xfreopen need not depend on freopen-safer
[gnulib.git] / lib / get-permissions.c
blob99b4664aae76122c561d9bb8f200f56d75a3b9de
1 /* Get permissions of a file. -*- coding: utf-8 -*-
3 Copyright (C) 2002-2003, 2005-2019 Free Software Foundation, Inc.
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation; either version 3 of the License, or
8 (at your option) any later version.
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with this program. If not, see <https://www.gnu.org/licenses/>.
18 Written by Paul Eggert, Andreas Grünbacher, and Bruno Haible. */
20 #include <config.h>
22 #include <string.h>
23 #include "acl.h"
25 #include "acl-internal.h"
27 /* Read the permissions of a file into CTX. If DESC is a valid file descriptor,
28 use file descriptor operations, else use filename based operations on NAME.
29 MODE is the file mode obtained from a previous stat call.
30 Return 0 if successful. Return -1 and set errno upon failure. */
32 int
33 get_permissions (const char *name, int desc, mode_t mode,
34 struct permission_context *ctx)
36 memset (ctx, 0, sizeof *ctx);
37 ctx->mode = mode;
39 #if USE_ACL && HAVE_ACL_GET_FILE
40 /* POSIX 1003.1e (draft 17 -- abandoned) specific version. */
41 /* Linux, FreeBSD, Mac OS X, IRIX, Tru64, Cygwin >= 2.5 */
42 # if !HAVE_ACL_TYPE_EXTENDED
43 /* Linux, FreeBSD, IRIX, Tru64, Cygwin >= 2.5 */
45 if (HAVE_ACL_GET_FD && desc != -1)
46 ctx->acl = acl_get_fd (desc);
47 else
48 ctx->acl = acl_get_file (name, ACL_TYPE_ACCESS);
49 if (ctx->acl == NULL)
50 return acl_errno_valid (errno) ? -1 : 0;
52 /* With POSIX ACLs, a file cannot have "no" acl; a file without
53 extended permissions has a "minimal" acl which is equivalent to the
54 file mode. */
56 if (S_ISDIR (mode))
58 ctx->default_acl = acl_get_file (name, ACL_TYPE_DEFAULT);
59 if (ctx->default_acl == NULL)
60 return -1;
63 # if HAVE_ACL_TYPE_NFS4 /* FreeBSD */
65 /* TODO (see set_permissions). */
67 # endif
69 # else /* HAVE_ACL_TYPE_EXTENDED */
70 /* Mac OS X */
72 /* On Mac OS X, acl_get_file (name, ACL_TYPE_ACCESS)
73 and acl_get_file (name, ACL_TYPE_DEFAULT)
74 always return NULL / EINVAL. You have to use
75 acl_get_file (name, ACL_TYPE_EXTENDED)
76 or acl_get_fd (open (name, ...))
77 to retrieve an ACL.
78 On the other hand,
79 acl_set_file (name, ACL_TYPE_ACCESS, acl)
80 and acl_set_file (name, ACL_TYPE_DEFAULT, acl)
81 have the same effect as
82 acl_set_file (name, ACL_TYPE_EXTENDED, acl):
83 Each of these calls sets the file's ACL. */
85 if (HAVE_ACL_GET_FD && desc != -1)
86 ctx->acl = acl_get_fd (desc);
87 else
88 ctx->acl = acl_get_file (name, ACL_TYPE_EXTENDED);
89 if (ctx->acl == NULL)
90 return acl_errno_valid (errno) ? -1 : 0;
92 # endif
94 #elif USE_ACL && defined GETACL /* Solaris, Cygwin, not HP-UX */
96 /* Solaris 2.5 through Solaris 10, Cygwin, and contemporaneous versions
97 of Unixware. The acl() call returns the access and default ACL both
98 at once. */
99 # ifdef ACE_GETACL
100 /* Solaris also has a different variant of ACLs, used in ZFS and NFSv4
101 file systems (whereas the other ones are used in UFS file systems).
102 There is an API
103 pathconf (name, _PC_ACL_ENABLED)
104 fpathconf (desc, _PC_ACL_ENABLED)
105 that allows us to determine which of the two kinds of ACLs is supported
106 for the given file. But some file systems may implement this call
107 incorrectly, so better not use it.
108 When fetching the source ACL, we simply fetch both ACL types.
109 When setting the destination ACL, we try either ACL types, assuming
110 that the kernel will translate the ACL from one form to the other.
111 (See in <http://docs.sun.com/app/docs/doc/819-2241/6n4huc7ia?l=en&a=view>
112 the description of ENOTSUP.) */
113 for (;;)
115 int ret;
117 if (desc != -1)
118 ret = facl (desc, ACE_GETACLCNT, 0, NULL);
119 else
120 ret = acl (name, ACE_GETACLCNT, 0, NULL);
121 if (ret < 0)
123 if (errno == ENOSYS || errno == EINVAL)
124 ret = 0;
125 else
126 return -1;
128 ctx->ace_count = ret;
130 if (ctx->ace_count == 0)
131 break;
133 ctx->ace_entries = (ace_t *) malloc (ctx->ace_count * sizeof (ace_t));
134 if (ctx->ace_entries == NULL)
136 errno = ENOMEM;
137 return -1;
140 if (desc != -1)
141 ret = facl (desc, ACE_GETACL, ctx->ace_count, ctx->ace_entries);
142 else
143 ret = acl (name, ACE_GETACL, ctx->ace_count, ctx->ace_entries);
144 if (ret < 0)
146 if (errno == ENOSYS || errno == EINVAL)
148 free (ctx->ace_entries);
149 ctx->ace_entries = NULL;
150 ctx->ace_count = 0;
151 break;
153 else
154 return -1;
156 if (ret <= ctx->ace_count)
158 ctx->ace_count = ret;
159 break;
161 /* Huh? The number of ACL entries has increased since the last call.
162 Repeat. */
163 free (ctx->ace_entries);
164 ctx->ace_entries = NULL;
166 # endif
168 for (;;)
170 int ret;
172 if (desc != -1)
173 ret = facl (desc, GETACLCNT, 0, NULL);
174 else
175 ret = acl (name, GETACLCNT, 0, NULL);
176 if (ret < 0)
178 if (errno == ENOSYS || errno == ENOTSUP || errno == EOPNOTSUPP)
179 ret = 0;
180 else
181 return -1;
183 ctx->count = ret;
185 if (ctx->count == 0)
186 break;
188 ctx->entries = (aclent_t *) malloc (ctx->count * sizeof (aclent_t));
189 if (ctx->entries == NULL)
191 errno = ENOMEM;
192 return -1;
195 if (desc != -1)
196 ret = facl (desc, GETACL, ctx->count, ctx->entries);
197 else
198 ret = acl (name, GETACL, ctx->count, ctx->entries);
199 if (ret < 0)
201 if (errno == ENOSYS || errno == ENOTSUP || errno == EOPNOTSUPP)
203 free (ctx->entries);
204 ctx->entries = NULL;
205 ctx->count = 0;
206 break;
208 else
209 return -1;
211 if (ret <= ctx->count)
213 ctx->count = ret;
214 break;
216 /* Huh? The number of ACL entries has increased since the last call.
217 Repeat. */
218 free (ctx->entries);
219 ctx->entries = NULL;
222 #elif USE_ACL && HAVE_GETACL /* HP-UX */
225 int ret;
227 if (desc != -1)
228 ret = fgetacl (desc, NACLENTRIES, ctx->entries);
229 else
230 ret = getacl (name, NACLENTRIES, ctx->entries);
231 if (ret < 0)
233 if (errno == ENOSYS || errno == EOPNOTSUPP || errno == ENOTSUP)
234 ret = 0;
235 else
236 return -1;
238 else if (ret > NACLENTRIES)
239 /* If NACLENTRIES cannot be trusted, use dynamic memory allocation. */
240 abort ();
241 ctx->count = ret;
243 # if HAVE_ACLV_H
244 ret = acl ((char *) name, ACL_GET, NACLVENTRIES, ctx->aclv_entries);
245 if (ret < 0)
247 if (errno == ENOSYS || errno == EOPNOTSUPP || errno == EINVAL)
248 ret = 0;
249 else
250 return -2;
252 else if (ret > NACLVENTRIES)
253 /* If NACLVENTRIES cannot be trusted, use dynamic memory allocation. */
254 abort ();
255 ctx->aclv_count = ret;
256 # endif
259 #elif USE_ACL && HAVE_ACLX_GET && ACL_AIX_WIP /* AIX */
261 /* TODO (see set_permissions). */
263 #elif USE_ACL && HAVE_STATACL /* older AIX */
266 int ret;
267 if (desc != -1)
268 ret = fstatacl (desc, STX_NORMAL, &ctx->u.a, sizeof ctx->u);
269 else
270 ret = statacl ((char *) name, STX_NORMAL, &ctx->u.a, sizeof ctx->u);
271 if (ret == 0)
272 ctx->have_u = true;
275 #elif USE_ACL && HAVE_ACLSORT /* NonStop Kernel */
278 int ret = acl ((char *) name, ACL_GET, NACLENTRIES, ctx->entries);
279 if (ret < 0)
280 return -1;
281 else if (ret > NACLENTRIES)
282 /* If NACLENTRIES cannot be trusted, use dynamic memory allocation. */
283 abort ();
284 ctx->count = ret;
287 #endif
289 return 0;