2 * Copyright (c) 2008, 2009 Edward Tomasz NapieraĆa <trasz@FreeBSD.org>
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 #include <sys/cdefs.h>
28 __FBSDID("$FreeBSD$");
40 #include <sys/syscall.h>
41 #include <sys/types.h>
44 #include "acl_support.h"
46 #define MAX_ENTRY_LENGTH 512
49 * Parse the tag field of ACL entry passed as "str". If qualifier
50 * needs to follow, then the variable referenced by "need_qualifier"
51 * is set to 1, otherwise it's set to 0.
54 parse_tag(const char *str, acl_entry_t entry, int *need_qualifier)
57 assert(need_qualifier != NULL);
60 if (strcmp(str, "owner@") == 0)
61 return (acl_set_tag_type(entry, ACL_USER_OBJ));
62 if (strcmp(str, "group@") == 0)
63 return (acl_set_tag_type(entry, ACL_GROUP_OBJ));
64 if (strcmp(str, "everyone@") == 0)
65 return (acl_set_tag_type(entry, ACL_EVERYONE));
69 if (strcmp(str, "user") == 0 || strcmp(str, "u") == 0)
70 return (acl_set_tag_type(entry, ACL_USER));
71 if (strcmp(str, "group") == 0 || strcmp(str, "g") == 0)
72 return (acl_set_tag_type(entry, ACL_GROUP));
74 warnx("malformed ACL: invalid \"tag\" field");
80 * Parse the qualifier field of ACL entry passed as "str".
81 * If user or group name cannot be resolved, then the variable
82 * referenced by "need_qualifier" is set to 1; it will be checked
83 * later to figure out whether the appended_id is required.
86 parse_qualifier(char *str, acl_entry_t entry, int *need_qualifier)
88 int qualifier_length, error;
92 assert(need_qualifier != NULL);
95 qualifier_length = strlen(str);
97 if (qualifier_length == 0) {
98 warnx("malformed ACL: empty \"qualifier\" field");
102 error = acl_get_tag_type(entry, &tag);
106 error = _acl_name_to_id(tag, str, &id);
112 return (acl_set_qualifier(entry, &id));
116 parse_access_mask(char *str, acl_entry_t entry)
121 error = _nfs4_parse_access_mask(str, &perm);
125 error = acl_set_permset(entry, &perm);
131 parse_flags(char *str, acl_entry_t entry)
136 error = _nfs4_parse_flags(str, &flags);
140 error = acl_set_flagset_np(entry, &flags);
146 parse_entry_type(const char *str, acl_entry_t entry)
149 if (strcmp(str, "allow") == 0)
150 return (acl_set_entry_type_np(entry, ACL_ENTRY_TYPE_ALLOW));
151 if (strcmp(str, "deny") == 0)
152 return (acl_set_entry_type_np(entry, ACL_ENTRY_TYPE_DENY));
153 if (strcmp(str, "audit") == 0)
154 return (acl_set_entry_type_np(entry, ACL_ENTRY_TYPE_AUDIT));
155 if (strcmp(str, "alarm") == 0)
156 return (acl_set_entry_type_np(entry, ACL_ENTRY_TYPE_ALARM));
158 warnx("malformed ACL: invalid \"type\" field");
164 parse_appended_id(char *str, acl_entry_t entry)
166 int qualifier_length;
170 qualifier_length = strlen(str);
171 if (qualifier_length == 0) {
172 warnx("malformed ACL: \"appended id\" field present, "
177 id = strtod(str, &end);
178 if (end - str != qualifier_length) {
179 warnx("malformed ACL: appended id is not a number");
183 return (acl_set_qualifier(entry, &id));
187 number_of_colons(const char *str)
191 while (*str != '\0') {
202 _nfs4_acl_entry_from_text(acl_t aclp, char *str)
204 int error, need_qualifier;
206 char *field, *qualifier_field;
208 error = acl_create_entry(&aclp, &entry);
212 assert(_entry_brand(entry) == ACL_BRAND_NFS4);
215 goto truncated_entry;
216 field = strsep(&str, ":");
218 field = string_skip_whitespace(field);
219 if ((*field == '\0') && (!str)) {
221 * Is an entirely comment line, skip to next
227 error = parse_tag(field, entry, &need_qualifier);
229 goto malformed_field;
231 if (need_qualifier) {
233 goto truncated_entry;
234 qualifier_field = field = strsep(&str, ":");
235 error = parse_qualifier(field, entry, &need_qualifier);
237 goto malformed_field;
241 goto truncated_entry;
242 field = strsep(&str, ":");
243 error = parse_access_mask(field, entry);
245 goto malformed_field;
248 goto truncated_entry;
249 /* Do we have "flags" field? */
250 if (number_of_colons(str) > 0) {
251 field = strsep(&str, ":");
252 error = parse_flags(field, entry);
254 goto malformed_field;
258 goto truncated_entry;
259 field = strsep(&str, ":");
260 error = parse_entry_type(field, entry);
262 goto malformed_field;
264 if (need_qualifier) {
266 warnx("malformed ACL: unknown user or group name "
267 "\"%s\"", qualifier_field);
268 goto truncated_entry;
271 error = parse_appended_id(str, entry);
273 goto malformed_field;
280 acl_delete_entry(aclp, entry);