1 /* install - copy files and set attributes
2 Copyright (C) 89, 90, 91, 95, 96, 1997 Free Software Foundation, Inc.
4 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2, or (at your option)
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
14 You should have received a copy of the GNU General Public License
15 along with this program; if not, write to the Free Software Foundation,
16 Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
18 /* Copy files and set their permission modes and, if possible,
19 their owner and group. Used similarly to `cp'; typically
20 used in Makefiles to copy programs into their destination
21 directories. It can also be used to create the destination
22 directories and any leading directories, and to set the final
23 directory's modes. It refuses to copy files onto themselves.
27 Set the group ownership of the installed file or directory
28 to the group ID of GROUP (default is process's current
29 group). GROUP may also be a numeric group ID.
32 Set the permission mode for the installed file or directory
33 to MODE, which is an octal number (default is 0755).
36 If run as root, set the ownership of the installed file to
37 the user ID of OWNER (default is root). OWNER may also be
40 -c No effect. For compatibility with old Unix versions of install.
43 Strip the symbol tables from installed files.
46 Create a directory and its leading directories, if they
47 do not already exist. Set the owner, group and mode
48 as given on the command line. Any leading directories
49 that are created are also given those attributes.
50 This is different from the SunOS 4.0 install, which gives
51 directories that it creates the default attributes.
53 David MacKenzie <djm@gnu.ai.mit.edu> */
62 #include <sys/types.h>
67 #include "backupfile.h"
68 #include "modechange.h"
74 # include <sys/wait.h>
82 # define BITSPERBYTE 8
85 struct passwd *getpwnam ();
86 struct group *getgrnam ();
88 #ifndef _POSIX_VERSION
94 # define endgrent() ((void) 0)
98 # define endpwent() ((void) 0)
101 /* True if C is an ASCII octal digit. */
102 #define isodigit(c) ((c) >= '0' && c <= '7')
104 /* Number of bytes of a file to copy at a time. */
105 #define READ_SIZE (32 * 1024)
108 # define UID_T_MAX ((uid_t)(~((unsigned long)1 << ((sizeof (uid_t) \
109 * BITSPERBYTE - 1)))))
113 # define GID_T_MAX ((gid_t)(~((unsigned long)1 << ((sizeof (gid_t) \
114 * BITSPERBYTE - 1)))))
123 enum backup_type get_version ();
125 static int change_attributes __P ((char *path, int no_need_to_chown));
126 static int copy_file __P ((char *from, char *to, int *to_created));
127 static int install_file_in_dir __P ((char *from, char *to_dir));
128 static int install_file_in_file __P ((char *from, char *to));
129 static void get_ids __P ((void));
130 static void strip __P ((char *path));
131 static void usage __P ((int status));
133 /* The name this program was run with, for error messages. */
136 /* The user name that will own the files, or NULL to make the owner
137 the current user ID. */
138 static char *owner_name;
140 /* The user ID corresponding to `owner_name'. */
141 static uid_t owner_id;
143 /* The group name that will own the files, or NULL to make the group
144 the current group ID. */
145 static char *group_name;
147 /* The group ID corresponding to `group_name'. */
148 static gid_t group_id;
150 /* The permissions to which the files will be set. The umask has
154 /* If nonzero, strip executable files after copying them. */
155 static int strip_files;
157 /* If nonzero, install a directory instead of a regular file. */
160 /* If nonzero, display usage information and exit. */
161 static int show_help;
163 /* If nonzero, print the version on standard output and exit. */
164 static int show_version;
166 static struct option const long_options[] =
168 {"strip", no_argument, NULL, 's'},
169 {"directory", no_argument, NULL, 'd'},
170 {"group", required_argument, NULL, 'g'},
171 {"mode", required_argument, NULL, 'm'},
172 {"owner", required_argument, NULL, 'o'},
173 {"backup", no_argument, NULL, 'b'},
174 {"version-control", required_argument, NULL, 'V'},
175 {"help", no_argument, &show_help, 1},
176 {"version", no_argument, &show_version, 1},
181 main (int argc, char **argv)
185 char *symbolic_mode = NULL;
186 int make_backups = 0;
189 program_name = argv[0];
190 setlocale (LC_ALL, "");
191 bindtextdomain (PACKAGE, LOCALEDIR);
192 textdomain (PACKAGE);
201 version = getenv ("SIMPLE_BACKUP_SUFFIX");
203 simple_backup_suffix = version;
204 version = getenv ("VERSION_CONTROL");
206 while ((optc = getopt_long (argc, argv, "bcsdg:m:o:V:S:", long_options,
228 symbolic_mode = optarg;
234 simple_backup_suffix = optarg;
246 printf ("install (%s) %s\n", GNU_PACKAGE, VERSION);
253 /* Check for invalid combinations of arguments. */
254 if (dir_arg && strip_files)
256 _("the strip option may not be used when installing a directory"));
259 backup_type = get_version (version);
261 if (optind == argc || (optind == argc - 1 && !dir_arg))
263 error (0, 0, _("too few arguments"));
269 struct mode_change *change = mode_compile (symbolic_mode, 0);
270 if (change == MODE_INVALID)
271 error (1, 0, _("invalid mode `%s'"), symbolic_mode);
272 else if (change == MODE_MEMORY_EXHAUSTED)
273 error (1, 0, _("virtual memory exhausted"));
274 mode = mode_adjust (0, change);
281 for (; optind < argc; ++optind)
284 make_path (argv[optind], mode, mode, owner_id, group_id, 0, NULL);
289 if (optind == argc - 2)
291 if (!isdir (argv[argc - 1]))
292 errors = install_file_in_file (argv[argc - 2], argv[argc - 1]);
294 errors = install_file_in_dir (argv[argc - 2], argv[argc - 1]);
298 if (!isdir (argv[argc - 1]))
300 for (; optind < argc - 1; ++optind)
302 errors |= install_file_in_dir (argv[optind], argv[argc - 1]);
310 /* Copy file FROM onto file TO and give TO the appropriate
312 Return 0 if successful, 1 if an error occurs. */
315 install_file_in_file (char *from, char *to)
318 int no_need_to_chown;
320 if (copy_file (from, to, &to_created))
324 no_need_to_chown = (to_created
325 && owner_name == NULL
326 && group_name == NULL);
327 return change_attributes (to, no_need_to_chown);
330 /* Copy file FROM into directory TO_DIR, keeping its same name,
331 and give the copy the appropriate attributes.
332 Return 0 if successful, 1 if not. */
335 install_file_in_dir (char *from, char *to_dir)
341 from_base = basename (from);
342 to = xmalloc ((unsigned) (strlen (to_dir) + strlen (from_base) + 2));
343 stpcpy (stpcpy (stpcpy (to, to_dir), "/"), from_base);
344 ret = install_file_in_file (from, to);
349 /* A chunk of a file being copied. */
350 static char buffer[READ_SIZE];
352 /* Copy file FROM onto file TO, creating TO if necessary.
353 Return 0 if the copy is successful, 1 if not. If the copy is
354 successful, set *TO_CREATED to nonzero if TO was created (if it did
355 not exist or did, but was unlinked) and to zero otherwise. If the
356 copy fails, don't modify *TO_CREATED. */
359 copy_file (char *from, char *to, int *to_created)
364 struct stat from_stats, to_stats;
365 int target_created = 1;
367 if (stat (from, &from_stats))
369 error (0, errno, "%s", from);
373 /* Allow installing from non-regular files like /dev/null.
374 Charles Karney reported that some Sun version of install allows that
375 and that sendmail's installation process relies on the behavior. */
376 if (S_ISDIR (from_stats.st_mode))
378 error (0, 0, _("`%s' is a directory"), from);
381 if (stat (to, &to_stats) == 0)
383 if (!S_ISREG (to_stats.st_mode))
385 error (0, 0, _("`%s' is not a regular file"), to);
388 if (from_stats.st_dev == to_stats.st_dev
389 && from_stats.st_ino == to_stats.st_ino)
391 error (0, 0, _("`%s' and `%s' are the same file"), from, to);
395 /* The destination file exists. Try to back it up if required. */
396 if (backup_type != none)
398 char *tmp_backup = find_backup_file_name (to);
401 if (tmp_backup == NULL)
402 error (1, 0, "virtual memory exhausted");
403 dst_backup = (char *) alloca (strlen (tmp_backup) + 1);
404 strcpy (dst_backup, tmp_backup);
406 if (rename (to, dst_backup))
410 error (0, errno, "cannot backup `%s'", to);
416 /* If unlink fails, try to proceed anyway. */
421 fromfd = open (from, O_RDONLY, 0);
424 error (0, errno, "%s", from);
428 /* Make sure to open the file in a mode that allows writing. */
429 tofd = open (to, O_WRONLY | O_CREAT | O_TRUNC, 0600);
432 error (0, errno, "%s", to);
437 while ((bytes = safe_read (fromfd, buffer, READ_SIZE)) > 0)
438 if (full_write (tofd, buffer, bytes) < 0)
440 error (0, errno, "%s", to);
446 error (0, errno, "%s", from);
450 if (close (fromfd) < 0)
452 error (0, errno, "%s", from);
455 if (close (tofd) < 0)
457 error (0, errno, "%s", to);
461 *to_created = target_created;
470 /* Set the attributes of file or directory PATH.
471 If NO_NEED_TO_CHOWN is nonzero, don't call chown.
472 Return 0 if successful, 1 if not. */
475 change_attributes (char *path, int no_need_to_chown)
479 /* chown must precede chmod because on some systems,
480 chown clears the set[ug]id bits for non-superusers,
481 resulting in incorrect permissions.
482 On System V, users can give away files with chown and then not
483 be able to chmod them. So don't give files away.
485 We don't pass -1 to chown to mean "don't change the value"
486 because SVR3 and earlier non-BSD systems don't support that.
488 We don't normally ignore errors from chown because the idea of
489 the install command is that the file is supposed to end up with
490 precisely the attributes that the user specified (or defaulted).
491 If the file doesn't end up with the group they asked for, they'll
492 want to know. But AFS returns EPERM when you try to change a
493 file's group; thus the kludge. */
495 if (!no_need_to_chown && chown (path, owner_id, group_id)
501 if (chmod (path, mode))
505 error (0, err, "%s", path);
511 /* Strip the symbol table from the file PATH.
512 We could dig the magic number out of the file first to
513 determine whether to strip it, but the header files and
514 magic numbers vary so much from system to system that making
515 it portable would be very difficult. Not worth the effort. */
526 error (1, errno, _("fork system call failed"));
529 execlp ("strip", "strip", path, (char *) NULL);
530 error (1, errno, _("cannot run strip"));
532 default: /* Parent. */
533 /* Parent process. */
534 while (pid != wait (&status)) /* Wait for kid to finish. */
540 /* Initialize the user and group ownership of the files to install. */
550 pw = getpwnam (owner_name);
554 if (xstrtol (owner_name, NULL, 0, &tmp_long, NULL) != LONGINT_OK
555 || tmp_long < 0 || tmp_long > UID_T_MAX)
556 error (1, 0, _("invalid user `%s'"), owner_name);
557 owner_id = (uid_t) tmp_long;
560 owner_id = pw->pw_uid;
564 owner_id = getuid ();
568 gr = getgrnam (group_name);
572 if (xstrtol (group_name, NULL, 0, &tmp_long, NULL) != LONGINT_OK
573 || tmp_long < 0 || tmp_long > (long) GID_T_MAX)
574 error (1, 0, _("invalid group `%s'"), group_name);
575 group_id = (gid_t) tmp_long;
578 group_id = gr->gr_gid;
582 group_id = getgid ();
589 fprintf (stderr, _("Try `%s --help' for more information.\n"),
594 Usage: %s [OPTION]... SOURCE DEST (1st format)\n\
595 or: %s [OPTION]... SOURCE... DIRECTORY (2nd format)\n\
596 or: %s -d [OPTION]... DIRECTORY... (3rd format)\n\
598 program_name, program_name, program_name);
600 In first two formats, copy SOURCE to DEST or multiple SOURCE(s) to\n\
601 DIRECTORY, while setting permission modes and owner/group. In third\n\
602 format, make all components of the given DIRECTORY(ies).\n\
604 -b, --backup make backup before removal\n\
606 -d, --directory create [leading] directories, mandatory for 3rd format\n\
607 -g, --group=GROUP set group ownership, instead of process' current group\n\
608 -m, --mode=MODE set permission mode (as in chmod), instead of rw-r--r--\n\
609 -o, --owner=OWNER set ownership (super-user only)\n\
610 -s, --strip strip symbol tables, only for 1st and 2nd formats\n\
611 -S, --suffix=SUFFIX override the usual backup suffix\n\
612 -V, --version-control=WORD override the usual version control\n\
613 --help display this help and exit\n\
614 --version output version information and exit\n\
618 The backup suffix is ~, unless set with SIMPLE_BACKUP_SUFFIX. The\n\
619 version control may be set with VERSION_CONTROL, values are:\n\
621 t, numbered make numbered backups\n\
622 nil, existing numbered if numbered backups exist, simple otherwise\n\
623 never, simple always make simple backups\n\
625 puts (_("\nReport bugs to <fileutils-bugs@gnu.ai.mit.edu>."));