acltext.c revision 9fb67ea305c66b6a297583b9b0db6796b0dfe497
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2010 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
/*LINTLIBRARY*/
#include <grp.h>
#include <pwd.h>
#include <string.h>
#include <limits.h>
#include <stdlib.h>
#include <errno.h>
#include <sys/param.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/acl.h>
#include <aclutils.h>
#include <idmap.h>
#include <synch.h>
#define ID_STR_MAX 20 /* digits in LONG_MAX */
#define APPENDED_ID_MAX ID_STR_MAX + 1 /* id + colon */
/*
* yyinteractive controls whether yyparse should print out
* error messages to stderr, and whether or not id's should be
* allowed from acl_fromtext().
*/
int yyinteractive;
acl_t *yyacl;
char *yybuf;
mutex_t yymutex;
extern acl_t *acl_alloc(enum acl_type);
/*
* dynamic string that will increase in size on an
* as needed basis.
*/
typedef struct dynaclstr {
size_t d_bufsize; /* current size of aclexport */
char *d_aclexport;
int d_pos;
} dynaclstr_t;
static int str_append(dynaclstr_t *, char *);
static int aclent_perm_txt(dynaclstr_t *, o_mode_t);
static void
aclent_perms(int perm, char *txt_perms)
{
if (perm & S_IROTH)
txt_perms[0] = 'r';
else
txt_perms[0] = '-';
if (perm & S_IWOTH)
txt_perms[1] = 'w';
else
txt_perms[1] = '-';
if (perm & S_IXOTH)
txt_perms[2] = 'x';
else
txt_perms[2] = '-';
txt_perms[3] = '\0';
}
static char *
pruname(uid_t uid, char *uidp, size_t buflen, int noresolve)
{
struct passwd *passwdp = NULL;
if (noresolve == 0)
passwdp = getpwuid(uid);
if (passwdp == (struct passwd *)NULL) {
/* could not get passwd information: display uid instead */
(void) snprintf(uidp, buflen, "%u", uid);
} else {
(void) strlcpy(uidp, passwdp->pw_name, buflen);
}
return (uidp);
}
static char *
prgname(gid_t gid, char *gidp, size_t buflen, int noresolve)
{
struct group *groupp = NULL;
if (noresolve == 0)
groupp = getgrgid(gid);
if (groupp == (struct group *)NULL) {
/* could not get group information: display gid instead */
(void) snprintf(gidp, buflen, "%u", gid);
} else {
(void) strlcpy(gidp, groupp->gr_name, buflen);
}
return (gidp);
}
static int
getsidname(uid_t who, boolean_t user, char **sidp, boolean_t noresolve)
{
idmap_handle_t *idmap_hdl = NULL;
idmap_get_handle_t *get_hdl = NULL;
idmap_stat status;
idmap_rid_t rid;
int error = IDMAP_ERR_NORESULT;
int len;
char *domain = NULL;
char *name = NULL;
*sidp = NULL;
/*
* First try and get windows name
*/
if (!noresolve) {
if (user)
error = idmap_getwinnamebyuid(who,
IDMAP_REQ_FLG_USE_CACHE, &name, &domain);
else
error = idmap_getwinnamebygid(who,
IDMAP_REQ_FLG_USE_CACHE, &name, &domain);
}
if (error != IDMAP_SUCCESS) {
if (idmap_init(&idmap_hdl) == IDMAP_SUCCESS &&
idmap_get_create(idmap_hdl, &get_hdl) == IDMAP_SUCCESS) {
if (user)
error = idmap_get_sidbyuid(get_hdl, who,
IDMAP_REQ_FLG_USE_CACHE, &domain, &rid,
&status);
else
error = idmap_get_sidbygid(get_hdl, who,
IDMAP_REQ_FLG_USE_CACHE, &domain, &rid,
&status);
if (error == IDMAP_SUCCESS &&
idmap_get_mappings(get_hdl) == 0) {
if (status == IDMAP_SUCCESS) {
len = snprintf(NULL, 0,
"%s-%d", domain, rid);
if (*sidp = malloc(len + 1)) {
(void) snprintf(*sidp, len + 1,
"%s-%d", domain, rid);
}
}
}
}
if (get_hdl)
idmap_get_destroy(get_hdl);
if (idmap_hdl)
(void) idmap_fini(idmap_hdl);
} else {
int len;
len = snprintf(NULL, 0, "%s@%s", name, domain);
if (*sidp = malloc(len + 1))
(void) snprintf(*sidp, len + 1, "%s@%s", name, domain);
}
if (name)
free(name);
if (domain)
free(domain);
return (*sidp ? 0 : 1);
}
static void
aclent_printacl(acl_t *aclp)
{
aclent_t *tp;
int aclcnt;
int mask;
int slot = 0;
char perm[4];
char uidp[ID_STR_MAX];
char gidp[ID_STR_MAX];
/* display ACL: assume it is sorted. */
aclcnt = aclp->acl_cnt;
for (tp = aclp->acl_aclp; tp && aclcnt--; tp++) {
if (tp->a_type == CLASS_OBJ)
mask = tp->a_perm;
}
aclcnt = aclp->acl_cnt;
for (tp = aclp->acl_aclp; aclcnt--; tp++) {
(void) printf(" %d:", slot++);
switch (tp->a_type) {
case USER:
aclent_perms(tp->a_perm, perm);
(void) printf("user:%s:%s\t\t",
pruname(tp->a_id, uidp, sizeof (uidp), 0), perm);
aclent_perms((tp->a_perm & mask), perm);
(void) printf("#effective:%s\n", perm);
break;
case USER_OBJ:
/* no need to display uid */
aclent_perms(tp->a_perm, perm);
(void) printf("user::%s\n", perm);
break;
case GROUP:
aclent_perms(tp->a_perm, perm);
(void) printf("group:%s:%s\t\t",
prgname(tp->a_id, gidp, sizeof (gidp), 0), perm);
aclent_perms(tp->a_perm & mask, perm);
(void) printf("#effective:%s\n", perm);
break;
case GROUP_OBJ:
aclent_perms(tp->a_perm, perm);
(void) printf("group::%s\t\t", perm);
aclent_perms(tp->a_perm & mask, perm);
(void) printf("#effective:%s\n", perm);
break;
case CLASS_OBJ:
aclent_perms(tp->a_perm, perm);
(void) printf("mask:%s\n", perm);
break;
case OTHER_OBJ:
aclent_perms(tp->a_perm, perm);
(void) printf("other:%s\n", perm);
break;
case DEF_USER:
aclent_perms(tp->a_perm, perm);
(void) printf("default:user:%s:%s\n",
pruname(tp->a_id, uidp, sizeof (uidp), 0), perm);
break;
case DEF_USER_OBJ:
aclent_perms(tp->a_perm, perm);
(void) printf("default:user::%s\n", perm);
break;
case DEF_GROUP:
aclent_perms(tp->a_perm, perm);
(void) printf("default:group:%s:%s\n",
prgname(tp->a_id, gidp, sizeof (gidp), 0), perm);
break;
case DEF_GROUP_OBJ:
aclent_perms(tp->a_perm, perm);
(void) printf("default:group::%s\n", perm);
break;
case DEF_CLASS_OBJ:
aclent_perms(tp->a_perm, perm);
(void) printf("default:mask:%s\n", perm);
break;
case DEF_OTHER_OBJ:
aclent_perms(tp->a_perm, perm);
(void) printf("default:other:%s\n", perm);
break;
default:
(void) fprintf(stderr,
dgettext(TEXT_DOMAIN, "unrecognized entry\n"));
break;
}
}
}
static void
split_line(char *str, int cols)
{
char *ptr;
int len;
int i;
int last_split;
char *pad = "";
int pad_len;
len = strlen(str);
ptr = str;
pad_len = 0;
ptr = str;
last_split = 0;
for (i = 0; i != len; i++) {
if ((i + pad_len + 4) >= cols) {
(void) printf("%s%.*s\n", pad, last_split, ptr);
ptr = &ptr[last_split];
len = strlen(ptr);
i = 0;
pad_len = 4;
pad = " ";
} else {
if (ptr[i] == '/' || ptr[i] == ':') {
last_split = i;
}
}
}
if (i == len) {
(void) printf("%s%s\n", pad, ptr);
}
}
/*
* compute entry type string, such as user:joe, group:staff,...
*/
static int
aclent_type_txt(dynaclstr_t *dstr, aclent_t *aclp, int flags)
{
char idp[ID_STR_MAX];
int error;
switch (aclp->a_type) {
case DEF_USER_OBJ:
case USER_OBJ:
if (aclp->a_type == USER_OBJ)
error = str_append(dstr, "user::");
else
error = str_append(dstr, "defaultuser::");
break;
case DEF_USER:
case USER:
if (aclp->a_type == USER)
error = str_append(dstr, "user:");
else
error = str_append(dstr, "defaultuser:");
if (error)
break;
error = str_append(dstr, pruname(aclp->a_id, idp,
sizeof (idp), flags & ACL_NORESOLVE));
if (error == 0)
error = str_append(dstr, ":");
break;
case DEF_GROUP_OBJ:
case GROUP_OBJ:
if (aclp->a_type == GROUP_OBJ)
error = str_append(dstr, "group::");
else
error = str_append(dstr, "defaultgroup::");
break;
case DEF_GROUP:
case GROUP:
if (aclp->a_type == GROUP)
error = str_append(dstr, "group:");
else
error = str_append(dstr, "defaultgroup:");
if (error)
break;
error = str_append(dstr, prgname(aclp->a_id, idp,
sizeof (idp), flags & ACL_NORESOLVE));
if (error == 0)
error = str_append(dstr, ":");
break;
case DEF_CLASS_OBJ:
case CLASS_OBJ:
if (aclp->a_type == CLASS_OBJ)
error = str_append(dstr, "mask:");
else
error = str_append(dstr, "defaultmask:");
break;
case DEF_OTHER_OBJ:
case OTHER_OBJ:
if (aclp->a_type == OTHER_OBJ)
error = str_append(dstr, "other:");
else
error = str_append(dstr, "defaultother:");
break;
default:
error = 1;
break;
}
return (error);
}
/*
* compute entry type string such as, owner@:, user:joe, group:staff,...
*/
static int
ace_type_txt(dynaclstr_t *dynstr, ace_t *acep, int flags)
{
char idp[ID_STR_MAX];
int error;
char *sidp = NULL;
switch (acep->a_flags & ACE_TYPE_FLAGS) {
case ACE_OWNER:
error = str_append(dynstr, OWNERAT_TXT);
break;
case ACE_GROUP|ACE_IDENTIFIER_GROUP:
error = str_append(dynstr, GROUPAT_TXT);
break;
case ACE_IDENTIFIER_GROUP:
if ((flags & ACL_SID_FMT) && acep->a_who > MAXUID) {
if (error = str_append(dynstr,
GROUPSID_TXT))
break;
if (error = getsidname(acep->a_who, B_FALSE,
&sidp, flags & ACL_NORESOLVE))
break;
error = str_append(dynstr, sidp);
} else {
if (error = str_append(dynstr, GROUP_TXT))
break;
error = str_append(dynstr, prgname(acep->a_who, idp,
sizeof (idp), flags & ACL_NORESOLVE));
}
if (error == 0)
error = str_append(dynstr, ":");
break;
case ACE_EVERYONE:
error = str_append(dynstr, EVERYONEAT_TXT);
break;
case 0:
if ((flags & ACL_SID_FMT) && acep->a_who > MAXUID) {
if (error = str_append(dynstr, USERSID_TXT))
break;
if (error = getsidname(acep->a_who, B_TRUE,
&sidp, flags & ACL_NORESOLVE))
break;
error = str_append(dynstr, sidp);
} else {
if (error = str_append(dynstr, USER_TXT))
break;
error = str_append(dynstr, pruname(acep->a_who, idp,
sizeof (idp), flags & ACL_NORESOLVE));
}
if (error == 0)
error = str_append(dynstr, ":");
break;
default:
error = 0;
break;
}
if (sidp)
free(sidp);
return (error);
}
/*
* compute string of permissions, such as read_data/write_data or
* rwxp,...
* The format depends on the flags field which indicates whether the compact
* or verbose format should be used.
*/
static int
ace_perm_txt(dynaclstr_t *dstr, uint32_t mask,
uint32_t iflags, int isdir, int flags)
{
int error = 0;
if (flags & ACL_COMPACT_FMT) {
char buf[16];
if (mask & ACE_READ_DATA)
buf[0] = 'r';
else
buf[0] = '-';
if (mask & ACE_WRITE_DATA)
buf[1] = 'w';
else
buf[1] = '-';
if (mask & ACE_EXECUTE)
buf[2] = 'x';
else
buf[2] = '-';
if (mask & ACE_APPEND_DATA)
buf[3] = 'p';
else
buf[3] = '-';
if (mask & ACE_DELETE)
buf[4] = 'd';
else
buf[4] = '-';
if (mask & ACE_DELETE_CHILD)
buf[5] = 'D';
else
buf[5] = '-';
if (mask & ACE_READ_ATTRIBUTES)
buf[6] = 'a';
else
buf[6] = '-';
if (mask & ACE_WRITE_ATTRIBUTES)
buf[7] = 'A';
else
buf[7] = '-';
if (mask & ACE_READ_NAMED_ATTRS)
buf[8] = 'R';
else
buf[8] = '-';
if (mask & ACE_WRITE_NAMED_ATTRS)
buf[9] = 'W';
else
buf[9] = '-';
if (mask & ACE_READ_ACL)
buf[10] = 'c';
else
buf[10] = '-';
if (mask & ACE_WRITE_ACL)
buf[11] = 'C';
else
buf[11] = '-';
if (mask & ACE_WRITE_OWNER)
buf[12] = 'o';
else
buf[12] = '-';
if (mask & ACE_SYNCHRONIZE)
buf[13] = 's';
else
buf[13] = '-';
buf[14] = ':';
buf[15] = '\0';
error = str_append(dstr, buf);
} else {
/*
* If ACE is a directory, but inheritance indicates its
* for a file then print permissions for file rather than
* dir.
*/
if (isdir) {
if (mask & ACE_LIST_DIRECTORY) {
if (iflags == ACE_FILE_INHERIT_ACE) {
error = str_append(dstr,
READ_DATA_TXT);
} else {
error =
str_append(dstr, READ_DIR_TXT);
}
}
if (error == 0 && (mask & ACE_ADD_FILE)) {
if (iflags == ACE_FILE_INHERIT_ACE) {
error =
str_append(dstr, WRITE_DATA_TXT);
} else {
error =
str_append(dstr, ADD_FILE_TXT);
}
}
if (error == 0 && (mask & ACE_ADD_SUBDIRECTORY)) {
if (iflags == ACE_FILE_INHERIT_ACE) {
error = str_append(dstr,
APPEND_DATA_TXT);
} else {
error = str_append(dstr,
ADD_DIR_TXT);
}
}
} else {
if (mask & ACE_READ_DATA) {
error = str_append(dstr, READ_DATA_TXT);
}
if (error == 0 && (mask & ACE_WRITE_DATA)) {
error = str_append(dstr, WRITE_DATA_TXT);
}
if (error == 0 && (mask & ACE_APPEND_DATA)) {
error = str_append(dstr, APPEND_DATA_TXT);
}
}
if (error == 0 && (mask & ACE_READ_NAMED_ATTRS)) {
error = str_append(dstr, READ_XATTR_TXT);
}
if (error == 0 && (mask & ACE_WRITE_NAMED_ATTRS)) {
error = str_append(dstr, WRITE_XATTR_TXT);
}
if (error == 0 && (mask & ACE_EXECUTE)) {
error = str_append(dstr, EXECUTE_TXT);
}
if (error == 0 && (mask & ACE_DELETE_CHILD)) {
error = str_append(dstr, DELETE_CHILD_TXT);
}
if (error == 0 && (mask & ACE_READ_ATTRIBUTES)) {
error = str_append(dstr, READ_ATTRIBUTES_TXT);
}
if (error == 0 && (mask & ACE_WRITE_ATTRIBUTES)) {
error = str_append(dstr, WRITE_ATTRIBUTES_TXT);
}
if (error == 0 && (mask & ACE_DELETE)) {
error = str_append(dstr, DELETE_TXT);
}
if (error == 0 && (mask & ACE_READ_ACL)) {
error = str_append(dstr, READ_ACL_TXT);
}
if (error == 0 && (mask & ACE_WRITE_ACL)) {
error = str_append(dstr, WRITE_ACL_TXT);
}
if (error == 0 && (mask & ACE_WRITE_OWNER)) {
error = str_append(dstr, WRITE_OWNER_TXT);
}
if (error == 0 && (mask & ACE_SYNCHRONIZE)) {
error = str_append(dstr, SYNCHRONIZE_TXT);
}
if (error == 0 && dstr->d_aclexport[dstr->d_pos-1] == '/') {
dstr->d_aclexport[--dstr->d_pos] = '\0';
}
if (error == 0)
error = str_append(dstr, ":");
}
return (error);
}
/*
* compute string of access type, such as allow, deny, ...
*/
static int
ace_access_txt(dynaclstr_t *dstr, int type)
{
int error;
if (type == ACE_ACCESS_ALLOWED_ACE_TYPE)
error = str_append(dstr, ALLOW_TXT);
else if (type == ACE_ACCESS_DENIED_ACE_TYPE)
error = str_append(dstr, DENY_TXT);
else if (type == ACE_SYSTEM_AUDIT_ACE_TYPE)
error = str_append(dstr, AUDIT_TXT);
else if (type == ACE_SYSTEM_ALARM_ACE_TYPE)
error = str_append(dstr, ALARM_TXT);
else
error = str_append(dstr, UNKNOWN_TXT);
return (error);
}
static int
ace_inherit_txt(dynaclstr_t *dstr, uint32_t iflags, int flags)
{
int error = 0;
if (flags & ACL_COMPACT_FMT) {
char buf[9];
if (iflags & ACE_FILE_INHERIT_ACE)
buf[0] = 'f';
else
buf[0] = '-';
if (iflags & ACE_DIRECTORY_INHERIT_ACE)
buf[1] = 'd';
else
buf[1] = '-';
if (iflags & ACE_INHERIT_ONLY_ACE)
buf[2] = 'i';
else
buf[2] = '-';
if (iflags & ACE_NO_PROPAGATE_INHERIT_ACE)
buf[3] = 'n';
else
buf[3] = '-';
if (iflags & ACE_SUCCESSFUL_ACCESS_ACE_FLAG)
buf[4] = 'S';
else
buf[4] = '-';
if (iflags & ACE_FAILED_ACCESS_ACE_FLAG)
buf[5] = 'F';
else
buf[5] = '-';
if (iflags & ACE_INHERITED_ACE)
buf[6] = 'I';
else
buf[6] = '-';
buf[7] = ':';
buf[8] = '\0';
error = str_append(dstr, buf);
} else {
if (iflags & ACE_FILE_INHERIT_ACE) {
error = str_append(dstr, FILE_INHERIT_TXT);
}
if (error == 0 && (iflags & ACE_DIRECTORY_INHERIT_ACE)) {
error = str_append(dstr, DIR_INHERIT_TXT);
}
if (error == 0 && (iflags & ACE_NO_PROPAGATE_INHERIT_ACE)) {
error = str_append(dstr, NO_PROPAGATE_TXT);
}
if (error == 0 && (iflags & ACE_INHERIT_ONLY_ACE)) {
error = str_append(dstr, INHERIT_ONLY_TXT);
}
if (error == 0 && (iflags & ACE_SUCCESSFUL_ACCESS_ACE_FLAG)) {
error = str_append(dstr, SUCCESSFUL_ACCESS_TXT);
}
if (error == 0 && (iflags & ACE_FAILED_ACCESS_ACE_FLAG)) {
error = str_append(dstr, FAILED_ACCESS_TXT);
}
if (error == 0 && (iflags & ACE_INHERITED_ACE)) {
error = str_append(dstr, INHERITED_ACE_TXT);
}
if (error == 0 && dstr->d_aclexport[dstr->d_pos-1] == '/') {
dstr->d_aclexport[--dstr->d_pos] = '\0';
error = str_append(dstr, ":");
}
}
return (error);
}
/*
* Convert internal acl representation to external representation.
*
* The length of a non-owning user name or non-owning group name ie entries
* of type DEF_USER, USER, DEF_GROUP or GROUP, can exceed LOGNAME_MAX. We
* thus check the length of these entries, and if greater than LOGNAME_MAX,
* we realloc() via increase_length().
*
* The LOGNAME_MAX, ENTRYTYPELEN and PERMS limits are otherwise always
* adhered to.
*/
/*
* acltotext() converts each ACL entry to look like this:
*
* entry_type:uid^gid^name:perms[:id]
*
* The maximum length of entry_type is 14 ("defaultgroup::" and
* "defaultother::") hence ENTRYTYPELEN is set to 14.
*
* The max length of a uid^gid^name entry (in theory) is 8, hence we use,
* however the ID could be a number so we therefore use ID_STR_MAX
*
* The length of a perms entry is 4 to allow for the comma appended to each
* to each acl entry. Hence PERMS is set to 4.
*/
#define ENTRYTYPELEN 14
#define PERMS 4
#define ACL_ENTRY_SIZE (ENTRYTYPELEN + ID_STR_MAX + PERMS + APPENDED_ID_MAX)
char *
aclent_acltotext(aclent_t *aclp, int aclcnt, int flags)
{
dynaclstr_t *dstr;
char *aclexport = NULL;
int i;
int error = 0;
if (aclp == NULL)
return (NULL);
if ((dstr = malloc(sizeof (dynaclstr_t))) == NULL)
return (NULL);
dstr->d_bufsize = aclcnt * ACL_ENTRY_SIZE;
if ((dstr->d_aclexport = malloc(dstr->d_bufsize)) == NULL) {
free(dstr);
return (NULL);
}
*dstr->d_aclexport = '\0';
dstr->d_pos = 0;
for (i = 0; i < aclcnt; i++, aclp++) {
if (error = aclent_type_txt(dstr, aclp, flags))
break;
if (error = aclent_perm_txt(dstr, aclp->a_perm))
break;
if ((flags & ACL_APPEND_ID) && ((aclp->a_type == USER) ||
(aclp->a_type == DEF_USER) || (aclp->a_type == GROUP) ||
(aclp->a_type == DEF_GROUP))) {
char id[ID_STR_MAX], *idstr;
if (error = str_append(dstr, ":"))
break;
id[ID_STR_MAX - 1] = '\0'; /* null terminate buffer */
idstr = lltostr(aclp->a_id, &id[ID_STR_MAX - 1]);
if (error = str_append(dstr, idstr))
break;
}
if (i < aclcnt - 1)
if (error = str_append(dstr, ","))
break;
}
if (error) {
if (dstr->d_aclexport)
free(dstr->d_aclexport);
} else {
aclexport = dstr->d_aclexport;
}
free(dstr);
return (aclexport);
}
char *
acltotext(aclent_t *aclp, int aclcnt)
{
return (aclent_acltotext(aclp, aclcnt, 0));
}
aclent_t *
aclfromtext(char *aclstr, int *aclcnt)
{
acl_t *aclp;
aclent_t *aclentp;
int error;
error = acl_fromtext(aclstr, &aclp);
if (error)
return (NULL);
aclentp = aclp->acl_aclp;
aclp->acl_aclp = NULL;
*aclcnt = aclp->acl_cnt;
acl_free(aclp);
return (aclentp);
}
/*
* Append string onto dynaclstr_t.
*
* Return 0 on success, 1 for failure.
*/
static int
str_append(dynaclstr_t *dstr, char *newstr)
{
size_t len = strlen(newstr);
if ((len + dstr->d_pos) >= dstr->d_bufsize) {
dstr->d_aclexport = realloc(dstr->d_aclexport,
dstr->d_bufsize + len + 1);
if (dstr->d_aclexport == NULL)
return (1);
dstr->d_bufsize += len;
}
(void) strcat(&dstr->d_aclexport[dstr->d_pos], newstr);
dstr->d_pos += len;
return (0);
}
static int
aclent_perm_txt(dynaclstr_t *dstr, o_mode_t perm)
{
char buf[4];
if (perm & S_IROTH)
buf[0] = 'r';
else
buf[0] = '-';
if (perm & S_IWOTH)
buf[1] = 'w';
else
buf[1] = '-';
if (perm & S_IXOTH)
buf[2] = 'x';
else
buf[2] = '-';
buf[3] = '\0';
return (str_append(dstr, buf));
}
/*
* ace_acltotext() convert each ace formatted acl to look like this:
*
* entry_type:uid^gid^name:perms[:flags]:<allow|deny>[:id][,]
*
* The maximum length of entry_type is 5 ("group")
*
* The max length of a uid^gid^name entry (in theory) is 8,
* however id could be a number so we therefore use ID_STR_MAX
*
* The length of a perms entry is 144 i.e read_data/write_data...
* to each acl entry.
*
* iflags: file_inherit/dir_inherit/inherit_only/no_propagate/successful_access
* /failed_access
*
*/
#define ACE_ENTRYTYPLEN 6
#define IFLAGS_STR "file_inherit/dir_inherit/inherit_only/no_propagate/" \
"successful_access/failed_access/inherited"
#define IFLAGS_SIZE (sizeof (IFLAGS_STR) - 1)
#define ACCESS_TYPE_SIZE 7 /* if unknown */
#define COLON_CNT 3
#define PERMS_LEN 216
#define ACE_ENTRY_SIZE (ACE_ENTRYTYPLEN + ID_STR_MAX + PERMS_LEN + \
ACCESS_TYPE_SIZE + IFLAGS_SIZE + COLON_CNT + APPENDED_ID_MAX)
static char *
ace_acltotext(acl_t *aceaclp, int flags)
{
ace_t *aclp = aceaclp->acl_aclp;
int aclcnt = aceaclp->acl_cnt;
int i;
int error = 0;
int isdir = (aceaclp->acl_flags & ACL_IS_DIR);
dynaclstr_t *dstr;
char *aclexport = NULL;
char *rawsidp = NULL;
if (aclp == NULL)
return (NULL);
if ((dstr = malloc(sizeof (dynaclstr_t))) == NULL)
return (NULL);
dstr->d_bufsize = aclcnt * ACL_ENTRY_SIZE;
if ((dstr->d_aclexport = malloc(dstr->d_bufsize)) == NULL) {
free(dstr);
return (NULL);
}
*dstr->d_aclexport = '\0';
dstr->d_pos = 0;
for (i = 0; i < aclcnt; i++, aclp++) {
if (error = ace_type_txt(dstr, aclp, flags))
break;
if (error = ace_perm_txt(dstr, aclp->a_access_mask,
aclp->a_flags, isdir, flags))
break;
if (error = ace_inherit_txt(dstr, aclp->a_flags, flags))
break;
if (error = ace_access_txt(dstr, aclp->a_type))
break;
if ((flags & ACL_APPEND_ID) &&
(((aclp->a_flags & ACE_TYPE_FLAGS) == 0) ||
((aclp->a_flags & ACE_TYPE_FLAGS) ==
ACE_IDENTIFIER_GROUP))) {
char id[ID_STR_MAX], *idstr;
if (error = str_append(dstr, ":"))
break;
rawsidp = NULL;
id[ID_STR_MAX -1] = '\0'; /* null terminate */
if (aclp->a_who > MAXUID && (flags & ACL_SID_FMT)) {
error = getsidname(aclp->a_who,
((aclp->a_flags & ACE_TYPE_FLAGS) == 0) ?
B_TRUE : B_FALSE, &idstr, 1);
rawsidp = idstr;
if (error)
break;
} else if (aclp->a_who > MAXUID &&
!(flags & ACL_NORESOLVE)) {
idstr = lltostr(UID_NOBODY,
&id[ID_STR_MAX - 1]);
} else {
idstr = lltostr(aclp->a_who,
&id[ID_STR_MAX - 1]);
}
if (error = str_append(dstr, idstr))
break;
if (rawsidp) {
free(rawsidp);
rawsidp = NULL;
}
}
if (i < aclcnt - 1) {
if (error = str_append(dstr, ","))
break;
}
}
if (rawsidp)
free(rawsidp);
if (error) {
if (dstr->d_aclexport)
free(dstr->d_aclexport);
} else {
aclexport = dstr->d_aclexport;
}
free(dstr);
return (aclexport);
}
char *
acl_totext(acl_t *aclp, int flags)
{
char *txtp;
if (aclp == NULL)
return (NULL);
switch (aclp->acl_type) {
case ACE_T:
txtp = ace_acltotext(aclp, flags);
break;
case ACLENT_T:
txtp = aclent_acltotext(aclp->acl_aclp, aclp->acl_cnt, flags);
break;
}
return (txtp);
}
int
acl_fromtext(const char *acltextp, acl_t **ret_aclp)
{
int error;
char *buf;
buf = malloc(strlen(acltextp) + 2);
if (buf == NULL)
return (EACL_MEM_ERROR);
strcpy(buf, acltextp);
strcat(buf, "\n");
(void) mutex_lock(&yymutex);
yybuf = buf;
yyreset();
error = yyparse();
free(buf);
if (yyacl) {
if (error == 0)
*ret_aclp = yyacl;
else {
acl_free(yyacl);
}
yyacl = NULL;
}
(void) mutex_unlock(&yymutex);
return (error);
}
int
acl_parse(const char *acltextp, acl_t **aclp)
{
int error;
yyinteractive = 1;
error = acl_fromtext(acltextp, aclp);
yyinteractive = 0;
return (error);
}
static void
ace_compact_printacl(acl_t *aclp)
{
int cnt;
ace_t *acep;
dynaclstr_t *dstr;
int len;
if ((dstr = malloc(sizeof (dynaclstr_t))) == NULL)
return;
dstr->d_bufsize = ACE_ENTRY_SIZE;
if ((dstr->d_aclexport = malloc(dstr->d_bufsize)) == NULL) {
free(dstr);
return;
}
*dstr->d_aclexport = '\0';
dstr->d_pos = 0;
for (cnt = 0, acep = aclp->acl_aclp;
cnt != aclp->acl_cnt; cnt++, acep++) {
dstr->d_aclexport[0] = '\0';
dstr->d_pos = 0;
if (ace_type_txt(dstr, acep, 0))
break;
len = strlen(&dstr->d_aclexport[0]);
if (ace_perm_txt(dstr, acep->a_access_mask, acep->a_flags,
aclp->acl_flags & ACL_IS_DIR, ACL_COMPACT_FMT))
break;
if (ace_inherit_txt(dstr, acep->a_flags, ACL_COMPACT_FMT))
break;
if (ace_access_txt(dstr, acep->a_type) == -1)
break;
(void) printf(" %20.*s%s\n", len, dstr->d_aclexport,
&dstr->d_aclexport[len]);
}
if (dstr->d_aclexport)
free(dstr->d_aclexport);
free(dstr);
}
static void
ace_printacl(acl_t *aclp, int cols, int compact)
{
int slot = 0;
char *token;
char *acltext;
if (compact) {
ace_compact_printacl(aclp);
return;
}
acltext = acl_totext(aclp, 0);
if (acltext == NULL)
return;
token = strtok(acltext, ",");
if (token == NULL) {
free(acltext);
return;
}
do {
(void) printf(" %d:", slot++);
split_line(token, cols - 5);
} while (token = strtok(NULL, ","));
free(acltext);
}
/*
* pretty print an ACL.
* For aclent_t ACL's the format is
* similar to the old format used by getfacl,
* with the addition of adding a "slot" number
* before each entry.
*
* for ace_t ACL's the cols variable will break up
* the long lines into multiple lines and will also
* print a "slot" number.
*/
void
acl_printacl(acl_t *aclp, int cols, int compact)
{
switch (aclp->acl_type) {
case ACLENT_T:
aclent_printacl(aclp);
break;
case ACE_T:
ace_printacl(aclp, cols, compact);
break;
}
}
typedef struct value_table {
char p_letter; /* perm letter such as 'r' */
uint32_t p_value; /* value for perm when pletter found */
} value_table_t;
/*
* The permission tables are laid out in positional order
* a '-' character will indicate a permission at a given
* position is not specified. The '-' is not part of the
* table, but will be checked for in the permission computation
* routine.
*/
value_table_t ace_perm_table[] = {
{ 'r', ACE_READ_DATA},
{ 'w', ACE_WRITE_DATA},
{ 'x', ACE_EXECUTE},
{ 'p', ACE_APPEND_DATA},
{ 'd', ACE_DELETE},
{ 'D', ACE_DELETE_CHILD},
{ 'a', ACE_READ_ATTRIBUTES},
{ 'A', ACE_WRITE_ATTRIBUTES},
{ 'R', ACE_READ_NAMED_ATTRS},
{ 'W', ACE_WRITE_NAMED_ATTRS},
{ 'c', ACE_READ_ACL},
{ 'C', ACE_WRITE_ACL},
{ 'o', ACE_WRITE_OWNER},
{ 's', ACE_SYNCHRONIZE}
};
#define ACE_PERM_COUNT (sizeof (ace_perm_table) / sizeof (value_table_t))
value_table_t aclent_perm_table[] = {
{ 'r', S_IROTH},
{ 'w', S_IWOTH},
{ 'x', S_IXOTH}
};
#define ACLENT_PERM_COUNT (sizeof (aclent_perm_table) / sizeof (value_table_t))
value_table_t inherit_table[] = {
{'f', ACE_FILE_INHERIT_ACE},
{'d', ACE_DIRECTORY_INHERIT_ACE},
{'i', ACE_INHERIT_ONLY_ACE},
{'n', ACE_NO_PROPAGATE_INHERIT_ACE},
{'S', ACE_SUCCESSFUL_ACCESS_ACE_FLAG},
{'F', ACE_FAILED_ACCESS_ACE_FLAG},
{'I', ACE_INHERITED_ACE}
};
#define IFLAG_COUNT (sizeof (inherit_table) / sizeof (value_table_t))
#define IFLAG_COUNT_V1 6 /* Older version compatibility */
/*
* compute value from a permission table or inheritance table
* based on string passed in. If positional is set then
* string must match order in permtab, otherwise any order
* is allowed.
*/
int
compute_values(value_table_t *permtab, int count,
char *permstr, int positional, uint32_t *mask)
{
uint32_t perm_val = 0;
char *pstr;
int i, found;
if (count < 0)
return (1);
if (positional) {
for (i = 0, pstr = permstr; i != count && pstr &&
*pstr; i++, pstr++) {
if (*pstr == permtab[i].p_letter) {
perm_val |= permtab[i].p_value;
} else if (*pstr != '-') {
return (1);
}
}
} else { /* random order single letters with no '-' */
for (pstr = permstr; pstr && *pstr; pstr++) {
for (found = 0, i = 0; i != count; i++) {
if (*pstr == permtab[i].p_letter) {
perm_val |= permtab[i].p_value;
found = 1;
break;
}
}
if (found == 0)
return (1);
}
}
*mask = perm_val;
return (0);
}
int
ace_inherit_helper(char *str, uint32_t *imask, int table_length)
{
int rc = 0;
if (strlen(str) == table_length) {
/*
* If the string == table_length then first check to see it's
* in positional format. If that fails then see if it's in
* non-positional format.
*/
if (compute_values(inherit_table, table_length, str,
1, imask) && compute_values(inherit_table,
table_length, str, 0, imask)) {
rc = 1;
}
} else {
rc = compute_values(inherit_table, table_length, str, 0, imask);
}
return (rc ? EACL_INHERIT_ERROR : 0);
}
/*
* compute value for inheritance flags.
*/
int
compute_ace_inherit(char *str, uint32_t *imask)
{
int rc = 0;
rc = ace_inherit_helper(str, imask, IFLAG_COUNT);
if (rc && strlen(str) != IFLAG_COUNT) {
/* is it an old formatted inherit string? */
rc = ace_inherit_helper(str, imask, IFLAG_COUNT_V1);
}
return (rc);
}
/*
* compute value for ACE permissions.
*/
int
compute_ace_perms(char *str, uint32_t *mask)
{
int positional = 0;
int error;
if (strlen(str) == ACE_PERM_COUNT)
positional = 1;
error = compute_values(ace_perm_table, ACE_PERM_COUNT,
str, positional, mask);
if (error && positional) {
/*
* If positional was set, then make sure permissions
* aren't actually valid in non positional case where
* all permissions are specified, just in random order.
*/
error = compute_values(ace_perm_table,
ACE_PERM_COUNT, str, 0, mask);
}
if (error)
error = EACL_PERM_MASK_ERROR;
return (error);
}
/*
* compute values for aclent permissions.
*/
int
compute_aclent_perms(char *str, o_mode_t *mask)
{
int error;
uint32_t pmask;
if (strlen(str) != ACLENT_PERM_COUNT)
return (EACL_PERM_MASK_ERROR);
*mask = 0;
error = compute_values(aclent_perm_table, ACLENT_PERM_COUNT,
str, 1, &pmask);
if (error == 0) {
*mask = (o_mode_t)pmask;
} else
error = EACL_PERM_MASK_ERROR;
return (error);
}
/*
* determine ACE permissions.
*/
int
ace_perm_mask(struct acl_perm_type *aclperm, uint32_t *mask)
{
int error;
if (aclperm->perm_style == PERM_TYPE_EMPTY) {
*mask = 0;
return (0);
}
if (aclperm->perm_style == PERM_TYPE_ACE) {
*mask = aclperm->perm_val;
return (0);
}
error = compute_ace_perms(aclperm->perm_str, mask);
if (error) {
acl_error(dgettext(TEXT_DOMAIN,
"Invalid permission(s) '%s' specified\n"),
aclperm->perm_str);
return (EACL_PERM_MASK_ERROR);
}
return (0);
}