diff options
Diffstat (limited to 'usr/src/lib/libcmd/common/chgrp.c')
-rw-r--r-- | usr/src/lib/libcmd/common/chgrp.c | 454 |
1 files changed, 454 insertions, 0 deletions
diff --git a/usr/src/lib/libcmd/common/chgrp.c b/usr/src/lib/libcmd/common/chgrp.c new file mode 100644 index 0000000000..5538f5e310 --- /dev/null +++ b/usr/src/lib/libcmd/common/chgrp.c @@ -0,0 +1,454 @@ +/*********************************************************************** +* * +* This software is part of the ast package * +* Copyright (c) 1992-2007 AT&T Knowledge Ventures * +* and is licensed under the * +* Common Public License, Version 1.0 * +* by AT&T Knowledge Ventures * +* * +* A copy of the License is available at * +* http://www.opensource.org/licenses/cpl1.0.txt * +* (with md5 checksum 059e8cd6165cb4c31e351f2b69388fd9) * +* * +* Information and Software Systems Research * +* AT&T Research * +* Florham Park NJ * +* * +* Glenn Fowler <gsf@research.att.com> * +* David Korn <dgk@research.att.com> * +* * +***********************************************************************/ +#pragma prototyped +/* + * David Korn + * Glenn Fowler + * AT&T Research + * + * chgrp+chown + */ + +static const char usage_1[] = +"[-?@(#)$Id: chgrp (AT&T Research) 2006-10-11 $\n]" +USAGE_LICENSE +; + +static const char usage_grp_1[] = +"[+NAME?chgrp - change the group ownership of files]" +"[+DESCRIPTION?\bchgrp\b changes the group ownership of each file" +" to \agroup\a, which can be either a group name or a numeric" +" group id. The user ownership of each file may also be changed to" +" \auser\a by prepending \auser\a\b:\b to the group name.]" +; + +static const char usage_own_1[] = +"[+NAME?chown - change the ownership of files]" +"[+DESCRIPTION?\bchown\b changes the ownership of each file" +" to \auser\a, which can be either a user name or a numeric" +" user id. The group ownership of each file may also be changed to" +" \auser\a by appending \b:\b\agroup\a to the user name.]" +; + +static const char usage_2[] = +"[c:changes?Describe only files whose ownership actually changes.]" +"[f:quiet|silent?Do not report files whose ownership fails to change.]" +"[l|h:symlink?Change the ownership of the symbolic links on systems that" +" support this.]" +"[m:map?The first operand is interpreted as a file that contains a map" +" of \afrom_uid:from_gid to_uid:to_gid\a pairs. Ownership of files" +" matching the \afrom\a part of any pair is changed to the corresponding" +" \ato\a part of the pair. The process stops at the first match for" +" each file. Unmatched files are silently ignored.]" +"[n:show?Show actions but don't execute.]" +"[r:reference?Omit the explicit ownership operand and use the ownership of" +" \afile\a instead.]:[file]" +"[v:verbose?Describe changed permissions of all files.]" +"[H:metaphysical?Follow symbolic links for command arguments; otherwise don't" +" follow symbolic links when traversing directories.]" +"[L:logical|follow?Follow symbolic links when traversing directories.]" +"[P:physical|nofollow?Don't follow symbolic links when traversing directories.]" +"[R:recursive?Recursively change ownership of directories and their contents.]" +"[X:test?Canonicalize output for testing.]" + +"\n" +"\n" +; + +static const char usage_3[] = +" file ...\n" +"\n" +"[+EXIT STATUS?]{" + "[+0?All files changed successfully.]" + "[+>0?Unable to change ownership of one or more files.]" +"}" +"[+SEE ALSO?\bchmod\b(1), \btw\b(1), \bgetconf\b(1), \bls\b(1)]" +; + +#if defined(__STDPP__directive) && defined(__STDPP__hide) +__STDPP__directive pragma pp:hide lchown +#else +#define lchown ______lchown +#endif + +#include <cmd.h> +#include <cdt.h> +#include <ls.h> +#include <ctype.h> +#include <fts.h> + +#include "FEATURE/symlink" + +#if defined(__STDPP__directive) && defined(__STDPP__hide) +__STDPP__directive pragma pp:nohide lchown +#else +#undef lchown +#endif + +typedef struct /* uid/gid map */ +{ + Dtlink_t link; /* dictionary link */ + int id; /* id */ + int uid; /* id maps to this uid */ + int gid; /* id maps to this gid */ +} Map_t; + +#define NOID (-1) + +#define OPT_CHOWN (1<<0) /* chown */ +#define OPT_FORCE (1<<1) /* ignore errors */ +#define OPT_GID (1<<2) /* have gid */ +#define OPT_LCHOWN (1<<3) /* lchown */ +#define OPT_SHOW (1<<4) /* show but don't do */ +#define OPT_TEST (1<<5) /* canonicalize output */ +#define OPT_UID (1<<6) /* have uid */ +#define OPT_VERBOSE (1<<7) /* have uid */ + +extern int lchown(const char*, uid_t, gid_t); + +#if !_lib_lchown + +#ifndef ENOSYS +#define ENOSYS EINVAL +#endif + +int +lchown(const char* path, uid_t uid, gid_t gid) +{ + return ENOSYS; +} + +#endif /* _lib_chown */ + +/* + * parse uid and gid from s + */ + +static void +getids(register char* s, char** e, int* uid, int* gid, int options) +{ + register char* t; + register int n; + char* z; + char buf[64]; + + *uid = *gid = NOID; + while (isspace(*s)) + s++; + for (t = s; (n = *t) && n != ':' && n != '.' && !isspace(n); t++); + if (n) + { + options |= OPT_CHOWN; + if ((n = t++ - s) >= sizeof(buf)) + n = sizeof(buf) - 1; + *((s = (char*)memcpy(buf, s, n)) + n) = 0; + while (isspace(*t)) + t++; + } + if (options & OPT_CHOWN) + { + if (*s) + { + if ((n = struid(s)) == NOID) + { + n = (int)strtol(s, &z, 0); + if (*z) + error(ERROR_exit(1), "%s: unknown user", s); + } + *uid = n; + } + for (s = t; (n = *t) && !isspace(n); t++); + if (n) + { + if ((n = t++ - s) >= sizeof(buf)) + n = sizeof(buf) - 1; + *((s = (char*)memcpy(buf, s, n)) + n) = 0; + } + } + if (*s) + { + if ((n = strgid(s)) == NOID) + { + n = (int)strtol(s, &z, 0); + if (*z) + error(ERROR_exit(1), "%s: unknown group", s); + } + *gid = n; + } + if (e) + *e = t; +} + +int +b_chgrp(int argc, char** argv, void* context) +{ + register int options = 0; + register char* s; + register Map_t* m; + register FTS* fts; + register FTSENT*ent; + Dt_t* map = 0; + int flags; + int uid; + int gid; + char* op; + char* usage; + Sfio_t* sp; + Dtdisc_t mapdisc; + struct stat st; + int (*chownf)(const char*, uid_t, gid_t); + + cmdinit(argc, argv, context, ERROR_CATALOG, ERROR_NOTIFY); + flags = fts_flags() | FTS_TOP | FTS_NOPOSTORDER | FTS_NOSEEDOTDIR; + if (!(sp = sfstropen())) + error(ERROR_SYSTEM|3, "out of space"); + sfputr(sp, usage_1, -1); + if (error_info.id[2] == 'g') + sfputr(sp, usage_grp_1, -1); + else + { + sfputr(sp, usage_own_1, -1); + options |= OPT_CHOWN; + } + sfputr(sp, usage_2, -1); + if (options & OPT_CHOWN) + sfputr(sp, ERROR_translate(0, 0, 0, "[owner[:group]]"), -1); + else + sfputr(sp, ERROR_translate(0, 0, 0, "[[owner:]group]"), -1); + sfputr(sp, usage_3, -1); + if (!(usage = sfstruse(sp))) + error(ERROR_SYSTEM|3, "out of space"); + for (;;) + { + switch (optget(argv, usage)) + { + case 'c': + case 'v': + options |= OPT_VERBOSE; + continue; + case 'f': + options |= OPT_FORCE; + continue; + case 'l': + options |= OPT_LCHOWN; + continue; + case 'm': + memset(&mapdisc, 0, sizeof(mapdisc)); + mapdisc.key = offsetof(Map_t, id); + mapdisc.size = sizeof(int); + if (!(map = dtopen(&mapdisc, Dthash))) + error(ERROR_exit(1), "out of space [id map]"); + continue; + case 'n': + options |= OPT_SHOW; + continue; + case 'r': + if (stat(opt_info.arg, &st)) + error(ERROR_exit(1), "%s: cannot stat", opt_info.arg); + uid = st.st_uid; + gid = st.st_gid; + options |= OPT_UID|OPT_GID; + continue; + case 'H': + flags |= FTS_META|FTS_PHYSICAL; + continue; + case 'L': + flags &= ~(FTS_META|FTS_PHYSICAL); + continue; + case 'P': + flags &= ~FTS_META; + flags |= FTS_PHYSICAL; + continue; + case 'R': + flags &= ~FTS_TOP; + continue; + case 'X': + options |= OPT_TEST; + continue; + case ':': + error(2, "%s", opt_info.arg); + continue; + case '?': + error(ERROR_usage(2), "%s", opt_info.arg); + break; + } + break; + } + argv += opt_info.index; + argc -= opt_info.index; + if (error_info.errors || argc < 2) + error(ERROR_usage(2), "%s", optusage(NiL)); + s = *argv; + if (map) + { + char* t; + int nuid; + int ngid; + + if (streq(s, "-")) + sp = sfstdin; + else if (!(sp = sfopen(NiL, s, "r"))) + error(ERROR_exit(1), "%s: cannot read", s); + while (s = sfgetr(sp, '\n', 1)) + { + getids(s, &t, &uid, &gid, options); + getids(t, NiL, &nuid, &ngid, options); + if (uid != NOID) + { + if (m = (Map_t*)dtmatch(map, &uid)) + { + m->uid = nuid; + if (m->gid == NOID) + m->gid = ngid; + } + else if (m = (Map_t*)stakalloc(sizeof(Map_t))) + { + m->id = uid; + m->uid = nuid; + m->gid = ngid; + dtinsert(map, m); + } + else + error(ERROR_exit(1), "out of space [id dictionary]"); + } + if (gid != NOID) + { + if (gid == uid || (m = (Map_t*)dtmatch(map, &gid))) + m->gid = ngid; + else if (m = (Map_t*)stakalloc(sizeof(Map_t))) + { + m->id = gid; + m->uid = NOID; + m->gid = ngid; + dtinsert(map, m); + } + else + error(ERROR_exit(1), "out of space [id dictionary]"); + } + } + if (sp != sfstdin) + sfclose(sp); + } + else if (!(options & (OPT_UID|OPT_GID))) + { + getids(s, NiL, &uid, &gid, options); + if (uid != NOID) + options |= OPT_UID; + if (gid != NOID) + options |= OPT_GID; + } + switch (options & (OPT_UID|OPT_GID)) + { + case OPT_UID: + s = ERROR_translate(0, 0, 0, " owner"); + break; + case OPT_GID: + s = ERROR_translate(0, 0, 0, " group"); + break; + case OPT_UID|OPT_GID: + s = ERROR_translate(0, 0, 0, " owner and group"); + break; + default: + s = ""; + break; + } + if (!(fts = fts_open(argv + 1, flags, NiL))) + error(ERROR_system(1), "%s: not found", argv[1]); + while (!cmdquit() && (ent = fts_read(fts))) + switch (ent->fts_info) + { + case FTS_F: + case FTS_D: + case FTS_SL: + case FTS_SLNONE: + anyway: + if (map) + { + options &= ~(OPT_UID|OPT_GID); + uid = ent->fts_statp->st_uid; + gid = ent->fts_statp->st_gid; + if ((m = (Map_t*)dtmatch(map, &uid)) && m->uid != NOID) + { + uid = m->uid; + options |= OPT_UID; + } + if (gid != uid) + m = (Map_t*)dtmatch(map, &gid); + if (m && m->gid != NOID) + { + gid = m->gid; + options |= OPT_GID; + } + } + else + { + if (!(options & OPT_UID)) + uid = ent->fts_statp->st_uid; + if (!(options & OPT_GID)) + gid = ent->fts_statp->st_gid; + } + if (uid != ent->fts_statp->st_uid || gid != ent->fts_statp->st_gid) + { + if ((ent->fts_info & FTS_SL) && (flags & FTS_PHYSICAL) && (options & OPT_LCHOWN)) + { + op = "lchown"; + chownf = lchown; + } + else + { + op = "chown"; + chownf = chown; + } + if (options & (OPT_SHOW|OPT_VERBOSE)) + { + if (options & OPT_TEST) + { + ent->fts_statp->st_uid = 0; + ent->fts_statp->st_gid = 0; + } + sfprintf(sfstdout, "%s uid:%05d->%05d gid:%05d->%05d %s\n", op, ent->fts_statp->st_uid, uid, ent->fts_statp->st_gid, gid, ent->fts_accpath); + } + if (!(options & OPT_SHOW) && (*chownf)(ent->fts_accpath, uid, gid) && !(options & OPT_FORCE)) + error(ERROR_system(0), "%s: cannot change%s", ent->fts_accpath, s); + } + break; + case FTS_DC: + if (!(options & OPT_FORCE)) + error(ERROR_warn(0), "%s: directory causes cycle", ent->fts_accpath); + break; + case FTS_DNR: + if (!(options & OPT_FORCE)) + error(ERROR_system(0), "%s: cannot read directory", ent->fts_accpath); + goto anyway; + case FTS_DNX: + if (!(options & OPT_FORCE)) + error(ERROR_system(0), "%s: cannot search directory", ent->fts_accpath); + goto anyway; + case FTS_NS: + if (!(options & OPT_FORCE)) + error(ERROR_system(0), "%s: not found", ent->fts_accpath); + break; + } + fts_close(fts); + if (map) + dtclose(map); + return error_info.errors != 0; +} |