2020-01-18 08:38:21 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
|
|
|
|
*
|
2021-04-22 08:24:48 +00:00
|
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
2020-01-18 08:38:21 +00:00
|
|
|
*/
|
|
|
|
|
2020-02-14 20:41:10 +00:00
|
|
|
#include <AK/Vector.h>
|
2021-12-31 18:28:24 +00:00
|
|
|
#include <LibCore/ArgsParser.h>
|
2022-07-25 13:04:39 +00:00
|
|
|
#include <LibCore/DirIterator.h>
|
2021-11-27 15:11:35 +00:00
|
|
|
#include <LibCore/System.h>
|
|
|
|
#include <LibMain/Main.h>
|
2020-01-12 10:13:54 +00:00
|
|
|
#include <grp.h>
|
|
|
|
#include <pwd.h>
|
2019-02-27 11:32:53 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
2019-06-07 09:49:31 +00:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <unistd.h>
|
2019-02-27 11:32:53 +00:00
|
|
|
|
2021-11-27 15:11:35 +00:00
|
|
|
ErrorOr<int> serenity_main(Main::Arguments arguments)
|
2019-02-27 11:32:53 +00:00
|
|
|
{
|
2022-04-03 23:16:06 +00:00
|
|
|
TRY(Core::System::pledge("stdio rpath chown"));
|
2020-01-12 11:52:02 +00:00
|
|
|
|
2023-03-10 14:53:52 +00:00
|
|
|
StringView spec;
|
2022-07-25 14:54:52 +00:00
|
|
|
Vector<StringView> paths;
|
2022-07-25 13:04:39 +00:00
|
|
|
bool no_dereference = false;
|
|
|
|
bool recursive = false;
|
|
|
|
bool follow_symlinks = false;
|
2021-12-31 18:28:24 +00:00
|
|
|
|
|
|
|
Core::ArgsParser args_parser;
|
|
|
|
args_parser.set_general_help("Change the ownership of a file or directory.");
|
2022-07-25 13:04:39 +00:00
|
|
|
args_parser.add_option(no_dereference, "Don't follow symlinks", "no-dereference", 'h');
|
|
|
|
args_parser.add_option(recursive, "Change file ownership recursively", "recursive", 'R');
|
|
|
|
args_parser.add_option(follow_symlinks, "Follow symlinks while recursing into directories", nullptr, 'L');
|
2021-12-31 18:28:24 +00:00
|
|
|
args_parser.add_positional_argument(spec, "User and group IDs", "USER[:GROUP]");
|
2022-07-25 14:54:52 +00:00
|
|
|
args_parser.add_positional_argument(paths, "Paths to files", "PATH");
|
2021-12-31 18:28:24 +00:00
|
|
|
args_parser.parse(arguments);
|
2019-02-27 11:32:53 +00:00
|
|
|
|
|
|
|
uid_t new_uid = -1;
|
|
|
|
gid_t new_gid = -1;
|
|
|
|
|
2022-10-22 13:38:21 +00:00
|
|
|
auto parts = spec.split_view(':', SplitBehavior::KeepEmpty);
|
2020-06-21 07:54:07 +00:00
|
|
|
if (parts[0].is_empty() || (parts.size() == 2 && parts[1].is_empty()) || parts.size() > 2) {
|
2021-05-31 14:43:25 +00:00
|
|
|
warnln("Invalid uid/gid spec");
|
2020-06-21 07:54:07 +00:00
|
|
|
return 1;
|
|
|
|
}
|
2020-01-12 10:13:54 +00:00
|
|
|
|
2020-06-12 19:07:52 +00:00
|
|
|
auto number = parts[0].to_uint();
|
|
|
|
if (number.has_value()) {
|
|
|
|
new_uid = number.value();
|
|
|
|
} else {
|
2021-11-27 15:11:35 +00:00
|
|
|
auto passwd = TRY(Core::System::getpwnam(parts[0]));
|
2021-12-23 08:41:00 +00:00
|
|
|
if (!passwd.has_value()) {
|
|
|
|
warnln("Unknown user '{}'", parts[0]);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
new_uid = passwd->pw_uid;
|
2019-02-27 11:32:53 +00:00
|
|
|
}
|
2020-01-12 10:13:54 +00:00
|
|
|
|
2019-02-27 11:32:53 +00:00
|
|
|
if (parts.size() == 2) {
|
2020-06-12 19:07:52 +00:00
|
|
|
auto number = parts[1].to_uint();
|
|
|
|
if (number.has_value()) {
|
|
|
|
new_gid = number.value();
|
|
|
|
} else {
|
2021-11-27 15:11:35 +00:00
|
|
|
auto group = TRY(Core::System::getgrnam(parts[1]));
|
2021-12-23 08:41:00 +00:00
|
|
|
if (!group.has_value()) {
|
|
|
|
warnln("Unknown group '{}'", parts[1]);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
new_gid = group->gr_gid;
|
2019-02-27 11:32:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-06-18 20:12:09 +00:00
|
|
|
Function<bool(StringView)> update_path_owner = [&](StringView path) {
|
|
|
|
auto stat_or_error = Core::System::lstat(path);
|
|
|
|
if (stat_or_error.is_error()) {
|
|
|
|
warnln("Could not stat '{}': {}", path, stat_or_error.release_error());
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto stat = stat_or_error.release_value();
|
2022-07-25 13:04:39 +00:00
|
|
|
|
|
|
|
if (S_ISLNK(stat.st_mode) && !follow_symlinks && !paths.contains_slow(path))
|
2023-06-18 20:12:09 +00:00
|
|
|
return false;
|
2022-07-25 13:04:39 +00:00
|
|
|
|
2023-06-18 20:12:09 +00:00
|
|
|
auto success = true;
|
|
|
|
auto maybe_error = no_dereference
|
|
|
|
? Core::System::lchown(path, new_uid, new_gid)
|
|
|
|
: Core::System::chown(path, new_uid, new_gid);
|
|
|
|
|
|
|
|
if (maybe_error.is_error()) {
|
|
|
|
warnln("Failed to change owner of '{}': {}", path, maybe_error.release_error());
|
|
|
|
success = false;
|
2022-07-25 14:54:52 +00:00
|
|
|
}
|
2022-07-25 13:04:39 +00:00
|
|
|
|
|
|
|
if (recursive && S_ISDIR(stat.st_mode)) {
|
|
|
|
Core::DirIterator it(path, Core::DirIterator::Flags::SkipParentAndBaseDir);
|
|
|
|
|
|
|
|
while (it.has_next())
|
2023-06-18 20:12:09 +00:00
|
|
|
success &= update_path_owner(it.next_full_path());
|
2022-07-25 13:04:39 +00:00
|
|
|
}
|
|
|
|
|
2023-06-18 20:12:09 +00:00
|
|
|
return success;
|
2022-07-25 13:04:39 +00:00
|
|
|
};
|
|
|
|
|
2023-06-18 20:12:09 +00:00
|
|
|
auto success = true;
|
|
|
|
for (auto const& path : paths) {
|
|
|
|
success &= update_path_owner(path);
|
2021-12-31 18:28:24 +00:00
|
|
|
}
|
2019-02-27 11:32:53 +00:00
|
|
|
|
2023-06-18 20:12:09 +00:00
|
|
|
return success ? 0 : 1;
|
2019-02-27 11:32:53 +00:00
|
|
|
}
|