usage.c: remove reference to busybox.h
[platform/upstream/busybox.git] / coreutils / install.c
1 /* vi: set sw=4 ts=4: */
2 /*
3  * Copyright (C) 2003 by Glenn McGrath <bug1@iinet.net.au>
4  * SELinux support: by Yuichi Nakamura <ynakam@hitachisoft.jp>
5  *
6  * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
7  *
8  * TODO: -d option, need a way of recursively making directories and changing
9  *           owner/group, will probably modify bb_make_directory(...)
10  */
11
12 #include <libgen.h>
13 #include <getopt.h> /* struct option */
14
15 #include "libbb.h"
16 #include "libcoreutils/coreutils.h"
17
18 #if ENABLE_FEATURE_INSTALL_LONG_OPTIONS
19 static const struct option install_long_options[] = {
20         { "directory",           0, NULL, 'd' },
21         { "preserve-timestamps", 0, NULL, 'p' },
22         { "strip",               0, NULL, 's' },
23         { "group",               0, NULL, 'g' },
24         { "mode",                0, NULL, 'm' },
25         { "owner",               0, NULL, 'o' },
26 #if ENABLE_SELINUX
27         { "context",             1, NULL, 'Z' },
28         { "preserve_context",    0, NULL, 0xff },
29         { "preserve-context",    0, NULL, 0xff },
30 #endif
31         { 0, 0, 0, 0 }
32 };
33 #endif
34
35
36 #if ENABLE_SELINUX
37 static bool use_default_selinux_context = 1;
38
39 static void setdefaultfilecon(const char *path)
40 {
41         struct stat s;
42         security_context_t scontext = NULL;
43
44         if (!is_selinux_enabled()) {
45                 return;
46         }
47         if (lstat(path, &s) != 0) {
48                 return;
49         }
50
51         if (matchpathcon(path, s.st_mode, &scontext) < 0) {
52                 goto out;
53         }
54         if (strcmp(scontext, "<<none>>") == 0) {
55                 goto out;
56         }
57
58         if (lsetfilecon(path, scontext) < 0) {
59                 if (errno != ENOTSUP) {
60                         bb_perror_msg("warning: failed to change context of %s to %s", path, scontext);
61                 }
62         }
63
64  out:
65         freecon(scontext);
66 }
67
68 #endif
69
70 int install_main(int argc, char **argv);
71 int install_main(int argc, char **argv)
72 {
73         struct stat statbuf;
74         mode_t mode;
75         uid_t uid;
76         gid_t gid;
77         const char *gid_str;
78         const char *uid_str;
79         const char *mode_str;
80         int copy_flags = FILEUTILS_DEREFERENCE | FILEUTILS_FORCE;
81         int ret = EXIT_SUCCESS, flags, i, isdir;
82 #if ENABLE_SELINUX
83         security_context_t scontext;
84 #endif
85         enum {
86                 OPT_CMD           =  0x1,
87                 OPT_DIRECTORY     =  0x2,
88                 OPT_PRESERVE_TIME =  0x4,
89                 OPT_STRIP         =  0x8,
90                 OPT_GROUP         = 0x10,
91                 OPT_MODE          = 0x20,
92                 OPT_OWNER         = 0x40,
93 #if ENABLE_SELINUX
94                 OPT_SET_SECURITY_CONTEXT = 0x80,
95                 OPT_PRESERVE_SECURITY_CONTEXT = 0x100,
96 #endif
97         };
98
99 #if ENABLE_FEATURE_INSTALL_LONG_OPTIONS
100         applet_long_options = install_long_options;
101 #endif
102         opt_complementary = "?:s--d:d--s" USE_SELINUX(":Z--\xff:\xff--Z");
103         /* -c exists for backwards compatibility, it's needed */
104
105         flags = getopt32(argc, argv, "cdpsg:m:o:" USE_SELINUX("Z:"), &gid_str, &mode_str, &uid_str USE_SELINUX(, &scontext));
106
107 #if ENABLE_SELINUX
108         if (flags & OPT_PRESERVE_SECURITY_CONTEXT) {
109                 use_default_selinux_context = 0;
110                 copy_flags |= FILEUTILS_PRESERVE_SECURITY_CONTEXT;
111                 selinux_or_die();
112         }
113         if (flags & OPT_SET_SECURITY_CONTEXT) {
114                 selinux_or_die();
115                 setfscreatecon_or_die(scontext);
116                 use_default_selinux_context = 0;
117                 copy_flags |= FILEUTILS_SET_SECURITY_CONTEXT;
118         }
119 #endif
120
121         /* preserve access and modification time, this is GNU behaviour, BSD only preserves modification time */
122         if (flags & OPT_PRESERVE_TIME) {
123                 copy_flags |= FILEUTILS_PRESERVE_STATUS;
124         }
125         mode = 0666;
126         if (flags & OPT_MODE) bb_parse_mode(mode_str, &mode);
127         uid = (flags & OPT_OWNER) ? get_ug_id(uid_str, xuname2uid) : getuid();
128         gid = (flags & OPT_GROUP) ? get_ug_id(gid_str, xgroup2gid) : getgid();
129         if (flags & (OPT_OWNER|OPT_GROUP)) umask(0);
130
131         /* Create directories
132          * don't use bb_make_directory() as it can't change uid or gid
133          * perhaps bb_make_directory() should be improved.
134          */
135         if (flags & OPT_DIRECTORY) {
136                 for (argv += optind; *argv; argv++) {
137                         char *old_argv_ptr = *argv + 1;
138                         char *argv_ptr;
139                         do {
140                                 argv_ptr = strchr(old_argv_ptr, '/');
141                                 old_argv_ptr = argv_ptr;
142                                 if (argv_ptr) {
143                                         *argv_ptr = '\0';
144                                         old_argv_ptr++;
145                                 }
146                                 if (mkdir(*argv, mode | 0111) == -1) {
147                                         if (errno != EEXIST) {
148                                                 bb_perror_msg("cannot create %s", *argv);
149                                                 ret = EXIT_FAILURE;
150                                                 break;
151                                         }
152                                 }
153                                 if ((flags & (OPT_OWNER|OPT_GROUP))
154                                  && lchown(*argv, uid, gid) == -1
155                                 ) {
156                                         bb_perror_msg("cannot change ownership of %s", *argv);
157                                         ret = EXIT_FAILURE;
158                                         break;
159                                 }
160                                 if (argv_ptr) {
161                                         *argv_ptr = '/';
162                                 }
163                         } while (old_argv_ptr);
164                 }
165                 return ret;
166         }
167
168         isdir = lstat(argv[argc - 1], &statbuf) < 0 ? 0 : S_ISDIR(statbuf.st_mode);
169
170         for (i = optind; i < argc - 1; i++) {
171                 char *dest;
172
173                 dest = argv[argc - 1];
174                 if (isdir)
175                         dest = concat_path_file(argv[argc - 1], basename(argv[i]));
176                 ret |= copy_file(argv[i], dest, copy_flags);
177
178                 /* Set the file mode */
179                 if ((flags & OPT_MODE) && chmod(dest, mode) == -1) {
180                         bb_perror_msg("cannot change permissions of %s", dest);
181                         ret = EXIT_FAILURE;
182                 }
183 #if ENABLE_SELINUX
184                 if (use_default_selinux_context)
185                         setdefaultfilecon(dest);
186 #endif
187                 /* Set the user and group id */
188                 if ((flags & (OPT_OWNER|OPT_GROUP))
189                  && lchown(dest, uid, gid) == -1
190                 ) {
191                         bb_perror_msg("cannot change ownership of %s", dest);
192                         ret = EXIT_FAILURE;
193                 }
194                 if (flags & OPT_STRIP) {
195                         if (BB_EXECLP("strip", "strip", dest, NULL) == -1) {
196                                 bb_perror_msg("strip");
197                                 ret = EXIT_FAILURE;
198                         }
199                 }
200                 if (ENABLE_FEATURE_CLEAN_UP && isdir) free(dest);
201         }
202
203         return ret;
204 }