2 * Copyright (c) 2017 Martin Matuska
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 __FBSDID("$FreeBSD$");
28 #if ARCHIVE_ACL_FREEBSD || ARCHIVE_ACL_DARWIN || ARCHIVE_ACL_LIBACL
29 static const acl_perm_t acl_perms[] = {
30 #if ARCHIVE_ACL_DARWIN
43 ACL_READ_EXTATTRIBUTES,
44 ACL_WRITE_EXTATTRIBUTES,
49 #else /* !ARCHIVE_ACL_DARWIN */
53 #if ARCHIVE_ACL_FREEBSD_NFS4
61 ACL_WRITE_NAMED_ATTRS,
70 #endif /* ARCHIVE_ACL_FREEBSD_NFS4 */
71 #endif /* !ARCHIVE_ACL_DARWIN */
73 #if ARCHIVE_ACL_DARWIN || ARCHIVE_ACL_FREEBSD_NFS4
74 static const acl_flag_t acl_flags[] = {
75 #if ARCHIVE_ACL_DARWIN
77 ACL_ENTRY_FILE_INHERIT,
78 ACL_ENTRY_DIRECTORY_INHERIT,
79 ACL_ENTRY_LIMIT_INHERIT,
80 ACL_ENTRY_ONLY_INHERIT
81 #else /* ARCHIVE_ACL_FREEBSD_NFS4 */
82 ACL_ENTRY_FILE_INHERIT,
83 ACL_ENTRY_DIRECTORY_INHERIT,
84 ACL_ENTRY_NO_PROPAGATE_INHERIT,
85 ACL_ENTRY_INHERIT_ONLY,
86 ACL_ENTRY_SUCCESSFUL_ACCESS,
87 ACL_ENTRY_FAILED_ACCESS,
88 #ifdef ACL_ENTRY_INHERITED
91 #endif /* ARCHIVE_ACL_FREEBSD_NFS4 */
93 #endif /* ARCHIVE_ACL_DARWIN || ARCHIVE_ACL_FREEBSD_NFS4 */
96 * Compare two ACL entries on FreeBSD or on Mac OS X
99 compare_acl_entry(acl_entry_t ae_a, acl_entry_t ae_b, int is_nfs4)
101 acl_tag_t tag_a, tag_b;
102 acl_permset_t permset_a, permset_b;
103 int perm_a, perm_b, perm_start, perm_end;
104 void *qual_a, *qual_b;
105 #if ARCHIVE_ACL_FREEBSD_NFS4
106 acl_entry_type_t type_a, type_b;
108 #if ARCHIVE_ACL_FREEBSD_NFS4 || ARCHIVE_ACL_DARWIN
109 acl_flagset_t flagset_a, flagset_b;
115 /* Compare ACL tag */
116 r = acl_get_tag_type(ae_a, &tag_a);
117 failure("acl_get_tag_type() error: %s", strerror(errno));
118 if (assertEqualInt(r, 0) == 0)
120 r = acl_get_tag_type(ae_b, &tag_b);
121 failure("acl_get_tag_type() error: %s", strerror(errno));
122 if (assertEqualInt(r, 0) == 0)
127 /* Compare ACL qualifier */
128 #if ARCHIVE_ACL_DARWIN
129 if (tag_a == ACL_EXTENDED_ALLOW || tag_b == ACL_EXTENDED_DENY)
131 if (tag_a == ACL_USER || tag_a == ACL_GROUP)
134 qual_a = acl_get_qualifier(ae_a);
135 failure("acl_get_qualifier() error: %s", strerror(errno));
136 if (assert(qual_a != NULL) == 0)
138 qual_b = acl_get_qualifier(ae_b);
139 failure("acl_get_qualifier() error: %s", strerror(errno));
140 if (assert(qual_b != NULL) == 0) {
144 #if ARCHIVE_ACL_DARWIN
145 if (memcmp(((guid_t *)qual_a)->g_guid,
146 ((guid_t *)qual_b)->g_guid, KAUTH_GUID_SIZE) != 0)
148 if ((tag_a == ACL_USER &&
149 (*(uid_t *)qual_a != *(uid_t *)qual_b)) ||
150 (tag_a == ACL_GROUP &&
151 (*(gid_t *)qual_a != *(gid_t *)qual_b)))
162 #if ARCHIVE_ACL_FREEBSD_NFS4
164 /* Compare NFS4 ACL type */
165 r = acl_get_entry_type_np(ae_a, &type_a);
166 failure("acl_get_entry_type_np() error: %s", strerror(errno));
167 if (assertEqualInt(r, 0) == 0)
169 r = acl_get_entry_type_np(ae_b, &type_b);
170 failure("acl_get_entry_type_np() error: %s", strerror(errno));
171 if (assertEqualInt(r, 0) == 0)
173 if (type_a != type_b)
178 /* Compare ACL perms */
179 r = acl_get_permset(ae_a, &permset_a);
180 failure("acl_get_permset() error: %s", strerror(errno));
181 if (assertEqualInt(r, 0) == 0)
183 r = acl_get_permset(ae_b, &permset_b);
184 failure("acl_get_permset() error: %s", strerror(errno));
185 if (assertEqualInt(r, 0) == 0)
189 perm_end = (int)(sizeof(acl_perms) / sizeof(acl_perms[0]));
190 #if ARCHIVE_ACL_FREEBSD_NFS4
196 /* Cycle through all perms and compare their value */
197 for (i = perm_start; i < perm_end; i++) {
198 #if ARCHIVE_ACL_LIBACL
199 perm_a = acl_get_perm(permset_a, acl_perms[i]);
200 perm_b = acl_get_perm(permset_b, acl_perms[i]);
202 perm_a = acl_get_perm_np(permset_a, acl_perms[i]);
203 perm_b = acl_get_perm_np(permset_b, acl_perms[i]);
205 if (perm_a == -1 || perm_b == -1)
207 if (perm_a != perm_b)
211 #if ARCHIVE_ACL_FREEBSD_NFS4 || ARCHIVE_ACL_DARWIN
213 r = acl_get_flagset_np(ae_a, &flagset_a);
214 failure("acl_get_flagset_np() error: %s", strerror(errno));
215 if (assertEqualInt(r, 0) == 0)
217 r = acl_get_flagset_np(ae_b, &flagset_b);
218 failure("acl_get_flagset_np() error: %s", strerror(errno));
219 if (assertEqualInt(r, 0) == 0)
221 /* Cycle through all flags and compare their status */
222 for (i = 0; i < (int)(sizeof(acl_flags) / sizeof(acl_flags[0]));
224 flag_a = acl_get_flag_np(flagset_a, acl_flags[i]);
225 flag_b = acl_get_flag_np(flagset_b, acl_flags[i]);
226 if (flag_a == -1 || flag_b == -1)
228 if (flag_a != flag_b)
232 #else /* ARCHIVE_ACL_FREEBSD_NFS4 || ARCHIVE_ACL_DARWIN */
233 (void)is_nfs4; /* UNUSED */
237 #endif /* ARCHIVE_ACL_FREEBSD || ARCHIVE_ACL_DARWIN || ARCHIVE_ACL_LIBACL */
239 #if ARCHIVE_ACL_SUPPORT
241 * Clear default ACLs or inheritance flags
244 clear_inheritance_flags(const char *path, int type)
247 case ARCHIVE_TEST_ACL_TYPE_POSIX1E:
248 #if ARCHIVE_ACL_POSIX1E
249 #if !ARCHIVE_ACL_SUNOS
250 acl_delete_def_file(path);
255 #endif /* ARCHIVE_ACL_POSIX1E */
257 case ARCHIVE_TEST_ACL_TYPE_NFS4:
263 (void)path; /* UNUSED */
269 compare_acls(const char *path_a, const char *path_b)
273 #if ARCHIVE_ACL_SUNOS
275 int aclcnt_a, aclcnt_b;
276 aclent_t *aclent_a, *aclent_b;
277 ace_t *ace_a, *ace_b;
279 #elif ARCHIVE_ACL_DARWIN || ARCHIVE_ACL_FREEBSD || ARCHIVE_ACL_LIBACL
281 acl_entry_t aclent_a, aclent_b;
284 #if ARCHIVE_ACL_LIBRICHACL
285 struct richacl *richacl_a, *richacl_b;
291 #if ARCHIVE_ACL_DARWIN || ARCHIVE_ACL_FREEBSD || ARCHIVE_ACL_LIBACL || \
296 #if ARCHIVE_ACL_SUNOS
297 acl_a = sunacl_get(GETACL, &aclcnt_a, 0, path_a);
299 #if ARCHIVE_ACL_SUNOS_NFS4
301 acl_a = sunacl_get(ACE_GETACL, &aclcnt_a, 0, path_a);
303 failure("acl_get() error: %s", strerror(errno));
304 if (assert(acl_a != NULL) == 0)
306 #if ARCHIVE_ACL_SUNOS_NFS4
307 acl_b = sunacl_get(ACE_GETACL, &aclcnt_b, 0, path_b);
310 acl_b = sunacl_get(GETACL, &aclcnt_b, 0, path_b);
311 if (acl_b == NULL && (errno == ENOSYS || errno == ENOTSUP)) {
315 failure("acl_get() error: %s", strerror(errno));
316 if (assert(acl_b != NULL) == 0) {
321 if (aclcnt_a != aclcnt_b) {
326 for (e = 0; e < aclcnt_a; e++) {
328 aclent_a = &((aclent_t *)acl_a)[e];
329 aclent_b = &((aclent_t *)acl_b)[e];
330 if (aclent_a->a_type != aclent_b->a_type ||
331 aclent_a->a_id != aclent_b->a_id ||
332 aclent_a->a_perm != aclent_b->a_perm) {
337 #if ARCHIVE_ACL_SUNOS_NFS4
339 ace_a = &((ace_t *)acl_a)[e];
340 ace_b = &((ace_t *)acl_b)[e];
341 if (ace_a->a_who != ace_b->a_who ||
342 ace_a->a_access_mask != ace_b->a_access_mask ||
343 ace_a->a_flags != ace_b->a_flags ||
344 ace_a->a_type != ace_b->a_type) {
351 #else /* !ARCHIVE_ACL_SUNOS */
352 #if ARCHIVE_ACL_LIBRICHACL
353 richacl_a = richacl_get_file(path_a);
354 #if !ARCHIVE_ACL_LIBACL
355 if (richacl_a == NULL &&
356 (errno == ENODATA || errno == ENOTSUP || errno == ENOSYS))
358 failure("richacl_get_file() error: %s (%s)", path_a, strerror(errno));
359 if (assert(richacl_a != NULL) == 0)
362 if (richacl_a != NULL) {
363 richacl_b = richacl_get_file(path_b);
364 if (richacl_b == NULL &&
365 (errno == ENODATA || errno == ENOTSUP || errno == ENOSYS)) {
366 richacl_free(richacl_a);
369 failure("richacl_get_file() error: %s (%s)", path_b,
371 if (assert(richacl_b != NULL) == 0) {
372 richacl_free(richacl_a);
375 if (richacl_compare(richacl_a, richacl_b) == 0)
377 richacl_free(richacl_a);
378 richacl_free(richacl_b);
381 #endif /* ARCHIVE_ACL_LIBRICHACL */
382 #if ARCHIVE_ACL_DARWIN || ARCHIVE_ACL_FREEBSD || ARCHIVE_ACL_LIBACL
383 #if ARCHIVE_ACL_DARWIN
385 acl_a = acl_get_file(path_a, ACL_TYPE_EXTENDED);
386 #elif ARCHIVE_ACL_FREEBSD_NFS4
387 acl_a = acl_get_file(path_a, ACL_TYPE_NFS4);
392 acl_a = acl_get_file(path_a, ACL_TYPE_ACCESS);
393 failure("acl_get_file() error: %s (%s)", path_a, strerror(errno));
394 if (assert(acl_a != NULL) == 0)
396 #if ARCHIVE_ACL_DARWIN
397 acl_b = acl_get_file(path_b, ACL_TYPE_EXTENDED);
398 #elif ARCHIVE_ACL_FREEBSD_NFS4
399 acl_b = acl_get_file(path_b, ACL_TYPE_NFS4);
401 #if !ARCHIVE_ACL_DARWIN
403 #if ARCHIVE_ACL_FREEBSD_NFS4
409 acl_b = acl_get_file(path_b, ACL_TYPE_ACCESS);
411 failure("acl_get_file() error: %s (%s)", path_b, strerror(errno));
412 if (assert(acl_b != NULL) == 0) {
417 a = acl_get_entry(acl_a, ACL_FIRST_ENTRY, &aclent_a);
422 b = acl_get_entry(acl_b, ACL_FIRST_ENTRY, &aclent_b);
427 #if ARCHIVE_ACL_DARWIN
428 while (a == 0 && b == 0)
429 #else /* FreeBSD, Linux */
430 while (a == 1 && b == 1)
433 r = compare_acl_entry(aclent_a, aclent_b, is_nfs4);
438 a = acl_get_entry(acl_a, ACL_NEXT_ENTRY, &aclent_a);
439 b = acl_get_entry(acl_b, ACL_NEXT_ENTRY, &aclent_b);
441 /* Entry count must match */
444 #endif /* ARCHIVE_ACL_DARWIN || ARCHIVE_ACL_FREEBSD || ARCHIVE_ACL_LIBACL */
445 #endif /* !ARCHIVE_ACL_SUNOS */
447 #if ARCHIVE_ACL_SUNOS
456 #endif /* ARCHIVE_ACL_SUPPORT */
458 DEFINE_TEST(test_option_acls)
460 #if !ARCHIVE_ACL_SUPPORT
461 skipping("ACLs are not supported on this platform");
462 #else /* ARCHIVE_ACL_SUPPORT */
465 assertMakeFile("f", 0644, "a");
466 acltype = setTestAcl("f");
468 skipping("Can't write ACLs on the filesystem");
472 /* Archive it with acls */
473 r = systemf("%s -c --no-mac-metadata --acls -f acls.tar f >acls.out 2>acls.err", testprog);
474 assertEqualInt(r, 0);
476 /* Archive it without acls */
477 r = systemf("%s -c --no-mac-metadata --no-acls -f noacls.tar f >noacls.out 2>noacls.err", testprog);
478 assertEqualInt(r, 0);
480 /* Extract acls with acls */
481 assertMakeDir("acls_acls", 0755);
482 clear_inheritance_flags("acls_acls", acltype);
483 r = systemf("%s -x -C acls_acls --no-same-permissions --acls -f acls.tar >acls_acls.out 2>acls_acls.err", testprog);
484 assertEqualInt(r, 0);
485 r = compare_acls("f", "acls_acls/f");
486 assertEqualInt(r, 1);
488 /* Extract acls without acls */
489 assertMakeDir("acls_noacls", 0755);
490 clear_inheritance_flags("acls_noacls", acltype);
491 r = systemf("%s -x -C acls_noacls -p --no-acls -f acls.tar >acls_noacls.out 2>acls_noacls.err", testprog);
492 assertEqualInt(r, 0);
493 r = compare_acls("f", "acls_noacls/f");
494 assertEqualInt(r, 0);
496 /* Extract noacls with acls flag */
497 assertMakeDir("noacls_acls", 0755);
498 clear_inheritance_flags("noacls_acls", acltype);
499 r = systemf("%s -x -C noacls_acls --no-same-permissions --acls -f noacls.tar >noacls_acls.out 2>noacls_acls.err", testprog);
500 assertEqualInt(r, 0);
501 r = compare_acls("f", "noacls_acls/f");
502 assertEqualInt(r, 0);
504 /* Extract noacls with noacls */
505 assertMakeDir("noacls_noacls", 0755);
506 clear_inheritance_flags("noacls_noacls", acltype);
507 r = systemf("%s -x -C noacls_noacls -p --no-acls -f noacls.tar >noacls_noacls.out 2>noacls_noacls.err", testprog);
508 assertEqualInt(r, 0);
509 r = compare_acls("f", "noacls_noacls/f");
510 assertEqualInt(r, 0);
511 #endif /* ARCHIVE_ACL_SUPPORT */