1 # Copyright 1999-2015 Gentoo Foundation
2 # Distributed under the terms of the GNU General Public License v2
5 # @ECLASS: fcaps.eclass
7 # Constanze Hausner <constanze@gentoo.org>
8 # base-system@gentoo.org
9 # @BLURB: function to set POSIX file-based capabilities
11 # This eclass provides a function to set file-based capabilities on binaries.
12 # This is not the same as USE=caps which controls runtime capability changes,
13 # often via packages like libcap.
15 # Due to probable capability-loss on moving or copying, this happens in
16 # pkg_postinst-phase (at least for now).
19 # You can manually set the caps on ping and ping6 by doing:
22 # fcaps cap_net_raw bin/ping bin/ping6
26 # Or set it via the global ebuild var FILECAPS:
29 # cap_net_raw bin/ping bin/ping6
33 if [[ -z ${_FCAPS_ECLASS} ]]; then
38 # We can't use libcap-ng atm due to #471414.
39 DEPEND="filecaps? ( sys-libs/libcap )"
41 # @ECLASS-VARIABLE: FILECAPS
44 # An array of fcap arguments to use to automatically execute fcaps. See that
45 # function for more details.
47 # All args are consumed until the '--' marker is found. So if you have:
49 # FILECAPS=( moo cow -- fat cat -- chubby penguin )
52 # This will end up executing:
56 # fcaps chubby penguin
59 # Note: If you override pkg_postinst, you must call fcaps_pkg_postinst yourself.
62 # @USAGE: [-o <owner>] [-g <group>] [-m <mode>] [-M <caps mode>] <capabilities> <file[s]>
64 # Sets the specified capabilities on the specified files.
66 # The caps option takes the form as expected by the cap_from_text(3) man page.
67 # If no action is specified, then "=ep" will be used as a default.
69 # If the file is a relative path (e.g. bin/foo rather than /bin/foo), then the
70 # appropriate path var ($D/$ROOT/etc...) will be prefixed based on the current
73 # The caps mode (default 711) is used to set the permission on the file if
74 # capabilities were properly set on the file.
76 # If the system is unable to set capabilities, it will use the specified user,
77 # group, and mode (presumably to make the binary set*id). The defaults there
78 # are root:0 and 4711. Otherwise, the ownership and permissions will be
81 debug-print-function ${FUNCNAME} "$@"
83 # Process the user options first.
89 while [[ $# -gt 0 ]] ; do
94 -M) caps_mode=$2; shift;;
100 [[ $# -lt 2 ]] && die "${FUNCNAME}: wrong arg count"
103 [[ ${caps} == *[-=+]* ]] || caps+="=ep"
107 case ${EBUILD_PHASE} in
108 compile|install|preinst)
112 root=${EROOT:-${ROOT}}
116 # Process every file!
119 [[ ${file} != /* ]] && file="${root}${file}"
121 if use filecaps ; then
122 # Try to set capabilities. Ignore errors when the
123 # fs doesn't support it, but abort on all others.
124 debug-print "${FUNCNAME}: setting caps '${caps}' on '${file}'"
126 # If everything goes well, we don't want the file to be readable
128 chmod ${caps_mode} "${file}" || die
130 # Set/verify funcs for sys-libs/libcap.
131 _libcap() { setcap "${caps}" "${file}" ; }
132 _libcap_verify() { setcap -v "${caps}" "${file}" >/dev/null ; }
134 # Set/verify funcs for sys-libs/libcap-ng.
135 # Note: filecap only supports =ep mode.
136 # It also expects a different form:
137 # setcap cap_foo,cap_bar
140 local caps=",${caps%=ep}"
141 filecap "${file}" "${caps//,cap_}"
143 _libcap_ng_verify() {
144 # libcap-ng has a crappy interface
145 local rcaps icaps caps=",${caps%=ep}"
146 rcaps=$(filecap "${file}" | \
148 -e "s:^.{${#file}} +::" \
152 [[ ${PIPESTATUS[0]} -eq 0 ]] || return 1
153 icaps=$(echo "${caps//,cap_}" | LC_ALL=C sort)
154 [[ ${rcaps} == ${icaps} ]]
157 local out cmd notfound=0
158 for cmd in _libcap _libcap_ng ; do
159 if ! out=$(LC_ALL=C ${cmd} 2>&1) ; then
161 *"command not found"*)
165 # ENOTSUP and EOPNOTSUPP might be the same value which means
166 # strerror() on them is unstable -- we can get both. #559608
168 *"Operation not supported"*)
169 local fstype=$(stat -f -c %T "${file}")
170 ewarn "Could not set caps on '${file}' due to missing filesystem support:"
171 ewarn "* enable XATTR support for '${fstype}' in your kernel (if configurable)"
172 ewarn "* mount the fs with the user_xattr option (if not the default)"
173 ewarn "* enable the relevant FS_SECURITY option (if configurable)"
177 eerror "Setting caps '${caps}' on file '${file}' failed:"
179 die "could not set caps"
183 # Sanity check that everything took.
184 ${cmd}_verify || die "Checking caps '${caps}' on '${file}' failed"
186 # Everything worked. Move on to the next file.
190 if [[ ${notfound} -eq 2 ]] && [[ -z ${_FCAPS_WARNED} ]] ; then
192 ewarn "Could not find cap utils; make sure libcap or libcap-ng is available."
196 # If we're still here, setcaps failed.
197 debug-print "${FUNCNAME}: setting owner/mode on '${file}'"
198 chown "${owner}:${group}" "${file}" || die
199 chmod ${mode} "${file}" || die
203 # @FUNCTION: fcaps_pkg_postinst
205 # Process the FILECAPS array.
206 fcaps_pkg_postinst() {
208 for arg in "${FILECAPS[@]}" "--" ; do
209 if [[ ${arg} == "--" ]] ; then
218 EXPORT_FUNCTIONS pkg_postinst