2 Bacula® - The Network Backup Solution
4 Copyright (C) 2004-2009 Free Software Foundation Europe e.V.
6 The main author of Bacula is Kern Sibbald, with contributions from
7 many others, a complete list can be found in the file AUTHORS.
8 This program is Free Software; you can redistribute it and/or
9 modify it under the terms of version two of the GNU General Public
10 License as published by the Free Software Foundation and included
13 This program is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
23 Bacula® is a registered trademark of Kern Sibbald.
24 The licensor of Bacula is the Free Software Foundation Europe
25 (FSFE), Fiduciary Program, Sumatrastrasse 25, 8006 Zürich,
26 Switzerland, email:ftf@fsfeurope.org.
29 * Functions to handle ACLs for bacula.
31 * We handle two different types of ACLs: access and default ACLS.
32 * On most systems that support default ACLs they only apply to directories.
34 * On some systems (eg. linux and FreeBSD) we must obtain the two ACLs
35 * independently, while others (eg. Solaris) provide both in one call.
37 * The Filed saves ACLs in their native format and uses different streams
38 * for all different platforms. Currently we only allow ACLs to be restored
39 * which were saved in the native format of the platform they are extracted
40 * on. Later on we might add conversion functions for mapping from one
41 * platform to an other or allow restores of systems that use the same
44 * Its also interesting to see what the exact format of acl text is on
45 * certain platforms and if they use they same encoding we might allow
46 * different platform streams to be decoded on an other similar platform.
47 * As we implement the decoding/restoring process as a big switch based
48 * on the stream number being passed in extending the switching code is
51 * Original written by Preben 'Peppe' Guldberg, December MMIV
52 * Major rewrite by Marco van Wieringen, November MMVIII
61 * List of supported OSes. Everything outside that gets stub functions.
62 * Also when ACL support is explicitly disabled.
63 * Not sure if all the HAVE_XYZ_OS are correct for autoconf.
64 * The ones that says man page, are coded according to man pages only.
66 #if !defined(HAVE_ACL) /* ACL support is required, of course */ \
67 || !( defined(HAVE_AIX_OS) /* man page -- may need flags */ \
68 || defined(HAVE_DARWIN_OS) /* tested -- compile without flags */ \
69 || defined(HAVE_FREEBSD_OS) /* tested -- compile without flags */ \
70 || defined(HAVE_HPUX_OS) /* man page -- may need flags */ \
71 || defined(HAVE_IRIX_OS) /* man page -- compile without flags */ \
72 || defined(HAVE_LINUX_OS) /* tested -- compile with -lacl */ \
73 || defined(HAVE_OSF1_OS) /* man page -- may need -lpacl */ \
74 || defined(HAVE_SUN_OS) /* tested -- compile with -lsec */ \
78 * Entry points when compiled without support for ACLs or on an unsupported platform.
80 bool build_acl_streams(JCR *jcr, FF_PKT *ff_pkt)
82 Jmsg(jcr, M_FATAL, 0, _("ACL support not configured for your machine.\n"));
86 bool parse_acl_stream(JCR *jcr, int stream)
88 Jmsg(jcr, M_FATAL, 0, _("ACL support not configured for your machine.\n"));
95 * Send an ACL stream to the SD.
97 static bool send_acl_stream(JCR *jcr, int stream)
99 BSOCK *sd = jcr->store_bsock;
101 #ifdef FD_NO_SEND_TEST
108 if (jcr->acl_data_len <= 0)
114 if (!sd->fsend("%ld %d 0", jcr->JobFiles, stream)) {
115 Jmsg1(jcr, M_FATAL, 0, _("Network send error to SD. ERR=%s\n"),
122 * Send the buffer to the storage deamon
124 Dmsg1(400, "Backing up ACL <%s>\n", jcr->acl_data);
126 sd->msg = jcr->acl_data;
127 sd->msglen = jcr->acl_data_len + 1;
131 Jmsg1(jcr, M_FATAL, 0, _("Network send error to SD. ERR=%s\n"),
137 jcr->JobBytes += sd->msglen;
139 if (!sd->signal(BNET_EOD)) {
140 Jmsg1(jcr, M_FATAL, 0, _("Network send error to SD. ERR=%s\n"),
146 Dmsg1(200, "ACL of file: %s successfully backed up!\n", jcr->last_fname);
151 #if defined(HAVE_AIX_OS)
153 #include <sys/access.h>
155 static bool aix_build_acl_streams(JCR *jcr, FF_PKT *ff_pkt)
159 if ((acl_text = acl_get(jcr->last_fname)) != NULL) {
160 jcr->acl_data_len = pm_strcpy(jcr->acl_data, acl_text);
161 actuallyfree(acl_text);
163 return send_acl_stream(jcr, STREAM_ACL_AIX_TEXT);
169 static bool aix_parse_acl_stream(JCR *jcr, int stream)
171 if (acl_put(jcr->last_fname, jcr->acl_data, 0) != 0) {
178 #elif defined(HAVE_DARWIN_OS) \
179 || defined(HAVE_FREEBSD_OS) \
180 || defined(HAVE_IRIX_OS) \
181 || defined(HAVE_OSF1_OS) \
182 || defined(HAVE_LINUX_OS)
184 #include <sys/types.h>
186 #ifdef HAVE_SYS_ACL_H
189 #error "configure failed to detect availability of sys/acl.h"
192 /* On IRIX we can get shortened ACLs */
193 #if defined(HAVE_IRIX_OS) && defined(BACL_WANT_SHORT_ACLS)
194 #define acl_to_text(acl,len) acl_to_short_text((acl), (len))
197 /* In Linux we can get numeric and/or shorted ACLs */
198 #if defined(HAVE_LINUX_OS)
199 #if defined(BACL_WANT_SHORT_ACLS) && defined(BACL_WANT_NUMERIC_IDS)
200 #define BACL_ALTERNATE_TEXT (TEXT_ABBREVIATE|TEXT_NUMERIC_IDS)
201 #elif defined(BACL_WANT_SHORT_ACLS)
202 #define BACL_ALTERNATE_TEXT TEXT_ABBREVIATE
203 #elif defined(BACL_WANT_NUMERIC_IDS)
204 #define BACL_ALTERNATE_TEXT TEXT_NUMERIC_IDS
206 #ifdef BACL_ALTERNATE_TEXT
207 #include <acl/libacl.h>
208 #define acl_to_text(acl,len) (acl_to_any_text((acl), NULL, ',', BACL_ALTERNATE_TEXT))
213 * Some generic functions used by multiple OSes.
215 static acl_type_t bac_to_os_acltype(bacl_type acltype)
220 case BACL_TYPE_ACCESS:
221 ostype = ACL_TYPE_ACCESS;
223 case BACL_TYPE_DEFAULT:
224 ostype = ACL_TYPE_DEFAULT;
227 #ifdef ACL_TYPE_DEFAULT_DIR
228 case BACL_TYPE_DEFAULT_DIR:
230 * OSF1 has an additional acl type named ACL_TYPE_DEFAULT_DIR.
232 ostype = ACL_TYPE_DEFAULT_DIR;
235 #ifdef ACL_TYPE_EXTENDED
236 case BACL_TYPE_EXTENDED:
238 * MacOSX has an additional acl type named ACL_TYPE_EXTENDED.
240 ostype = ACL_TYPE_EXTENDED;
245 * This should never happen, as the per os version function only tries acl
246 * types supported on a certain platform.
248 ostype = (acl_type_t)ACL_TYPE_NONE;
255 #if !defined(HAVE_DARWIN_OS)
257 * See if an acl is a trivial one (e.g. just the stat bits encoded as acl.)
258 * There is no need to store those acls as we already store the stat bits too.
260 static bool acl_is_trivial(acl_t acl)
263 * acl is trivial if it has only the following entries:
270 #if defined(HAVE_FREEBSD_OS) || defined(HAVE_LINUX_OS)
273 entry_available = acl_get_entry(acl, ACL_FIRST_ENTRY, &ace);
274 while (entry_available == 1) {
276 * Get the tag type of this acl entry.
277 * If we fail to get the tagtype we call the acl non-trivial.
279 if (acl_get_tag_type(ace, &tag) < 0)
283 * Anything other the ACL_USER_OBJ, ACL_GROUP_OBJ or ACL_OTHER breaks the spell.
285 if (tag != ACL_USER_OBJ &&
286 tag != ACL_GROUP_OBJ &&
290 entry_available = acl_get_entry(acl, ACL_NEXT_ENTRY, &ace);
294 #elif defined(HAVE_IRIX_OS)
297 for (n = 0; n < acl->acl_cnt; n++) {
298 ace = &acl->acl_entry[n];
302 * Anything other the ACL_USER_OBJ, ACL_GROUP_OBJ or ACL_OTHER breaks the spell.
304 if (tag != ACL_USER_OBJ &&
305 tag != ACL_GROUP_OBJ &&
311 #elif defined(HAVE_OSF1_OS)
314 ace = acl->acl_first;
315 count = acl->acl_num;
318 tag = ace->entry->acl_type;
321 * Anything other the ACL_USER_OBJ, ACL_GROUP_OBJ or ACL_OTHER breaks the spell.
323 if (tag != ACL_USER_OBJ &&
324 tag != ACL_GROUP_OBJ &&
329 * On Tru64, perm can also contain non-standard bits such as
330 * PERM_INSERT, PERM_DELETE, PERM_MODIFY, PERM_LOOKUP, ...
332 if ((ace->entry->acl_perm & ~(ACL_READ | ACL_WRITE | ACL_EXECUTE)))
345 * Generic wrapper around acl_get_file call.
347 static int generic_get_acl_from_os(JCR *jcr, bacl_type acltype)
354 ostype = bac_to_os_acltype(acltype);
355 acl = acl_get_file(jcr->last_fname, ostype);
357 #if defined(HAVE_IRIX_OS)
359 * From observation, IRIX's acl_get_file() seems to return a
360 * non-NULL acl with a count field of -1 when a file has no ACL
361 * defined, while IRIX's acl_to_text() returns NULL when presented
364 * Checking the count in the acl structure before calling
365 * acl_to_text() lets us avoid error messages about files
366 * with no ACLs, without modifying the flow of the code used for
367 * other operating systems, and it saves making some calls
368 * to acl_to_text() besides.
370 if (acl->acl_cnt <= 0) {
371 pm_strcpy(jcr->acl_data, "");
377 #if !defined(HAVE_DARWIN_OS)
379 * Make sure this is not just a trivial ACL.
381 if (acltype == BACL_TYPE_ACCESS && acl_is_trivial(acl)) {
383 * The ACLs simply reflect the (already known) standard permissions
384 * So we don't send an ACL stream to the SD.
386 pm_strcpy(jcr->acl_data, "");
392 if ((acl_text = acl_to_text(acl, NULL)) != NULL) {
393 len = pm_strcpy(jcr->acl_data, acl_text);
401 Jmsg2(jcr, M_ERROR, 0, _("acl_to_text error on file \"%s\": ERR=%s\n"),
402 jcr->last_fname, be.bstrerror());
403 Dmsg2(100, "acl_to_text error file=%s ERR=%s\n",
404 jcr->last_fname, be.bstrerror());
406 pm_strcpy(jcr->acl_data, "");
409 return 0; /* non-fatal error */
413 * Handle errors gracefully.
415 if (acl == (acl_t)NULL) {
417 #if defined(BACL_ENOTSUP)
419 break; /* not supported */
423 /* Some real error */
424 Jmsg2(jcr, M_ERROR, 0, _("acl_get_file error on file \"%s\": ERR=%s\n"),
425 jcr->last_fname, be.bstrerror());
426 Dmsg2(100, "acl_get_file error file=%s ERR=%s\n",
427 jcr->last_fname, be.bstrerror());
429 pm_strcpy(jcr->acl_data, "");
430 return 0; /* non-fatal error */
434 * Not supported, just pretend there is nothing to see
436 pm_strcpy(jcr->acl_data, "");
441 * Generic wrapper around acl_set_file call.
443 static bool generic_set_acl_on_os(JCR *jcr, bacl_type acltype)
449 * If we get empty default ACLs, clear ACLs now
451 ostype = bac_to_os_acltype(acltype);
452 if (ostype == ACL_TYPE_DEFAULT && strlen(jcr->acl_data) == 0) {
453 if (acl_delete_def_file(jcr->last_fname) == 0) {
457 Jmsg2(jcr, M_ERROR, 0, _("acl_delete_def_file error on file \"%s\": ERR=%s\n"),
458 jcr->last_fname, be.bstrerror());
463 acl = acl_from_text(jcr->acl_data);
466 Jmsg2(jcr, M_ERROR, 0, _("acl_from_text error on file \"%s\": ERR=%s\n"),
467 jcr->last_fname, be.bstrerror());
468 Dmsg3(100, "acl_from_text error acl=%s file=%s ERR=%s\n",
469 jcr->acl_data, jcr->last_fname, be.bstrerror());
475 * FreeBSD always fails acl_valid() - at least on valid input...
476 * As it does the right thing, given valid input, just ignore acl_valid().
478 #ifndef HAVE_FREEBSD_OS
479 if (acl_valid(acl) != 0) {
481 Jmsg2(jcr, M_ERROR, 0, _("ac_valid error on file \"%s\": ERR=%s\n"),
482 jcr->last_fname, be.bstrerror());
483 Dmsg3(100, "acl_valid error acl=%s file=%s ERR=%s\n",
484 jcr->acl_data, jcr->last_fname, be.bstrerror());
492 * Restore the ACLs, but don't complain about links which really should
493 * not have attributes, and the file it is linked to may not yet be restored.
494 * This is only true for the old acl streams as in the new implementation we
495 * don't save acls of symlinks (which cannot have acls anyhow)
497 if (acl_set_file(jcr->last_fname, ostype, acl) != 0 && jcr->last_type != FT_LNK) {
499 Jmsg2(jcr, M_ERROR, 0, _("acl_set_file error on file \"%s\": ERR=%s\n"),
500 jcr->last_fname, be.bstrerror());
501 Dmsg3(100, "acl_set_file error acl=%s file=%s ERR=%s\n",
502 jcr->acl_data, jcr->last_fname, be.bstrerror());
513 * OS specific functions for handling different types of acl streams.
515 #if defined(HAVE_DARWIN_OS)
516 static bool darwin_build_acl_streams(JCR *jcr, FF_PKT *ff_pkt)
518 #if defined(ACL_TYPE_EXTENDED)
520 * On MacOS X, acl_get_file (name, ACL_TYPE_ACCESS)
521 * and acl_get_file (name, ACL_TYPE_DEFAULT)
522 * always return NULL / EINVAL. There is no point in making
523 * these two useless calls. The real ACL is retrieved through
524 * acl_get_file (name, ACL_TYPE_EXTENDED).
526 * Read access ACLs for files, dirs and links
528 if ((jcr->acl_data_len = generic_get_acl_from_os(jcr, BACL_TYPE_EXTENDED)) < 0)
532 * Read access ACLs for files, dirs and links
534 if ((jcr->acl_data_len = generic_get_acl_from_os(jcr, BACL_TYPE_ACCESS)) < 0)
537 if (jcr->acl_data_len > 0) {
538 if (!send_acl_stream(jcr, STREAM_ACL_DARWIN_ACCESS_ACL))
546 static bool darwin_parse_acl_stream(JCR *jcr, int stream)
549 case STREAM_UNIX_ACCESS_ACL:
550 case STREAM_ACL_DARWIN_ACCESS_ACL:
551 return generic_set_acl_on_os(jcr, BACL_TYPE_ACCESS);
556 #elif defined(HAVE_FREEBSD_OS)
557 static bool freebsd_build_acl_streams(JCR *jcr, FF_PKT *ff_pkt)
560 * Read access ACLs for files, dirs and links
562 if ((jcr->acl_data_len = generic_get_acl_from_os(jcr, BACL_TYPE_ACCESS)) < 0)
565 if (jcr->acl_data_len > 0) {
566 if (!send_acl_stream(jcr, STREAM_ACL_FREEBSD_ACCESS_ACL))
571 * Directories can have default ACLs too
573 if (ff_pkt->type == FT_DIREND) {
574 if ((jcr->acl_data_len = generic_get_acl_from_os(jcr, BACL_TYPE_DEFAULT)) < 0)
577 if (jcr->acl_data_len > 0) {
578 if (!send_acl_stream(jcr, STREAM_ACL_FREEBSD_DEFAULT_ACL))
586 static bool freebsd_parse_acl_stream(JCR *jcr, int stream)
589 case STREAM_UNIX_ACCESS_ACL:
590 case STREAM_ACL_FREEBSD_ACCESS_ACL:
591 return generic_set_acl_on_os(jcr, BACL_TYPE_ACCESS);
592 case STREAM_UNIX_DEFAULT_ACL:
593 case STREAM_ACL_FREEBSD_DEFAULT_ACL:
594 return generic_set_acl_on_os(jcr, BACL_TYPE_DEFAULT);
599 #elif defined(HAVE_IRIX_OS)
600 static bool irix_build_acl_streams(JCR *jcr, FF_PKT *ff_pkt)
603 * Read access ACLs for files, dirs and links
605 if ((jcr->acl_data_len = generic_get_acl_from_os(jcr, BACL_TYPE_ACCESS)) < 0)
608 if (jcr->acl_data_len > 0) {
609 if (!send_acl_stream(jcr, STREAM_ACL_IRIX_ACCESS_ACL))
614 * Directories can have default ACLs too
616 if (ff_pkt->type == FT_DIREND) {
617 if ((jcr->acl_data_len = generic_get_acl_from_os(jcr, BACL_TYPE_DEFAULT)) < 0)
620 if (jcr->acl_data_len > 0) {
621 if (!send_acl_stream(jcr, STREAM_ACL_IRIX_DEFAULT_ACL))
629 static bool irix_parse_acl_stream(JCR *jcr, int stream)
632 case STREAM_UNIX_ACCESS_ACL:
633 case STREAM_ACL_IRIX_ACCESS_ACL:
634 return generic_set_acl_on_os(jcr, BACL_TYPE_ACCESS);
635 case STREAM_UNIX_DEFAULT_ACL:
636 case STREAM_ACL_IRIX_DEFAULT_ACL:
637 return generic_set_acl_on_os(jcr, BACL_TYPE_DEFAULT);
642 #elif defined(HAVE_LINUX_OS)
643 static bool linux_build_acl_streams(JCR *jcr, FF_PKT *ff_pkt)
646 * Read access ACLs for files, dirs and links
648 if ((jcr->acl_data_len = generic_get_acl_from_os(jcr, BACL_TYPE_ACCESS)) < 0)
651 if (jcr->acl_data_len > 0) {
652 if (!send_acl_stream(jcr, STREAM_ACL_LINUX_ACCESS_ACL))
657 * Directories can have default ACLs too
659 if (ff_pkt->type == FT_DIREND) {
660 if ((jcr->acl_data_len = generic_get_acl_from_os(jcr, BACL_TYPE_DEFAULT)) < 0)
663 if (jcr->acl_data_len > 0) {
664 if (!send_acl_stream(jcr, STREAM_ACL_LINUX_DEFAULT_ACL))
672 static bool linux_parse_acl_stream(JCR *jcr, int stream)
675 case STREAM_UNIX_ACCESS_ACL:
676 case STREAM_ACL_LINUX_ACCESS_ACL:
677 return generic_set_acl_on_os(jcr, BACL_TYPE_ACCESS);
678 case STREAM_UNIX_DEFAULT_ACL:
679 case STREAM_ACL_LINUX_DEFAULT_ACL:
680 return generic_set_acl_on_os(jcr, BACL_TYPE_DEFAULT);
685 #elif defined(HAVE_OSF1_OS)
686 static bool tru64_build_acl_streams(JCR *jcr, FF_PKT *ff_pkt)
689 * Read access ACLs for files, dirs and links
691 if ((jcr->acl_data_len = generic_get_acl_from_os(jcr, BACL_TYPE_ACCESS)) < 0)
694 if (jcr->acl_data_len > 0) {
695 if (!send_acl_stream(jcr, STREAM_ACL_TRU64_ACCESS_ACL))
700 * Directories can have default ACLs too
702 if (ff_pkt->type == FT_DIREND) {
703 if ((jcr->acl_data_len = generic_get_acl_from_os(jcr, BACL_TYPE_DEFAULT)) < 0)
706 if (jcr->acl_data_len > 0) {
707 if (!send_acl_stream(jcr, STREAM_ACL_TRU64_DEFAULT_ACL))
712 * Tru64 has next to BACL_TYPE_DEFAULT also BACL_TYPE_DEFAULT_DIR acls.
713 * This is an inherited acl for all subdirs.
714 * See http://www.helsinki.fi/atk/unix/dec_manuals/DOC_40D/AQ0R2DTE/DOCU_018.HTM
715 * Section 21.5 Default ACLs
717 if ((jcr->acl_data_len = generic_get_acl_from_os(jcr, BACL_TYPE_DEFAULT_DIR)) < 0)
720 if (jcr->acl_data_len > 0) {
721 if (!send_acl_stream(jcr, STREAM_ACL_TRU64_DEFAULT_DIR_ACL))
729 static bool tru64_parse_acl_stream(JCR *jcr, int stream)
732 case STREAM_UNIX_ACCESS_ACL:
733 case STREAM_ACL_TRU64_ACCESS_ACL:
734 return generic_set_acl_on_os(jcr, BACL_TYPE_ACCESS);
735 case STREAM_UNIX_DEFAULT_ACL:
736 case STREAM_ACL_TRU64_DEFAULT_ACL:
737 return generic_set_acl_on_os(jcr, BACL_TYPE_DEFAULT);
738 case STREAM_ACL_TRU64_DEFAULT_DIR_ACL:
739 return generic_set_acl_on_os(jcr, BACL_TYPE_DEFAULT_DIR);
743 #elif defined(HAVE_HPUX_OS)
744 #ifdef HAVE_SYS_ACL_H
747 #error "configure failed to detect availability of sys/acl.h"
753 * See if an acl is a trivial one (e.g. just the stat bits encoded as acl.)
754 * There is no need to store those acls as we already store the stat bits too.
756 static bool acl_is_trivial(int count, struct acl_entry *entries, struct stat sb)
761 for (n = 0; n < count; n++) {
765 * See if this acl just is the stat mode in acl form.
767 if (!((ace.uid == sb.st_uid && ace.gid == ACL_NSGROUP) ||
768 (ace.uid == ACL_NSUSER && ace.gid == sb.st_gid) ||
769 (ace.uid == ACL_NSUSER && ace.gid == ACL_NSGROUP)))
777 * OS specific functions for handling different types of acl streams.
779 static bool hpux_build_acl_streams(JCR *jcr, FF_PKT *ff_pkt)
782 struct acl_entry acls[NACLENTRIES];
785 if ((n = getacl(jcr->last_fname, 0, acls)) < 0) {
787 #if defined(BACL_ENOTSUP)
790 * Not supported, just pretend there is nothing to see
792 pm_strcpy(jcr->acl_data, "");
797 Jmsg2(jcr, M_ERROR, 0, _("getacl error on file \"%s\": ERR=%s\n"),
798 jcr->last_fname, be.bstrerror());
799 Dmsg2(100, "getacl error file=%s ERR=%s\n",
800 jcr->last_fname, be.bstrerror());
802 pm_strcpy(jcr->acl_data, "");
808 pm_strcpy(jcr->acl_data, "");
812 if ((n = getacl(jcr->last_fname, n, acls)) > 0) {
813 if (acl_is_trivial(n, acls, ff_pkt->statp)) {
815 * The ACLs simply reflect the (already known) standard permissions
816 * So we don't send an ACL stream to the SD.
818 pm_strcpy(jcr->acl_data, "");
822 if ((acl_text = acltostr(n, acls, FORM_SHORT)) != NULL) {
823 jcr->acl_data_len = pm_strcpy(jcr->acl_data, acl_text);
824 actuallyfree(acl_text);
826 return send_acl_stream(jcr, STREAM_ACL_HPUX_ACL_ENTRY);
830 Jmsg2(jcr, M_ERROR, 0, _("acltostr error on file \"%s\": ERR=%s\n"),
831 jcr->last_fname, be.bstrerror());
832 Dmsg3(100, "acltostr error acl=%s file=%s ERR=%s\n",
833 jcr->acl_data, jcr->last_fname, be.bstrerror());
841 static bool hpux_parse_acl_stream(JCR *jcr, int stream)
844 struct acl_entry acls[NACLENTRIES];
846 n = strtoacl(jcr->acl_data, 0, NACLENTRIES, acls, ACL_FILEOWNER, ACL_FILEGROUP);
849 Jmsg2(jcr, M_ERROR, 0, _("strtoacl error on file \"%s\": ERR=%s\n"),
850 jcr->last_fname, be.bstrerror());
851 Dmsg3(100, "strtoacl error acl=%s file=%s ERR=%s\n",
852 jcr->acl_data, jcr->last_fname, be.bstrerror());
856 if (strtoacl(jcr->acl_data, n, NACLENTRIES, acls, ACL_FILEOWNER, ACL_FILEGROUP) != n) {
858 Jmsg2(jcr, M_ERROR, 0, _("strtoacl error on file \"%s\": ERR=%s\n"),
859 jcr->last_fname, be.bstrerror());
860 Dmsg3(100, "strtoacl error acl=%s file=%s ERR=%s\n",
861 jcr->acl_data, jcr->last_fname, be.bstrerror());
866 * Restore the ACLs, but don't complain about links which really should
867 * not have attributes, and the file it is linked to may not yet be restored.
868 * This is only true for the old acl streams as in the new implementation we
869 * don't save acls of symlinks (which cannot have acls anyhow)
871 if (setacl(jcr->last_fname, n, acls) != 0 && jcr->last_type != FT_LNK) {
873 Jmsg2(jcr, M_ERROR, 0, _("setacl error on file \"%s\": ERR=%s\n"),
874 jcr->last_fname, be.bstrerror());
875 Dmsg3(100, "setacl error acl=%s file=%s ERR=%s\n",
876 jcr->acl_data, jcr->last_fname, be.bstrerror());
884 #elif defined(HAVE_SUN_OS)
885 #ifdef HAVE_SYS_ACL_H
888 #error "configure failed to detect availability of sys/acl.h"
891 #if defined(HAVE_EXTENDED_ACL)
893 * We define some internals of the Solaris acl libs here as those
894 * are not exposed yet. Probably because they want us to see the
895 * acls as opague data. But as we need to support different platforms
896 * and versions of Solaris we need to expose some data to be able
897 * to determine the type of acl used to stuff it into the correct
898 * data stream. I know this is far from portable, but maybe the
899 * propper interface is exposed later on and we can get ride of
900 * this kludge. Newer versions of Solaris include sys/acl_impl.h
901 * which has implementation details of acls, if thats included we
902 * don't have to define it ourself.
904 #if !defined(_SYS_ACL_IMPL_H)
905 typedef enum acl_type {
912 * Two external references to functions in the libsec library function not in current include files.
915 int acl_type(acl_t *);
916 char *acl_strerror(int);
920 * As the new libsec interface with acl_totext and acl_fromtext also handles
921 * the old format from acltotext we can use the new functions even
922 * for acls retrieved and stored in the database with older fd versions. If the
923 * new interface is not defined (Solaris 9 and older we fall back to the old code)
925 static bool solaris_build_acl_streams(JCR *jcr, FF_PKT *ff_pkt)
927 int acl_enabled, flags;
930 bool stream_status = false;
934 * See if filesystem supports acls.
936 acl_enabled = pathconf(jcr->last_fname, _PC_ACL_ENABLED);
937 switch (acl_enabled) {
939 pm_strcpy(jcr->acl_data, "");
943 Jmsg2(jcr, M_ERROR, 0, _("pathconf error on file \"%s\": ERR=%s\n"),
944 jcr->last_fname, be.bstrerror());
945 Dmsg2(100, "pathconf error file=%s ERR=%s\n",
946 jcr->last_fname, be.bstrerror());
954 * Get ACL info: don't bother allocating space if there is only a trivial ACL.
956 if (acl_get(jcr->last_fname, ACL_NO_TRIVIAL, &aclp) != 0) {
957 Jmsg2(jcr, M_ERROR, 0, _("acl_get error on file \"%s\": ERR=%s\n"),
958 jcr->last_fname, acl_strerror(errno));
959 Dmsg2(100, "acl_get error file=%s ERR=%s\n",
960 jcr->last_fname, acl_strerror(errno));
967 * The ACLs simply reflect the (already known) standard permissions
968 * So we don't send an ACL stream to the SD.
970 pm_strcpy(jcr->acl_data, "");
974 #if defined(ACL_SID_FMT)
976 * New format flag added in newer Solaris versions.
978 flags = ACL_APPEND_ID | ACL_COMPACT_FMT | ACL_SID_FMT;
980 flags = ACL_APPEND_ID | ACL_COMPACT_FMT;
981 #endif /* ACL_SID_FMT */
983 if ((acl_text = acl_totext(aclp, flags)) != NULL) {
984 jcr->acl_data_len = pm_strcpy(jcr->acl_data, acl_text);
985 actuallyfree(acl_text);
987 switch (acl_type(aclp)) {
989 stream_status = send_acl_stream(jcr, STREAM_ACL_SOLARIS_ACLENT);
992 stream_status = send_acl_stream(jcr, STREAM_ACL_SOLARIS_ACE);
1001 return stream_status;
1004 static bool solaris_parse_acl_stream(JCR *jcr, int stream)
1007 int acl_enabled, error;
1011 case STREAM_UNIX_ACCESS_ACL:
1012 case STREAM_ACL_SOLARIS_ACLENT:
1013 case STREAM_ACL_SOLARIS_ACE:
1015 * First make sure the filesystem supports acls.
1017 acl_enabled = pathconf(jcr->last_fname, _PC_ACL_ENABLED);
1018 switch (acl_enabled) {
1020 Jmsg1(jcr, M_ERROR, 0, _("Trying to restore acl on file \"%s\" on filesystem without acl support\n"),
1025 Jmsg2(jcr, M_ERROR, 0, _("pathconf error on file \"%s\": ERR=%s\n"),
1026 jcr->last_fname, be.bstrerror());
1027 Dmsg3(100, "pathconf error acl=%s file=%s ERR=%s\n",
1028 jcr->acl_data, jcr->last_fname, be.bstrerror());
1033 * On a filesystem with ACL support make sure this particilar ACL type can be restored.
1036 case STREAM_ACL_SOLARIS_ACLENT:
1038 * An aclent can be restored on filesystems with _ACL_ACLENT_ENABLED or _ACL_ACE_ENABLED support.
1040 if ((acl_enabled & (_ACL_ACLENT_ENABLED | _ACL_ACE_ENABLED)) == 0) {
1041 Jmsg1(jcr, M_ERROR, 0, _("Trying to restore acl on file \"%s\" on filesystem without aclent acl support\n"),
1046 case STREAM_ACL_SOLARIS_ACE:
1048 * An ace can only be restored on a filesystem with _ACL_ACE_ENABLED support.
1050 if ((acl_enabled & _ACL_ACE_ENABLED) == 0) {
1051 Jmsg1(jcr, M_ERROR, 0, _("Trying to restore acl on file \"%s\" on filesystem without ace acl support\n"),
1058 * Stream id which doesn't describe the type of acl which is encoded.
1065 if ((error = acl_fromtext(jcr->acl_data, &aclp)) != 0) {
1066 Jmsg2(jcr, M_ERROR, 0, _("acl_fromtext error on file \"%s\": ERR=%s\n"),
1067 jcr->last_fname, acl_strerror(error));
1068 Dmsg3(100, "acl_fromtext error acl=%s file=%s ERR=%s\n",
1069 jcr->acl_data, jcr->last_fname, acl_strerror(error));
1074 * Validate that the conversion gave us the correct acl type.
1077 case STREAM_ACL_SOLARIS_ACLENT:
1078 if (acl_type(aclp) != ACLENT_T) {
1079 Jmsg1(jcr, M_ERROR, 0, _("wrong encoding of acl type in acl stream on file \"%s\"\n"),
1084 case STREAM_ACL_SOLARIS_ACE:
1085 if (acl_type(aclp) != ACE_T) {
1086 Jmsg1(jcr, M_ERROR, 0, _("wrong encoding of acl type in acl stream on file \"%s\"\n"),
1093 * Stream id which doesn't describe the type of acl which is encoded.
1099 * Restore the ACLs, but don't complain about links which really should
1100 * not have attributes, and the file it is linked to may not yet be restored.
1101 * This is only true for the old acl streams as in the new implementation we
1102 * don't save acls of symlinks (which cannot have acls anyhow)
1104 if ((error = acl_set(jcr->last_fname, aclp)) == -1 && jcr->last_type != FT_LNK) {
1105 Jmsg2(jcr, M_ERROR, 0, _("acl_set error on file \"%s\": ERR=%s\n"),
1106 jcr->last_fname, acl_strerror(error));
1107 Dmsg3(100, "acl_set error acl=%s file=%s ERR=%s\n",
1108 jcr->acl_data, jcr->last_fname, acl_strerror(error));
1118 } /* end switch (stream) */
1121 #else /* HAVE_EXTENDED_ACL */
1124 * See if an acl is a trivial one (e.g. just the stat bits encoded as acl.)
1125 * There is no need to store those acls as we already store the stat bits too.
1127 static bool acl_is_trivial(int count, aclent_t *entries)
1132 for (n = 0; n < count; n++) {
1135 if (!(ace->a_type == USER_OBJ ||
1136 ace->a_type == GROUP_OBJ ||
1137 ace->a_type == OTHER_OBJ ||
1138 ace->a_type == CLASS_OBJ))
1146 * OS specific functions for handling different types of acl streams.
1148 static bool solaris_build_acl_streams(JCR *jcr, FF_PKT *ff_pkt)
1154 n = acl(jcr->last_fname, GETACLCNT, 0, NULL);
1155 if (n < MIN_ACL_ENTRIES)
1158 acls = (aclent_t *)malloc(n * sizeof(aclent_t));
1159 if (acl(jcr->last_fname, GETACL, n, acls) == n) {
1160 if (acl_is_trivial(n, acls)) {
1162 * The ACLs simply reflect the (already known) standard permissions
1163 * So we don't send an ACL stream to the SD.
1166 pm_strcpy(jcr->acl_data, "");
1170 if ((acl_text = acltotext(acls, n)) != NULL) {
1171 jcr->acl_data_len = pm_strcpy(jcr->acl_data, acl_text);
1172 actuallyfree(acl_text);
1175 return send_acl_stream(jcr, STREAM_ACL_SOLARIS_ACLENT);
1179 Jmsg2(jcr, M_ERROR, 0, _("acltotext error on file \"%s\": ERR=%s\n"),
1180 jcr->last_fname, be.bstrerror());
1181 Dmsg3(100, "acltotext error acl=%s file=%s ERR=%s\n",
1182 jcr->acl_data, jcr->last_fname, be.bstrerror());
1189 static bool solaris_parse_acl_stream(JCR *jcr, int stream)
1194 acls = aclfromtext(jcr->acl_data, &n);
1197 Jmsg2(jcr, M_ERROR, 0, _("aclfromtext error on file \"%s\": ERR=%s\n"),
1198 jcr->last_fname, be.bstrerror());
1199 Dmsg3(100, "aclfromtext error acl=%s file=%s ERR=%s\n",
1200 jcr->acl_data, jcr->last_fname, be.bstrerror());
1206 * Restore the ACLs, but don't complain about links which really should
1207 * not have attributes, and the file it is linked to may not yet be restored.
1209 if (acl(jcr->last_fname, SETACL, n, acls) == -1 && jcr->last_type != FT_LNK) {
1211 Jmsg2(jcr, M_ERROR, 0, _("acl(SETACL) error on file \"%s\": ERR=%s\n"),
1212 jcr->last_fname, be.bstrerror());
1213 Dmsg3(100, "acl(SETACL) error acl=%s file=%s ERR=%s\n",
1214 jcr->acl_data, jcr->last_fname, be.bstrerror());
1224 #endif /* HAVE_EXTENDED_ACL */
1225 #endif /* HAVE_SUN_OS */
1228 * Entry points when compiled with support for ACLs on a supported platform.
1232 * Read and send an ACL for the last encountered file.
1234 bool build_acl_streams(JCR *jcr, FF_PKT *ff_pkt)
1237 * Call the appropriate function, the ifdefs make sure the proper code is compiled.
1239 #if defined(HAVE_AIX_OS)
1240 return aix_build_acl_streams(jcr, ff_pkt);
1241 #elif defined(HAVE_DARWIN_OS)
1242 return darwin_build_acl_streams(jcr, ff_pkt);
1243 #elif defined(HAVE_FREEBSD_OS)
1244 return freebsd_build_acl_streams(jcr, ff_pkt);
1245 #elif defined(HAVE_HPUX_OS)
1246 return hpux_build_acl_streams(jcr, ff_pkt);
1247 #elif defined(HAVE_IRIX_OS)
1248 return irix_build_acl_streams(jcr, ff_pkt);
1249 #elif defined(HAVE_LINUX_OS)
1250 return linux_build_acl_streams(jcr, ff_pkt);
1251 #elif defined(HAVE_OSF1_OS)
1252 return tru64_build_acl_streams(jcr, ff_pkt);
1253 #elif defined(HAVE_SUN_OS)
1254 return solaris_build_acl_streams(jcr, ff_pkt);
1258 bool parse_acl_stream(JCR *jcr, int stream)
1261 * Based on the stream being passed in dispatch to the right function
1262 * for parsing and restoring a specific acl. The platform determines
1263 * which streams are recognized and parsed and which are handled by
1264 * the default case and ignored. The old STREAM_UNIX_ACCESS_ACL and
1265 * STREAM_UNIX_DEFAULT_ACL is handled as a legacy stream by each function.
1266 * As only one of the platform defines is true per compile we never end
1267 * up with duplicate switch values.
1270 #if defined(HAVE_AIX_OS)
1271 case STREAM_UNIX_ACCESS_ACL:
1272 case STREAM_UNIX_DEFAULT_ACL:
1273 case STREAM_ACL_AIX_TEXT:
1274 return aix_parse_acl_stream(jcr, stream);
1275 #elif defined(HAVE_DARWIN_OS)
1276 case STREAM_UNIX_ACCESS_ACL:
1277 case STREAM_ACL_DARWIN_ACCESS_ACL:
1278 return darwin_parse_acl_stream(jcr, stream);
1279 #elif defined(HAVE_FREEBSD_OS)
1280 case STREAM_UNIX_ACCESS_ACL:
1281 case STREAM_UNIX_DEFAULT_ACL:
1282 case STREAM_ACL_FREEBSD_DEFAULT_ACL:
1283 case STREAM_ACL_FREEBSD_ACCESS_ACL:
1284 return freebsd_parse_acl_stream(jcr, stream);
1285 #elif defined(HAVE_HPUX_OS)
1286 case STREAM_UNIX_ACCESS_ACL:
1287 case STREAM_ACL_HPUX_ACL_ENTRY:
1288 return hpux_parse_acl_stream(jcr, stream);
1289 #elif defined(HAVE_IRIX_OS)
1290 case STREAM_UNIX_ACCESS_ACL:
1291 case STREAM_UNIX_DEFAULT_ACL:
1292 case STREAM_ACL_IRIX_DEFAULT_ACL:
1293 case STREAM_ACL_IRIX_ACCESS_ACL:
1294 return irix_parse_acl_stream(jcr, stream);
1295 #elif defined(HAVE_LINUX_OS)
1296 case STREAM_UNIX_ACCESS_ACL:
1297 case STREAM_UNIX_DEFAULT_ACL:
1298 case STREAM_ACL_LINUX_DEFAULT_ACL:
1299 case STREAM_ACL_LINUX_ACCESS_ACL:
1300 return linux_parse_acl_stream(jcr, stream);
1301 #elif defined(HAVE_OSF1_OS)
1302 case STREAM_UNIX_ACCESS_ACL:
1303 case STREAM_UNIX_DEFAULT_ACL:
1304 case STREAM_ACL_TRU64_DEFAULT_ACL:
1305 case STREAM_ACL_TRU64_ACCESS_ACL:
1306 case STREAM_ACL_TRU64_DEFAULT_DIR_ACL:
1307 return tru64_parse_acl_stream(jcr, stream);
1308 #elif defined(HAVE_SUN_OS)
1309 case STREAM_UNIX_ACCESS_ACL:
1310 case STREAM_ACL_SOLARIS_ACLENT:
1311 #if defined(HAVE_EXTENDED_ACL)
1312 case STREAM_ACL_SOLARIS_ACE:
1314 return solaris_parse_acl_stream(jcr, stream);
1318 * Issue a warning and discard the message. But pretend the restore was ok.
1320 Qmsg2(jcr, M_WARNING, 0,
1321 _("Can't restore ACLs of %s - incompatible acl stream encountered - %d\n"),
1322 jcr->last_fname, stream);
1324 } /* end switch (stream) */