this;
}
if (dir.dirp)
_M_dirs->push(std::move(dir));
}
while (!_M_dirs->top().advance(skip_permission_denied, ec) && !ec)
{
_M_dirs->pop();
if (_M_dirs->empty())
{
_M_dirs.reset();
return *this;
}
}
if (ec)
_M_dirs.reset();
return *this;
}
void
fs::recursive_directory_iterator::pop(error_code& ec)
{
if (!_M_dirs)
{
ec = std::make_error_code(errc::invalid_argument);
return;
}
const bool skip_permission_denied
= is_set(_M_dirs->options, directory_options::skip_permission_denied);
do {
_M_dirs->pop();
if (_M_dirs->empty())
{
_M_dirs.reset();
ec.clear();
return;
}
} while (!_M_dirs->top().advance(skip_permission_denied, ec) && !ec);
if (ec)
_M_dirs.reset();
}
void
fs::recursive_directory_iterator::pop()
{
[[maybe_unused]] const bool dereferenceable = _M_dirs != nullptr;
error_code ec;
pop(ec);
if (ec)
_GLIBCXX_THROW_OR_ABORT(filesystem_error(dereferenceable
? "recursive directory iterator cannot pop"
: "non-dereferenceable recursive directory iterator cannot pop",
ec));
}
void
fs::recursive_directory_iterator::disable_recursion_pending() noexcept
{
_M_dirs->pending = false;
}
// Used to implement filesystem::remove_all.
fs::recursive_directory_iterator&
fs::recursive_directory_iterator::__erase(error_code* ecptr)
{
error_code ec;
if (!_M_dirs)
{
ec = std::make_error_code(errc::invalid_argument);
return *this;
}
// We never want to skip permission denied when removing files.
const bool skip_permission_denied = false;
// We never want to follow directory symlinks when removing files.
const bool nofollow = true;
// Loop until we find something we can remove.
while (!ec)
{
auto& top = _M_dirs->top();
#if _GLIBCXX_FILESYSTEM_IS_WINDOWS
// _Dir::unlink uses fs::remove which uses std::system_category() for
// Windows errror codes, so we can't just check for EPERM and EISDIR.
// Use directory_entry::refresh() here to check if we have a directory.
// This can be a TOCTTOU race, but we don't have openat or unlinkat to
// solve that on Windows, and generally don't support symlinks anyway.
if (top.entry._M_type == file_type::none)
top.entry.refresh();
#endif
if (top.entry._M_type == file_type::directory)
{
_Dir dir = top.open_subdir(skip_permission_denied, nofollow, ec);
if (!ec)
{
__glibcxx_assert(dir.dirp != nullptr);
if (dir.advance(skip_permission_denied, ec))
{
// Non-empty directory, recurse into it.
_M_dirs->push(std::move(dir));
continue;
}
if (!ec)
{
// Directory is empty so we can remove it.
if (top.rmdir(ec))
break; // Success
}
}
}
else if (top.unlink(ec))
break; // Success
#if ! _GLIBCXX_FILESYSTEM_IS_WINDOWS
else if (top.entry._M_type == file_type::none)
{
// We did not have a cached type, so it's possible that top.entry
// is actually a directory, and that's why the unlink above failed.
#ifdef EPERM
// POSIX.1-2017 says unlink on a directory returns EPERM,
// but LSB allows EISDIR too. Some targets don't even define EPERM.
if (ec.value() == EPERM || ec.value() == EISDIR)
#else
if (ec.value() == EISDIR)
#endif
{
// Retry, treating it as a directory.
top.entry._M_type = file_type::directory;
ec.clear();
continue;
}
}
#endif
}
if (!ec)
{
// We successfully removed the current entry, so advance to the next one.
if (_M_dirs->top().advance(skip_permission_denied, ec))
return *this;
else if (!ec)
{
// Reached the end of the current directory.
_M_dirs->pop();
if (_M_dirs->empty())
_M_dirs.reset();
return *this;
}
}
// Reset _M_dirs to empty.
auto dirs = std::move(_M_dirs);
// Need to report an error
if (ecptr)
*ecptr = ec;
else
_GLIBCXX_THROW_OR_ABORT(fs::filesystem_error("cannot remove all",
dirs->orig,
dirs->current_path(),
ec));
return *this;
}