summaryrefslogtreecommitdiffstats
path: root/bin/setfacl
Commit message (Collapse)AuthorAgeFilesLines
* Don't mention the "canonical six" in setfacl(1); it describes semanticstrasz2016-01-231-3/+4
| | | | | | | that's long gone. MFC after: 1 month Sponsored by: The FreeBSD Foundation
* Expose an interface to determine if an ACE is inherited.delphij2015-09-041-2/+4
| | | | | | | Submitted by: sef Reviewed by: trasz MFC after: 2 weeks Differential Revision: https://reviews.freebsd.org/D3540
* Add META_MODE support.sjg2015-06-131-0/+18
|\ | | | | | | | | | | | | | | | | | | | | Off by default, build behaves normally. WITH_META_MODE we get auto objdir creation, the ability to start build from anywhere in the tree. Still need to add real targets under targets/ to build packages. Differential Revision: D2796 Reviewed by: brooks imp
| * dirdeps.mk now sets DEP_RELDIRsjg2015-06-081-2/+0
| |
| * Merge head from 7/28sjg2014-08-191-2/+2
| |\ | |/ |/|
| * Updated dependenciessjg2014-05-161-1/+0
| |
| * Updated dependenciessjg2014-05-101-0/+2
| |
| * sync from headsjg2013-04-121-7/+17
| |\
| * | Updated dependenciessjg2013-03-111-0/+1
| | |
| * | Updated dependenciessjg2013-02-161-2/+0
| | |
| | |
| | \
| *-. \ Sync from headsjg2012-11-044-33/+65
| |\ \ \
| * | | | Sync FreeBSD's bmake branch with Juniper's internal bmake branch.marcel2012-08-221-0/+19
| | |/ / | |/| | | | | | | | | | Requested by: Simon Gerraty <sjg@juniper.net>
* | | | use .Mt to mark up email addresses consistently (part1)bapt2014-06-201-2/+2
| |_|/ |/| | | | | | | | | | | PR: 191174 Submitted by: Franco Fichtner <franco@lastsummer.de>
* | | Mention that read_attributes, write_attributes, read_acl and write_acltrasz2013-04-011-1/+5
| | | | | | | | | | | | | | | | | | | | | are always permitted for the file owner. PR: kern/174948 MFC after: 1 week
* | | Fix NFSv4 permission description in setfacl(1) manual page: the 'D'trasz2013-02-081-2/+2
| | | | | | | | | | | | | | | | | | means delete_child, not delete. MFC after: 1 week
* | | Improve description of the "-m" option to setfacl(1).trasz2013-02-081-5/+6
| | | | | | | | | | | | | | | Submitted by: scottl MFC after: 1 week
* | | In the setfacl(1) manual page, make it clear that for NFSv4 ACLs,trasz2013-02-081-1/+6
| |/ |/| | | | | | | | | one should really use -a and -x instead of -m. MFC after: 1 week
* | Fix warnings found by -Wmising-variable-declarations.ed2012-10-192-28/+33
| | | | | | | | | | | | | | | | | | | | | | This self-written compiler warning, which is hopefully going to be committed into LLVM sources soon, warns about potentially missing `static' keywords, similar to -Wmissing-prototypes. - bin/pax: Move external declaration of chdname and s_mask into extern.h. - bin/setfacl: Move setfacl.c-specific stuff out of setfacl.h. - sbin/mount_fusefs: Remove char *progname; use getprogname(). - others: add `static' where possible.
* | Fix an error in setfacl(1) that manifested like this:trasz2012-09-041-3/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | # setfacl -m u:trasz:rwx x # setfacl -m u:root:rwx x # getfacl x # file: x # owner: root # group: wheel user::rw- user:root:rwx user:trasz:rwx group::r-- mask::rwx other::r-- # setfacl -m u:root:rwx x setfacl: x: acl_calc_mask() failed: Invalid argument setfacl: x: failed to set ACL mask For NFSv4 ACLs, this sort of situation would result in duplicated entries. MFC after: 1 month
* | Make "setfacl -bd" an alias for "setfacl -k". Previously it would crashtrasz2012-09-041-0/+11
| | | | | | | | | | | | | | on assert. PR: bin/165807 MFC after: 1 month
* | Make setfacl(1) behave properly in situations like "setfacl -kd".trasz2012-09-041-0/+15
| | | | | | | | MFC after: 1 month
* | Fix compact form of "synchronize" permission in setfacl(1) manual page - ittrasz2012-09-031-2/+2
|/ | | | | | | should be "s", not "S". PR: docs/162380 MFC after: 2 weeks
* Remove trailing whitespace per mdoc lint warningeadler2012-03-291-1/+1
| | | | | | | Disussed with: gavin No objection from: doc Approved by: joel MFC after: 3 days
* Make it possible to use permission sets (full_set, modify_set, read_settrasz2011-04-091-2/+17
| | | | | | | | and write_set) with setfacl(1). PR: kern/154113 Submitted by: Shawn Webb <lattera at gmail dot com> (earlier version) MFC after: 1 month
* Increase carried_error if we skip a file due to an error. This ensuresjh2011-01-031-0/+4
| | | | | | | | | that setfacl(1) exits with proper exit status on failure. PR: bin/149780 Submitted by: Ævar Arnfjörð Bjarmason (original version) Reviewed by: trasz MFC after: 3 weeks
* Typo fix: s/ommited/omittedbcr2010-07-271-2/+2
| | | | MFC after: 4 days
* Update authors and history.trasz2010-05-131-1/+6
| | | | MFC after: 1 week
* Switch to our preferred license text.joel2010-03-078-64/+64
| | | | Approved by: jedgar
* Fix breakage introduced in last commit.trasz2009-12-261-1/+1
|
* Improve ACL branding mismatch detection and reporting in some rare cases,trasz2009-12-264-8/+32
| | | | such as "setfacl -m ''".
* Add NFSv4 support to setfacl(1).trasz2009-09-076-221/+539
| | | | Reviewed by: rwatson
* Fix double free in setfacl(1). Description from the author:trasz2008-09-061-4/+6
| | | | | | | | | | | | | | Initially, 'acl' (an 'acl_t *') is allocated, and its ACCESS_ACL and DEFAULT_ACL fields are passed to the 'libc' ACL routines for subsequent allocation. If the '-m' option (merge existing ACL with a new one) is specified, then 'set_acl_mask()' will be called and passed one of the two ACLs. This function, in turn, replaces this given ACL structure by another, freshly allocated. However, the pointer in the 'acl' variable in the caller is not updated. The caller then proceeds to free the ACL, incurring in a double free condition. Submitted by: Pedro Martelletto <pedro at ambientworks.net> Approved by: rwatson (mentor)
* Add hard sentence breaks.csjp2008-07-061-8/+10
| | | | | Pointed out by: rwatson MFC after: 1 week
* Document default ACLs and how to use them.csjp2008-07-061-0/+16
| | | | MFC after: 1 week
* Implement the -h flag (set an ACL on a symbolic link).mckusick2007-02-261-4/+14
| | | | | | | Before this fix the -h flag was ignored (i.e. setfacl always set the ACL on the file pointed to by the symbolic link even when the -h flag requested that the ACL be set on the symbolic link itself).
* Markup fixes.ru2006-09-171-2/+3
|
* o Fix grammar, format.maxim2006-06-091-3/+3
|
* Document the way to get list of files to process from the stdin.kib2006-06-091-1/+3
| | | | | MFC after: 1 week Approved by: kan (mentor)
* Copy filename read from the stdin into the private buffer. Otherwise,kib2006-06-091-1/+5
| | | | | | | | | next read filename overwrite previous one, resulting in acl being applied only to the last name in the list. Submitted by: Oleg Lomaka <oleg.lomaka at gmail com> MFC after: 1 week Approved by: kan (mentor)
* [mdoc] add missing space before a punctuation type argument.ru2005-12-131-1/+1
|
* Sync program's usage() with manpage's SYNOPSIS.ru2005-02-092-4/+4
|
* Add the new standard EXIT STATUS section where appropriate.ru2005-01-161-1/+1
| | | | Sort standard sections in the (documented) preferred order.
* /*- or .\"- or #- to begin license clauses.imp2005-01-108-8/+8
|
* Mechanically kill hard sentence breaks.ru2004-07-021-8/+16
|
* style.Makefile(5)obrien2004-06-131-2/+2
|
* Add additional documentation to setfacl(1) regarding the behavior ofrwatson2003-08-071-0/+18
| | | | | | | | | | | tools such as chmod(1) and ls(1) when it comes to acting on objects that have POSIX.1e extended ACLs. Specifically, discuss the substitution of the mask entry for the group entry in the mode representation of the ACL. Differently worded from the submission, and could probably use further refinement. PR: 55319 Submitted by: Grzegorz Czaplinski <G.Czaplinski@prioris.mini.pw.edu.pl>
* -v no longer a valid argument to setfacl(1) -- remove from usage().rwatson2003-08-071-1/+1
| | | | | PR: 55318 Submitted by: Grzegorz Czaplinski <G.Czaplinski@prioris.mini.pw.edu.pl>
* When reporting an error internalizing an ACL string, print out therwatson2003-07-181-2/+2
| | | | | | | | ACL that generated the error, rather than the function, which is more user-friendly. Obtained from: TrustedBSD Project Product of: France
* Add "-h" arguments to getfacl and setfacl, which behave in a mannerrwatson2002-12-303-6/+21
| | | | | | | similar to "-h" on chown, chmod, etc, causing the operation to occur on a final symlink in the provided path, rather than its target. Obtained from: TrustedBSD Project
* Consistently use FBSDIDobrien2002-06-306-12/+18
|
OpenPOWER on IntegriCloud