2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
4 * Copyright (c) 2008, 2009 Edward Tomasz NapieraĆa <trasz@FreeBSD.org>
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 #include <sys/cdefs.h>
30 __FBSDID("$FreeBSD$");
38 #include "acl_support.h"
40 struct flagnames_struct {
46 struct flagnames_struct a_flags[] =
47 {{ ACL_ENTRY_FILE_INHERIT, "file_inherit", 'f'},
48 { ACL_ENTRY_DIRECTORY_INHERIT, "dir_inherit", 'd'},
49 { ACL_ENTRY_INHERIT_ONLY, "inherit_only", 'i'},
50 { ACL_ENTRY_NO_PROPAGATE_INHERIT, "no_propagate", 'n'},
51 { ACL_ENTRY_SUCCESSFUL_ACCESS, "successfull_access", 'S'},
52 { ACL_ENTRY_FAILED_ACCESS, "failed_access", 'F'},
53 { ACL_ENTRY_INHERITED, "inherited", 'I' },
55 * There is no ACE_IDENTIFIER_GROUP here - SunOS does not show it
56 * in the "flags" field. There is no ACE_OWNER, ACE_GROUP or
57 * ACE_EVERYONE either, for obvious reasons.
61 struct flagnames_struct a_access_masks[] =
62 {{ ACL_READ_DATA, "read_data", 'r'},
63 { ACL_WRITE_DATA, "write_data", 'w'},
64 { ACL_EXECUTE, "execute", 'x'},
65 { ACL_APPEND_DATA, "append_data", 'p'},
66 { ACL_DELETE_CHILD, "delete_child", 'D'},
67 { ACL_DELETE, "delete", 'd'},
68 { ACL_READ_ATTRIBUTES, "read_attributes", 'a'},
69 { ACL_WRITE_ATTRIBUTES, "write_attributes", 'A'},
70 { ACL_READ_NAMED_ATTRS, "read_xattr", 'R'},
71 { ACL_WRITE_NAMED_ATTRS, "write_xattr", 'W'},
72 { ACL_READ_ACL, "read_acl", 'c'},
73 { ACL_WRITE_ACL, "write_acl", 'C'},
74 { ACL_WRITE_OWNER, "write_owner", 'o'},
75 { ACL_SYNCHRONIZE, "synchronize", 's'},
76 { ACL_FULL_SET, "full_set", '\0'},
77 { ACL_MODIFY_SET, "modify_set", '\0'},
78 { ACL_READ_SET, "read_set", '\0'},
79 { ACL_WRITE_SET, "write_set", '\0'},
83 format_flag(uint32_t *var, const struct flagnames_struct *flags)
86 for (; flags->name != NULL; flags++) {
87 if ((flags->flag & *var) == 0)
98 format_flags_verbose(char *str, size_t size, uint32_t var,
99 const struct flagnames_struct *flags)
104 while ((tmp = format_flag(&var, flags)) != NULL) {
105 off += snprintf(str + off, size - off, "%s/", tmp);
109 /* If there were any flags added... */
112 /* ... then remove the last slash. */
113 assert(str[off] == '/');
122 format_flags_compact(char *str, size_t size, uint32_t var,
123 const struct flagnames_struct *flags)
127 for (i = 0; flags[i].letter != '\0'; i++) {
129 if ((flags[i].flag & var) == 0)
132 str[i] = flags[i].letter;
141 parse_flags_verbose(const char *strp, uint32_t *var,
142 const struct flagnames_struct *flags, const char *flags_name,
145 int i, found, ever_found = 0;
152 while (str != NULL) {
153 flag = strsep(&str, "/:");
156 for (i = 0; flags[i].name != NULL; i++) {
157 if (strcmp(flags[i].name, flag) == 0) {
158 *var |= flags[i].flag;
166 warnx("malformed ACL: \"%s\" field contains "
167 "invalid flag \"%s\"", flags_name, flag);
180 parse_flags_compact(const char *str, uint32_t *var,
181 const struct flagnames_struct *flags, const char *flags_name)
191 /* Ignore minus signs. */
197 for (j = 0; flags[j].name != NULL; j++) {
198 if (flags[j].letter == str[i]) {
199 *var |= flags[j].flag;
206 warnx("malformed ACL: \"%s\" field contains "
207 "invalid flag \"%c\"", flags_name, str[i]);
214 _nfs4_format_flags(char *str, size_t size, acl_flag_t var, int verbose)
218 return (format_flags_verbose(str, size, var, a_flags));
220 return (format_flags_compact(str, size, var, a_flags));
224 _nfs4_format_access_mask(char *str, size_t size, acl_perm_t var, int verbose)
228 return (format_flags_verbose(str, size, var, a_access_masks));
230 return (format_flags_compact(str, size, var, a_access_masks));
234 _nfs4_parse_flags(const char *str, acl_flag_t *flags)
236 int error, try_compact;
239 error = parse_flags_verbose(str, &tmpflags, a_flags, "flags", &try_compact);
240 if (error && try_compact)
241 error = parse_flags_compact(str, &tmpflags, a_flags, "flags");
249 _nfs4_parse_access_mask(const char *str, acl_perm_t *perms)
251 int error, try_compact;
254 error = parse_flags_verbose(str, &tmpperms, a_access_masks,
255 "access permissions", &try_compact);
256 if (error && try_compact)
257 error = parse_flags_compact(str, &tmpperms,
258 a_access_masks, "access permissions");