aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorShohei YOSHIDA <syohex@gmail.com>2022-11-25 18:15:00 +0900
committerShohei YOSHIDA <syohex@gmail.com>2022-11-25 18:15:00 +0900
commitfc35e4e6c345a79cb0b2d8a99bbeca0b2afca03f (patch)
treebb9df7d1b68eab13c80ecf4ff5fd55c156913491 /src
parentMerge pull request #952 from zsh-users/update_qmk (diff)
downloadzsh-completions-fc35e4e6c345a79cb0b2d8a99bbeca0b2afca03f.tar
zsh-completions-fc35e4e6c345a79cb0b2d8a99bbeca0b2afca03f.tar.gz
zsh-completions-fc35e4e6c345a79cb0b2d8a99bbeca0b2afca03f.tar.bz2
zsh-completions-fc35e4e6c345a79cb0b2d8a99bbeca0b2afca03f.tar.lz
zsh-completions-fc35e4e6c345a79cb0b2d8a99bbeca0b2afca03f.tar.xz
zsh-completions-fc35e4e6c345a79cb0b2d8a99bbeca0b2afca03f.tar.zst
zsh-completions-fc35e4e6c345a79cb0b2d8a99bbeca0b2afca03f.zip
Update setcap
Diffstat (limited to 'src')
-rw-r--r--src/_setcap134
1 files changed, 76 insertions, 58 deletions
diff --git a/src/_setcap b/src/_setcap
index 21ac2b1..2de84e0 100644
--- a/src/_setcap
+++ b/src/_setcap
@@ -38,71 +38,89 @@
# - Zephyr Pellerin (https://github.com/zv)
# ------------------------------------------------------------------------------
-local curcontext=$curcontext state line expl ret=1
-local -a args privs operators
+_setcap() {
+ local curcontext=$curcontext state line expl ret=1
-args=( '*:file:->files'
- '1:capability:->capability'
- '-v[verify]' '-q[quiet]' )
+ _arguments -C -s \
+ '-v[verify that the specified capabilities are currently associated with the file]' \
+ '-n[set the file capability for use only in a user namespace with this root user ID owner]:rootuid' \
+ '-q[make the program less verbose in its output]' \
+ '1:capability:->capability' \
+ '*:file:_files' \
+ && ret=0
-_arguments -C -s "$args[@]" && ret=0
+ case "$state" in
+ (capability)
+ if compset -P '*?[=+-]'; then
+ local -a operators=("e:effective" "i:inheritable" "p:permitted")
+ _describe -t operators "operator" operators && ret=0
+ else
+ _setcap_capabilities && ret=0
+ fi
+ ;;
+ esac
-operators=("e:effective" "i:inheritable" "p:permitted")
+ return 0
+}
-case "$state" in
- capability)
- if compset -P '*?[=+-]'; then
- _describe -t operators "operator" operators && ret=0
- else
- _values -s , capability \
- 'cap_audit_control[Enable and disable kernel auditing]' \
- 'cap_audit_read[Allow reading the audit log]' \
- 'cap_audit_write[Write records to kernel auditing log.]' \
- 'cap_block_suspend[Employ features that can block system suspend]' \
- 'cap_chown[Make arbitrary changes to file UIDs and GIDs]' \
- 'cap_dac_override[Bypass file read, write, and execute permission checks.]' \
- 'cap_dac_read_search[Bypass file read permission checks]' \
- 'cap_fowner[Bypass filesystem UID checks, set extended attrs.]' \
- "cap_fsetid[Don't clear set-user-ID and set-group-ID permission bits when a file is modified]" \
- 'cap_ipc_lock[Lock memory]' \
- 'cap_ipc_owner[Bypass checks on SySV IPC object operations.]' \
- 'cap_kill[Bypass permission checks for sending signals]' \
- 'cap_lease[Establish leases on arbitrary files]' \
- 'cap_linux_immutable[Set immutability or append only]' \
- 'cap_mac_admin[Override Mandatory Access Control]' \
- 'cap_mac_override[Allow MAC configuration or state changes.]' \
- 'cap_mknod[Create special files using mknod(2)]' \
- 'cap_net_admin[Perform various network-related operations]' \
- 'cap_net_bind_service[Bind a socket to a privileged ports.]' \
- 'cap_net_broadcast[Make socket broadcasts and listen to multicast.]' \
- 'cap_net_raw[Use raw sockets.]' \
- 'cap_setgid[Manipulate process GIDs.]' \
- 'cap_setfcap[Set file capabilities.]' \
- "cap_setpcap[Grant or remove any capability in the caller's permitted capability set to or from any other process.]" \
- 'cap_setuid[Manipulate or forge process UIDs]' \
- 'cap_sys_admin[Perform numerous administrative tasks.]' \
- 'cap_sys_boot[Reboot]' \
- 'cap_sys_chroot[Use chroot]' \
- 'cap_sys_module[Load kernel module.]' \
- 'cap_sys_nice[Nice or renice processes.]' \
- 'cap_sys_pacct[Use acct(2).]' \
- 'cap_sys_ptrace[Inspect processes with ptrace or use process_vm_writev.]' \
- 'cap_sys_rawio[Numerous device IO functions, including performing raw IO and access x86 MSRs]' \
- 'cap_sys_resource[Set numerous resource limits]' \
- 'cap_sys_time[Set system clock]' \
- 'cap_sys_tty_config[Use vhangup(2)]' \
- 'cap_syslog[Perform privileged syslog(2) operations.]' \
- 'cap_wake_alarm[Trigger something that will wake up the system]' && ret=0
- fi ;;
- files) _files && ret=0 ;;
-esac
+(( $+functions[_setcap_capabilities] )) ||
+_setcap_capabilities() {
+ local ret=1
+ local -a capabilities=(
+ 'cap_audit_control:Enable and disable kernel auditing'
+ 'cap_audit_read:Allow reading the audit log'
+ 'cap_audit_write:Write records to kernel auditing log'
+ 'cap_block_suspend:Employ features that can block system suspend'
+ 'cap_bpf:Employ privileged BPF operations'
+ 'cap_checkpoint_restore:Facilitate checkpoint/restore'
+ 'cap_chown:Make arbitrary changes to file UIDs and GIDs'
+ 'cap_dac_override:Bypass file read, write, and execute permission checks'
+ 'cap_dac_read_search:Bypass file read permission checks'
+ 'cap_fowner:Bypass filesystem UID checks, set extended attrs'
+ "cap_fsetid:Don't clear set-user-ID and set-group-ID permission bits when a file is modified"
+ 'cap_ipc_lock:Lock memory'
+ 'cap_ipc_owner:Bypass checks on SySV IPC object operations'
+ 'cap_kill:Bypass permission checks for sending signals'
+ 'cap_lease:Establish leases on arbitrary files'
+ 'cap_linux_immutable:Set immutability or append only'
+ 'cap_mac_admin:Override Mandatory Access Control'
+ 'cap_mac_override:Allow MAC configuration or state changes'
+ 'cap_mknod:Create special files using mknod(2)'
+ 'cap_net_admin:Perform various network-related operations'
+ 'cap_net_bind_service:Bind a socket to a privileged ports'
+ 'cap_net_broadcast:Make socket broadcasts and listen to multicast'
+ 'cap_net_raw:Use raw sockets'
+ 'cap_perfmon:Employ various performance-monitoring mechanisms'
+ 'cap_setgid:Manipulate process GIDs'
+ 'cap_setfcap:Set file capabilities'
+ "cap_setpcap:Grant or remove any capability in the caller's permitted capability set to or from any other process"
+ 'cap_setuid:Manipulate or forge process UIDs'
+ 'cap_sys_admin:Perform numerous administrative tasks'
+ 'cap_sys_boot:Reboot'
+ 'cap_sys_chroot:Use chroot'
+ 'cap_sys_module:Load kernel module'
+ 'cap_sys_nice:Nice or renice processes'
+ 'cap_sys_pacct:Use acct(2)'
+ 'cap_sys_ptrace:Inspect processes with ptrace or use process_vm_writev'
+ 'cap_sys_rawio:Numerous device IO functions, including performing raw IO and access x86 MSRs'
+ 'cap_sys_resource:Set numerous resource limits'
+ 'cap_sys_time:Set system clock'
+ 'cap_sys_tty_config:Use vhangup(2)'
+ 'cap_syslog:Perform privileged syslog(2) operations'
+ 'cap_wake_alarm:Trigger something that will wake up the system'
+ )
-return ret
+ _values -s , capability $capabilities && ret=0
+ return $ret
+
+}
+
+_setcap "$@"
# Local variables:
-# mode: shell-script
-# sh-basic-offset: 2
-# sh-indent-comment: t
+# mode: Shell-Script
+# sh-indentation: 2
# indent-tabs-mode: nil
+# sh-basic-offset: 2
# End:
# ex: sw=2 ts=2 et filetype=sh