All checks were successful
		
		
	
	Test / Create distribution (push) Successful in 34s
				
			Test / Hpkg (push) Successful in 4m3s
				
			Test / Sandbox (race detector) (push) Successful in 4m26s
				
			Test / Hakurei (race detector) (push) Successful in 5m19s
				
			Test / Sandbox (push) Successful in 1m28s
				
			Test / Hakurei (push) Successful in 2m16s
				
			Test / Flake checks (push) Successful in 1m37s
				
			This allows use of absolute pathname values without importing container. Signed-off-by: Ophestra <cat@gensokyo.uk>
		
			
				
	
	
		
			70 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			70 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package system
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"os"
 | 
						|
	"slices"
 | 
						|
 | 
						|
	"hakurei.app/container/check"
 | 
						|
	"hakurei.app/hst"
 | 
						|
	"hakurei.app/system/acl"
 | 
						|
)
 | 
						|
 | 
						|
// UpdatePerm calls UpdatePermType with the [Process] criteria.
 | 
						|
func (sys *I) UpdatePerm(path *check.Absolute, perms ...acl.Perm) *I {
 | 
						|
	sys.UpdatePermType(Process, path, perms...)
 | 
						|
	return sys
 | 
						|
}
 | 
						|
 | 
						|
// UpdatePermType maintains [acl.Perms] on a file until its [Enablement] is no longer satisfied.
 | 
						|
func (sys *I) UpdatePermType(et hst.Enablement, path *check.Absolute, perms ...acl.Perm) *I {
 | 
						|
	sys.ops = append(sys.ops, &aclUpdateOp{et, path.String(), perms})
 | 
						|
	return sys
 | 
						|
}
 | 
						|
 | 
						|
// aclUpdateOp implements [I.UpdatePermType].
 | 
						|
type aclUpdateOp struct {
 | 
						|
	et    hst.Enablement
 | 
						|
	path  string
 | 
						|
	perms acl.Perms
 | 
						|
}
 | 
						|
 | 
						|
func (a *aclUpdateOp) Type() hst.Enablement { return a.et }
 | 
						|
 | 
						|
func (a *aclUpdateOp) apply(sys *I) error {
 | 
						|
	sys.msg.Verbose("applying ACL", a)
 | 
						|
	return newOpError("acl", sys.aclUpdate(a.path, sys.uid, a.perms...), false)
 | 
						|
}
 | 
						|
 | 
						|
func (a *aclUpdateOp) revert(sys *I, ec *Criteria) error {
 | 
						|
	if ec.hasType(a.Type()) {
 | 
						|
		sys.msg.Verbose("stripping ACL", a)
 | 
						|
		err := sys.aclUpdate(a.path, sys.uid)
 | 
						|
		if errors.Is(err, os.ErrNotExist) {
 | 
						|
			// the ACL is effectively stripped if the file no longer exists
 | 
						|
			sys.msg.Verbosef("target of ACL %s no longer exists", a)
 | 
						|
			err = nil
 | 
						|
		}
 | 
						|
		return newOpError("acl", err, true)
 | 
						|
	} else {
 | 
						|
		sys.msg.Verbose("skipping ACL", a)
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (a *aclUpdateOp) Is(o Op) bool {
 | 
						|
	target, ok := o.(*aclUpdateOp)
 | 
						|
	return ok && a != nil && target != nil &&
 | 
						|
		a.et == target.et &&
 | 
						|
		a.path == target.path &&
 | 
						|
		slices.Equal(a.perms, target.perms)
 | 
						|
}
 | 
						|
 | 
						|
func (a *aclUpdateOp) Path() string { return a.path }
 | 
						|
 | 
						|
func (a *aclUpdateOp) String() string {
 | 
						|
	return fmt.Sprintf("%s type: %s path: %q",
 | 
						|
		a.perms, TypeString(a.et), a.path)
 | 
						|
}
 |