666 lines
18 KiB
Bash
Executable file
666 lines
18 KiB
Bash
Executable file
#!/bin/sh
|
|
|
|
# Show all commands when run with environment variable VERBOSE=yes.
|
|
test -z "$VERBOSE" || set -x
|
|
|
|
test "$USE_ACL" = 0 &&
|
|
{
|
|
echo "Skipping test: insufficient ACL support"
|
|
exit 77
|
|
}
|
|
|
|
# func_tmpdir
|
|
# creates a temporary directory.
|
|
# Sets variable
|
|
# - tmp pathname of freshly created temporary directory
|
|
func_tmpdir ()
|
|
{
|
|
# Use the environment variable TMPDIR, falling back to /tmp. This allows
|
|
# users to specify a different temporary directory, for example, if their
|
|
# /tmp is filled up or too small.
|
|
: "${TMPDIR=/tmp}"
|
|
{
|
|
# Use the mktemp program if available. If not available, hide the error
|
|
# message.
|
|
tmp=`(umask 077 && mktemp -d "$TMPDIR/glXXXXXX") 2>/dev/null` &&
|
|
test -n "$tmp" && test -d "$tmp"
|
|
} ||
|
|
{
|
|
# Use a simple mkdir command. It is guaranteed to fail if the directory
|
|
# already exists. $RANDOM is bash specific and expands to empty in shells
|
|
# other than bash, ksh and zsh. Its use does not increase security;
|
|
# rather, it minimizes the probability of failure in a very cluttered /tmp
|
|
# directory.
|
|
tmp=$TMPDIR/gl$$-$RANDOM
|
|
(umask 077 && mkdir "$tmp")
|
|
} ||
|
|
{
|
|
echo "$0: cannot create a temporary directory in $TMPDIR" >&2
|
|
exit 1
|
|
}
|
|
}
|
|
|
|
func_tmpdir
|
|
# builddir may already be set by the script that invokes this one.
|
|
case "$builddir" in
|
|
'') builddir=`pwd` ;;
|
|
/* | ?:*) ;;
|
|
*) builddir=`pwd`/$builddir ;;
|
|
esac
|
|
cd "$builddir" ||
|
|
{
|
|
echo "$0: cannot determine build directory (unreadable parent dir?)" >&2
|
|
exit 1
|
|
}
|
|
# Switch to a temporary directory, to increase the likelihood that ACLs are
|
|
# supported on the current file system. (/tmp is usually locally mounted,
|
|
# whereas the build dir is sometimes NFS-mounted.)
|
|
( cd "$tmp"
|
|
|
|
# Prepare tmpfile0.
|
|
rm -f tmpfile[0-9] tmpaclout[0-2]
|
|
echo "Simple contents" > tmpfile0
|
|
chmod 600 tmpfile0
|
|
|
|
# Classification of the platform according to the programs available for
|
|
# manipulating ACLs.
|
|
# Possible values are:
|
|
# linux, cygwin, freebsd, solaris, hpux, hpuxjfs, osf1, aix, macosx, irix, none.
|
|
# TODO: Support also native Windows platforms (mingw).
|
|
acl_flavor=none
|
|
if (getfacl tmpfile0 >/dev/null) 2>/dev/null; then
|
|
# Platforms with the getfacl and setfacl programs.
|
|
# Linux, FreeBSD, NetBSD >= 10, Solaris, Cygwin.
|
|
if (setfacl --help >/dev/null) 2>/dev/null; then
|
|
# Linux, Cygwin.
|
|
if (LC_ALL=C setfacl --help | grep ' --set-file' >/dev/null) 2>/dev/null; then
|
|
# Linux.
|
|
acl_flavor=linux
|
|
else
|
|
acl_flavor=cygwin
|
|
fi
|
|
else
|
|
# FreeBSD, NetBSD >= 10, Solaris.
|
|
if (LC_ALL=C setfacl 2>&1 | grep '\-x entries' >/dev/null) 2>/dev/null; then
|
|
# FreeBSD, NetBSD >= 10.
|
|
acl_flavor=freebsd
|
|
else
|
|
# Solaris.
|
|
acl_flavor=solaris
|
|
fi
|
|
fi
|
|
else
|
|
if (lsacl / >/dev/null) 2>/dev/null; then
|
|
# Platforms with the lsacl and chacl programs.
|
|
# HP-UX, sometimes also IRIX.
|
|
if (getacl tmpfile0 >/dev/null) 2>/dev/null; then
|
|
# HP-UX 11.11 or newer.
|
|
acl_flavor=hpuxjfs
|
|
else
|
|
# HP-UX 11.00.
|
|
acl_flavor=hpux
|
|
fi
|
|
else
|
|
if (getacl tmpfile0 >/dev/null) 2>/dev/null; then
|
|
# Tru64, NonStop Kernel.
|
|
if (getacl -m tmpfile0 >/dev/null) 2>/dev/null; then
|
|
# Tru64.
|
|
acl_flavor=osf1
|
|
else
|
|
# NonStop Kernel.
|
|
acl_flavor=nsk
|
|
fi
|
|
else
|
|
if (aclget tmpfile0 >/dev/null) 2>/dev/null; then
|
|
# AIX.
|
|
acl_flavor=aix
|
|
else
|
|
if (fsaclctl -v >/dev/null) 2>/dev/null; then
|
|
# Mac OS X.
|
|
acl_flavor=macosx
|
|
else
|
|
if test -f /sbin/chacl; then
|
|
# IRIX.
|
|
acl_flavor=irix
|
|
fi
|
|
fi
|
|
fi
|
|
fi
|
|
fi
|
|
fi
|
|
|
|
# Define a function to test for the same ACLs, from the point of view of
|
|
# the programs.
|
|
# func_test_same_acls file1 file2
|
|
case $acl_flavor in
|
|
linux | cygwin | freebsd | solaris)
|
|
func_test_same_acls ()
|
|
{
|
|
getfacl "$1" | sed -e "s/$1/FILENAME/g" > tmpaclout1
|
|
getfacl "$2" | sed -e "s/$2/FILENAME/g" > tmpaclout2
|
|
cmp tmpaclout1 tmpaclout2 > /dev/null
|
|
}
|
|
;;
|
|
hpux)
|
|
func_test_same_acls ()
|
|
{
|
|
lsacl "$1" | sed -e "s/$1/FILENAME/g" > tmpaclout1
|
|
lsacl "$2" | sed -e "s/$2/FILENAME/g" > tmpaclout2
|
|
cmp tmpaclout1 tmpaclout2 > /dev/null
|
|
}
|
|
;;
|
|
hpuxjfs)
|
|
func_test_same_acls ()
|
|
{
|
|
{ lsacl "$1" | sed -e "s/$1/FILENAME/g" > tmpaclout1
|
|
lsacl "$2" | sed -e "s/$2/FILENAME/g" > tmpaclout2
|
|
cmp tmpaclout1 tmpaclout2 > /dev/null
|
|
} &&
|
|
{ getacl "$1" | sed -e "s/$1/FILENAME/g" > tmpaclout1
|
|
getacl "$2" | sed -e "s/$2/FILENAME/g" > tmpaclout2
|
|
cmp tmpaclout1 tmpaclout2 > /dev/null
|
|
}
|
|
}
|
|
;;
|
|
osf1 | nsk)
|
|
func_test_same_acls ()
|
|
{
|
|
getacl "$1" | sed -e "s/$1/FILENAME/g" > tmpaclout1
|
|
getacl "$2" | sed -e "s/$2/FILENAME/g" > tmpaclout2
|
|
cmp tmpaclout1 tmpaclout2 > /dev/null
|
|
}
|
|
;;
|
|
aix)
|
|
func_test_same_acls ()
|
|
{
|
|
aclget "$1" > tmpaclout1
|
|
aclget "$2" > tmpaclout2
|
|
cmp tmpaclout1 tmpaclout2 > /dev/null
|
|
}
|
|
;;
|
|
macosx)
|
|
func_test_same_acls ()
|
|
{
|
|
/bin/ls -le "$1" | sed -e "s/$1/FILENAME/g" > tmpaclout1
|
|
/bin/ls -le "$2" | sed -e "s/$2/FILENAME/g" > tmpaclout2
|
|
cmp tmpaclout1 tmpaclout2 > /dev/null
|
|
}
|
|
;;
|
|
irix)
|
|
func_test_same_acls ()
|
|
{
|
|
/bin/ls -lD "$1" | sed -e "s/$1/FILENAME/g" > tmpaclout1
|
|
/bin/ls -lD "$2" | sed -e "s/$2/FILENAME/g" > tmpaclout2
|
|
cmp tmpaclout1 tmpaclout2 > /dev/null
|
|
}
|
|
;;
|
|
none)
|
|
func_test_same_acls ()
|
|
{
|
|
:
|
|
}
|
|
;;
|
|
esac
|
|
|
|
# func_test_copy file1 file2
|
|
# copies file1 to file2 and verifies the permissions and ACLs are the same
|
|
# on both.
|
|
func_test_copy ()
|
|
{
|
|
echo "Simple contents" > "$2"
|
|
chmod 600 "$2"
|
|
${CHECKER} "$builddir"/test-copy-acl${EXEEXT} "$1" "$2" || exit 1
|
|
${CHECKER} "$builddir"/test-sameacls${EXEEXT} "$1" "$2" || exit 1
|
|
func_test_same_acls "$1" "$2" || exit 1
|
|
}
|
|
|
|
func_test_copy tmpfile0 tmpfile1
|
|
|
|
if test $acl_flavor != none; then
|
|
# A POSIX compliant 'id' program.
|
|
if test -f /usr/xpg4/bin/id; then
|
|
ID=/usr/xpg4/bin/id
|
|
else
|
|
ID=id
|
|
fi
|
|
# Use a user and group id different from the current one, to avoid
|
|
# redundant/ambiguous ACLs.
|
|
myuid=`$ID -u`
|
|
mygid=`$ID -g`
|
|
auid=1
|
|
if test "$auid" = "$myuid"; then auid=2; fi
|
|
agid=1
|
|
if test "$agid" = "$mygid"; then agid=2; fi
|
|
|
|
case $acl_flavor in
|
|
linux | freebsd | solaris)
|
|
|
|
# Set an ACL for a user.
|
|
setfacl -m user:$auid:1 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile2
|
|
|
|
# Set an ACL for a group.
|
|
setfacl -m group:$agid:4 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile3
|
|
|
|
# Set an ACL for other.
|
|
case $acl_flavor in
|
|
freebsd) setfacl -m other::4 tmpfile0 ;;
|
|
solaris) chmod o+r tmpfile0 ;;
|
|
*) setfacl -m other:4 tmpfile0 ;;
|
|
esac
|
|
|
|
func_test_copy tmpfile0 tmpfile4
|
|
|
|
# Remove the ACL for the user.
|
|
case $acl_flavor in
|
|
linux) setfacl -x user:$auid tmpfile0 ;;
|
|
freebsd) setfacl -x user:$auid:1 tmpfile0 ;;
|
|
*) setfacl -d user:$auid:1 tmpfile0 ;;
|
|
esac
|
|
|
|
func_test_copy tmpfile0 tmpfile5
|
|
|
|
# Remove the ACL for other.
|
|
case $acl_flavor in
|
|
linux | solaris) ;; # impossible
|
|
freebsd) setfacl -x other::4 tmpfile0 ;;
|
|
*) setfacl -d other:4 tmpfile0 ;;
|
|
esac
|
|
|
|
func_test_copy tmpfile0 tmpfile6
|
|
|
|
# Remove the ACL for the group.
|
|
case $acl_flavor in
|
|
linux) setfacl -x group:$agid tmpfile0 ;;
|
|
freebsd) setfacl -x group:$agid:4 tmpfile0 ;;
|
|
*) setfacl -d group:$agid:4 tmpfile0 ;;
|
|
esac
|
|
|
|
func_test_copy tmpfile0 tmpfile7
|
|
|
|
# Delete all optional ACLs.
|
|
case $acl_flavor in
|
|
linux | freebsd)
|
|
setfacl -m user:$auid:1 tmpfile0
|
|
setfacl -b tmpfile0
|
|
;;
|
|
*)
|
|
setfacl -s user::6,group::0,other:0 tmpfile0 ;;
|
|
esac
|
|
|
|
func_test_copy tmpfile0 tmpfile8
|
|
|
|
# Copy ACLs from a file that has no ACLs.
|
|
echo > tmpfile9
|
|
chmod a+x tmpfile9
|
|
case $acl_flavor in
|
|
linux) getfacl tmpfile9 | setfacl --set-file=- tmpfile0 ;;
|
|
freebsd) ;;
|
|
*) getfacl tmpfile9 | setfacl -f - tmpfile0 ;;
|
|
esac
|
|
rm -f tmpfile9
|
|
|
|
func_test_copy tmpfile0 tmpfile9
|
|
|
|
;;
|
|
|
|
cygwin)
|
|
|
|
# Set an ACL for a group.
|
|
# Group 1 in Cygwin corresponds to the DIALUP users (cf.
|
|
# <https://learn.microsoft.com/en-us/windows/win32/secauthz/well-known-sids>).
|
|
setfacl -m group:1:1 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile2
|
|
|
|
# Set an ACL for other.
|
|
setfacl -m other:4 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile4
|
|
|
|
# Remove the ACL for the group.
|
|
setfacl -d group:1 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile5
|
|
|
|
# Remove the ACL for other.
|
|
setfacl -d other:4 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile6
|
|
|
|
# Delete all optional ACLs.
|
|
setfacl -s user::6,group::0,other:0 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile8
|
|
|
|
# Copy ACLs from a file that has no ACLs.
|
|
echo > tmpfile9
|
|
chmod a+x tmpfile9
|
|
getfacl tmpfile9 | setfacl -f - tmpfile0
|
|
rm -f tmpfile9
|
|
|
|
func_test_copy tmpfile0 tmpfile9
|
|
|
|
;;
|
|
|
|
hpux)
|
|
|
|
# Set an ACL for a user.
|
|
orig=`lsacl tmpfile0 | sed -e 's/ tmpfile0$//'`
|
|
chacl -r "${orig}($auid.%,--x)" tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile2
|
|
|
|
# Set an ACL for a group.
|
|
orig=`lsacl tmpfile0 | sed -e 's/ tmpfile0$//'`
|
|
chacl -r "${orig}(%.$agid,r--)" tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile3
|
|
|
|
# Set an ACL for other.
|
|
orig=`lsacl tmpfile0 | sed -e 's/ tmpfile0$//'`
|
|
chacl -r "${orig}(%.%,r--)" tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile4
|
|
|
|
# Remove the ACL for the user.
|
|
chacl -d "($auid.%,--x)" tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile5
|
|
|
|
# Remove the ACL for the group.
|
|
chacl -d "(%.$agid,r--)" tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile6
|
|
|
|
# Delete all optional ACLs.
|
|
chacl -z tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile8
|
|
|
|
# Copy ACLs from a file that has no ACLs.
|
|
echo > tmpfile9
|
|
chmod a+x tmpfile9
|
|
orig=`lsacl tmpfile9 | sed -e 's/ tmpfile9$//'`
|
|
rm -f tmpfile9
|
|
chacl -r "${orig}" tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile9
|
|
|
|
;;
|
|
|
|
hpuxjfs)
|
|
|
|
# Set an ACL for a user.
|
|
orig=`lsacl tmpfile0 | sed -e 's/ tmpfile0$//'`
|
|
chacl -r "${orig}($auid.%,--x)" tmpfile0 \
|
|
|| setacl -m user:$auid:1 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile2
|
|
|
|
# Set an ACL for a group.
|
|
orig=`lsacl tmpfile0 | sed -e 's/ tmpfile0$//'`
|
|
chacl -r "${orig}(%.$agid,r--)" tmpfile0 \
|
|
|| setacl -m group:$agid:4 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile3
|
|
|
|
# Set an ACL for other.
|
|
orig=`lsacl tmpfile0 | sed -e 's/ tmpfile0$//'`
|
|
chacl -r "${orig}(%.%,r--)" tmpfile0 \
|
|
|| setacl -m other:4 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile4
|
|
|
|
# Remove the ACL for the user.
|
|
chacl -d "($auid.%,--x)" tmpfile0 \
|
|
|| setacl -d user:$auid tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile5
|
|
|
|
# Remove the ACL for the group.
|
|
chacl -d "(%.$agid,r--)" tmpfile0 \
|
|
|| setacl -d group:$agid tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile6
|
|
|
|
# Delete all optional ACLs.
|
|
chacl -z tmpfile0 \
|
|
|| { setacl -m user:$auid:1 tmpfile0
|
|
setacl -s user::6,group::0,class:7,other:0 tmpfile0
|
|
}
|
|
|
|
func_test_copy tmpfile0 tmpfile8
|
|
|
|
# Copy ACLs from a file that has no ACLs.
|
|
echo > tmpfile9
|
|
chmod a+x tmpfile9
|
|
orig=`lsacl tmpfile9 | sed -e 's/ tmpfile9$//'`
|
|
getacl tmpfile9 > tmpaclout0
|
|
rm -f tmpfile9
|
|
chacl -r "${orig}" tmpfile0 \
|
|
|| setacl -f tmpaclout0 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile9
|
|
|
|
;;
|
|
|
|
osf1)
|
|
|
|
# Set an ACL for a user.
|
|
setacl -u user:$auid:1 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile2
|
|
|
|
# Set an ACL for a group.
|
|
setacl -u group:$agid:4 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile3
|
|
|
|
# Set an ACL for other.
|
|
setacl -u other::4 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile4
|
|
|
|
# Remove the ACL for the user.
|
|
setacl -x user:$auid:1 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile5
|
|
|
|
if false; then # would give an error "can't set ACL: Invalid argument"
|
|
# Remove the ACL for other.
|
|
setacl -x other::4 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile6
|
|
fi
|
|
|
|
# Remove the ACL for the group.
|
|
setacl -x group:$agid:4 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile7
|
|
|
|
# Delete all optional ACLs.
|
|
setacl -u user:$auid:1 tmpfile0
|
|
setacl -b tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile8
|
|
|
|
# Copy ACLs from a file that has no ACLs.
|
|
echo > tmpfile9
|
|
chmod a+x tmpfile9
|
|
getacl tmpfile9 > tmpaclout0
|
|
setacl -b -U tmpaclout0 tmpfile0
|
|
rm -f tmpfile9
|
|
|
|
func_test_copy tmpfile0 tmpfile9
|
|
|
|
;;
|
|
|
|
nsk)
|
|
|
|
# Set an ACL for a user.
|
|
setacl -m user:$auid:1 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile2
|
|
|
|
# Set an ACL for a group.
|
|
setacl -m group:$agid:4 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile3
|
|
|
|
# Set an ACL for other.
|
|
setacl -m other:4 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile4
|
|
|
|
# Remove the ACL for the user.
|
|
setacl -d user:$auid tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile5
|
|
|
|
# Remove the ACL for the group.
|
|
setacl -d group:$agid tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile6
|
|
|
|
# Delete all optional ACLs.
|
|
setacl -m user:$auid:1 tmpfile0
|
|
setacl -s user::6,group::0,class:7,other:0 tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile8
|
|
|
|
# Copy ACLs from a file that has no ACLs.
|
|
echo > tmpfile9
|
|
chmod a+x tmpfile9
|
|
getacl tmpfile9 > tmpaclout0
|
|
setacl -f tmpaclout0 tmpfile0
|
|
rm -f tmpfile9
|
|
|
|
func_test_copy tmpfile0 tmpfile9
|
|
|
|
;;
|
|
|
|
aix)
|
|
|
|
# Set an ACL for a user.
|
|
{ aclget tmpfile0 | sed -e 's/disabled$/enabled/'; echo " permit --x u:$auid"; } | aclput tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile2
|
|
|
|
# Set an ACL for a group.
|
|
{ aclget tmpfile0 | sed -e 's/disabled$/enabled/'; echo " permit r-- g:$agid"; } | aclput tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile3
|
|
|
|
# Set an ACL for other.
|
|
chmod o+r tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile4
|
|
|
|
# Remove the ACL for the user.
|
|
aclget tmpfile0 | grep -v ' u:[^ ]*$' | aclput tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile5
|
|
|
|
# Remove the ACL for the group.
|
|
aclget tmpfile0 | grep -v ' g:[^ ]*$' | aclput tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile7
|
|
|
|
# Delete all optional ACLs.
|
|
aclget tmpfile0 | sed -e 's/enabled$/disabled/' | sed -e '/disabled$/q' | aclput tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile8
|
|
|
|
# Copy ACLs from a file that has no ACLs.
|
|
echo > tmpfile9
|
|
chmod a+x tmpfile9
|
|
aclget tmpfile9 | aclput tmpfile0
|
|
rm -f tmpfile9
|
|
|
|
func_test_copy tmpfile0 tmpfile9
|
|
|
|
;;
|
|
|
|
macosx)
|
|
|
|
# Set an ACL for a user.
|
|
/bin/chmod +a "user:daemon allow execute" tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile2
|
|
|
|
# Set an ACL for a group.
|
|
/bin/chmod +a "group:daemon allow read" tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile3
|
|
|
|
# Set an ACL for other.
|
|
chmod o+r tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile4
|
|
|
|
# Remove the ACL for the user.
|
|
/bin/chmod -a "user:daemon allow execute" tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile5
|
|
|
|
# Remove the ACL for the group.
|
|
/bin/chmod -a "group:daemon allow read" tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile7
|
|
|
|
# Delete all optional ACLs.
|
|
/bin/chmod -N tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile8
|
|
|
|
# Copy ACLs from a file that has no ACLs.
|
|
echo > tmpfile9
|
|
chmod a+x tmpfile9
|
|
{ /bin/ls -le tmpfile9 | sed -n -e 's/^ [0-9][0-9]*: //p'; echo; } | /bin/chmod -E tmpfile0
|
|
rm -f tmpfile9
|
|
|
|
func_test_copy tmpfile0 tmpfile9
|
|
|
|
;;
|
|
|
|
irix)
|
|
|
|
# Set an ACL for a user.
|
|
/sbin/chacl user::rw-,group::---,other::---,user:$auid:--x tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile2
|
|
|
|
# Set an ACL for a group.
|
|
/sbin/chacl user::rw-,group::---,other::---,user:$auid:--x,group:$agid:r-- tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile3
|
|
|
|
# Set an ACL for other.
|
|
/sbin/chacl user::rw-,group::---,user:$auid:--x,group:$agid:r--,other::r-- tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile4
|
|
|
|
# Remove the ACL for the user.
|
|
/sbin/chacl user::rw-,group::---,group:$agid:r--,other::r-- tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile5
|
|
|
|
# Remove the ACL for the group.
|
|
/sbin/chacl user::rw-,group::---,other::r-- tmpfile0
|
|
|
|
func_test_copy tmpfile0 tmpfile7
|
|
|
|
;;
|
|
|
|
esac
|
|
fi
|
|
|
|
rm -f tmpfile[0-9] tmpaclout[0-2]
|
|
) || exit 1
|
|
|
|
rm -rf "$tmp"
|
|
exit 0
|