1
Fork 0
mirror of https://github.com/RGBCube/uutils-coreutils synced 2025-07-28 11:37:44 +00:00

chown: Almost done

TODO:
* [ ] Describe changes according to verbosity
* [ ] More tests
* [ ] Clean up the code
This commit is contained in:
Knight 2016-06-22 21:40:31 +08:00
parent 19676a3ca2
commit 04d7f81fd3

448
src/chown/chown.rs Normal file
View file

@ -0,0 +1,448 @@
#![crate_name = "uu_chown"]
// This file is part of the uutils coreutils package.
//
// (c) Jian Zeng <anonymousknight96@gmail.com>
//
// For the full copyright and license information, please view the LICENSE
// file that was distributed with this source code.
//
#![cfg_attr(feature="clippy", feature(plugin))]
#![cfg_attr(feature="clippy", plugin(clippy))]
extern crate libc;
use libc::{uid_t, gid_t, c_char, c_int};
#[macro_use]
extern crate uucore;
extern crate getopts;
use getopts::Options;
pub mod passwd;
use std::fs;
use std::os::unix::fs::MetadataExt;
use std::io::{self, Write};
use std::io::Result as IOResult;
use std::path::Path;
use std::convert::AsRef;
use std::ffi::CString;
use std::os::unix::ffi::OsStrExt;
use std::sync::Arc;
static NAME: &'static str = "chown";
static VERSION: &'static str = env!("CARGO_PKG_VERSION");
const FTS_COMFOLLOW: u8 = 1;
const FTS_PHYSICAL: u8 = 1 << 1;
const FTS_LOGICAL: u8 = 1 << 2;
extern "C" {
pub fn lchown(path: *const c_char, uid: uid_t, gid: gid_t) -> c_int;
}
pub fn uumain(args: Vec<String>) -> i32 {
let mut opts = Options::new();
opts.optflag("c",
"changes",
"like verbose but report only when a change is made");
opts.optflag("f", "silent", "");
opts.optflag("", "quiet", "suppress most error messages");
opts.optflag("v",
"verbose",
"output a diagnostic for every file processed");
opts.optflag("", "dereference", "affect the referent of each symbolic link (this is the default), rather than the symbolic link itself");
opts.optflag("h", "no-dereference", "affect symbolic links instead of any referenced file (useful only on systems that can change the ownership of a symlink)");
opts.optopt("", "from", "change the owner and/or group of each file only if its current owner and/or group match those specified here. Either may be omitted, in which case a match is not required for the omitted attribute", "CURRENT_OWNER:CURRENT_GROUP");
opts.optopt("",
"reference",
"use RFILE's owner and group rather than specifying OWNER:GROUP values",
"RFILE");
opts.optflag("",
"no-preserve-root",
"do not treat '/' specially (the default)");
opts.optflag("", "preserve-root", "fail to operate recursively on '/'");
opts.optflag("R",
"recursive",
"operate on files and directories recursively");
opts.optflag("H",
"",
"if a command line argument is a symbolic link to a directory, traverse it");
opts.optflag("L",
"",
"traverse every symbolic link to a directory encountered");
opts.optflag("P", "", "do not traverse any symbolic links (default)");
opts.optflag("", "help", "display this help and exit");
opts.optflag("", "version", "output version information and exit");
let matches = match opts.parse(&args[1..]) {
Ok(m) => m,
Err(f) => {
disp_err!("{}", f);
return 1;
}
};
let mut bit_flag = FTS_PHYSICAL;
let mut preserve_root = false;
let mut derefer = -1;
for opt in &args {
match opt.as_str() {
// If more than one is specified, only the final one takes effect.
s if s.contains('H') => bit_flag = FTS_COMFOLLOW | FTS_PHYSICAL,
s if s.contains('L') => bit_flag = FTS_LOGICAL,
s if s.contains('P') => bit_flag = FTS_PHYSICAL,
"--no-preserve-root" => preserve_root = false,
"--preserve-root" => preserve_root = true,
"--dereference" => derefer = 1,
"--no-dereference" => derefer = 0,
_ => (),
}
}
if matches.opt_present("help") {
return help();
} else if matches.opt_present("version") {
println!("{} {}", NAME, VERSION);
return 0;
}
let recursive = matches.opt_present("recursive");
if recursive {
if bit_flag == FTS_PHYSICAL {
if derefer == 1 {
show_info!("-R --dereference requires -H or -L");
return 1;
}
derefer = 0;
}
} else {
bit_flag = FTS_PHYSICAL;
}
let verbosity = if matches.opt_present("changes") {
Verbosity::Changes
} else if matches.opt_present("silent") || matches.opt_present("quiet") {
Verbosity::Silent
} else if matches.opt_present("verbose") {
Verbosity::Verbose
} else {
Verbosity::Normal
};
let filter = if let Some(spec) = matches.opt_str("from") {
match parse_spec(&spec) {
Ok((Some(uid), None)) => IfFrom::User(uid),
Ok((None, Some(gid))) => IfFrom::Group(gid),
Ok((Some(uid), Some(gid))) => IfFrom::UserGroup(uid, gid),
Ok((None, None)) => IfFrom::All,
Err(e) => {
show_info!("{}", e);
return 1;
}
}
} else {
IfFrom::All
};
if matches.free.len() < 1 {
disp_err!("missing operand");
return 1;
} else if matches.free.len() < 2 && !matches.opt_present("reference") {
disp_err!("missing operand after {}", matches.free[0]);
return 1;
}
let dest_uid: Option<u32>;
let dest_gid: Option<u32>;
if let Some(file) = matches.opt_str("reference") {
// matches.opt_present("reference")
match fs::metadata(&file) {
Ok(meta) => {
dest_gid = Some(meta.gid());
dest_uid = Some(meta.uid());
}
Err(e) => {
show_info!("failed to get attributes of '{}': {}", file, e);
return 1;
}
}
} else {
match parse_spec(&matches.free[0]) {
Ok((u, g)) => {
dest_uid = u;
dest_gid = g;
}
Err(e) => {
show_info!("{}", e);
return 1;
}
}
}
let mut files = matches.free;
files.remove(0);
let executor = Chowner {
bit_flag: bit_flag,
dest_uid: dest_uid,
dest_gid: dest_gid,
verbosity: verbosity,
recursive: recursive,
dereference: derefer != 0,
filter: filter,
preserve_root: preserve_root,
files: files,
};
executor.exec()
}
fn parse_spec(spec: &str) -> Result<(Option<u32>, Option<u32>), String> {
let args = spec.split(':').collect::<Vec<_>>();
let usr_only = args.len() == 1;
let grp_only = args.len() == 2 && args[0].is_empty() && !args[1].is_empty();
let usr_grp = args.len() == 2 && !args[0].is_empty() && !args[1].is_empty();
if usr_only {
Ok((Some(match passwd::getuid(args[0]) {
Ok(uid) => uid,
Err(_) => return Err(format!("invalid user: {}", spec)),
}),
None))
} else if grp_only {
Ok((None,
Some(match passwd::getgid(args[1]) {
Ok(gid) => gid,
Err(_) => return Err(format!("invalid group: {}", spec)),
})))
} else if usr_grp {
Ok((Some(match passwd::getuid(args[0]) {
Ok(uid) => uid,
Err(_) => return Err(format!("invalid user: {}", spec)),
}),
Some(match passwd::getgid(args[1]) {
Ok(gid) => gid,
Err(_) => return Err(format!("invalid group: {}", spec)),
})))
} else {
Ok((None, None))
}
}
enum Verbosity {
Silent,
Changes,
Normal,
Verbose,
}
enum IfFrom {
All,
User(u32),
Group(u32),
UserGroup(u32, u32),
}
struct Chowner {
dest_uid: Option<u32>,
dest_gid: Option<u32>,
bit_flag: u8,
verbosity: Verbosity,
filter: IfFrom,
files: Vec<String>,
recursive: bool,
preserve_root: bool,
dereference: bool,
}
impl Chowner {
fn exec(&self) -> i32 {
let mut ret = 0;
for f in &self.files {
if f == "/" && self.preserve_root && self.recursive {
show_info!("it is dangerous to operate recursively on '/'");
show_info!("use --no-preserve-root to override this failsafe");
ret = 1;
continue;
}
ret = self.traverse(f);
}
ret
}
fn chown<P: AsRef<Path>>(&self, path: P, follow: bool) -> IOResult<()> {
let s = CString::new(path.as_ref().as_os_str().as_bytes()).unwrap();
let ret = unsafe {
if follow {
libc::chown(s.as_ptr(),
self.dest_uid.unwrap_or((0 as uid_t).wrapping_sub(1)),
self.dest_gid.unwrap_or((0 as gid_t).wrapping_sub(1)))
} else {
lchown(s.as_ptr(),
self.dest_uid.unwrap_or((0 as uid_t).wrapping_sub(1)),
self.dest_gid.unwrap_or((0 as gid_t).wrapping_sub(1)))
}
};
if ret == 0 {
Ok(())
} else {
Err(io::Error::last_os_error())
}
}
fn traverse<P: AsRef<Path>>(&self, root: P) -> i32 {
let mut ret = 0;
let follow_arg = self.dereference || self.recursive && self.bit_flag != FTS_PHYSICAL;
let root_path = root.as_ref();
let meta = if follow_arg {
match root_path.metadata() {
Ok(meta) => meta,
Err(e) => {
show_info!("cannot dereference '{}': {}", root_path.display(), e);
return 1;
}
}
} else {
match root_path.symlink_metadata() {
Ok(meta) => meta,
Err(e) => {
show_info!("cannot access '{}': {}", root_path.display(), e);
return 1;
}
}
};
if self.matched(meta.uid(), meta.gid()) {
if let Err(e) = self.chown(root.as_ref(), follow_arg) {
show_info!("changing ownership of '{}': {}", root_path.display(), e);
ret = 1;
}
}
if !meta.is_dir() || !self.recursive {
return ret;
}
let mut dirs = vec![];
dirs.push(Arc::new(root_path.to_path_buf()));
while !dirs.is_empty() {
let dir = dirs.pop().expect("Poping directory");
for entry in dir.read_dir().unwrap() {
let entry = entry.unwrap();
let path = Arc::new(entry.path());
let smeta = if self.bit_flag & FTS_LOGICAL != 0 {
match path.metadata() {
Ok(meta) => meta,
Err(e) => {
show_info!("cannot access '{}': {}", path.display(), e);
ret = 1;
continue;
}
}
} else {
match path.symlink_metadata() {
Ok(meta) => meta,
Err(e) => {
show_info!("cannot dereference '{}': {}", path.display(), e);
ret = 1;
continue;
}
}
};
if smeta.is_dir() {
dirs.push(path.clone());
}
let meta = if self.bit_flag == FTS_PHYSICAL {
smeta
} else {
match path.metadata() {
Ok(meta) => meta,
Err(e) => {
show_info!("cannot dereference '{}': {}", path.display(), e);
ret = 1;
continue;
}
}
};
if self.matched(meta.uid(), meta.gid()) {
if let Err(e) = self.chown(&*path, true) {
ret = 1;
show_info!("changing ownership of '{}': {}", path.display(), e);
}
}
}
}
ret
}
#[inline]
fn matched(&self, uid: uid_t, gid: gid_t) -> bool {
match self.filter {
IfFrom::All => true,
IfFrom::User(u) => u == uid,
IfFrom::Group(g) => g == gid,
IfFrom::UserGroup(u, g) => u == uid && g == gid,
}
}
}
fn help() -> i32 {
println!(r#"
Usage: {0} [OPTION]... [OWNER][:[GROUP]] FILE...
or: {0} [OPTION]... --reference=RFILE FILE...
Change the owner and/or group of each FILE to OWNER and/or GROUP.
With --reference, change the owner and group of each FILE to those of RFILE.
-c, --changes like verbose but report only when a change is made
-f, --silent, --quiet suppress most error messages
-v, --verbose output a diagnostic for every file processed
--dereference affect the referent of each symbolic link (this is
the default), rather than the symbolic link itself
-h, --no-dereference affect symbolic links instead of any referenced file
(useful only on systems that can change the
ownership of a symlink)
--from=CURRENT_OWNER:CURRENT_GROUP
change the owner and/or group of each file only if
its current owner and/or group match those specified
here. Either may be omitted, in which case a match
is not required for the omitted attribute
--no-preserve-root do not treat '/' specially (the default)
--preserve-root fail to operate recursively on '/'
--reference=RFILE use RFILE's owner and group rather than
specifying OWNER:GROUP values
-R, --recursive operate on files and directories recursively
The following options modify how a hierarchy is traversed when the -R
option is also specified. If more than one is specified, only the final
one takes effect.
-H if a command line argument is a symbolic link
to a directory, traverse it
-L traverse every symbolic link to a directory
encountered
-P do not traverse any symbolic links (default)
--help display this help and exit
--version output version information and exit
Owner is unchanged if missing. Group is unchanged if missing, but changed
to login group if implied by a ':' following a symbolic OWNER.
OWNER and GROUP may be numeric as well as symbolic.
Examples:
chown root /u Change the owner of /u to "root".
chown root:staff /u Likewise, but also change its group to "staff".
chown -hR root /u Change the owner of /u and subfiles to "root".
"#,
NAME);
0
}