/usr/share/perl5/Dpkg/Source/Functions.pm is in libdpkg-perl 1.19.0.5ubuntu2.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | # Copyright © 2008-2010, 2012-2015 Guillem Jover <guillem@debian.org>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <https://www.gnu.org/licenses/>.
package Dpkg::Source::Functions;
use strict;
use warnings;
our $VERSION = '0.01';
our @EXPORT_OK = qw(
erasedir
fixperms
fs_time
is_binary
);
use Exporter qw(import);
use Errno qw(ENOENT);
use Dpkg::ErrorHandling;
use Dpkg::Gettext;
use Dpkg::IPC;
sub erasedir {
my $dir = shift;
if (not lstat($dir)) {
return if $! == ENOENT;
syserr(g_('cannot stat directory %s (before removal)'), $dir);
}
system 'rm', '-rf', '--', $dir;
subprocerr("rm -rf $dir") if $?;
if (not stat($dir)) {
return if $! == ENOENT;
syserr(g_("unable to check for removal of directory '%s'"), $dir);
}
error(g_("rm -rf failed to remove '%s'"), $dir);
}
sub fixperms {
my $dir = shift;
my ($mode, $modes_set);
# Unfortunately tar insists on applying our umask _to the original
# permissions_ rather than mostly-ignoring the original
# permissions. We fix it up with chmod -R (which saves us some
# work) but we have to construct a u+/- string which is a bit
# of a palaver. (Numeric doesn't work because we need [ugo]+X
# and [ugo]=<stuff> doesn't work because that unsets sgid on dirs.)
$mode = 0777 & ~umask;
for my $i (0 .. 2) {
$modes_set .= ',' if $i;
$modes_set .= qw(u g o)[$i];
for my $j (0 .. 2) {
$modes_set .= $mode & (0400 >> ($i * 3 + $j)) ? '+' : '-';
$modes_set .= qw(r w X)[$j];
}
}
system('chmod', '-R', '--', $modes_set, $dir);
subprocerr("chmod -R -- $modes_set $dir") if $?;
}
# Touch the file and read the resulting mtime.
#
# If the file doesn't exist, create it, read the mtime and unlink it.
#
# Use this instead of time() when the timestamp is going to be
# used to set file timestamps. This avoids confusion when an
# NFS server and NFS client disagree about what time it is.
sub fs_time($) {
my $file = shift;
my $is_temp = 0;
if (not -e $file) {
open(my $temp_fh, '>', $file) or syserr(g_('cannot write %s'));
close($temp_fh);
$is_temp = 1;
} else {
utime(undef, undef, $file) or
syserr(g_('cannot change timestamp for %s'), $file);
}
stat($file) or syserr(g_('cannot read timestamp from %s'), $file);
my $mtime = (stat(_))[9];
unlink($file) if $is_temp;
return $mtime;
}
sub is_binary($) {
my $file = shift;
# TODO: might want to reimplement what diff does, aka checking if the
# file contains \0 in the first 4Kb of data
# Use diff to check if it's a binary file
my $diffgen;
my $diff_pid = spawn(
exec => [ 'diff', '-u', '--', '/dev/null', $file ],
env => { LC_ALL => 'C', LANG => 'C', TZ => 'UTC0' },
to_pipe => \$diffgen,
);
my $result = 0;
local $_;
while (<$diffgen>) {
if (m/^(?:binary|[^-+\@ ].*\bdiffer\b)/i) {
$result = 1;
last;
} elsif (m/^[-+\@ ]/) {
$result = 0;
last;
}
}
close($diffgen) or syserr('close on diff pipe');
wait_child($diff_pid, nocheck => 1, cmdline => "diff -u -- /dev/null $file");
return $result;
}
1;
|