[101504] trunk/base/src/port1.0/portextract.tcl

Blair Zajac blair at orcaware.com
Mon Jan 14 20:32:24 PST 2013


On 01/14/2013 05:33 PM, Sean Farley wrote:
> On Mon, Jan 14, 2013 at 11:09 AM, Blair Zajac <blair at orcaware.com> wrote:
>> On 01/13/2013 06:46 PM, Ryan Schmidt wrote:
>>>
>>>
>>> On Jan 13, 2013, at 18:53, Blair Zajac wrote:
>>>
>>>> On 01/13/2013 03:36 PM, Ryan Schmidt wrote:
>>>>
>>>>> https://trac.macports.org/ticket/21117
>>>>>
>>>>> I think the problem still remains when you have a non-root MacPorts
>>>>> installation; that's the configuration I was using when I initially filed
>>>>> the ticket, before the privilege-dropping code was added to MacPorts and
>>>>> made it an issue for everyone. The way I was thinking of fixing it was to
>>>>> exclude those files from copying that we don't need anyway and I think that
>>>>> still might be a better way, but I didn't really know how to do that which
>>>>> is why I never did anything about the ticket.
>>>>
>>>>
>>>> If you're doing this as non-root, then presumably you have permissions
>>>> yourself to mount a DMG.  Are you saying that even if you can mount it,
>>>> there's files in there you cannot see?
>>>
>>>
>>>
>>> I haven't tried using a non-root MacPorts installation in awhile; it just
>>> seemed to become totally impossible once the privilege-dropping branch got
>>> merged in. Maybe those bugs have been fixed by now.
>>>
>>> But here's an example from outside of MacPorts, using the distfile for the
>>> cliclick port:
>>>
>>>
>>> $ open cliclick/2.1/cliclick.dmg
>>> $ cd /Volumes/cliclick
>>> $ find . -print0 | xargs -0 ls -ld
>>> find: ./.Trashes: Permission denied
>>> drwxr-xr-x  12 rschmidt  rschmidt    476 Sep 26 02:12 .
>>> -rw-r--r--@  1 rschmidt  rschmidt  12292 Sep 26 02:14 ./.DS_Store
>>> d-wx-wx-wt   2 rschmidt  rschmidt     68 Sep 26 02:15 ./.Trashes
>>> drwxr-xr-x   8 rschmidt  rschmidt    272 Sep 26 02:13 ./.assets
>>> -rw-r--r--   1 rschmidt  rschmidt   5639 Sep 26 02:11
>>> ./.assets/AppIcon.png
>>> -rw-r--r--   1 rschmidt  rschmidt     95 Sep 26 02:11 ./.assets/bar.gif
>>> -rw-r--r--   1 rschmidt  rschmidt   4535 Sep 14 05:24
>>> ./.assets/diskimage-background.png
>>> -rw-r--r--   1 rschmidt  rschmidt     67 Sep 26 02:11 ./.assets/li.gif
>>> -rw-r--r--   1 rschmidt  rschmidt   1193 Sep 26 02:11 ./.assets/logo.gif
>>> -rw-r--r--   1 rschmidt  rschmidt   1301 Sep 26 02:11 ./.assets/style.css
>>> drwx------   4 rschmidt  rschmidt    136 Sep 26 02:15 ./.fseventsd
>>> -rw-------   1 rschmidt  rschmidt    209 Sep 26 02:15
>>> ./.fseventsd/6365733132517f42
>>> -rw-------   1 rschmidt  rschmidt     36 Sep 26 02:15
>>> ./.fseventsd/fseventsd-uuid
>>> -rw-r--r--   1 rschmidt  rschmidt    277 Sep 26 02:11 ./Contact.webloc
>>> -rw-r--r--@  1 rschmidt  rschmidt   4676 Sep 26 02:11 ./Read me.html
>>> -rw-r--r--   1 rschmidt  rschmidt    265 Sep 26 02:11 ./Website.webloc
>>> -rwxr-xr-x   1 rschmidt  rschmidt  89216 Sep 26 02:11 ./cliclick
>>>
>>>
>>> So .Trashes cannot be seen. One solution I thought of was to just not copy
>>> anything beginning with a period. In other words, "cp * ${worksrcpath}".
>>> ("*" expansion does not include items starting with ".")
>>>
>>> A more elaborate and more correct solution would be to actually look at
>>> the permissions of each item and just not copy those we're not allowed to,
>>> but doing that in a single-line command execution, such as is required by
>>> the extract system, was daunting.
>>
>>
>> Instead of tar, you can use find's -perms flag.  I haven't tried this, but
>> this may work:
>>
>> $ find PATH -depth -perms +r -print0 | cpio -0 -p -d -m -u -v "$worksrcpath
>
> I would agree with Jeremy's suggestion to use rsync. I think that will
> be the most elegant and not involve any piping or redirection, etc.
> Though, I haven't tried to formulate the command yet; I'm just
> thinking out loud here.

That'll work also, but you'll get more errors from rsync on the files 
and directories it cannot read.  Granted, find will also warn on 
directories it cannot descend into.

Blair



More information about the macports-dev mailing list