[101504] trunk/base/src/port1.0/portextract.tcl
Blair Zajac
blair at orcaware.com
Mon Jan 14 09:09:18 PST 2013
On 01/13/2013 06:46 PM, Ryan Schmidt wrote:
>
> On Jan 13, 2013, at 18:53, Blair Zajac wrote:
>
>> On 01/13/2013 03:36 PM, Ryan Schmidt wrote:
>>
>>> https://trac.macports.org/ticket/21117
>>>
>>> I think the problem still remains when you have a non-root MacPorts installation; that's the configuration I was using when I initially filed the ticket, before the privilege-dropping code was added to MacPorts and made it an issue for everyone. The way I was thinking of fixing it was to exclude those files from copying that we don't need anyway and I think that still might be a better way, but I didn't really know how to do that which is why I never did anything about the ticket.
>>
>> If you're doing this as non-root, then presumably you have permissions yourself to mount a DMG. Are you saying that even if you can mount it, there's files in there you cannot see?
>
>
> I haven't tried using a non-root MacPorts installation in awhile; it just seemed to become totally impossible once the privilege-dropping branch got merged in. Maybe those bugs have been fixed by now.
>
> But here's an example from outside of MacPorts, using the distfile for the cliclick port:
>
>
> $ open cliclick/2.1/cliclick.dmg
> $ cd /Volumes/cliclick
> $ find . -print0 | xargs -0 ls -ld
> find: ./.Trashes: Permission denied
> drwxr-xr-x 12 rschmidt rschmidt 476 Sep 26 02:12 .
> -rw-r--r--@ 1 rschmidt rschmidt 12292 Sep 26 02:14 ./.DS_Store
> d-wx-wx-wt 2 rschmidt rschmidt 68 Sep 26 02:15 ./.Trashes
> drwxr-xr-x 8 rschmidt rschmidt 272 Sep 26 02:13 ./.assets
> -rw-r--r-- 1 rschmidt rschmidt 5639 Sep 26 02:11 ./.assets/AppIcon.png
> -rw-r--r-- 1 rschmidt rschmidt 95 Sep 26 02:11 ./.assets/bar.gif
> -rw-r--r-- 1 rschmidt rschmidt 4535 Sep 14 05:24 ./.assets/diskimage-background.png
> -rw-r--r-- 1 rschmidt rschmidt 67 Sep 26 02:11 ./.assets/li.gif
> -rw-r--r-- 1 rschmidt rschmidt 1193 Sep 26 02:11 ./.assets/logo.gif
> -rw-r--r-- 1 rschmidt rschmidt 1301 Sep 26 02:11 ./.assets/style.css
> drwx------ 4 rschmidt rschmidt 136 Sep 26 02:15 ./.fseventsd
> -rw------- 1 rschmidt rschmidt 209 Sep 26 02:15 ./.fseventsd/6365733132517f42
> -rw------- 1 rschmidt rschmidt 36 Sep 26 02:15 ./.fseventsd/fseventsd-uuid
> -rw-r--r-- 1 rschmidt rschmidt 277 Sep 26 02:11 ./Contact.webloc
> -rw-r--r--@ 1 rschmidt rschmidt 4676 Sep 26 02:11 ./Read me.html
> -rw-r--r-- 1 rschmidt rschmidt 265 Sep 26 02:11 ./Website.webloc
> -rwxr-xr-x 1 rschmidt rschmidt 89216 Sep 26 02:11 ./cliclick
>
>
> So .Trashes cannot be seen. One solution I thought of was to just not copy anything beginning with a period. In other words, "cp * ${worksrcpath}". ("*" expansion does not include items starting with ".")
>
> A more elaborate and more correct solution would be to actually look at the permissions of each item and just not copy those we're not allowed to, but doing that in a single-line command execution, such as is required by the extract system, was daunting.
Instead of tar, you can use find's -perms flag. I haven't tried this,
but this may work:
$ find PATH -depth -perms +r -print0 | cpio -0 -p -d -m -u -v "$worksrcpath
Blair
More information about the macports-dev
mailing list