forked from SerenityOS/serenity
-
Notifications
You must be signed in to change notification settings - Fork 0
/
chown.cpp
101 lines (85 loc) · 3 KB
/
chown.cpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
/*
* Copyright (c) 2018-2020, Andreas Kling <[email protected]>
*
* SPDX-License-Identifier: BSD-2-Clause
*/
#include <AK/String.h>
#include <AK/Vector.h>
#include <LibCore/ArgsParser.h>
#include <LibCore/DirIterator.h>
#include <LibCore/System.h>
#include <LibMain/Main.h>
#include <grp.h>
#include <pwd.h>
#include <stdio.h>
#include <string.h>
#include <sys/stat.h>
#include <unistd.h>
ErrorOr<int> serenity_main(Main::Arguments arguments)
{
TRY(Core::System::pledge("stdio rpath chown"));
String spec;
Vector<StringView> paths;
bool no_dereference = false;
bool recursive = false;
bool follow_symlinks = false;
Core::ArgsParser args_parser;
args_parser.set_general_help("Change the ownership of a file or directory.");
args_parser.add_option(no_dereference, "Don't follow symlinks", "no-dereference", 'h');
args_parser.add_option(recursive, "Change file ownership recursively", "recursive", 'R');
args_parser.add_option(follow_symlinks, "Follow symlinks while recursing into directories", nullptr, 'L');
args_parser.add_positional_argument(spec, "User and group IDs", "USER[:GROUP]");
args_parser.add_positional_argument(paths, "Paths to files", "PATH");
args_parser.parse(arguments);
uid_t new_uid = -1;
gid_t new_gid = -1;
auto parts = spec.split_view(':', true);
if (parts[0].is_empty() || (parts.size() == 2 && parts[1].is_empty()) || parts.size() > 2) {
warnln("Invalid uid/gid spec");
return 1;
}
auto number = parts[0].to_uint();
if (number.has_value()) {
new_uid = number.value();
} else {
auto passwd = TRY(Core::System::getpwnam(parts[0]));
if (!passwd.has_value()) {
warnln("Unknown user '{}'", parts[0]);
return 1;
}
new_uid = passwd->pw_uid;
}
if (parts.size() == 2) {
auto number = parts[1].to_uint();
if (number.has_value()) {
new_gid = number.value();
} else {
auto group = TRY(Core::System::getgrnam(parts[1]));
if (!group.has_value()) {
warnln("Unknown group '{}'", parts[1]);
return 1;
}
new_gid = group->gr_gid;
}
}
Function<ErrorOr<void>(StringView)> update_path_owner = [&](StringView path) -> ErrorOr<void> {
auto stat = TRY(Core::System::lstat(path));
if (S_ISLNK(stat.st_mode) && !follow_symlinks && !paths.contains_slow(path))
return {};
if (no_dereference) {
TRY(Core::System::lchown(path, new_uid, new_gid));
} else {
TRY(Core::System::chown(path, new_uid, new_gid));
}
if (recursive && S_ISDIR(stat.st_mode)) {
Core::DirIterator it(path, Core::DirIterator::Flags::SkipParentAndBaseDir);
while (it.has_next())
TRY(update_path_owner(it.next_full_path()));
}
return {};
};
for (auto path : paths) {
TRY(update_path_owner(path));
}
return 0;
}