1 /* vi: set sw=4 ts=4: */
3 * Copyright (C) 2003 by Glenn McGrath <bug1@iinet.net.au>
4 * SELinux support: by Yuichi Nakamura <ynakam@hitachisoft.jp>
6 * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
8 * TODO: -d option, need a way of recursively making directories and changing
9 * owner/group, will probably modify bb_make_directory(...)
13 #include <getopt.h> /* struct option */
16 #include "libcoreutils/coreutils.h"
18 #if ENABLE_FEATURE_INSTALL_LONG_OPTIONS
19 static const struct option install_long_options[] = {
20 { "directory", 0, NULL, 'd' },
21 { "preserve-timestamps", 0, NULL, 'p' },
22 { "strip", 0, NULL, 's' },
23 { "group", 0, NULL, 'g' },
24 { "mode", 0, NULL, 'm' },
25 { "owner", 0, NULL, 'o' },
27 { "context", 1, NULL, 'Z' },
28 { "preserve_context", 0, NULL, 0xff },
29 { "preserve-context", 0, NULL, 0xff },
37 static bool use_default_selinux_context = 1;
39 static void setdefaultfilecon(const char *path)
42 security_context_t scontext = NULL;
44 if (!is_selinux_enabled()) {
47 if (lstat(path, &s) != 0) {
51 if (matchpathcon(path, s.st_mode, &scontext) < 0) {
54 if (strcmp(scontext, "<<none>>") == 0) {
58 if (lsetfilecon(path, scontext) < 0) {
59 if (errno != ENOTSUP) {
60 bb_perror_msg("warning: failed to change context of %s to %s", path, scontext);
70 int install_main(int argc, char **argv);
71 int install_main(int argc, char **argv)
80 int copy_flags = FILEUTILS_DEREFERENCE | FILEUTILS_FORCE;
81 int ret = EXIT_SUCCESS, flags, i, isdir;
83 security_context_t scontext;
88 OPT_PRESERVE_TIME = 0x4,
94 OPT_SET_SECURITY_CONTEXT = 0x80,
95 OPT_PRESERVE_SECURITY_CONTEXT = 0x100,
99 #if ENABLE_FEATURE_INSTALL_LONG_OPTIONS
100 applet_long_options = install_long_options;
102 opt_complementary = "s--d:d--s" USE_SELINUX(":Z--\xff:\xff--Z");
103 /* -c exists for backwards compatibility, it's needed */
105 flags = getopt32(argc, argv, "cdpsg:m:o:" USE_SELINUX("Z:"),
106 &gid_str, &mode_str, &uid_str USE_SELINUX(, &scontext));
109 if (flags & OPT_PRESERVE_SECURITY_CONTEXT) {
110 use_default_selinux_context = 0;
111 copy_flags |= FILEUTILS_PRESERVE_SECURITY_CONTEXT;
114 if (flags & OPT_SET_SECURITY_CONTEXT) {
116 setfscreatecon_or_die(scontext);
117 use_default_selinux_context = 0;
118 copy_flags |= FILEUTILS_SET_SECURITY_CONTEXT;
122 /* preserve access and modification time, this is GNU behaviour, BSD only preserves modification time */
123 if (flags & OPT_PRESERVE_TIME) {
124 copy_flags |= FILEUTILS_PRESERVE_STATUS;
127 if (flags & OPT_MODE) bb_parse_mode(mode_str, &mode);
128 uid = (flags & OPT_OWNER) ? get_ug_id(uid_str, xuname2uid) : getuid();
129 gid = (flags & OPT_GROUP) ? get_ug_id(gid_str, xgroup2gid) : getgid();
130 if (flags & (OPT_OWNER|OPT_GROUP)) umask(0);
132 /* Create directories
133 * don't use bb_make_directory() as it can't change uid or gid
134 * perhaps bb_make_directory() should be improved.
136 if (flags & OPT_DIRECTORY) {
137 for (argv += optind; *argv; argv++) {
138 char *old_argv_ptr = *argv + 1;
141 argv_ptr = strchr(old_argv_ptr, '/');
142 old_argv_ptr = argv_ptr;
147 if (mkdir(*argv, mode | 0111) == -1) {
148 if (errno != EEXIST) {
149 bb_perror_msg("cannot create %s", *argv);
154 if ((flags & (OPT_OWNER|OPT_GROUP))
155 && lchown(*argv, uid, gid) == -1
157 bb_perror_msg("cannot change ownership of %s", *argv);
164 } while (old_argv_ptr);
169 /* coreutils install resolves link in this case, don't use lstat */
170 isdir = stat(argv[argc - 1], &statbuf) < 0 ? 0 : S_ISDIR(statbuf.st_mode);
172 for (i = optind; i < argc - 1; i++) {
175 dest = argv[argc - 1];
177 dest = concat_path_file(argv[argc - 1], basename(argv[i]));
178 ret |= copy_file(argv[i], dest, copy_flags);
180 /* Set the file mode */
181 if ((flags & OPT_MODE) && chmod(dest, mode) == -1) {
182 bb_perror_msg("cannot change permissions of %s", dest);
186 if (use_default_selinux_context)
187 setdefaultfilecon(dest);
189 /* Set the user and group id */
190 if ((flags & (OPT_OWNER|OPT_GROUP))
191 && lchown(dest, uid, gid) == -1
193 bb_perror_msg("cannot change ownership of %s", dest);
196 if (flags & OPT_STRIP) {
198 args[0] = (char*)"strip";
201 if (spawn_and_wait(args)) {
202 bb_perror_msg("strip");
206 if (ENABLE_FEATURE_CLEAN_UP && isdir) free(dest);