diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 20:49:52 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 20:49:52 +0000 |
commit | 55944e5e40b1be2afc4855d8d2baf4b73d1876b5 (patch) | |
tree | 33f869f55a1b149e9b7c2b7e201867ca5dd52992 /src/shared/acl-util.h | |
parent | Initial commit. (diff) | |
download | systemd-55944e5e40b1be2afc4855d8d2baf4b73d1876b5.tar.xz systemd-55944e5e40b1be2afc4855d8d2baf4b73d1876b5.zip |
Adding upstream version 255.4.upstream/255.4
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/shared/acl-util.h')
-rw-r--r-- | src/shared/acl-util.h | 60 |
1 files changed, 60 insertions, 0 deletions
diff --git a/src/shared/acl-util.h b/src/shared/acl-util.h new file mode 100644 index 0000000..ef315c2 --- /dev/null +++ b/src/shared/acl-util.h @@ -0,0 +1,60 @@ +/* SPDX-License-Identifier: LGPL-2.1-or-later */ +#pragma once + +#include <errno.h> +#include <unistd.h> + +int fd_acl_make_read_only_fallback(int fd); +int fd_acl_make_writable_fallback(int fd); + +#if HAVE_ACL +#include <acl/libacl.h> +#include <stdbool.h> +#include <sys/acl.h> + +#include "macro.h" + +int acl_find_uid(acl_t acl, uid_t uid, acl_entry_t *entry); +int calc_acl_mask_if_needed(acl_t *acl_p); +int add_base_acls_if_needed(acl_t *acl_p, const char *path); +int acl_search_groups(const char* path, char ***ret_groups); +int parse_acl( + const char *text, + acl_t *ret_acl_access, + acl_t *ret_acl_access_exec, + acl_t *ret_acl_default, + bool want_mask); +int acls_for_file(const char *path, acl_type_t type, acl_t new, acl_t *ret); +int fd_add_uid_acl_permission(int fd, uid_t uid, unsigned mask); + +int fd_acl_make_read_only(int fd); +int fd_acl_make_writable(int fd); + +/* acl_free takes multiple argument types. + * Multiple cleanup functions are necessary. */ +DEFINE_TRIVIAL_CLEANUP_FUNC_FULL(acl_t, acl_free, NULL); +#define acl_free_charp acl_free +DEFINE_TRIVIAL_CLEANUP_FUNC_FULL(char*, acl_free_charp, NULL); +#define acl_free_uid_tp acl_free +DEFINE_TRIVIAL_CLEANUP_FUNC_FULL(uid_t*, acl_free_uid_tp, NULL); +#define acl_free_gid_tp acl_free +DEFINE_TRIVIAL_CLEANUP_FUNC_FULL(gid_t*, acl_free_gid_tp, NULL); + +#else +#define ACL_READ 0x04 +#define ACL_WRITE 0x02 +#define ACL_EXECUTE 0x01 + +static inline int fd_add_uid_acl_permission(int fd, uid_t uid, unsigned mask) { + return -EOPNOTSUPP; +} + +static inline int fd_acl_make_read_only(int fd) { + return fd_acl_make_read_only_fallback(fd); +} + +static inline int fd_acl_make_writable(int fd) { + return fd_acl_make_writable_fallback(fd); +} + +#endif |