//! Implementation of the calls to handle POSIX access control lists // see C header file for reference extern crate libc; use std::ffi::CString; use std::marker::PhantomData; use std::os::unix::ffi::OsStrExt; use std::os::unix::io::RawFd; use std::path::Path; use std::ptr; use libc::{c_char, c_int, c_uint, c_void}; use nix::errno::Errno; use nix::NixPath; // from: acl/include/acl.h pub const ACL_UNDEFINED_ID: u32 = 0xffffffff; // acl_perm_t values pub type ACLPerm = c_uint; pub const ACL_READ: ACLPerm = 0x04; pub const ACL_WRITE: ACLPerm = 0x02; pub const ACL_EXECUTE: ACLPerm = 0x01; // acl_tag_t values pub type ACLTag = c_int; pub const ACL_UNDEFINED_TAG: ACLTag = 0x00; pub const ACL_USER_OBJ: ACLTag = 0x01; pub const ACL_USER: ACLTag = 0x02; pub const ACL_GROUP_OBJ: ACLTag = 0x04; pub const ACL_GROUP: ACLTag = 0x08; pub const ACL_MASK: ACLTag = 0x10; pub const ACL_OTHER: ACLTag = 0x20; // acl_type_t values pub type ACLType = c_uint; pub const ACL_TYPE_ACCESS: ACLType = 0x8000; pub const ACL_TYPE_DEFAULT: ACLType = 0x4000; // acl entry constants pub const ACL_FIRST_ENTRY: c_int = 0; pub const ACL_NEXT_ENTRY: c_int = 1; // acl to extended attribute names constants // from: acl/include/acl_ea.h pub const ACL_EA_ACCESS: &'static str = "system.posix_acl_access"; pub const ACL_EA_DEFAULT: &'static str = "system.posix_acl_default"; pub const ACL_EA_VERSION: u32 = 0x0002; #[link(name = "acl")] extern "C" { fn acl_get_file(path: *const c_char, acl_type: ACLType) -> *mut c_void; fn acl_set_file(path: *const c_char, acl_type: ACLType, acl: *mut c_void) -> c_int; fn acl_get_fd(fd: RawFd) -> *mut c_void; fn acl_get_entry(acl: *const c_void, entry_id: c_int, entry: *mut *mut c_void) -> c_int; fn acl_create_entry(acl: *mut *mut c_void, entry: *mut *mut c_void) -> c_int; fn acl_get_tag_type(entry: *mut c_void, tag_type: *mut ACLTag) -> c_int; fn acl_set_tag_type(entry: *mut c_void, tag_type: ACLTag) -> c_int; fn acl_get_permset(entry: *mut c_void, permset: *mut *mut c_void) -> c_int; fn acl_clear_perms(permset: *mut c_void) -> c_int; fn acl_get_perm(permset: *mut c_void, perm: ACLPerm) -> c_int; fn acl_add_perm(permset: *mut c_void, perm: ACLPerm) -> c_int; fn acl_get_qualifier(entry: *mut c_void) -> *mut c_void; fn acl_set_qualifier(entry: *mut c_void, qualifier: *const c_void) -> c_int; fn acl_init(count: c_int) -> *mut c_void; fn acl_valid(ptr: *const c_void) -> c_int; fn acl_free(ptr: *mut c_void) -> c_int; } #[derive(Debug)] pub struct ACL { ptr: *mut c_void, } impl Drop for ACL { fn drop(&mut self) { let ret = unsafe { acl_free(self.ptr) }; if ret != 0 { panic!("invalid pointer encountered while dropping ACL - {}", Errno::last()); } } } impl ACL { pub fn init(count: usize) -> Result { let ptr = unsafe { acl_init(count as i32 as c_int) }; if ptr.is_null() { return Err(Errno::last()); } Ok(ACL { ptr }) } pub fn get_file>(path: P, acl_type: ACLType) -> Result { let path_cstr = CString::new(path.as_ref().as_os_str().as_bytes()).unwrap(); let ptr = unsafe { acl_get_file(path_cstr.as_ptr(), acl_type) }; if ptr.is_null() { return Err(Errno::last()); } Ok(ACL { ptr }) } pub fn set_file(&self, path: &P, acl_type: ACLType) -> nix::Result<()> { path.with_nix_path(|path| { Errno::result(unsafe { acl_set_file(path.as_ptr(), acl_type, self.ptr) }) })? .map(drop) } pub fn get_fd(fd: RawFd) -> Result { let ptr = unsafe { acl_get_fd(fd) }; if ptr.is_null() { return Err(Errno::last()); } Ok(ACL { ptr }) } pub fn create_entry(&mut self) -> Result { let mut ptr = ptr::null_mut() as *mut c_void; let res = unsafe { acl_create_entry(&mut self.ptr, &mut ptr) }; if res < 0 { return Err(Errno::last()); } Ok(ACLEntry { ptr, _phantom: PhantomData, }) } pub fn is_valid(&self) -> bool { let res = unsafe { acl_valid(self.ptr) }; if res == 0 { return true; } false } pub fn entries(self) -> ACLEntriesIterator { ACLEntriesIterator { acl: self, current: ACL_FIRST_ENTRY, } } pub fn add_entry_full(&mut self, tag: ACLTag, qualifier: Option, permissions: u64) -> Result<(), nix::errno::Errno> { let mut entry = self.create_entry()?; entry.set_tag_type(tag)?; if let Some(qualifier) = qualifier { entry.set_qualifier(qualifier)?; } entry.set_permissions(permissions)?; Ok(()) } } #[derive(Debug)] pub struct ACLEntry<'a> { ptr: *mut c_void, _phantom: PhantomData<&'a mut ()>, } impl<'a> ACLEntry<'a> { pub fn get_tag_type(&self) -> Result { let mut tag = ACL_UNDEFINED_TAG; let res = unsafe { acl_get_tag_type(self.ptr, &mut tag as *mut ACLTag) }; if res < 0 { return Err(Errno::last()); } Ok(tag) } pub fn set_tag_type(&mut self, tag: ACLTag) -> Result<(), nix::errno::Errno> { let res = unsafe { acl_set_tag_type(self.ptr, tag) }; if res < 0 { return Err(Errno::last()); } Ok(()) } pub fn get_permissions(&self) -> Result { let mut permissions = 0; let mut permset = ptr::null_mut() as *mut c_void; let mut res = unsafe { acl_get_permset(self.ptr, &mut permset) }; if res < 0 { return Err(Errno::last()); } for &perm in &[ACL_READ, ACL_WRITE, ACL_EXECUTE] { res = unsafe { acl_get_perm(permset, perm) }; if res < 0 { return Err(Errno::last()); } else if res > 0 { permissions |= perm as u64; } } Ok(permissions) } pub fn set_permissions(&mut self, permissions: u64) -> Result { let mut permset = ptr::null_mut() as *mut c_void; let mut res = unsafe { acl_get_permset(self.ptr, &mut permset) }; if res < 0 { return Err(Errno::last()); } res = unsafe { acl_clear_perms(permset) }; if res < 0 { return Err(Errno::last()); } for &perm in &[ACL_READ, ACL_WRITE, ACL_EXECUTE] { if permissions & perm as u64 == perm as u64 { res = unsafe { acl_add_perm(permset, perm) }; if res < 0 { return Err(Errno::last()); } } } Ok(permissions) } pub fn get_qualifier(&self) -> Result { let qualifier = unsafe { acl_get_qualifier(self.ptr) }; if qualifier.is_null() { return Err(Errno::last()); } let result = unsafe { *(qualifier as *const u32) as u64 }; let ret = unsafe { acl_free(qualifier) }; if ret != 0 { panic!("invalid pointer encountered while dropping ACL qualifier - {}", Errno::last()); } Ok(result) } pub fn set_qualifier(&mut self, qualifier: u64) -> Result<(), nix::errno::Errno> { let val = qualifier as u32; let val_ptr: *const u32 = &val; let res = unsafe { acl_set_qualifier(self.ptr, val_ptr as *const c_void) }; if res < 0 { return Err(Errno::last()); } Ok(()) } } #[derive(Debug)] pub struct ACLEntriesIterator { acl: ACL, current: c_int, } impl<'a> Iterator for &'a mut ACLEntriesIterator { type Item = ACLEntry<'a>; fn next(&mut self) -> Option { let mut entry_ptr = ptr::null_mut(); let res = unsafe { acl_get_entry(self.acl.ptr, self.current, &mut entry_ptr) }; self.current = ACL_NEXT_ENTRY; if res == 1 { return Some(ACLEntry { ptr: entry_ptr, _phantom: PhantomData }); } None } } /// Helper to transform `PxarEntry`s user mode to acl permissions. pub fn mode_user_to_acl_permissions(mode: u64) -> u64 { (mode >> 6) & 7 } /// Helper to transform `PxarEntry`s group mode to acl permissions. pub fn mode_group_to_acl_permissions(mode: u64) -> u64 { (mode >> 3) & 7 } /// Helper to transform `PxarEntry`s other mode to acl permissions. pub fn mode_other_to_acl_permissions(mode: u64) -> u64 { mode & 7 } /// Buffer to compose ACLs as extended attribute. pub struct ACLXAttrBuffer { buffer: Vec, } impl ACLXAttrBuffer { /// Create a new buffer to write ACLs as extended attribute. /// /// `version` defines the ACL_EA_VERSION found in acl/include/acl_ea.h pub fn new(version: u32) -> Self { let mut buffer = Vec::new(); buffer.extend_from_slice(&version.to_le_bytes()); Self { buffer } } /// Add ACL entry to buffer. pub fn add_entry(&mut self, tag: ACLTag, qualifier: Option, permissions: u64) { self.buffer.extend_from_slice(&(tag as u16).to_le_bytes()); self.buffer.extend_from_slice(&(permissions as u16).to_le_bytes()); match qualifier { Some(qualifier) => self.buffer.extend_from_slice(&(qualifier as u32).to_le_bytes()), None => self.buffer.extend_from_slice(&ACL_UNDEFINED_ID.to_le_bytes()), } } /// Length of the buffer in bytes. pub fn len(&self) -> usize { self.buffer.len() } /// Borrow raw buffer as mut slice. pub fn as_mut_slice(&mut self) -> &mut [u8] { self.buffer.as_mut_slice() } }