[101504] trunk/base/src/port1.0/portextract.tcl

Blair Zajac blair at orcaware.com
Mon Jan 14 09:09:18 PST 2013


On 01/13/2013 06:46 PM, Ryan Schmidt wrote:
>
> On Jan 13, 2013, at 18:53, Blair Zajac wrote:
>
>> On 01/13/2013 03:36 PM, Ryan Schmidt wrote:
>>
>>> https://trac.macports.org/ticket/21117
>>>
>>> I think the problem still remains when you have a non-root MacPorts installation; that's the configuration I was using when I initially filed the ticket, before the privilege-dropping code was added to MacPorts and made it an issue for everyone. The way I was thinking of fixing it was to exclude those files from copying that we don't need anyway and I think that still might be a better way, but I didn't really know how to do that which is why I never did anything about the ticket.
>>
>> If you're doing this as non-root, then presumably you have permissions yourself to mount a DMG.  Are you saying that even if you can mount it, there's files in there you cannot see?
>
>
> I haven't tried using a non-root MacPorts installation in awhile; it just seemed to become totally impossible once the privilege-dropping branch got merged in. Maybe those bugs have been fixed by now.
>
> But here's an example from outside of MacPorts, using the distfile for the cliclick port:
>
>
> $ open cliclick/2.1/cliclick.dmg
> $ cd /Volumes/cliclick
> $ find . -print0 | xargs -0 ls -ld
> find: ./.Trashes: Permission denied
> drwxr-xr-x  12 rschmidt  rschmidt    476 Sep 26 02:12 .
> -rw-r--r--@  1 rschmidt  rschmidt  12292 Sep 26 02:14 ./.DS_Store
> d-wx-wx-wt   2 rschmidt  rschmidt     68 Sep 26 02:15 ./.Trashes
> drwxr-xr-x   8 rschmidt  rschmidt    272 Sep 26 02:13 ./.assets
> -rw-r--r--   1 rschmidt  rschmidt   5639 Sep 26 02:11 ./.assets/AppIcon.png
> -rw-r--r--   1 rschmidt  rschmidt     95 Sep 26 02:11 ./.assets/bar.gif
> -rw-r--r--   1 rschmidt  rschmidt   4535 Sep 14 05:24 ./.assets/diskimage-background.png
> -rw-r--r--   1 rschmidt  rschmidt     67 Sep 26 02:11 ./.assets/li.gif
> -rw-r--r--   1 rschmidt  rschmidt   1193 Sep 26 02:11 ./.assets/logo.gif
> -rw-r--r--   1 rschmidt  rschmidt   1301 Sep 26 02:11 ./.assets/style.css
> drwx------   4 rschmidt  rschmidt    136 Sep 26 02:15 ./.fseventsd
> -rw-------   1 rschmidt  rschmidt    209 Sep 26 02:15 ./.fseventsd/6365733132517f42
> -rw-------   1 rschmidt  rschmidt     36 Sep 26 02:15 ./.fseventsd/fseventsd-uuid
> -rw-r--r--   1 rschmidt  rschmidt    277 Sep 26 02:11 ./Contact.webloc
> -rw-r--r--@  1 rschmidt  rschmidt   4676 Sep 26 02:11 ./Read me.html
> -rw-r--r--   1 rschmidt  rschmidt    265 Sep 26 02:11 ./Website.webloc
> -rwxr-xr-x   1 rschmidt  rschmidt  89216 Sep 26 02:11 ./cliclick
>
>
> So .Trashes cannot be seen. One solution I thought of was to just not copy anything beginning with a period. In other words, "cp * ${worksrcpath}". ("*" expansion does not include items starting with ".")
>
> A more elaborate and more correct solution would be to actually look at the permissions of each item and just not copy those we're not allowed to, but doing that in a single-line command execution, such as is required by the extract system, was daunting.

Instead of tar, you can use find's -perms flag.  I haven't tried this, 
but this may work:

$ find PATH -depth -perms +r -print0 | cpio -0 -p -d -m -u -v "$worksrcpath

Blair



More information about the macports-dev mailing list