|
Packit Service |
1d0348 |
/*-
|
|
Packit Service |
1d0348 |
* Copyright (c) 2003-2008 Tim Kientzle
|
|
Packit Service |
1d0348 |
* Copyright (c) 2017 Martin Matuska
|
|
Packit Service |
1d0348 |
* All rights reserved.
|
|
Packit Service |
1d0348 |
*
|
|
Packit Service |
1d0348 |
* Redistribution and use in source and binary forms, with or without
|
|
Packit Service |
1d0348 |
* modification, are permitted provided that the following conditions
|
|
Packit Service |
1d0348 |
* are met:
|
|
Packit Service |
1d0348 |
* 1. Redistributions of source code must retain the above copyright
|
|
Packit Service |
1d0348 |
* notice, this list of conditions and the following disclaimer.
|
|
Packit Service |
1d0348 |
* 2. Redistributions in binary form must reproduce the above copyright
|
|
Packit Service |
1d0348 |
* notice, this list of conditions and the following disclaimer in the
|
|
Packit Service |
1d0348 |
* documentation and/or other materials provided with the distribution.
|
|
Packit Service |
1d0348 |
*
|
|
Packit Service |
1d0348 |
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
|
|
Packit Service |
1d0348 |
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
Packit Service |
1d0348 |
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
Packit Service |
1d0348 |
* IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
Packit Service |
1d0348 |
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
Packit Service |
1d0348 |
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
Packit Service |
1d0348 |
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
Packit Service |
1d0348 |
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
Packit Service |
1d0348 |
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
Packit Service |
1d0348 |
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
Packit Service |
1d0348 |
*/
|
|
Packit Service |
1d0348 |
#include "test.h"
|
|
Packit Service |
1d0348 |
__FBSDID("$FreeBSD: head/lib/libarchive/test/test_acl_freebsd.c 189427 2009-03-06 04:21:23Z kientzle $");
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_POSIX1E
|
|
Packit Service |
1d0348 |
#include <sys/acl.h>
|
|
Packit Service |
1d0348 |
#if HAVE_ACL_GET_PERM
|
|
Packit Service |
1d0348 |
#include <acl/libacl.h>
|
|
Packit Service |
1d0348 |
#define ACL_GET_PERM acl_get_perm
|
|
Packit Service |
1d0348 |
#elif HAVE_ACL_GET_PERM_NP
|
|
Packit Service |
1d0348 |
#define ACL_GET_PERM acl_get_perm_np
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
static struct archive_test_acl_t acls2[] = {
|
|
Packit Service |
1d0348 |
{ ARCHIVE_ENTRY_ACL_TYPE_ACCESS, ARCHIVE_ENTRY_ACL_EXECUTE | ARCHIVE_ENTRY_ACL_READ,
|
|
Packit Service |
1d0348 |
ARCHIVE_ENTRY_ACL_USER_OBJ, -1, "" },
|
|
Packit Service |
1d0348 |
{ ARCHIVE_ENTRY_ACL_TYPE_ACCESS, ARCHIVE_ENTRY_ACL_READ,
|
|
Packit Service |
1d0348 |
ARCHIVE_ENTRY_ACL_USER, 77, "user77" },
|
|
Packit Service |
1d0348 |
{ ARCHIVE_ENTRY_ACL_TYPE_ACCESS, 0,
|
|
Packit Service |
1d0348 |
ARCHIVE_ENTRY_ACL_USER, 78, "user78" },
|
|
Packit Service |
1d0348 |
{ ARCHIVE_ENTRY_ACL_TYPE_ACCESS, ARCHIVE_ENTRY_ACL_READ,
|
|
Packit Service |
1d0348 |
ARCHIVE_ENTRY_ACL_GROUP_OBJ, -1, "" },
|
|
Packit Service |
1d0348 |
{ ARCHIVE_ENTRY_ACL_TYPE_ACCESS, 0007,
|
|
Packit Service |
1d0348 |
ARCHIVE_ENTRY_ACL_GROUP, 78, "group78" },
|
|
Packit Service |
1d0348 |
{ ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
|
|
Packit Service |
1d0348 |
ARCHIVE_ENTRY_ACL_WRITE | ARCHIVE_ENTRY_ACL_EXECUTE,
|
|
Packit Service |
1d0348 |
ARCHIVE_ENTRY_ACL_OTHER, -1, "" },
|
|
Packit Service |
1d0348 |
{ ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
|
|
Packit Service |
1d0348 |
ARCHIVE_ENTRY_ACL_WRITE | ARCHIVE_ENTRY_ACL_READ | ARCHIVE_ENTRY_ACL_EXECUTE,
|
|
Packit Service |
1d0348 |
ARCHIVE_ENTRY_ACL_MASK, -1, "" },
|
|
Packit Service |
1d0348 |
};
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
static int
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
acl_entry_get_perm(aclent_t *aclent)
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
acl_entry_get_perm(acl_entry_t aclent)
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
{
|
|
Packit Service |
1d0348 |
int permset = 0;
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_FREEBSD || ARCHIVE_ACL_LIBACL
|
|
Packit Service |
1d0348 |
acl_permset_t opaque_ps;
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
if (aclent->a_perm & 1)
|
|
Packit Service |
1d0348 |
permset |= ARCHIVE_ENTRY_ACL_EXECUTE;
|
|
Packit Service |
1d0348 |
if (aclent->a_perm & 2)
|
|
Packit Service |
1d0348 |
permset |= ARCHIVE_ENTRY_ACL_WRITE;
|
|
Packit Service |
1d0348 |
if (aclent->a_perm & 4)
|
|
Packit Service |
1d0348 |
permset |= ARCHIVE_ENTRY_ACL_READ;
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
/* translate the silly opaque permset to a bitmap */
|
|
Packit Service |
1d0348 |
acl_get_permset(aclent, &opaque_ps);
|
|
Packit Service |
1d0348 |
if (ACL_GET_PERM(opaque_ps, ACL_EXECUTE))
|
|
Packit Service |
1d0348 |
permset |= ARCHIVE_ENTRY_ACL_EXECUTE;
|
|
Packit Service |
1d0348 |
if (ACL_GET_PERM(opaque_ps, ACL_WRITE))
|
|
Packit Service |
1d0348 |
permset |= ARCHIVE_ENTRY_ACL_WRITE;
|
|
Packit Service |
1d0348 |
if (ACL_GET_PERM(opaque_ps, ACL_READ))
|
|
Packit Service |
1d0348 |
permset |= ARCHIVE_ENTRY_ACL_READ;
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
return permset;
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
#if 0
|
|
Packit Service |
1d0348 |
static int
|
|
Packit Service |
1d0348 |
acl_get_specific_entry(acl_t acl, acl_tag_t requested_tag_type, int requested_tag) {
|
|
Packit Service |
1d0348 |
int entry_id = ACL_FIRST_ENTRY;
|
|
Packit Service |
1d0348 |
acl_entry_t acl_entry;
|
|
Packit Service |
1d0348 |
acl_tag_t acl_tag_type;
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
while (1 == acl_get_entry(acl, entry_id, &acl_entry)) {
|
|
Packit Service |
1d0348 |
/* After the first time... */
|
|
Packit Service |
1d0348 |
entry_id = ACL_NEXT_ENTRY;
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* If this matches, return perm mask */
|
|
Packit Service |
1d0348 |
acl_get_tag_type(acl_entry, &acl_tag_type);
|
|
Packit Service |
1d0348 |
if (acl_tag_type == requested_tag_type) {
|
|
Packit Service |
1d0348 |
switch (acl_tag_type) {
|
|
Packit Service |
1d0348 |
case ACL_USER_OBJ:
|
|
Packit Service |
1d0348 |
if ((uid_t)requested_tag == *(uid_t *)(acl_get_qualifier(acl_entry))) {
|
|
Packit Service |
1d0348 |
return acl_entry_get_perm(acl_entry);
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
case ACL_GROUP_OBJ:
|
|
Packit Service |
1d0348 |
if ((gid_t)requested_tag == *(gid_t *)(acl_get_qualifier(acl_entry))) {
|
|
Packit Service |
1d0348 |
return acl_entry_get_perm(acl_entry);
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
case ACL_USER:
|
|
Packit Service |
1d0348 |
case ACL_GROUP:
|
|
Packit Service |
1d0348 |
case ACL_OTHER:
|
|
Packit Service |
1d0348 |
return acl_entry_get_perm(acl_entry);
|
|
Packit Service |
1d0348 |
default:
|
|
Packit Service |
1d0348 |
failure("Unexpected ACL tag type");
|
|
Packit Service |
1d0348 |
assert(0);
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
return -1;
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
static int
|
|
Packit Service |
1d0348 |
acl_match(aclent_t *aclent, struct archive_test_acl_t *myacl)
|
|
Packit Service |
1d0348 |
{
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
if (myacl->permset != acl_entry_get_perm(aclent))
|
|
Packit Service |
1d0348 |
return (0);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
switch (aclent->a_type) {
|
|
Packit Service |
1d0348 |
case DEF_USER_OBJ:
|
|
Packit Service |
1d0348 |
case USER_OBJ:
|
|
Packit Service |
1d0348 |
if (myacl->tag != ARCHIVE_ENTRY_ACL_USER_OBJ) return (0);
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
if (myacl->tag != ARCHIVE_ENTRY_ACL_USER)
|
|
Packit Service |
1d0348 |
return (0);
|
|
Packit Service |
1d0348 |
if ((uid_t)myacl->qual != aclent->a_id)
|
|
Packit Service |
1d0348 |
return (0);
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
case DEF_GROUP_OBJ:
|
|
Packit Service |
1d0348 |
case GROUP_OBJ:
|
|
Packit Service |
1d0348 |
if (myacl->tag != ARCHIVE_ENTRY_ACL_GROUP_OBJ) return (0);
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
case DEF_GROUP:
|
|
Packit Service |
1d0348 |
case GROUP:
|
|
Packit Service |
1d0348 |
if (myacl->tag != ARCHIVE_ENTRY_ACL_GROUP)
|
|
Packit Service |
1d0348 |
return (0);
|
|
Packit Service |
1d0348 |
if ((gid_t)myacl->qual != aclent->a_id)
|
|
Packit Service |
1d0348 |
return (0);
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
case DEF_CLASS_OBJ:
|
|
Packit Service |
1d0348 |
case CLASS_OBJ:
|
|
Packit Service |
1d0348 |
if (myacl->tag != ARCHIVE_ENTRY_ACL_MASK) return (0);
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
case DEF_OTHER_OBJ:
|
|
Packit Service |
1d0348 |
case OTHER_OBJ:
|
|
Packit Service |
1d0348 |
if (myacl->tag != ARCHIVE_ENTRY_ACL_OTHER) return (0);
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
return (1);
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
#else /* ARCHIVE_ACL_FREEBSD || ARCHIVE_ACL_LIBACL */
|
|
Packit Service |
1d0348 |
static int
|
|
Packit Service |
1d0348 |
acl_match(acl_entry_t aclent, struct archive_test_acl_t *myacl)
|
|
Packit Service |
1d0348 |
{
|
|
Packit Service |
1d0348 |
gid_t g, *gp;
|
|
Packit Service |
1d0348 |
uid_t u, *up;
|
|
Packit Service |
1d0348 |
acl_tag_t tag_type;
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
if (myacl->permset != acl_entry_get_perm(aclent))
|
|
Packit Service |
1d0348 |
return (0);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
acl_get_tag_type(aclent, &tag_type);
|
|
Packit Service |
1d0348 |
switch (tag_type) {
|
|
Packit Service |
1d0348 |
case ACL_USER_OBJ:
|
|
Packit Service |
1d0348 |
if (myacl->tag != ARCHIVE_ENTRY_ACL_USER_OBJ) return (0);
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
case ACL_USER:
|
|
Packit Service |
1d0348 |
if (myacl->tag != ARCHIVE_ENTRY_ACL_USER)
|
|
Packit Service |
1d0348 |
return (0);
|
|
Packit Service |
1d0348 |
up = acl_get_qualifier(aclent);
|
|
Packit Service |
1d0348 |
u = *up;
|
|
Packit Service |
1d0348 |
acl_free(up);
|
|
Packit Service |
1d0348 |
if ((uid_t)myacl->qual != u)
|
|
Packit Service |
1d0348 |
return (0);
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
case ACL_GROUP_OBJ:
|
|
Packit Service |
1d0348 |
if (myacl->tag != ARCHIVE_ENTRY_ACL_GROUP_OBJ) return (0);
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
case ACL_GROUP:
|
|
Packit Service |
1d0348 |
if (myacl->tag != ARCHIVE_ENTRY_ACL_GROUP)
|
|
Packit Service |
1d0348 |
return (0);
|
|
Packit Service |
1d0348 |
gp = acl_get_qualifier(aclent);
|
|
Packit Service |
1d0348 |
g = *gp;
|
|
Packit Service |
1d0348 |
acl_free(gp);
|
|
Packit Service |
1d0348 |
if ((gid_t)myacl->qual != g)
|
|
Packit Service |
1d0348 |
return (0);
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
case ACL_MASK:
|
|
Packit Service |
1d0348 |
if (myacl->tag != ARCHIVE_ENTRY_ACL_MASK) return (0);
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
case ACL_OTHER:
|
|
Packit Service |
1d0348 |
if (myacl->tag != ARCHIVE_ENTRY_ACL_OTHER) return (0);
|
|
Packit Service |
1d0348 |
break;
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
return (1);
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
static void
|
|
Packit Service |
1d0348 |
compare_acls(
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
void *aclp, int aclcnt,
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
acl_t acl,
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
struct archive_test_acl_t *myacls, int n)
|
|
Packit Service |
1d0348 |
{
|
|
Packit Service |
1d0348 |
int *marker;
|
|
Packit Service |
1d0348 |
int matched;
|
|
Packit Service |
1d0348 |
int i;
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
int e;
|
|
Packit Service |
1d0348 |
aclent_t *acl_entry;
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
int entry_id = ACL_FIRST_ENTRY;
|
|
Packit Service |
1d0348 |
acl_entry_t acl_entry;
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Count ACL entries in myacls array and allocate an indirect array. */
|
|
Packit Service |
1d0348 |
marker = malloc(sizeof(marker[0]) * n);
|
|
Packit Service |
1d0348 |
if (marker == NULL)
|
|
Packit Service |
1d0348 |
return;
|
|
Packit Service |
1d0348 |
for (i = 0; i < n; i++)
|
|
Packit Service |
1d0348 |
marker[i] = i;
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/*
|
|
Packit Service |
1d0348 |
* Iterate over acls in system acl object, try to match each
|
|
Packit Service |
1d0348 |
* one with an item in the myacls array.
|
|
Packit Service |
1d0348 |
*/
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
for(e = 0; e < aclcnt; e++) {
|
|
Packit Service |
1d0348 |
acl_entry = &((aclent_t *)aclp)[e];
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
while (1 == acl_get_entry(acl, entry_id, &acl_entry)) {
|
|
Packit Service |
1d0348 |
/* After the first time... */
|
|
Packit Service |
1d0348 |
entry_id = ACL_NEXT_ENTRY;
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Search for a matching entry (tag and qualifier) */
|
|
Packit Service |
1d0348 |
for (i = 0, matched = 0; i < n && !matched; i++) {
|
|
Packit Service |
1d0348 |
if (acl_match(acl_entry, &myacls[marker[i]])) {
|
|
Packit Service |
1d0348 |
/* We found a match; remove it. */
|
|
Packit Service |
1d0348 |
marker[i] = marker[n - 1];
|
|
Packit Service |
1d0348 |
n--;
|
|
Packit Service |
1d0348 |
matched = 1;
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* TODO: Print out more details in this case. */
|
|
Packit Service |
1d0348 |
failure("ACL entry on file that shouldn't be there");
|
|
Packit Service |
1d0348 |
assert(matched == 1);
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Dump entries in the myacls array that weren't in the system acl. */
|
|
Packit Service |
1d0348 |
for (i = 0; i < n; ++i) {
|
|
Packit Service |
1d0348 |
failure(" ACL entry missing from file: "
|
|
Packit Service |
1d0348 |
"type=%#010x,permset=%#010x,tag=%d,qual=%d,name=``%s''\n",
|
|
Packit Service |
1d0348 |
myacls[marker[i]].type, myacls[marker[i]].permset,
|
|
Packit Service |
1d0348 |
myacls[marker[i]].tag, myacls[marker[i]].qual,
|
|
Packit Service |
1d0348 |
myacls[marker[i]].name);
|
|
Packit Service |
1d0348 |
assert(0); /* Record this as a failure. */
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
free(marker);
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/*
|
|
Packit Service |
1d0348 |
* Verify ACL restore-to-disk. This test is Platform-specific.
|
|
Packit Service |
1d0348 |
*/
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
DEFINE_TEST(test_acl_platform_posix1e_restore)
|
|
Packit Service |
1d0348 |
{
|
|
Packit Service |
1d0348 |
#if !ARCHIVE_ACL_POSIX1E
|
|
Packit Service |
1d0348 |
skipping("POSIX.1e ACLs are not supported on this platform");
|
|
Packit Service |
1d0348 |
#else /* ARCHIVE_ACL_POSIX1E */
|
|
Packit Service |
1d0348 |
struct stat st;
|
|
Packit Service |
1d0348 |
struct archive *a;
|
|
Packit Service |
1d0348 |
struct archive_entry *ae;
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
void *aclp;
|
|
Packit Service |
1d0348 |
int aclcnt;
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
acl_t acl;
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
assertMakeFile("pretest", 0644, "a");
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
if (setTestAcl("pretest") != ARCHIVE_TEST_ACL_TYPE_POSIX1E) {
|
|
Packit Service |
1d0348 |
skipping("POSIX.1e ACLs are not writable on this filesystem");
|
|
Packit Service |
1d0348 |
return;
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Create a write-to-disk object. */
|
|
Packit Service |
1d0348 |
assert(NULL != (a = archive_write_disk_new()));
|
|
Packit Service |
1d0348 |
archive_write_disk_set_options(a,
|
|
Packit Service |
1d0348 |
ARCHIVE_EXTRACT_TIME | ARCHIVE_EXTRACT_PERM | ARCHIVE_EXTRACT_ACL);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Populate an archive entry with some metadata, including ACL info */
|
|
Packit Service |
1d0348 |
ae = archive_entry_new();
|
|
Packit Service |
1d0348 |
assert(ae != NULL);
|
|
Packit Service |
1d0348 |
archive_entry_set_pathname(ae, "test0");
|
|
Packit Service |
1d0348 |
archive_entry_set_mtime(ae, 123456, 7890);
|
|
Packit Service |
1d0348 |
archive_entry_set_size(ae, 0);
|
|
Packit Service |
1d0348 |
assertEntrySetAcls(ae, acls2, sizeof(acls2)/sizeof(acls2[0]));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK, archive_write_header(a, ae));
|
|
Packit Service |
1d0348 |
archive_entry_free(ae);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Close the archive. */
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK, archive_write_close(a));
|
|
Packit Service |
1d0348 |
assertEqualInt(ARCHIVE_OK, archive_write_free(a));
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Verify the data on disk. */
|
|
Packit Service |
1d0348 |
assertEqualInt(0, stat("test0", &st);;
|
|
Packit Service |
1d0348 |
assertEqualInt(st.st_mtime, 123456);
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
aclp = sunacl_get(GETACL, &aclcnt, 0, "test0");
|
|
Packit Service |
1d0348 |
failure("acl(): errno = %d (%s)", errno, strerror(errno));
|
|
Packit Service |
1d0348 |
assert(aclp != NULL);
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
acl = acl_get_file("test0", ACL_TYPE_ACCESS);
|
|
Packit Service |
1d0348 |
failure("acl_get_file(): errno = %d (%s)", errno, strerror(errno));
|
|
Packit Service |
1d0348 |
assert(acl != (acl_t)NULL);
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
compare_acls(aclp, aclcnt, acls2, sizeof(acls2)/sizeof(acls2[0]));
|
|
Packit Service |
1d0348 |
free(aclp);
|
|
Packit Service |
1d0348 |
aclp = NULL;
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
compare_acls(acl, acls2, sizeof(acls2)/sizeof(acls2[0]));
|
|
Packit Service |
1d0348 |
acl_free(acl);
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
#endif /* ARCHIVE_ACL_POSIX1E */
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/*
|
|
Packit Service |
1d0348 |
* Verify ACL read-from-disk. This test is Platform-specific.
|
|
Packit Service |
1d0348 |
*/
|
|
Packit Service |
1d0348 |
DEFINE_TEST(test_acl_platform_posix1e_read)
|
|
Packit Service |
1d0348 |
{
|
|
Packit Service |
1d0348 |
#if !ARCHIVE_ACL_POSIX1E
|
|
Packit Service |
1d0348 |
skipping("POSIX.1e ACLs are not supported on this platform");
|
|
Packit Service |
1d0348 |
#else /* ARCHIVE_ACL_POSIX1E */
|
|
Packit Service |
1d0348 |
struct archive *a;
|
|
Packit Service |
1d0348 |
struct archive_entry *ae;
|
|
Packit Service |
1d0348 |
int n, fd, flags, dflags;
|
|
Packit Service |
1d0348 |
char *func, *acl_text;
|
|
Packit Service |
1d0348 |
const char *acl1_text, *acl2_text, *acl3_text;
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
void *aclp;
|
|
Packit Service |
1d0348 |
int aclcnt;
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
acl_t acl1, acl2, acl3;
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/*
|
|
Packit Service |
1d0348 |
* Manually construct a directory and two files with
|
|
Packit Service |
1d0348 |
* different ACLs. This also serves to verify that ACLs
|
|
Packit Service |
1d0348 |
* are supported on the local filesystem.
|
|
Packit Service |
1d0348 |
*/
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Create a test file f1 with acl1 */
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
acl1_text = "user::rwx,"
|
|
Packit Service |
1d0348 |
"group::rwx,"
|
|
Packit Service |
1d0348 |
"other:rwx,"
|
|
Packit Service |
1d0348 |
"user:1:rw-,"
|
|
Packit Service |
1d0348 |
"group:15:r-x,"
|
|
Packit Service |
1d0348 |
"mask:rwx";
|
|
Packit Service |
1d0348 |
aclent_t aclp1[] = {
|
|
Packit Service |
1d0348 |
{ USER_OBJ, -1, 4 | 2 | 1 },
|
|
Packit Service |
1d0348 |
{ USER, 1, 4 | 2 },
|
|
Packit Service |
1d0348 |
{ GROUP_OBJ, -1, 4 | 2 | 1 },
|
|
Packit Service |
1d0348 |
{ GROUP, 15, 4 | 1 },
|
|
Packit Service |
1d0348 |
{ CLASS_OBJ, -1, 4 | 2 | 1 },
|
|
Packit Service |
1d0348 |
{ OTHER_OBJ, -1, 4 | 2 | 1 }
|
|
Packit Service |
1d0348 |
};
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
acl1_text = "user::rwx\n"
|
|
Packit Service |
1d0348 |
"group::rwx\n"
|
|
Packit Service |
1d0348 |
"other::rwx\n"
|
|
Packit Service |
1d0348 |
"user:1:rw-\n"
|
|
Packit Service |
1d0348 |
"group:15:r-x\n"
|
|
Packit Service |
1d0348 |
"mask::rwx";
|
|
Packit Service |
1d0348 |
acl1 = acl_from_text(acl1_text);
|
|
Packit Service |
1d0348 |
failure("acl_from_text(): errno = %d (%s)", errno, strerror(errno));
|
|
Packit Service |
1d0348 |
assert((void *)acl1 != NULL);
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
fd = open("f1", O_WRONLY | O_CREAT | O_EXCL, 0777);
|
|
Packit Service |
1d0348 |
failure("Could not create test file?!");
|
|
Packit Service |
1d0348 |
if (!assert(fd >= 0)) {
|
|
Packit Service |
1d0348 |
#if !ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
acl_free(acl1);
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
return;
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
/* Check if Solaris filesystem supports POSIX.1e ACLs */
|
|
Packit Service |
1d0348 |
aclp = sunacl_get(GETACL, &aclcnt, fd, NULL);
|
|
Packit Service |
1d0348 |
if (aclp == 0)
|
|
Packit Service |
1d0348 |
close(fd);
|
|
Packit Service |
1d0348 |
if (errno == ENOSYS || errno == ENOTSUP) {
|
|
Packit Service |
1d0348 |
skipping("POSIX.1e ACLs are not supported on this filesystem");
|
|
Packit Service |
1d0348 |
return;
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
failure("facl(): errno = %d (%s)", errno, strerror(errno));
|
|
Packit Service |
1d0348 |
assert(aclp != NULL);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
func = "facl()";
|
|
Packit Service |
1d0348 |
n = facl(fd, SETACL, (int)(sizeof(aclp1)/sizeof(aclp1[0])), aclp1);
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
func = "acl_set_fd()";
|
|
Packit Service |
1d0348 |
n = acl_set_fd(fd, acl1);
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
#if !ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
acl_free(acl1);
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
if (n != 0) {
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
if (errno == ENOSYS || errno == ENOTSUP)
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
if (errno == EOPNOTSUPP || errno == EINVAL)
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
{
|
|
Packit Service |
1d0348 |
close(fd);
|
|
Packit Service |
1d0348 |
skipping("POSIX.1e ACLs are not supported on this filesystem");
|
|
Packit Service |
1d0348 |
return;
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
failure("%s: errno = %d (%s)", func, errno, strerror(errno));
|
|
Packit Service |
1d0348 |
assertEqualInt(0, n);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
close(fd);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
assertMakeDir("d", 0700);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/*
|
|
Packit Service |
1d0348 |
* Create file d/f1 with acl2
|
|
Packit Service |
1d0348 |
*
|
|
Packit Service |
1d0348 |
* This differs from acl1 in the u:1: and g:15: permissions.
|
|
Packit Service |
1d0348 |
*
|
|
Packit Service |
1d0348 |
* This file deliberately has the same name but a different ACL.
|
|
Packit Service |
1d0348 |
* Github Issue #777 explains how libarchive's directory traversal
|
|
Packit Service |
1d0348 |
* did not always correctly enter directories before attempting
|
|
Packit Service |
1d0348 |
* to read ACLs, resulting in reading the ACL from a like-named
|
|
Packit Service |
1d0348 |
* file in the wrong directory.
|
|
Packit Service |
1d0348 |
*/
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
acl2_text = "user::rwx,"
|
|
Packit Service |
1d0348 |
"group::rwx,"
|
|
Packit Service |
1d0348 |
"other:---,"
|
|
Packit Service |
1d0348 |
"user:1:r--,"
|
|
Packit Service |
1d0348 |
"group:15:r--,"
|
|
Packit Service |
1d0348 |
"mask:rwx";
|
|
Packit Service |
1d0348 |
aclent_t aclp2[] = {
|
|
Packit Service |
1d0348 |
{ USER_OBJ, -1, 4 | 2 | 1 },
|
|
Packit Service |
1d0348 |
{ USER, 1, 4 },
|
|
Packit Service |
1d0348 |
{ GROUP_OBJ, -1, 4 | 2 | 1},
|
|
Packit Service |
1d0348 |
{ GROUP, 15, 4 },
|
|
Packit Service |
1d0348 |
{ CLASS_OBJ, -1, 4 | 2 | 1},
|
|
Packit Service |
1d0348 |
{ OTHER_OBJ, -1, 0 }
|
|
Packit Service |
1d0348 |
};
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
acl2_text = "user::rwx\n"
|
|
Packit Service |
1d0348 |
"group::rwx\n"
|
|
Packit Service |
1d0348 |
"other::---\n"
|
|
Packit Service |
1d0348 |
"user:1:r--\n"
|
|
Packit Service |
1d0348 |
"group:15:r--\n"
|
|
Packit Service |
1d0348 |
"mask::rwx";
|
|
Packit Service |
1d0348 |
acl2 = acl_from_text(acl2_text);
|
|
Packit Service |
1d0348 |
failure("acl_from_text(): errno = %d (%s)", errno, strerror(errno));
|
|
Packit Service |
1d0348 |
assert((void *)acl2 != NULL);
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
fd = open("d/f1", O_WRONLY | O_CREAT | O_EXCL, 0777);
|
|
Packit Service |
1d0348 |
failure("Could not create test file?!");
|
|
Packit Service |
1d0348 |
if (!assert(fd >= 0)) {
|
|
Packit Service |
1d0348 |
#if !ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
acl_free(acl2);
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
return;
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
func = "facl()";
|
|
Packit Service |
1d0348 |
n = facl(fd, SETACL, (int)(sizeof(aclp2) / sizeof(aclp2[0])), aclp2);
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
func = "acl_set_fd()";
|
|
Packit Service |
1d0348 |
n = acl_set_fd(fd, acl2);
|
|
Packit Service |
1d0348 |
acl_free(acl2);
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
if (n != 0)
|
|
Packit Service |
1d0348 |
close(fd);
|
|
Packit Service |
1d0348 |
failure("%s: errno = %d (%s)", func, errno, strerror(errno));
|
|
Packit Service |
1d0348 |
assertEqualInt(0, n);
|
|
Packit Service |
1d0348 |
close(fd);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Create nested directory d2 with default ACLs */
|
|
Packit Service |
1d0348 |
assertMakeDir("d/d2", 0755);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
acl3_text = "user::rwx,"
|
|
Packit Service |
1d0348 |
"group::r-x,"
|
|
Packit Service |
1d0348 |
"other:r-x,"
|
|
Packit Service |
1d0348 |
"user:2:r--,"
|
|
Packit Service |
1d0348 |
"group:16:-w-,"
|
|
Packit Service |
1d0348 |
"mask:rwx,"
|
|
Packit Service |
1d0348 |
"default:user::rwx,"
|
|
Packit Service |
1d0348 |
"default:user:1:r--,"
|
|
Packit Service |
1d0348 |
"default:group::r-x,"
|
|
Packit Service |
1d0348 |
"default:group:15:r--,"
|
|
Packit Service |
1d0348 |
"default:mask:rwx,"
|
|
Packit Service |
1d0348 |
"default:other:r-x";
|
|
Packit Service |
1d0348 |
aclent_t aclp3[] = {
|
|
Packit Service |
1d0348 |
{ USER_OBJ, -1, 4 | 2 | 1 },
|
|
Packit Service |
1d0348 |
{ USER, 2, 4 },
|
|
Packit Service |
1d0348 |
{ GROUP_OBJ, -1, 4 | 1 },
|
|
Packit Service |
1d0348 |
{ GROUP, 16, 2 },
|
|
Packit Service |
1d0348 |
{ CLASS_OBJ, -1, 4 | 2 | 1 },
|
|
Packit Service |
1d0348 |
{ OTHER_OBJ, -1, 4 | 1 },
|
|
Packit Service |
1d0348 |
{ USER_OBJ | ACL_DEFAULT, -1, 4 | 2 | 1 },
|
|
Packit Service |
1d0348 |
{ USER | ACL_DEFAULT, 1, 4 },
|
|
Packit Service |
1d0348 |
{ GROUP_OBJ | ACL_DEFAULT, -1, 4 | 1 },
|
|
Packit Service |
1d0348 |
{ GROUP | ACL_DEFAULT, 15, 4 },
|
|
Packit Service |
1d0348 |
{ CLASS_OBJ | ACL_DEFAULT, -1, 4 | 2 | 1},
|
|
Packit Service |
1d0348 |
{ OTHER_OBJ | ACL_DEFAULT, -1, 4 | 1 }
|
|
Packit Service |
1d0348 |
};
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
acl3_text = "user::rwx\n"
|
|
Packit Service |
1d0348 |
"user:1:r--\n"
|
|
Packit Service |
1d0348 |
"group::r-x\n"
|
|
Packit Service |
1d0348 |
"group:15:r--\n"
|
|
Packit Service |
1d0348 |
"mask::rwx\n"
|
|
Packit Service |
1d0348 |
"other::r-x";
|
|
Packit Service |
1d0348 |
acl3 = acl_from_text(acl3_text);
|
|
Packit Service |
1d0348 |
failure("acl_from_text(): errno = %d (%s)", errno, strerror(errno));
|
|
Packit Service |
1d0348 |
assert((void *)acl3 != NULL);
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
func = "acl()";
|
|
Packit Service |
1d0348 |
n = acl("d/d2", SETACL, (int)(sizeof(aclp3) / sizeof(aclp3[0])), aclp3);
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
func = "acl_set_file()";
|
|
Packit Service |
1d0348 |
n = acl_set_file("d/d2", ACL_TYPE_DEFAULT, acl3);
|
|
Packit Service |
1d0348 |
acl_free(acl3);
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
failure("%s: errno = %d (%s)", func, errno, strerror(errno));
|
|
Packit Service |
1d0348 |
assertEqualInt(0, n);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Create a read-from-disk object. */
|
|
Packit Service |
1d0348 |
assert(NULL != (a = archive_read_disk_new()));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK, archive_read_disk_open(a, "."));
|
|
Packit Service |
1d0348 |
assert(NULL != (ae = archive_entry_new()));
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
#if ARCHIVE_ACL_SUNOS
|
|
Packit Service |
1d0348 |
flags = ARCHIVE_ENTRY_ACL_TYPE_POSIX1E
|
|
Packit Service |
1d0348 |
| ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA
|
|
Packit Service |
1d0348 |
| ARCHIVE_ENTRY_ACL_STYLE_SOLARIS;
|
|
Packit Service |
1d0348 |
dflags = flags;
|
|
Packit Service |
1d0348 |
#else
|
|
Packit Service |
1d0348 |
flags = ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
|
|
Packit Service |
1d0348 |
dflags = ARCHIVE_ENTRY_ACL_TYPE_DEFAULT;
|
|
Packit Service |
1d0348 |
#endif
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Walk the dir until we see both of the files */
|
|
Packit Service |
1d0348 |
while (ARCHIVE_OK == archive_read_next_header2(a, ae)) {
|
|
Packit Service |
1d0348 |
archive_read_disk_descend(a);
|
|
Packit Service |
1d0348 |
if (strcmp(archive_entry_pathname(ae), "./f1") == 0) {
|
|
Packit Service |
1d0348 |
acl_text = archive_entry_acl_to_text(ae, NULL, flags);
|
|
Packit Service |
1d0348 |
assertEqualString(acl_text, acl1_text);
|
|
Packit Service |
1d0348 |
free(acl_text);
|
|
Packit Service |
1d0348 |
} else if (strcmp(archive_entry_pathname(ae), "./d/f1") == 0) {
|
|
Packit Service |
1d0348 |
acl_text = archive_entry_acl_to_text(ae, NULL, flags);
|
|
Packit Service |
1d0348 |
assertEqualString(acl_text, acl2_text);
|
|
Packit Service |
1d0348 |
free(acl_text);
|
|
Packit Service |
1d0348 |
} else if (strcmp(archive_entry_pathname(ae), "./d/d2") == 0) {
|
|
Packit Service |
1d0348 |
acl_text = archive_entry_acl_to_text(ae, NULL, dflags);
|
|
Packit Service |
1d0348 |
assertEqualString(acl_text, acl3_text);
|
|
Packit Service |
1d0348 |
free(acl_text);
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
archive_entry_free(ae);
|
|
Packit Service |
1d0348 |
assertEqualInt(ARCHIVE_OK, archive_free(a));
|
|
Packit Service |
1d0348 |
#endif /* ARCHIVE_ACL_POSIX1E */
|
|
Packit Service |
1d0348 |
}
|