acl_reset() {
# Remove any ACLs on our test directory and remove its contents.
setfacl --remove-all --recursive "$TESTDIR"
- rm "${TESTDIR}"/*
+ rm -f "${TESTDIR}"/*
}
compare() {
if [[ "${ACTUAL}" == "${EXPECTED}" ]]; then
echo "Success."
+ acl_reset
else
echo "Failure."
echo "Expected result:"
# When using a minimal ACL, the default user, group, and other
# permissions should all be propagated to the mode bits.
-
TARGET="${TESTDIR}"/foo
-touch "${TARGET}"
-chmod 777 "${TARGET}"
-setfacl -d -m user::r-- "${TESTDIR}"
+setfacl -d -m user::r-- "${TESTDIR}"
setfacl -d -m group::r-- "${TESTDIR}"
setfacl -d -m other::r-- "${TESTDIR}"
+touch "${TARGET}"
+chmod 777 "${TARGET}"
+./aclq "${TARGET}"
+
+EXPECTED=$(cat <<EOF
+user::r--
+group::r--
+other::r--
+
+EOF
+)
+ACTUAL=`getfacl --omit-header "${TARGET}"`
+compare
+
+# Do the same thing as the last test, except with an extended ACL.
+setfacl -d -m user::r-- "${TESTDIR}"
+setfacl -d -m group::r-- "${TESTDIR}"
+setfacl -d -m other::r-- "${TESTDIR}"
+setfacl -d -m user:mail:rwx "${TESTDIR}"
+touch "${TARGET}"
+chmod 777 "${TARGET}"
./aclq "${TARGET}"
EXPECTED=$(cat <<EOF
user::r--
+user:mail:rwx
group::r--
+mask::rwx
other::r--
EOF
ACTUAL=`getfacl --omit-header "${TARGET}"`
compare
+
+# A directory shared by a group, should still be group-writable
+# afterwards.
+setfacl -d -m group:mail:rwx "${TESTDIR}"
+touch "${TARGET}"
+chmod 644 "${TARGET}"
+./aclq "${TARGET}"
+
+EXPECTED=$(cat <<EOF
+user::rw-
+group::r--
+group:mail:rwx #effective:rw-
+mask::rw-
+other::r--
+EOF
+)
+
+ACTUAL=`getfacl --omit-header "${TARGET}"`
+compare
}
-int has_minimal_default_acl(const char* path) {
- /* An ACL is minimal if and only if it has no mask. Return 1 if it's
- minimal, zero if it isn't, and -1 on errors. */
- int has_dm = has_default_tag_acl(path, ACL_MASK);
-
- if (has_dm == 0) {
- return 1;
- }
- else if (has_dm == 1) {
- return 0;
- }
- else {
- perror("has_minimal_default_acl");
- return -1;
- }
-}
-
-
int has_default_user_obj_acl(const char* path) {
return has_default_tag_acl(path, ACL_USER_OBJ);
}
return has_default_tag_acl(path, ACL_OTHER);
}
+int has_default_mask_acl(const char* path) {
+ return has_default_tag_acl(path, ACL_MASK);
+}
+
int get_default_tag_entry(const char* path,
acl_tag_t desired_tag,
to it, and then later reapply the result via chmod. */
mode_t path_mode = get_mode(path);
+ if (has_default_mask_acl(parent)) {
+ /* The parent has an extended ACL. Extended ACLs use the mask
+ entry. */
+
+ /* For the group bits, we'll use the ACL's mask instead of the group
+ object bits. If the default ACL had a group entry, it should
+ already have propagated (but might be masked). */
+ if (has_default_mask_read(parent)) {
+ path_mode |= S_IRGRP;
+ }
+ else {
+ path_mode &= ~S_IRGRP;
+ }
+
+ if (has_default_mask_write(parent)) {
+ path_mode |= S_IWGRP;
+ }
+ else {
+ path_mode &= ~S_IWGRP;
+ }
+
+ if (!mode_has_perm(path_mode, S_IXGRP)) {
+ /* The group ACL entry should already have been inherited from the
+ default ACL. If the source was not group executable, we want to
+ modify the destination so that it is not group executable
+ either. In the presence of ACLs, the group permissions come not
+ from the mode bits, but from the group:: ACL entry. So, to do
+ this, we remove the group::x entry. */
+ remove_default_group_obj_execute(path);
+ }
+
+ /* We need to determine whether or not to mask the execute
+ bit. This applies not only to the user/group/other entries, but
+ also to all other named entries. If the original file wasn't
+ executable, then the result probably should not be. To
+ determine whether or not "it was executable", we rely on the
+ user execute bits. Obviously this should be done before we
+ twiddle that bit. */
+ if (has_default_mask_execute(parent)) {
+ if (mode_has_perm(path_mode, S_IXUSR)) {
+ /* This just adds the group execute bit, and doesn't actually
+ grant group execute permissions. */
+ path_mode |= S_IXGRP;
+ }
+ }
+ else {
+ path_mode &= ~S_IXGRP;
+ }
+
+ }
+ else {
+ /* It's a minimal ACL. We'll repeat for the group bits what we
+ already did for the owner/other bits. */
+ if (has_default_group_obj_acl(parent)) {
+ if (has_default_group_obj_read(parent)) {
+ path_mode |= S_IRGRP;
+ }
+ else {
+ path_mode &= ~S_IRGRP;
+ }
+
+
+ if (has_default_group_obj_write(parent)) {
+ path_mode |= S_IWGRP;
+ }
+ else {
+ path_mode &= ~S_IWGRP;
+ }
+ /* We don't want to set the execute bit on via the ACL unless it
+ was on originally. */
+ if (!has_default_group_obj_execute(parent)) {
+ path_mode &= ~S_IXGRP;
+ }
+ }
+ }
+
+
/* If parent has a default user ACL, apply it. */
if (has_default_user_obj_acl(parent)) {
}
}
-
- if (has_minimal_default_acl(parent)) {
- /* With a minimal ACL, we'll repeat for the group bits what we
- already did for the owner/other bits. */
- if (has_default_group_obj_acl(parent)) {
- if (has_default_group_obj_read(parent)) {
- path_mode |= S_IRGRP;
- }
- else {
- path_mode &= ~S_IRGRP;
- }
-
-
- if (has_default_group_obj_write(parent)) {
- path_mode |= S_IWGRP;
- }
- else {
- path_mode &= ~S_IWGRP;
- }
-
- /* We don't want to set the execute bit on via the ACL unless it
- was on originally. */
- if (!has_default_group_obj_execute(parent)) {
- path_mode &= ~S_IXGRP;
- }
- }
- }
- else {
- /* The parent has an extended ACL. Extended ACLs use the mask
- entry. */
-
- /* For the group bits, we'll use the ACL's mask instead of the group
- object bits. If the default ACL had a group entry, it should
- already have propagated (but might be masked). */
- if (has_default_mask_read(parent)) {
- path_mode |= S_IRGRP;
- }
-
- if (has_default_mask_write(parent)) {
- path_mode |= S_IWGRP;
- }
-
- /* Honor the mask execute unconditionally. */
- if (has_default_mask_execute(parent)) {
- /* This just adds the group execute bit, and doesn't actually
- grant group execute permissions. */
- path_mode |= S_IXGRP;
- }
-
- if (!mode_has_perm(path_mode, S_IXGRP)) {
- /* The group ACL entry should already have been inherited from the
- default ACL. If the source was not group executable, we want to
- modify the destination so that it is not group executable
- either. In the presence of ACLs, the group permissions come not
- from the mode bits, but from the group:: ACL entry. So, to do
- this, we remove the group::x entry. */
- if (has_default_group_obj_execute(path)) {
- remove_default_group_obj_execute(path);
- }
- }
- }
-
int chmod_result = chmod(path, path_mode);
if (chmod_result == 0) {
return 1;