1*9aa2a9c3Schristos /* $NetBSD: mask.c,v 1.1 2020/05/16 18:31:45 christos Exp $ */
2*9aa2a9c3Schristos
3*9aa2a9c3Schristos /*-
4*9aa2a9c3Schristos * Copyright (c) 2001-2002 Chris D. Faulhaber
5*9aa2a9c3Schristos * All rights reserved.
6*9aa2a9c3Schristos *
7*9aa2a9c3Schristos * Redistribution and use in source and binary forms, with or without
8*9aa2a9c3Schristos * modification, are permitted provided that the following conditions
9*9aa2a9c3Schristos * are met:
10*9aa2a9c3Schristos * 1. Redistributions of source code must retain the above copyright
11*9aa2a9c3Schristos * notice, this list of conditions and the following disclaimer.
12*9aa2a9c3Schristos * 2. Redistributions in binary form must reproduce the above copyright
13*9aa2a9c3Schristos * notice, this list of conditions and the following disclaimer in the
14*9aa2a9c3Schristos * documentation and/or other materials provided with the distribution.
15*9aa2a9c3Schristos *
16*9aa2a9c3Schristos * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17*9aa2a9c3Schristos * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18*9aa2a9c3Schristos * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19*9aa2a9c3Schristos * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20*9aa2a9c3Schristos * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21*9aa2a9c3Schristos * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22*9aa2a9c3Schristos * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23*9aa2a9c3Schristos * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24*9aa2a9c3Schristos * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25*9aa2a9c3Schristos * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26*9aa2a9c3Schristos * SUCH DAMAGE.
27*9aa2a9c3Schristos */
28*9aa2a9c3Schristos
29*9aa2a9c3Schristos #include <sys/cdefs.h>
30*9aa2a9c3Schristos #if 0
31*9aa2a9c3Schristos __FBSDID("$FreeBSD: head/bin/setfacl/mask.c 333065 2018-04-27 15:25:24Z emaste $");
32*9aa2a9c3Schristos #else
33*9aa2a9c3Schristos __RCSID("$NetBSD: mask.c,v 1.1 2020/05/16 18:31:45 christos Exp $");
34*9aa2a9c3Schristos #endif
35*9aa2a9c3Schristos
36*9aa2a9c3Schristos #include <sys/types.h>
37*9aa2a9c3Schristos #include <sys/acl.h>
38*9aa2a9c3Schristos #include <sys/stat.h>
39*9aa2a9c3Schristos
40*9aa2a9c3Schristos #include <err.h>
41*9aa2a9c3Schristos #include <errno.h>
42*9aa2a9c3Schristos #include <stdio.h>
43*9aa2a9c3Schristos #include <stdlib.h>
44*9aa2a9c3Schristos
45*9aa2a9c3Schristos #include "setfacl.h"
46*9aa2a9c3Schristos
47*9aa2a9c3Schristos /* set the appropriate mask the given ACL's */
48*9aa2a9c3Schristos int
set_acl_mask(acl_t * prev_acl,const char * filename)49*9aa2a9c3Schristos set_acl_mask(acl_t *prev_acl, const char *filename)
50*9aa2a9c3Schristos {
51*9aa2a9c3Schristos acl_entry_t entry;
52*9aa2a9c3Schristos acl_t acl;
53*9aa2a9c3Schristos acl_tag_t tag;
54*9aa2a9c3Schristos int entry_id;
55*9aa2a9c3Schristos
56*9aa2a9c3Schristos entry = NULL;
57*9aa2a9c3Schristos
58*9aa2a9c3Schristos /*
59*9aa2a9c3Schristos * ... if a mask entry is specified, then the permissions of the mask
60*9aa2a9c3Schristos * entry in the resulting ACL shall be set to the permissions in the
61*9aa2a9c3Schristos * specified ACL mask entry.
62*9aa2a9c3Schristos */
63*9aa2a9c3Schristos if (have_mask)
64*9aa2a9c3Schristos return (0);
65*9aa2a9c3Schristos
66*9aa2a9c3Schristos acl = acl_dup(*prev_acl);
67*9aa2a9c3Schristos if (acl == NULL)
68*9aa2a9c3Schristos err(1, "%s: acl_dup() failed", filename);
69*9aa2a9c3Schristos
70*9aa2a9c3Schristos if (!n_flag) {
71*9aa2a9c3Schristos /*
72*9aa2a9c3Schristos * If no mask entry is specified and the -n option is not
73*9aa2a9c3Schristos * specified, then the permissions of the resulting ACL mask
74*9aa2a9c3Schristos * entry shall be set to the union of the permissions
75*9aa2a9c3Schristos * associated with all entries which belong to the file group
76*9aa2a9c3Schristos * class in the resulting ACL
77*9aa2a9c3Schristos */
78*9aa2a9c3Schristos if (acl_calc_mask(&acl)) {
79*9aa2a9c3Schristos warn("%s: acl_calc_mask() failed", filename);
80*9aa2a9c3Schristos acl_free(acl);
81*9aa2a9c3Schristos return (-1);
82*9aa2a9c3Schristos }
83*9aa2a9c3Schristos } else {
84*9aa2a9c3Schristos /*
85*9aa2a9c3Schristos * If no mask entry is specified and the -n option is
86*9aa2a9c3Schristos * specified, then the permissions of the resulting ACL
87*9aa2a9c3Schristos * mask entry shall remain unchanged ...
88*9aa2a9c3Schristos */
89*9aa2a9c3Schristos
90*9aa2a9c3Schristos entry_id = ACL_FIRST_ENTRY;
91*9aa2a9c3Schristos
92*9aa2a9c3Schristos while (acl_get_entry(acl, entry_id, &entry) == 1) {
93*9aa2a9c3Schristos entry_id = ACL_NEXT_ENTRY;
94*9aa2a9c3Schristos if (acl_get_tag_type(entry, &tag) == -1)
95*9aa2a9c3Schristos err(1, "%s: acl_get_tag_type() failed",
96*9aa2a9c3Schristos filename);
97*9aa2a9c3Schristos
98*9aa2a9c3Schristos if (tag == ACL_MASK) {
99*9aa2a9c3Schristos acl_free(acl);
100*9aa2a9c3Schristos return (0);
101*9aa2a9c3Schristos }
102*9aa2a9c3Schristos }
103*9aa2a9c3Schristos
104*9aa2a9c3Schristos /*
105*9aa2a9c3Schristos * If no mask entry is specified, the -n option is specified,
106*9aa2a9c3Schristos * and no ACL mask entry exists in the ACL associated with the
107*9aa2a9c3Schristos * file, then write an error message to standard error and
108*9aa2a9c3Schristos * continue with the next file.
109*9aa2a9c3Schristos */
110*9aa2a9c3Schristos warnx("%s: warning: no mask entry", filename);
111*9aa2a9c3Schristos acl_free(acl);
112*9aa2a9c3Schristos return (0);
113*9aa2a9c3Schristos }
114*9aa2a9c3Schristos
115*9aa2a9c3Schristos acl_free(*prev_acl);
116*9aa2a9c3Schristos *prev_acl = acl_dup(acl);
117*9aa2a9c3Schristos acl_free(acl);
118*9aa2a9c3Schristos
119*9aa2a9c3Schristos return (0);
120*9aa2a9c3Schristos }
121