selinux support by Yuichi Nakamura <ynakam@hitachisoft.jp> (HitachiSoft)
[platform/upstream/busybox.git] / coreutils / install.c
1 /* vi: set sw=4 ts=4: */
2 /*
3  *  Copyright (C) 2003 by Glenn McGrath <bug1@iinet.net.au>
4  *
5  * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
6  *
7  * TODO: -d option, need a way of recursively making directories and changing
8  *           owner/group, will probably modify bb_make_directory(...)
9  */
10
11 #include "busybox.h"
12 #include "libcoreutils/coreutils.h"
13 #include <libgen.h>
14 #include <getopt.h> /* struct option */
15
16 #if ENABLE_FEATURE_INSTALL_LONG_OPTIONS
17 static const struct option install_long_options[] = {
18         { "directory",           0, NULL, 'd' },
19         { "preserve-timestamps", 0, NULL, 'p' },
20         { "strip",               0, NULL, 's' },
21         { "group",               0, NULL, 'g' },
22         { "mode",                0, NULL, 'm' },
23         { "owner",               0, NULL, 'o' },
24 #if ENABLE_SELINUX
25         { "context",             1, NULL, 'Z' },
26         { "preserve_context",    0, NULL, 0xff },
27         { "preserve-context",    0, NULL, 0xff },
28 #endif
29         { 0, 0, 0, 0 }
30 };
31 #endif
32
33
34 #if ENABLE_SELINUX
35 static bool use_default_selinux_context = 1;
36
37 static void setdefaultfilecon(const char *path) {
38         struct stat s;
39         security_context_t scontext = NULL;
40
41         if (!is_selinux_enabled()) {
42                 return;
43         }       
44         if (lstat(path, &s) != 0) {
45                 return;
46         }
47
48         if (matchpathcon(path, s.st_mode, &scontext) < 0) {
49                 goto out;
50         }
51         if (strcmp(scontext, "<<none>>") == 0) {
52                 goto out;
53         }
54
55         if (lsetfilecon(path, scontext) < 0) {
56                 if (errno != ENOTSUP) {
57                         bb_perror_msg("warning: failed to change context of %s to %s", path, scontext);
58                 }
59         }
60
61  out:
62         freecon(scontext);
63 }
64
65 #endif
66
67 int install_main(int argc, char **argv);
68 int install_main(int argc, char **argv)
69 {
70         struct stat statbuf;
71         mode_t mode;
72         uid_t uid;
73         gid_t gid;
74         const char *gid_str;
75         const char *uid_str;
76         const char *mode_str;
77         int copy_flags = FILEUTILS_DEREFERENCE | FILEUTILS_FORCE;
78         int ret = EXIT_SUCCESS, flags, i, isdir;
79 #if ENABLE_SELINUX
80         security_context_t scontext;
81 #endif
82         enum {
83                 OPT_CMD           =  0x1,
84                 OPT_DIRECTORY     =  0x2,
85                 OPT_PRESERVE_TIME =  0x4,
86                 OPT_STRIP         =  0x8,
87                 OPT_GROUP         = 0x10,
88                 OPT_MODE          = 0x20,
89                 OPT_OWNER         = 0x40,
90 #if ENABLE_SELINUX
91                 OPT_SET_SECURITY_CONTEXT = 0x80,
92                 OPT_PRESERVE_SECURITY_CONTEXT = 0x100,
93 #endif
94         };
95
96 #if ENABLE_FEATURE_INSTALL_LONG_OPTIONS
97         applet_long_options = install_long_options;
98 #endif
99         opt_complementary = "?:s--d:d--s" USE_SELINUX(":Z--\xff:\xff--Z");
100         /* -c exists for backwards compatibility, it's needed */
101
102         flags = getopt32(argc, argv, "cdpsg:m:o:" USE_SELINUX("Z:"), &gid_str, &mode_str, &uid_str USE_SELINUX(, &scontext));
103         
104 #if ENABLE_SELINUX
105         if (flags & OPT_PRESERVE_SECURITY_CONTEXT) {
106                 use_default_selinux_context = 0;
107                 copy_flags |= FILEUTILS_PRESERVE_SECURITY_CONTEXT;
108                 selinux_or_die();
109         }
110         if (flags & OPT_SET_SECURITY_CONTEXT) {
111                 selinux_or_die();
112                 if (setfscreatecon(scontext) < 0) {
113                         bb_error_msg_and_die("setfscreatecon(%s)", scontext); // perror?
114                 }
115                 use_default_selinux_context = 0;
116                 copy_flags |= FILEUTILS_SET_SECURITY_CONTEXT;
117         }
118 #endif
119
120         /* preserve access and modification time, this is GNU behaviour, BSD only preserves modification time */
121         if (flags & OPT_PRESERVE_TIME) {
122                 copy_flags |= FILEUTILS_PRESERVE_STATUS;
123         }
124         mode = 0666;
125         if (flags & OPT_MODE) bb_parse_mode(mode_str, &mode);
126         uid = (flags & OPT_OWNER) ? get_ug_id(uid_str, xuname2uid) : getuid();
127         gid = (flags & OPT_GROUP) ? get_ug_id(gid_str, xgroup2gid) : getgid();
128         if (flags & (OPT_OWNER|OPT_GROUP)) umask(0);
129
130         /* Create directories
131          * don't use bb_make_directory() as it can't change uid or gid
132          * perhaps bb_make_directory() should be improved.
133          */
134         if (flags & OPT_DIRECTORY) {
135                 for (argv += optind; *argv; argv++) {
136                         char *old_argv_ptr = *argv + 1;
137                         char *argv_ptr;
138                         do {
139                                 argv_ptr = strchr(old_argv_ptr, '/');
140                                 old_argv_ptr = argv_ptr;
141                                 if (argv_ptr) {
142                                         *argv_ptr = '\0';
143                                         old_argv_ptr++;
144                                 }
145                                 if (mkdir(*argv, mode | 0111) == -1) {
146                                         if (errno != EEXIST) {
147                                                 bb_perror_msg("cannot create %s", *argv);
148                                                 ret = EXIT_FAILURE;
149                                                 break;
150                                         }
151                                 }
152                                 if ((flags & (OPT_OWNER|OPT_GROUP))
153                                  && lchown(*argv, uid, gid) == -1
154                                 ) {
155                                         bb_perror_msg("cannot change ownership of %s", *argv);
156                                         ret = EXIT_FAILURE;
157                                         break;
158                                 }
159                                 if (argv_ptr) {
160                                         *argv_ptr = '/';
161                                 }
162                         } while (old_argv_ptr);
163                 }
164                 return ret;
165         }
166
167         isdir = lstat(argv[argc - 1], &statbuf) < 0 ? 0 : S_ISDIR(statbuf.st_mode);
168
169         for (i = optind; i < argc - 1; i++) {
170                 char *dest;
171
172                 dest = argv[argc - 1];
173                 if (isdir)
174                         dest = concat_path_file(argv[argc - 1], basename(argv[i]));
175                 ret |= copy_file(argv[i], dest, copy_flags);
176
177                 /* Set the file mode */
178                 if ((flags & OPT_MODE) && chmod(dest, mode) == -1) {
179                         bb_perror_msg("cannot change permissions of %s", dest);
180                         ret = EXIT_FAILURE;
181                 }
182 #if ENABLE_SELINUX
183                 if (use_default_selinux_context)
184                         setdefaultfilecon(dest);
185 #endif
186                 /* Set the user and group id */
187                 if ((flags & (OPT_OWNER|OPT_GROUP))
188                  && lchown(dest, uid, gid) == -1
189                 ) {
190                         bb_perror_msg("cannot change ownership of %s", dest);
191                         ret = EXIT_FAILURE;
192                 }
193                 if (flags & OPT_STRIP) {
194                         if (BB_EXECLP("strip", "strip", dest, NULL) == -1) {
195                                 bb_perror_msg("strip");
196                                 ret = EXIT_FAILURE;
197                         }
198                 }
199                 if (ENABLE_FEATURE_CLEAN_UP && isdir) free(dest);
200         }
201
202         return ret;
203 }