int main(int argc, char **argv) { int ch, help = 0; while ((ch = getopt_long(argc, argv, "+d:", base_opts, NULL)) != -1) { switch (ch) { case 'd': btpd_dir = optarg; break; case 'H': help = 1; break; default: usage(); } } argc -= optind; argv += optind; if (btpd_dir == NULL) if ((btpd_dir = find_btpd_dir()) == NULL) diemsg("cannot find the btpd directory.\n"); if (argc == 0) { cmd_list(argc, argv); cmd_stat(argc, argv); return 0; } optind = 0; int found = 0; for (int i = 0; !found && i < ARRAY_COUNT(cmd_table); i++) { if (strcmp(argv[0], cmd_table[i].name) == 0) { found = 1; if (help) cmd_table[i].help(); else cmd_table[i].fun(argc, argv); } } if (!found) usage(); return 0; }
static int do_cmd(int cmd, int argc, const char *argv[]) { switch (cmd) { case CMD_INTERACTIVE: case CMD_UNKNOWN: return cmd_loop(argc, argv); break; case CMD_CD: return cmd_cd(argv[0]); break; case CMD_PWD: return cmd_pwd(); break; case CMD_LS: return cmd_ls(argc, argv); break; case CMD_MKDIR: return cmd_mkdir(argc, argv); break; case CMD_LN: return cmd_ln(argc, argv); break; case CMD_RM: return cmd_rm(argc, argv); break; case CMD_MV: return cmd_mv(argc, argv); break; case CMD_CP: return cmd_cp(argc, argv); break; case CMD_CAT: return cmd_cat(argc, argv); break; case CMD_STAT: return cmd_stat(argc, argv); break; case CMD_QUIT: exit(EXIT_SUCCESS); break; default: return -1; break; } }
void parse_input(char *cmd) { if(strcmp("ps", cmd) == 0) { cmd_ps(); } else if (strcmp("lsdev", cmd) == 0) { cmd_lsdev(); } else if (strncmp("ls ", cmd, 3) == 0) { cmd_ls(cmd + 3); } else if (strcmp("exit", cmd) == 0) { cmd_exit(); } else if (strcmp("testmt", cmd) == 0) { cmd_testmt(); } else if (strncmp("cat ", cmd, 4) == 0) { cmd_cat(cmd + 4); } else if (strncmp("stat ", cmd, 5) == 0) { cmd_stat(cmd + 5); } else if (strncmp("elf ", cmd, 4) == 0) { cmd_elf(cmd + 4); } }
int start(int ac, char *av[]) { if(ac < 3) { usage(); return 0; } char *cmd = av[1]; ac-=2; av+=2; if(strncmp(cmd,"type",5)==0) return cmd_type(ac, av); if(strncmp(cmd,"dir",4)==0) return cmd_dir(ac, av); if(strncmp(cmd,"stat",5)==0) return cmd_stat(ac, av); if(strncmp(cmd,"exec",5)==0) return cmd_exec(ac, av); usage(); return 0; }
int main(int ac, char **av) { const char *sel_path = NULL; const char *uuid_str = NULL; const char *arg; int pfs_type = HAMMER2_PFSTYPE_NONE; int all_opt = 0; int ecode = 0; int ch; srandomdev(); signal(SIGPIPE, SIG_IGN); dmsg_crypto_setup(); /* * Core options */ while ((ch = getopt(ac, av, "adfrqs:t:u:v")) != -1) { switch(ch) { case 'a': all_opt = 1; break; case 'd': DebugOpt = 1; break; case 'f': ForceOpt = 1; break; case 'r': RecurseOpt = 1; break; case 's': sel_path = optarg; break; case 't': /* * set node type for mkpfs */ if (strcasecmp(optarg, "ADMIN") == 0) { pfs_type = HAMMER2_PFSTYPE_ADMIN; } else if (strcasecmp(optarg, "CACHE") == 0) { pfs_type = HAMMER2_PFSTYPE_CACHE; } else if (strcasecmp(optarg, "COPY") == 0) { pfs_type = HAMMER2_PFSTYPE_COPY; } else if (strcasecmp(optarg, "SLAVE") == 0) { pfs_type = HAMMER2_PFSTYPE_SLAVE; } else if (strcasecmp(optarg, "SOFT_SLAVE") == 0) { pfs_type = HAMMER2_PFSTYPE_SOFT_SLAVE; } else if (strcasecmp(optarg, "SOFT_MASTER") == 0) { pfs_type = HAMMER2_PFSTYPE_SOFT_MASTER; } else if (strcasecmp(optarg, "MASTER") == 0) { pfs_type = HAMMER2_PFSTYPE_MASTER; } else { fprintf(stderr, "-t: Unrecognized node type\n"); usage(1); } break; case 'u': /* * set uuid for mkpfs, else one will be generated * (required for all except the MASTER node_type) */ uuid_str = optarg; break; case 'v': if (QuietOpt) --QuietOpt; else ++VerboseOpt; break; case 'q': if (VerboseOpt) --VerboseOpt; else ++QuietOpt; break; default: fprintf(stderr, "Unknown option: %c\n", ch); usage(1); /* not reached */ break; } } /* * Adjust, then process the command */ ac -= optind; av += optind; if (ac < 1) { fprintf(stderr, "Missing command\n"); usage(1); /* not reached */ } if (strcmp(av[0], "connect") == 0) { /* * Add cluster connection */ if (ac < 2) { fprintf(stderr, "connect: missing argument\n"); usage(1); } ecode = cmd_remote_connect(sel_path, av[1]); } else if (strcmp(av[0], "chaindump") == 0) { if (ac < 2) ecode = cmd_chaindump("."); else ecode = cmd_chaindump(av[1]); } else if (strcmp(av[0], "debugspan") == 0) { /* * Debug connection to the target hammer2 service and run * the CONN/SPAN protocol. */ if (ac < 2) { fprintf(stderr, "debugspan: requires hostname\n"); usage(1); } ecode = cmd_debugspan(av[1]); } else if (strcmp(av[0], "disconnect") == 0) { /* * Remove cluster connection */ if (ac < 2) { fprintf(stderr, "disconnect: missing argument\n"); usage(1); } ecode = cmd_remote_disconnect(sel_path, av[1]); } else if (strcmp(av[0], "hash") == 0) { ecode = cmd_hash(ac - 1, (const char **)(void *)&av[1]); } else if (strcmp(av[0], "status") == 0) { /* * Get status of PFS and its connections (-a for all PFSs) */ ecode = cmd_remote_status(sel_path, all_opt); } else if (strcmp(av[0], "pfs-clid") == 0) { /* * Print cluster id (uuid) for specific PFS */ if (ac < 2) { fprintf(stderr, "pfs-clid: requires name\n"); usage(1); } ecode = cmd_pfs_getid(sel_path, av[1], 0); } else if (strcmp(av[0], "pfs-fsid") == 0) { /* * Print private id (uuid) for specific PFS */ if (ac < 2) { fprintf(stderr, "pfs-fsid: requires name\n"); usage(1); } ecode = cmd_pfs_getid(sel_path, av[1], 1); } else if (strcmp(av[0], "pfs-list") == 0) { /* * List all PFSs */ ecode = cmd_pfs_list(sel_path); } else if (strcmp(av[0], "pfs-create") == 0) { /* * Create new PFS using pfs_type */ if (ac < 2) { fprintf(stderr, "pfs-create: requires name\n"); usage(1); } ecode = cmd_pfs_create(sel_path, av[1], pfs_type, uuid_str); } else if (strcmp(av[0], "pfs-delete") == 0) { /* * Delete a PFS by name */ if (ac < 2) { fprintf(stderr, "pfs-delete: requires name\n"); usage(1); } ecode = cmd_pfs_delete(sel_path, av[1]); } else if (strcmp(av[0], "snapshot") == 0) { /* * Create snapshot with optional pfs-type and optional * label override. */ if (ac > 2) { fprintf(stderr, "pfs-snapshot: too many arguments\n"); usage(1); } if (ac != 2) ecode = cmd_pfs_snapshot(sel_path, NULL); else ecode = cmd_pfs_snapshot(sel_path, av[1]); } else if (strcmp(av[0], "service") == 0) { /* * Start the service daemon. This daemon accepts * connections from local and remote clients, handles * the security handshake, and manages the core messaging * protocol. */ ecode = cmd_service(); } else if (strcmp(av[0], "stat") == 0) { ecode = cmd_stat(ac - 1, (const char **)(void *)&av[1]); } else if (strcmp(av[0], "leaf") == 0) { /* * Start the management daemon for a specific PFS. * * This will typically connect to the local master node * daemon, register the PFS, and then pass its side of * the socket descriptor to the kernel HAMMER2 VFS via an * ioctl(). The process and/or thread context remains in the * kernel until the PFS is unmounted or the connection is * lost, then returns from the ioctl. * * It is possible to connect directly to a remote master node * instead of the local master node in situations where * encryption is not desired or no local master node is * desired. This is not recommended because it represents * a single point of failure for the PFS's communications. * * Direct kernel<->kernel communication between HAMMER2 VFSs * is theoretically possible for directly-connected * registrations (i.e. where the spanning tree is degenerate), * but not recommended. We specifically try to reduce the * complexity of the HAMMER2 VFS kernel code. */ ecode = cmd_leaf(sel_path); } else if (strcmp(av[0], "shell") == 0) { /* * Connect to the command line monitor in the hammer2 master * node for the machine using HAMMER2_DBG_SHELL messages. */ ecode = cmd_shell((ac < 2) ? NULL : av[1]); } else if (strcmp(av[0], "rsainit") == 0) { /* * Initialize a RSA keypair. If no target directory is * specified we default to "/etc/hammer2". */ arg = (ac < 2) ? HAMMER2_DEFAULT_DIR : av[1]; ecode = cmd_rsainit(arg); } else if (strcmp(av[0], "rsaenc") == 0) { /* * Encrypt the input symmetrically by running it through * the specified public and/or private key files. * * If no key files are specified data is encoded using * "/etc/hammer2/rsa.pub". * * WARNING: no padding is added, data stream must contain * random padding for this to be secure. * * Used for debugging only */ if (ac == 1) { const char *rsapath = HAMMER2_DEFAULT_DIR "/rsa.pub"; ecode = cmd_rsaenc(&rsapath, 1); } else { ecode = cmd_rsaenc((const char **)(void *)&av[1], ac - 1); } } else if (strcmp(av[0], "rsadec") == 0) { /* * Decrypt the input symmetrically by running it through * the specified public and/or private key files. * * If no key files are specified data is decoded using * "/etc/hammer2/rsa.prv". * * WARNING: no padding is added, data stream must contain * random padding for this to be secure. * * Used for debugging only */ if (ac == 1) { const char *rsapath = HAMMER2_DEFAULT_DIR "/rsa.prv"; ecode = cmd_rsadec(&rsapath, 1); } else { ecode = cmd_rsadec((const char **)(void *)&av[1], ac - 1); } } else if (strcmp(av[0], "show") == 0) { /* * Raw dump of filesystem. Use -v to check all crc's, and * -vv to dump bulk file data. */ if (ac != 2) { fprintf(stderr, "show: requires device path\n"); usage(1); } else { cmd_show(av[1], 0); } } else if (strcmp(av[0], "freemap") == 0) { /* * Raw dump of freemap. Use -v to check all crc's, and * -vv to dump bulk file data. */ if (ac != 2) { fprintf(stderr, "freemap: requires device path\n"); usage(1); } else { cmd_show(av[1], 1); } } else if (strcmp(av[0], "setcomp") == 0) { if (ac < 3) { /* * Missing compression method and at least one * path. */ fprintf(stderr, "setcomp: requires compression method and" "directory/file path\n"); usage(1); } else { /* * Multiple paths may be specified */ ecode = cmd_setcomp(av[1], &av[2]); } } else if (strcmp(av[0], "printinode") == 0) { if (ac != 2) { fprintf(stderr, "printinode: requires directory/file path\n"); usage(1); } else print_inode(av[1]); } else { fprintf(stderr, "Unrecognized command: %s\n", av[0]); usage(1); } /* * In DebugMode we may wind up starting several pthreads in the * original process, in which case we have to let them run and * not actually exit. */ if (NormalExit) { return (ecode); } else { pthread_exit(NULL); _exit(2); /* NOT REACHED */ } }