bash_perms_make_se.php 126 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939
  1. <?php
  2. //author Arkadiusz Binder 2013-07-30
  3. //todo do przepisania na PHP i dodania opcji generowania Symlinkow
  4. //todo @2013-08-04 do skonczenia funkcja
  5. //if(file_exists(".config.php")) require_once(".config.php");
  6. /**
  7. * by plabudda:
  8. *
  9. * 1. install:
  10. * - create *.plist file:
  11. * # php /Library/Server/Web/Data/Sites/Default/SE/se-dev-pl/bash_perms_make_se.php biuro.biall-net.pl addToLaunchctl
  12. * - load by launchctl:
  13. * # launchctl load /Library/LaunchDaemons/pl.biallnet.sync_perms.php.plist
  14. *
  15. * 2. uninstall:
  16. * - unload from launchctl:
  17. * # launchctl unload /Library/LaunchDaemons/pl.biallnet.sync_perms.php.plist
  18. *
  19. * 3. debug:
  20. * - debug by www:
  21. * /SE/se-dev-pl/bash_perms_make_se.php?DBG=1
  22. * - more verbose debug:
  23. * /SE/se-dev-pl/bash_perms_make_se.php?DBG=6
  24. */
  25. define('DS', DIRECTORY_SEPARATOR);
  26. define('APP_PATH_ROOT', dirname(__FILE__));
  27. define('APP_PATH_WWW', dirname(__FILE__));
  28. define('APP_PATH_CONFIG', APP_PATH_ROOT . DS . 'config');
  29. require_once APP_PATH_ROOT . DS . 'se-lib' . DS . 'Lib.php';
  30. Lib::loadClass('V');
  31. Lib::loadClass('Config');
  32. Lib::loadClass('DB');
  33. Lib::loadClass('User');
  34. Lib::loadClass('FoldersConfig');
  35. Lib::loadClass('FileUploader');
  36. if (isset($_SERVER["argv"][1])) {
  37. $_SERVER['SERVER_NAME'] = $_SERVER["argv"][1];
  38. }
  39. else if (empty($_SERVER["argv"]) && V::get('task', '', $_GET) == 'task') {
  40. SyncPerms::run($_SERVER["argv"][0], $_SERVER["argv"][1], 'nextTask', null);
  41. }
  42. else if (empty($_SERVER["argv"]) && V::get('task', '', $_GET) == 'newFiles') {
  43. SyncPerms::run($_SERVER["argv"][0], $_SERVER["argv"][1], 'newFiles', null);
  44. }
  45. else if (empty($_SERVER["argv"]) && V::get('DBG', '', $_GET, 'int') > 10) {
  46. /* Test file perms, change by user _www:
  47. $ ls -le 123.test/t4.txt
  48. -rw-r--r--+ 1 plabudda staff 0 7 paź 23:10 123.test/t4.txt
  49. 0: group:workgroup inherited allow read,write,execute,append
  50. 1: user:_www inherited allow read,write,execute,append
  51. * Perms was inherited from parent dir:
  52. $ drwxr-xr-x+ 7 plabudda staff 238 7 paź 23:10 .
  53. 0: group:workgroup allow list,add_file,search,add_subdirectory,delete_child,chown,file_inherit,directory_inherit
  54. 1: user:_www allow list,add_file,search,add_subdirectory,delete_child,chown,file_inherit,directory_inherit
  55. *
  56. */
  57. $file = "/Users/plabudda/bup/123.test/t4.txt";
  58. exec("ls -le {$file}", $out, $outVal);
  59. echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;"> (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('cmd'=>"ls -le {$file}", 'out'=>$out, 'outVal'=>$outVal));echo'</pre>';
  60. exec("chown _www {$file}", $out, $outVal);
  61. echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;"> (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('cmd'=>"chown _www {$file}", 'out'=>$out, 'outVal'=>$outVal));echo'</pre>';
  62. exec("chmod +a \"user:kraskowskil allow read\" {$file}", $out, $outVal);
  63. echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;"> (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('cmd'=>"chmod +a \"user:kraskowskil allow read\" {$file}", 'out'=>$out, 'outVal'=>$outVal));echo'</pre>';
  64. }
  65. else if (empty($_SERVER["argv"]) && V::get('DBG', '', $_GET, 'int') > 5) {
  66. $filesWithPerms = array(
  67. 0 => "total 54512",
  68. 1 => "-rwxrwx---@ 1 kraskowskil workgroup 3268608 Sep 30 13:36 Bez nazwy-1.indd",
  69. 2 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  70. 3 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  71. 4 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  72. 5 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  73. 6 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  74. 7 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  75. 8 => "-rwxrwx---@ 1 kraskowskil workgroup 1703696 Sep 30 13:36 Bez nazwy-1.pdf",
  76. 9 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  77. 10 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  78. 11 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  79. 12 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  80. 13 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  81. 14 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  82. 15 => "drwxrwx---+ 28 kraskowskil workgroup 952 Oct 3 16:31 files",
  83. 16 => " 0: user:kraskowskil allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  84. 17 => " 1: group:workgroup allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  85. 18 => " 2: user:_www allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  86. 19 => "-rwxrwx---@ 1 kraskowskil workgroup 2527481 Oct 2 14:37 infografika.ai",
  87. 20 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  88. 21 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  89. 22 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  90. 23 => "-rwxrwx---@ 1 kraskowskil workgroup 14864384 Oct 7 16:05 katalog_biall-net.indd",
  91. 24 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  92. 25 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  93. 26 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  94. 27 => "-rwxrwx---@ 1 kraskowskil workgroup 1568645 Oct 3 14:45 katalog_biall-net.pdf",
  95. 28 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  96. 29 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  97. 30 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  98. 31 => "-rwxrwx---@ 1 kraskowskil workgroup 2596864 Sep 30 15:27 okladkii.indd",
  99. 32 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  100. 33 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  101. 34 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  102. 35 => "-rwxrwx---@ 1 kraskowskil workgroup 1369255 Sep 30 15:27 okladkii.pdf",
  103. 36 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  104. 37 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  105. 38 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  106. 39 => "",
  107. 40 => "./files:",
  108. 41 => "total 320224",
  109. 42 => "-rwxrwx---@ 1 kraskowskil workgroup 2205050 Oct 2 12:09 2 strona-05-04-04.eps",
  110. 43 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  111. 44 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  112. 45 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  113. 46 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  114. 47 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  115. 48 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  116. 49 => "-rwxrwx---@ 1 kraskowskil workgroup 2203910 Oct 2 12:06 2 strona-05-04.eps",
  117. 50 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  118. 51 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  119. 52 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  120. 53 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  121. 54 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  122. 55 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  123. 56 => "-rwxrwx---@ 1 kraskowskil workgroup 1689006 Sep 30 15:44 2 strona-05.eps",
  124. 57 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  125. 58 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  126. 59 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  127. 60 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  128. 61 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  129. 62 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  130. 63 => "-rwxrwx---@ 1 kraskowskil workgroup 20336 Oct 3 11:30 295062_520407511316102_217586070_n.jpg",
  131. 64 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  132. 65 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  133. 66 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  134. 67 => "-rwxrwx---@ 1 kraskowskil workgroup 37838 Oct 3 11:35 C0122306.jpg",
  135. 68 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  136. 69 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  137. 70 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  138. 71 => "-rwxrwx---@ 1 kraskowskil workgroup 465726 Oct 2 10:35 help_icon-20.eps",
  139. 72 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  140. 73 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  141. 74 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  142. 75 => "-rwxrwx---@ 1 kraskowskil workgroup 1031704 Sep 25 14:05 icon.ai",
  143. 76 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  144. 77 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  145. 78 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  146. 79 => "-rwxrwx---@ 1 kraskowskil workgroup 1050878 Sep 25 14:38 icon.eps",
  147. 80 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  148. 81 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  149. 82 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  150. 83 => "drwxrwx---+ 33 kraskowskil workgroup 1122 Oct 4 16:26 icons",
  151. 84 => " 0: user:kraskowskil allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  152. 85 => " 1: group:workgroup allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  153. 86 => " 2: user:_www allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  154. 87 => "drwxrwx---+ 18 kraskowskil workgroup 612 Sep 30 14:59 ideas",
  155. 88 => " 0: user:kraskowskil allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  156. 89 => " 1: group:workgroup allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  157. 90 => " 2: user:_www allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  158. 91 => "-rwxrwx---@ 1 kraskowskil workgroup 483118 Sep 30 10:35 internet_icon.eps",
  159. 92 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  160. 93 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  161. 94 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  162. 95 => "drwxrwx---+ 5 kraskowskil workgroup 170 Oct 3 15:36 mapka",
  163. 96 => " 0: user:kraskowskil allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  164. 97 => " 1: group:workgroup allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  165. 98 => " 2: user:_www allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  166. 99 => "-rwxrwx---@ 1 kraskowskil workgroup 3525022 Oct 2 12:17 mapka-03.eps",
  167. 100 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  168. 101 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  169. 102 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  170. 103 => "-rwxrwx---@ 1 kraskowskil workgroup 332462 Oct 2 09:36 network_icon.eps",
  171. 104 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  172. 105 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  173. 106 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  174. 107 => "drwxrwx---+ 38 kraskowskil workgroup 1292 Sep 30 15:22 okładki",
  175. 108 => " 0: user:kraskowskil allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  176. 109 => " 1: group:workgroup allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  177. 110 => " 2: user:_www allow list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit",
  178. 111 => "-rwxrwx---@ 1 kraskowskil workgroup 467090 Oct 2 10:50 sprawiedliwosc_icon-25.eps",
  179. 112 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  180. 113 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  181. 114 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  182. 115 => "-rwxrwx---@ 1 kraskowskil workgroup 475402 Sep 30 10:36 tel_icon.eps",
  183. 116 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  184. 117 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  185. 118 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  186. 119 => "-rwxrwx---@ 1 kraskowskil workgroup 538178 Sep 30 10:35 telefon_icon.eps",
  187. 120 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  188. 121 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  189. 122 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  190. 123 => "-rwxrwx---@ 1 kraskowskil workgroup 35522224 Sep 25 14:26 tlo.psd",
  191. 124 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  192. 125 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  193. 126 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  194. 127 => "-rwxrwx---@ 1 kraskowskil workgroup 39249644 Sep 25 14:29 tlo2.psd",
  195. 128 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  196. 129 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  197. 130 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  198. 131 => "-rwxrwx---@ 1 kraskowskil workgroup 40306893 Sep 25 14:36 tlo3.psd",
  199. 132 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  200. 133 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  201. 134 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  202. 135 => "-rwxrwx---@ 1 kraskowskil workgroup 982067 Sep 25 16:09 vector biall-katalog.ai",
  203. 136 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  204. 137 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  205. 138 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  206. 139 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  207. 140 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  208. 141 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  209. 142 => "-rwxrwx---@ 1 kraskowskil workgroup 1745198 Sep 25 14:01 vector_icon-02.eps",
  210. 143 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  211. 144 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  212. 145 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  213. 146 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  214. 147 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  215. 148 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  216. 149 => "-rwxrwx---@ 1 kraskowskil workgroup 30854359 Oct 3 16:31 vector_icon.ai",
  217. 150 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  218. 151 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  219. 152 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  220. 153 => "-rwxrwx---@ 1 kraskowskil workgroup 466622 Oct 2 11:13 wzrost_icon-26.eps",
  221. 154 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  222. 155 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  223. 156 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  224. 157 => "",
  225. 158 => "./files/icons:",
  226. 159 => "total 67864",
  227. 160 => "-rwxrwx---@ 1 kraskowskil workgroup 997806 Oct 4 16:26 ikonki-01.eps",
  228. 161 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  229. 162 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  230. 163 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  231. 164 => "-rwxrwx---@ 1 kraskowskil workgroup 996502 Oct 4 16:26 ikonki-02.eps",
  232. 165 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  233. 166 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  234. 167 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  235. 168 => "-rwxrwx---@ 1 kraskowskil workgroup 1092438 Oct 4 16:26 ikonki-03.eps",
  236. 169 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  237. 170 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  238. 171 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  239. 172 => "-rwxrwx---@ 1 kraskowskil workgroup 997674 Oct 4 16:26 ikonki-04.eps",
  240. 173 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  241. 174 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  242. 175 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  243. 176 => "-rwxrwx---@ 1 kraskowskil workgroup 995578 Oct 4 16:26 ikonki-05.eps",
  244. 177 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  245. 178 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  246. 179 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  247. 180 => "-rwxrwx---@ 1 kraskowskil workgroup 995402 Oct 4 16:26 ikonki-06.eps",
  248. 181 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  249. 182 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  250. 183 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  251. 184 => "-rwxrwx---@ 1 kraskowskil workgroup 995298 Oct 4 16:26 ikonki-07.eps",
  252. 185 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  253. 186 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  254. 187 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  255. 188 => "-rwxrwx---@ 1 kraskowskil workgroup 1000758 Oct 4 16:26 ikonki-08.eps",
  256. 189 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  257. 190 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  258. 191 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  259. 192 => "-rwxrwx---@ 1 kraskowskil workgroup 999030 Oct 4 16:26 ikonki-09.eps",
  260. 193 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  261. 194 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  262. 195 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  263. 196 => "-rwxrwx---@ 1 kraskowskil workgroup 995542 Oct 4 16:26 ikonki-10.eps",
  264. 197 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  265. 198 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  266. 199 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  267. 200 => "-rwxrwx---@ 1 kraskowskil workgroup 996810 Oct 4 16:26 ikonki-11.eps",
  268. 201 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  269. 202 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  270. 203 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  271. 204 => "-rwxrwx---@ 1 kraskowskil workgroup 997534 Oct 4 16:26 ikonki-12.eps",
  272. 205 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  273. 206 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  274. 207 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  275. 208 => "-rwxrwx---@ 1 kraskowskil workgroup 995674 Oct 4 16:26 ikonki-13.eps",
  276. 209 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  277. 210 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  278. 211 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  279. 212 => "-rwxrwx---@ 1 kraskowskil workgroup 1002458 Oct 4 16:26 ikonki-14.eps",
  280. 213 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  281. 214 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  282. 215 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  283. 216 => "-rwxrwx---@ 1 kraskowskil workgroup 997478 Oct 4 16:26 ikonki-15.eps",
  284. 217 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  285. 218 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  286. 219 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  287. 220 => "-rwxrwx---@ 1 kraskowskil workgroup 1000090 Oct 4 16:26 ikonki-16.eps",
  288. 221 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  289. 222 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  290. 223 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  291. 224 => "-rwxrwx---@ 1 kraskowskil workgroup 995934 Oct 4 16:26 ikonki-17.eps",
  292. 225 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  293. 226 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  294. 227 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  295. 228 => "-rwxrwx---@ 1 kraskowskil workgroup 998298 Oct 4 16:26 ikonki-18.eps",
  296. 229 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  297. 230 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  298. 231 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  299. 232 => "-rwxrwx---@ 1 kraskowskil workgroup 998362 Oct 4 16:26 ikonki-19.eps",
  300. 233 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  301. 234 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  302. 235 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  303. 236 => "-rwxrwx---@ 1 kraskowskil workgroup 997602 Oct 4 16:26 ikonki-20.eps",
  304. 237 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  305. 238 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  306. 239 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  307. 240 => "-rwxrwx---@ 1 kraskowskil workgroup 997114 Oct 4 16:26 ikonki-21.eps",
  308. 241 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  309. 242 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  310. 243 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  311. 244 => "-rwxrwx---@ 1 kraskowskil workgroup 996854 Oct 4 16:26 ikonki-22.eps",
  312. 245 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  313. 246 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  314. 247 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  315. 248 => "-rwxrwx---@ 1 kraskowskil workgroup 1103014 Oct 4 16:26 ikonki-23.eps",
  316. 249 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  317. 250 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  318. 251 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  319. 252 => "-rwxrwx---@ 1 kraskowskil workgroup 991438 Oct 4 16:26 ikonki-24.eps",
  320. 253 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  321. 254 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  322. 255 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  323. 256 => "-rwxrwx---@ 1 kraskowskil workgroup 991430 Oct 4 16:26 ikonki-25.eps",
  324. 257 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  325. 258 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  326. 259 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  327. 260 => "-rwxrwx---@ 1 kraskowskil workgroup 991438 Oct 4 16:26 ikonki-26.eps",
  328. 261 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  329. 262 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  330. 263 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  331. 264 => "-rwxrwx---@ 1 kraskowskil workgroup 991438 Oct 4 16:26 ikonki-27.eps",
  332. 265 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  333. 266 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  334. 267 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  335. 268 => "-rwxrwx---@ 1 kraskowskil workgroup 991438 Oct 4 16:26 ikonki-28.eps",
  336. 269 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  337. 270 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  338. 271 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  339. 272 => "-rwxrwx---@ 1 kraskowskil workgroup 1249471 Oct 4 16:25 ikonki.ai",
  340. 273 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  341. 274 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  342. 275 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  343. 276 => "-rwxrwx---@ 1 kraskowskil workgroup 5194002 Oct 4 16:26 ikonki.eps",
  344. 277 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  345. 278 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  346. 279 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  347. 280 => "",
  348. 281 => "./files/ideas:",
  349. 282 => "total 8768",
  350. 283 => "-rwxrwx---@ 1 kraskowskil workgroup 3768091 Sep 27 14:57 3paski_luk.ai",
  351. 284 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  352. 285 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  353. 286 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  354. 287 => "-rwxrwx---@ 1 kraskowskil workgroup 28477 Sep 25 09:14 400_F_49095520_EHpfz0T9xsrz4Qcos2X7b1VvSlvygWUk.jpg",
  355. 288 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  356. 289 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  357. 290 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  358. 291 => "-rwxrwx---@ 1 kraskowskil workgroup 39349 Sep 25 09:13 400_F_49756688_8HTjP8kkooigl0EnxgTqR1DvjF2cqNWp.jpg",
  359. 292 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  360. 293 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  361. 294 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  362. 295 => "-rwxrwx---@ 1 kraskowskil workgroup 29025 Sep 25 09:08 400_F_51706259_O0PU1efa5QurjxRCRNxGMHDt6f8fDCLS.jpg",
  363. 296 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  364. 297 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  365. 298 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  366. 299 => "-rwxrwx---@ 1 kraskowskil workgroup 26788 Sep 25 09:14 400_F_51706705_HDERAFHA1Os1qTla9K0HxHxzIc5quX62.jpg",
  367. 300 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  368. 301 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  369. 302 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  370. 303 => "-rwxrwx---@ 1 kraskowskil workgroup 41271 Sep 25 09:14 400_F_52552977_Pl4vTWyxrRZ4iaJuCCfZiTLeSYfN43iJ.jpg",
  371. 304 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  372. 305 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  373. 306 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  374. 307 => "-rwxrwx---@ 1 kraskowskil workgroup 43872 Sep 25 09:14 400_F_53777430_KiOaUrNdOxswacYuVn0SwOAc90JWwRG7.jpg",
  375. 308 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  376. 309 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  377. 310 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  378. 311 => "-rwxrwx---@ 1 kraskowskil workgroup 38987 Sep 25 09:13 400_F_54486482_2TZGny09uCMtw6erZaWDiR5gJQjRWIrP.jpg",
  379. 312 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  380. 313 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  381. 314 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  382. 315 => "-rwxrwx---@ 1 kraskowskil workgroup 34531 Sep 25 09:14 400_F_55830018_xkWqEtY7JcsVZ9Wtdeh6JaFQUmRzD9E0.jpg",
  383. 316 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  384. 317 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  385. 318 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  386. 319 => "-rwxrwx---@ 1 kraskowskil workgroup 21752 Sep 25 09:14 400_F_56095979_QYYraAruFiboCn2cU35DKdUuB6CVqyW7.jpg",
  387. 320 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  388. 321 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  389. 322 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  390. 323 => "-rwxrwx---@ 1 kraskowskil workgroup 14273 Sep 27 12:25 FotoliaComp_51237043_N1KrwIvq3YyjEZA1WY9QG3O7JbB3fqYs.jpg",
  391. 324 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  392. 325 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  393. 326 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  394. 327 => "-rwxrwx---@ 1 kraskowskil workgroup 8760 Sep 25 08:53 FotoliaComp_55911652_7qoklD7AAjujfZmnRrGD4ILjjr0ywEet.jpg",
  395. 328 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  396. 329 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  397. 330 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  398. 331 => "-rwxrwx---@ 1 kraskowskil workgroup 7643 Sep 25 08:52 FotoliaComp_55912081_ranuB1khyEoqTiI1zy47waHKqo5winoP.jpg",
  399. 332 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  400. 333 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  401. 334 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  402. 335 => "-rwxrwx---@ 1 kraskowskil workgroup 7937 Sep 25 08:55 FotoliaComp_56265582_E5MFDyTJnOpPzdiTjCEt9E5zwEfkLptQ.jpg",
  403. 336 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  404. 337 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  405. 338 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  406. 339 => "-rwxrwx---@ 1 kraskowskil workgroup 347866 Sep 27 13:20 dott_infographic.jpg",
  407. 340 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  408. 341 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  409. 342 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  410. 343 => "",
  411. 344 => "./files/mapka:",
  412. 345 => "total 150200",
  413. 346 => "-rwxrwx---@ 1 kraskowskil workgroup 30354351 Oct 3 13:47 mapka.ai",
  414. 347 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  415. 348 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  416. 349 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  417. 350 => "-rwxrwx---@ 1 kraskowskil workgroup 46537842 Oct 3 13:47 mapka.eps",
  418. 351 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  419. 352 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  420. 353 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  421. 354 => "",
  422. 355 => "./files/okładki:",
  423. 356 => "total 1632",
  424. 357 => "-rwxrwx---@ 1 kraskowskil workgroup 9257 Sep 30 15:18 csumx3PP.jpg.part",
  425. 358 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  426. 359 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  427. 360 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  428. 361 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  429. 362 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  430. 363 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  431. 364 => "-rwxrwx---@ 1 kraskowskil workgroup 12933 Sep 30 15:12 fotolia_29446398.jpg",
  432. 365 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  433. 366 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  434. 367 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  435. 368 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  436. 369 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  437. 370 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  438. 371 => "-rwxrwx---@ 1 kraskowskil workgroup 13501 Sep 30 15:17 fotolia_29447320.jpg",
  439. 372 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  440. 373 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  441. 374 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  442. 375 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  443. 376 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  444. 377 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  445. 378 => "-rwxrwx---@ 1 kraskowskil workgroup 12557 Sep 30 15:12 fotolia_29447379.jpg",
  446. 379 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  447. 380 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  448. 381 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  449. 382 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  450. 383 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  451. 384 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  452. 385 => "-rwxrwx---@ 1 kraskowskil workgroup 14641 Sep 30 15:13 fotolia_37429269.jpg",
  453. 386 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  454. 387 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  455. 388 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  456. 389 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  457. 390 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  458. 391 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  459. 392 => "-rwxrwx---@ 1 kraskowskil workgroup 14776 Sep 30 15:12 fotolia_37429319.jpg",
  460. 393 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  461. 394 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  462. 395 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  463. 396 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  464. 397 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  465. 398 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  466. 399 => "-rwxrwx---@ 1 kraskowskil workgroup 17084 Sep 30 15:18 fotolia_37877043.jpg",
  467. 400 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  468. 401 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  469. 402 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  470. 403 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  471. 404 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  472. 405 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  473. 406 => "-rwxrwx---@ 1 kraskowskil workgroup 15858 Sep 30 15:17 fotolia_37877044.jpg",
  474. 407 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  475. 408 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  476. 409 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  477. 410 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  478. 411 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  479. 412 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  480. 413 => "-rwxrwx---@ 1 kraskowskil workgroup 15595 Sep 30 15:18 fotolia_37877055.jpg",
  481. 414 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  482. 415 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  483. 416 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  484. 417 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  485. 418 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  486. 419 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  487. 420 => "-rwxrwx---@ 1 kraskowskil workgroup 7658 Sep 30 15:01 fotolia_40810341.jpg",
  488. 421 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  489. 422 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  490. 423 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  491. 424 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  492. 425 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  493. 426 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  494. 427 => "-rwxrwx---@ 1 kraskowskil workgroup 8255 Sep 30 15:12 fotolia_40941077.jpg",
  495. 428 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  496. 429 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  497. 430 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  498. 431 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  499. 432 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  500. 433 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  501. 434 => "-rwxrwx---@ 1 kraskowskil workgroup 9257 Sep 30 15:18 fotolia_41414049.jpg",
  502. 435 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  503. 436 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  504. 437 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  505. 438 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  506. 439 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  507. 440 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  508. 441 => "-rwxrwx---@ 1 kraskowskil workgroup 9036 Sep 30 15:17 fotolia_41414192.jpg",
  509. 442 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  510. 443 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  511. 444 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  512. 445 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  513. 446 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  514. 447 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  515. 448 => "-rwxrwx---@ 1 kraskowskil workgroup 7160 Sep 30 15:00 fotolia_42917170.jpg",
  516. 449 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  517. 450 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  518. 451 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  519. 452 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  520. 453 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  521. 454 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  522. 455 => "-rwxrwx---@ 1 kraskowskil workgroup 11022 Sep 30 15:12 fotolia_44067256.jpg",
  523. 456 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  524. 457 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  525. 458 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  526. 459 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  527. 460 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  528. 461 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  529. 462 => "-rwxrwx---@ 1 kraskowskil workgroup 8336 Sep 30 15:12 fotolia_52178094.jpg",
  530. 463 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  531. 464 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  532. 465 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  533. 466 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  534. 467 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  535. 468 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  536. 469 => "-rwxrwx---@ 1 kraskowskil workgroup 8656 Sep 30 15:12 fotolia_52420666.jpg",
  537. 470 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  538. 471 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  539. 472 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  540. 473 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  541. 474 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  542. 475 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  543. 476 => "-rwxrwx---@ 1 kraskowskil workgroup 8282 Sep 30 15:00 fotolia_55915200.jpg",
  544. 477 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  545. 478 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  546. 479 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  547. 480 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  548. 481 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  549. 482 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  550. 483 => "-rwxrwx---@ 1 kraskowskil workgroup 8599 Sep 30 15:00 fotolia_55915205.jpg",
  551. 484 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  552. 485 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  553. 486 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  554. 487 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  555. 488 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  556. 489 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  557. 490 => "-rwxrwx---@ 1 kraskowskil workgroup 8070 Sep 30 15:00 fotolia_55915214.jpg",
  558. 491 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  559. 492 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  560. 493 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  561. 494 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  562. 495 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  563. 496 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  564. 497 => "-rwxrwx---@ 1 kraskowskil workgroup 9807 Sep 30 15:01 fotolia_56010256.jpg",
  565. 498 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  566. 499 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  567. 500 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  568. 501 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  569. 502 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  570. 503 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  571. 504 => "-rwxrwx---@ 1 kraskowskil workgroup 10966 Sep 30 15:00 fotolia_56276809.jpg",
  572. 505 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  573. 506 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  574. 507 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  575. 508 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  576. 509 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  577. 510 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  578. 511 => "-rwxrwx---@ 1 kraskowskil workgroup 7704 Sep 30 15:03 fotolia_56517534.jpg",
  579. 512 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  580. 513 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  581. 514 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  582. 515 => " 3: user:kraskowskil inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  583. 516 => " 4: group:workgroup inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  584. 517 => " 5: user:_www inherited allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  585. 518 => "-rwxrwx---@ 1 kraskowskil workgroup 44802 Sep 30 14:40 stock-photo-12942297-smiling-business-man-speaking-over-a-phone.jpg",
  586. 519 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  587. 520 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  588. 521 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  589. 522 => "-rwxrwx---@ 1 kraskowskil workgroup 43787 Sep 30 14:39 stock-photo-13171306-business-man-speaking-over-cellphone-with-colleagues-at-the-back.jpg",
  590. 523 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  591. 524 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  592. 525 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  593. 526 => "-rwxrwx---@ 1 kraskowskil workgroup 39562 Sep 30 14:40 stock-photo-15199787-attentive-businessman-on-the-phone-with-colleague-in-background.jpg",
  594. 527 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  595. 528 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  596. 529 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  597. 530 => "-rwxrwx---@ 1 kraskowskil workgroup 47620 Sep 30 14:53 stock-photo-15372082-executive-viewing-presentation-on-laptop.jpg",
  598. 531 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  599. 532 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  600. 533 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  601. 534 => "-rwxrwx---@ 1 kraskowskil workgroup 35984 Sep 30 14:40 stock-photo-15416214-businessman-communicating-through-headset.jpg",
  602. 535 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  603. 536 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  604. 537 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  605. 538 => "-rwxrwx---@ 1 kraskowskil workgroup 39520 Sep 30 14:55 stock-photo-15525740-couple-shopping-online.jpg",
  606. 539 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  607. 540 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  608. 541 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  609. 542 => "-rwxrwx---@ 1 kraskowskil workgroup 37231 Sep 30 14:57 stock-photo-26891071-bringing-in-some-extra-eyes-on-the-project.jpg",
  610. 543 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  611. 544 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  612. 545 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  613. 546 => "-rwxrwx---@ 1 kraskowskil workgroup 51777 Sep 30 14:37 stock-photo-3265037-businessman-happily-working.jpg",
  614. 547 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  615. 548 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  616. 549 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  617. 550 => "-rwxrwx---@ 1 kraskowskil workgroup 45278 Sep 30 14:39 stock-photo-7007516-businessman-talking-on-telephone-in-office.jpg",
  618. 551 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  619. 552 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  620. 553 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  621. 554 => "-rwxrwx---@ 1 kraskowskil workgroup 45685 Sep 30 14:39 stock-photo-7271704-happy-young-businesswoman-talking-on-phone.jpg",
  622. 555 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  623. 556 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  624. 557 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  625. 558 => "-rwxrwx---@ 1 kraskowskil workgroup 46491 Sep 30 14:39 stock-photo-7701331-businessman-talking-on-telephone-sitting-by-computer.jpg",
  626. 559 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  627. 560 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  628. 561 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  629. 562 => "-rwxrwx---@ 1 kraskowskil workgroup 29477 Sep 30 14:52 stock-photo-7722369-working-on-the-computer.jpg",
  630. 563 => " 0: user:kraskowskil allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  631. 564 => " 1: group:workgroup allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  632. 565 => " 2: user:_www allow read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown",
  633. );
  634. echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">$filesWithPerms (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($filesWithPerms);echo'</pre>';
  635. $filesWithPermsTree = array();
  636. $lastName = '';
  637. $folderParent = '';
  638. foreach ($filesWithPerms as $line) {
  639. if (substr($line, 0, 1) == '-' || substr($line, 0, 1) == 'd') {// file name
  640. $fileParts = array();
  641. $filePartsArr = explode(' ', $line);
  642. foreach ($filePartsArr as $vPart) {
  643. if (!empty($vPart)) {
  644. $fileParts[] = $vPart;
  645. }
  646. }
  647. while (count($fileParts) > 9) {
  648. $lastPart = array_pop($fileParts);
  649. $prevPart = array_pop($fileParts);
  650. array_push($fileParts, "{$prevPart} {$lastPart}");
  651. }
  652. $file = new stdClass();
  653. $file->name = $fileParts[8];
  654. $file->path = array();
  655. if ($folderParent) $file->path[] = $folderParent;
  656. $file->path[] = $fileParts[8];
  657. $file->path = implode('/', $file->path);
  658. $file->owner = $fileParts[2];
  659. $file->group = $fileParts[3];
  660. $file->perms = $fileParts[0];
  661. $file->isDir = (substr($line, 0, 1) == 'd');
  662. $file->permsExtended = array();
  663. $filesWithPermsTree[$file->name] = $file;
  664. $lastName = $file;
  665. }
  666. else if (substr($line, 0, 1) == ' ') {// extended perm line
  667. $filesWithPermsTree[$file->name]->permsExtended[] = trim($line);
  668. }
  669. else if (substr($line, 0, 2) == './' && substr($line, -1) == ':') {// folder
  670. $folderParent = substr($line, 2, -1);
  671. }
  672. else if (substr($line, 0, 5) == 'total') {
  673. continue;
  674. }
  675. else if (empty($line)) {
  676. $folderParent = '';
  677. continue;
  678. }
  679. }
  680. echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">$filesWithPermsTree (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($filesWithPermsTree);echo'</pre>';
  681. die('.OEF DBG > 5');
  682. }
  683. else if (empty($_SERVER["argv"]) && V::get('DBG', '', $_GET, 'int') > 0) {
  684. SyncPerms::run($_SERVER["argv"][0], $_SERVER["argv"][1], $arg2, $arg3);
  685. }
  686. else {
  687. die("\n The second argument should be server domain - e.g. biuro.kike.pl \n");
  688. }
  689. if (!empty($_SERVER["argv"][0]) && !empty($_SERVER["argv"][1])) {
  690. $arg2 = (!empty($_SERVER["argv"][2]))? $_SERVER["argv"][2] : null;
  691. $arg3 = (!empty($_SERVER["argv"][3]))? $_SERVER["argv"][3] : null;
  692. //bash_perms_make_se($_SERVER["argv"][0], $_SERVER["argv"][1], $arg2, $arg3);
  693. SyncPerms::run($_SERVER["argv"][0], $_SERVER["argv"][1], $arg2, $arg3);
  694. }
  695. require(APP_PATH_ROOT."/superedit-SEF.php");
  696. //require_once(".config.php");
  697. function group_clear($FILE_URL) {
  698. // echo "\n chmod -N ".$FILE_URL;
  699. system("chmod -N {$FILE_URL}");
  700. }
  701. function make_proj_perm($LINK_PROJ, $PR_GROUP, $PR_CLASS, $PR_L_AP_US, $PR_L_AP_US_MAN, $PR_DESC) {
  702. $CHMOD="0770";
  703. /*
  704. #SRC166-copy
  705. */
  706. echo "160: chmod -R ".$CHMOD." ".$LINK_PROJ." CLASS:".$PR_CLASS.", PR_GROUP:".$PR_GROUP." , PR_L_AP_US:".$PR_L_AP_US." PR_L_AP_US_MAN:".$PR_L_AP_US_MAN." ";
  707. system(" chmod -R ".$CHMOD." ".$LINK_PROJ." ");
  708. if( empty($PR_GROUP)) $PR_GROUP='workgroup';
  709. if(!empty($PR_L_AP_US)) {
  710. echo "\n chown -R ".$PR_L_AP_US." ".$LINK_PROJ;
  711. system("chown -R ".$PR_L_AP_US." ".$LINK_PROJ);
  712. } else if(!empty($PR_L_AP_US_MAN)) {
  713. echo "\n chown -R ".$PR_L_AP_US_MAN." ".$LINK_PROJ;
  714. system("chown -R ".$PR_L_AP_US_MAN." ".$LINK_PROJ);
  715. }
  716. if(!empty($PR_GROUP) && ($PR_GROUP!="N/S;")) {
  717. echo "\n163: chgrp -R ".$PR_GROUP." ".$LINK_PROJ." ";
  718. system("chgrp ".$PR_GROUP." ".$LINK_PROJ." ");
  719. echo "\nCzyszcze group_clear ".$LINK_PROJ." ";
  720. group_clear($LINK_PROJ);
  721. system("chmod -R +a \"user:_www allow add_file,search,add_subdirectory,delete_child,read,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit\" ".$LINK_PROJ." ");
  722. echo "\n167: chmod +a group:".$PR_GROUP." allow read... ";
  723. system("chmod -R +a \"group:".$PR_GROUP." allow add_file,search,add_subdirectory,delete_child,read,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit\" ".$LINK_PROJ." ");
  724. //#dodanie tylko widoku plikow
  725. if (!empty($PR_CLASS)) {
  726. system("chmod -R +a \"group:".$PR_CLASS." allow execute,list,readattr,readsecurity,file_inherit,directory_inherit\" ".$LINK_PROJ." ");
  727. }
  728. echo "\n177 dodanie usera z PR_L_AP_US oraz PR_L_AP_US_MAN";
  729. if (!empty($PR_L_AP_US)) {
  730. system("chmod -R +a \"user:".$PR_L_AP_US." allow add_file,search,add_subdirectory,delete_child,read,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit\" ".$LINK_PROJ." ");
  731. }
  732. if (!empty($PR_L_AP_US_MAN) && ($PR_L_AP_US_MAN!='NULL')) {
  733. system("chmod -R +a \"user:${PR_L_AP_US_MAN} allow add_file,search,add_subdirectory,delete_child,read,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit\" ".$LINK_PROJ." ");
  734. }
  735. } else {
  736. echo "\nUnknown group ".$PR_GROUP." making clear for ".$LINK_PROJ." ";
  737. echo "\nCzyszcze group_clear ".$LINK_PROJ." ";
  738. group_clear($LINK_PROJ);
  739. if (!empty($PR_CLASS)) {
  740. system("chmod -R +a \"group:".$PR_CLASS." allow execute,list,readattr,readsecurity,file_inherit,directory_inherit\" ".$LINK_PROJ." ");
  741. }
  742. echo "\n227: chmod -R +a \"user:_www allow add_file,search,add_subdirectory,delete_child,read,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit\" ".$LINK_PROJ." ";
  743. system("chmod -R +a \"user:_www allow add_file,search,add_subdirectory,delete_child,read,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit\" ".$LINK_PROJ." ");
  744. }
  745. // #SRC166EOF-copy
  746. }
  747. function bash_perms_make_se($arg0, $arg1, $arg2, $arg3) {
  748. /*
  749. #!/bin/sh
  750. #author Arkadiusz Binder 2013-07-23
  751. #plan
  752. #1.odczytaj konfig typ labudda - baza, pliki pisma/projekty
  753. #2.dla kazdego projektu rekursywnie ustaw chgrp=A_ADM_COMPANY
  754. #3.dla kazdego projektu ustaw permy crhgrp=A_ADM_COMPANY
  755. #CONFIG look for .cnf--folders.[hostname].ini.php
  756. #CONFIG look for .cnf--zasob_[DbZasobId]-[hostname].ini.php
  757. #plan 2 - jezeli jest plik w /config/.bash_perms_make_se.timestamp ,
  758. #to dzialamy tak, ze szukamy plikow, ktore sie zmienily od tego momenu
  759. #dla nich tylko zmieniamy uprawnienia
  760. #a) szukamy jakie sa wogole projekty w uzyciu ${PROJECTS_USED[@]}
  761. #b) jak zalatwimy jakis z tych projektow to robimy unsed ${PROJECT_USED[$PROJ]}
  762. #c) potem robimy dla wszystkich zmiennych for var in ${PROJECT_USED[@]} - wyzwalamy funkcje $0 -force ${var} - czyli dokladamy po sprawie, ktorej nie znalezlismy
  763. #d) trzeba tez znalezc wszystkie sprawy, ktore ulegly zmianie od ostatniego czasu i dla nich zrobic force
  764. # profile : [ ! ${PR_GROUP} ] PR_GROUP='workgroup'
  765. export PATH=$PATH:/opt/local/lib/mysql55/bin:/usr/local/mysql/bin:/Library/Server/Web/Sites/Default/SE/utils:/Library/Server/Web/Data/Sites/Default/SE/utils:/Library/Server/Web/Data/Sites/Default/SE/se-dev/utils
  766. #funkcja czysci uprawnienia dla parametru $1 w filesystemie afs - dla wszysktich grup
  767. */
  768. $PROJ_mount_point = FoldersConfig::get('IN7_MK_BAZA_DYSTRYBUCJI_COLUMN', 'mount_point');
  769. $PISMA_mount_point = FoldersConfig::get('IN7_DZIENNIK_KORESP_COLUMN', 'mount_point');
  770. if (empty($PROJ_mount_point) || empty($PISMA_mount_point)) {
  771. die('Error in config for folders!');
  772. }
  773. else {
  774. echo "\n PROJ_mount_point = {$PROJ_mount_point} and PISMA_mount_point = {$PISMA_mount_point}";
  775. }
  776. system("echo \"<?xml version=\"1.0\" encoding=\"UTF-8\"?>
  777. <!DOCTYPE plist PUBLIC \"-//Apple Computer//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">
  778. <plist version=\"1.0\">
  779. <dict>
  780. <key>Disabled</key>
  781. <false/>
  782. <key>Label</key>
  783. <string>pl.biallnet.se.bash_perm</string>
  784. <key>UserName</key>
  785. <string>root</string>
  786. <key>ProgramArguments</key>
  787. <array>
  788. <string>php</string>
  789. <string>{$arg0}</string>
  790. <string>{$arg1}</string>
  791. </array>
  792. <key>StartInterval</key>
  793. <integer>60</integer>
  794. </dict>
  795. </plist>
  796. \" > /Library/LaunchDaemons/pl.biallnet.se.bash_perm.php.plist");
  797. $LAST_TIMESTAMP = file_get_contents(APP_PATH_ROOT . DS .'config' . DS . '.bash_perms_make_se.timestamp');
  798. $LAST_TIMESTAMP = str_replace(array("\n", "\r"), '', $LAST_TIMESTAMP);
  799. echo "\n read_timestamp:".$LAST_TIMESTAMP." arg3:".$arg3;
  800. if(($arg2 != "-force" ) && (!empty($LAST_TIMESTAMP))) {
  801. echo "file exists - changing perms only to newer files : ";
  802. echo "Finding newer Project files than (".$LAST_TIMESTAMP.")";
  803. // LAST_TIMESTAMP=`cat ${1}/.bash_perms_make_se.timestamp`
  804. echo "a) szukamy jakie sa wogole projekty w uzyciu -> {PROJECTS_USED[@]}";
  805. $sql="select t1.ID from IN7_MK_BAZA_DYSTRYBUCJI as t1
  806. where t1.A_STATUS!='DELETED' ; ";
  807. $res=DB::query($sql);
  808. while($h=DB::fetch_array($res)) {
  809. $PROJECTS_USED[$h['ID']]=$h['ID'];
  810. }
  811. $PATH_CNT=explode('/',$PROJ_mount_point);
  812. $PATH_CNT=count($PATH_CNT);
  813. exec("find ".$PROJ_mount_point." -newer ".APP_PATH_ROOT . DS .'config' . DS . '.bash_perms_make_se.timestamp',$ID_PROJ_ARR);
  814. print_r($ID_PROJ_ARR);
  815. foreach($ID_PROJ_ARR as $ID_PROJ) {
  816. exec("date \"+%s\" > ".APP_PATH_ROOT . DS .'config' . DS .".bash_perms_make_se.timestamp");
  817. echo "\n ID_PROJ: ".$ID_PROJ." number ".$PATH_CNT." " ;
  818. $FOLDER_CUT=explode("/",$ID_PROJ);
  819. $FOLDER=$FOLDER_CUT[$PATH_CNT];
  820. list($ID)=explode(".",$FOLDER);
  821. if(isset($PROJECTS_USED[$ID])) { //kasujemy z listy rekord - oznaczmay, ze ustalilismy dla tego projektu permy
  822. unset($PROJECTS_USED[$ID]);
  823. } // else {
  824. // continue ;
  825. // }
  826. $sql="select t1.ID
  827. , t1.A_ADM_COMPANY
  828. , t1.A_CLASSIFIED
  829. , t1.L_APPOITMENT_USER
  830. , concat_ws('', t2.L_APPOITMENT_USER) as T2_L_APPOITMENT_USER
  831. , left(concat(t1.M_DISTRIBUTOR, '_', t1.M_DIST_DESC), 50) as DESCR
  832. from IN7_MK_BAZA_DYSTRYBUCJI as t1
  833. left join IN7_MK_BAZA_DYSTRYBUCJI as t2 on (t1.P_ID=t2.ID)
  834. where t1.ID='".$ID."'
  835. ";
  836. $res2=DB::query($sql);
  837. //echo " SQL*".$sql."* rows : ".$rows."\n";
  838. while($h2=DB::fetch_array($res2)) {
  839. $PR_GROUP=$h2['A_ADM_COMPANY'];
  840. $PR_CLASS=$h2['A_CLASSIFIED'];
  841. $PR_L_AP_US=$h2['L_APPOITMENT_USER'];
  842. $PR_L_AP_US_MAN=$h2['T2_L_APPOITMENT_USER'];
  843. $PR_DESC=str_replace($_SESSION['CONFIG']['BAD_FILE_SIGNS'],$_SESSION['CONFIG']['OK_FILE_SIGNS'],$h2['DESCR']);
  844. $LINK_PROJ=$ID_PROJ;
  845. echo "\nFFFFFolder is ".$FOLDER_CUT[$PATH_CNT]." and id is (".$ID.")\n ***DESC(".$PR_DESC.")";
  846. make_proj_perm($LINK_PROJ,$PR_GROUP,$PR_CLASS,$PR_L_AP_US,$PR_L_AP_US_MAN,$PR_DESC);
  847. // #EOF Find newer
  848. }
  849. }
  850. // echo "c) szukanie edytowanych projektow uzytych"
  851. $sql="select t1.ID from IN7_MK_BAZA_DYSTRYBUCJI as t1 where unix_timestamp(A_RECORD_UPDATE_DATE)>'".$LAST_TIMESTAMP."' ; ";
  852. $res3=DB::query($sql);
  853. echo "\n *sql*".$sql."**";
  854. while($h3=DB::fetch_array($res3)) {
  855. echo "\neditied project found ".$h3['ID']." - add to array - after ".$LAST_TIMESTAMP;
  856. ECHO "\n php ".$arg0." ".$arg1." -force ".$h3['ID']." ";
  857. bash_perms_make_se($arg0,$arg1,'-force',$h3['ID']);
  858. // done
  859. }
  860. // [ ${#PROJECTS_USED[@]} -gt 0 ] && echo "Szukam uzytych projektow , ktore moze nie maja folderow: ${#PROJECTS_USED[@]} "
  861. if(count($PROJECTS_USED)>0) {
  862. // for var in ${PROJECTS_USED[@]} ; do
  863. foreach($PROJECTS_USED as $var) {
  864. // ls -d ${mount_point}/${PROJ_mount_point}/${var}.* >/dev/null 2>/dev/null || {
  865. exec("ls -d ".$PROJ_mount_point."/".$var.".* >/dev/null 2>/dev/null",$out,$exit_find);
  866. if($exit_find==1) {
  867. $stdout="";
  868. echo "\n Brak projektu ".$var." - uruchamiam bash_perms_make_se(".$arg0." ".$arg1." -force ".$var.") ";
  869. bash_perms_make_se($arg0,$arg1,'-force',$var);
  870. }
  871. // }
  872. // done
  873. }
  874. }
  875. }
  876. else {
  877. exec("date \"+%s\" > ".APP_PATH_ROOT . DS .'config' . DS .".bash_perms_make_se.timestamp");
  878. // date "+%s" > ${1}/.bash_perms_make_se.timestamp
  879. $SQL_LIMIT="";
  880. if(isset($arg3)) {
  881. echo "\nForced limit to only one project ".$arg3;
  882. $SQL_LIMIT=" and t1.ID='".$arg3."' ";
  883. } else {
  884. echo "\nNot found ".APP_PATH_ROOT . DS .'config' . DS . '.bash_perms_make_se.timestamp file - making perms to any files in PROJECTS and LETTERS';
  885. }
  886. $sql="select t1.ID,t1.A_ADM_COMPANY,t1.A_CLASSIFIED,t1.L_APPOITMENT_USER,concat_ws('',t2.L_APPOITMENT_USER) as T2_L_APPOITMENT_USER,left(concat(t1.M_DISTRIBUTOR,'_',t1.M_DIST_DESC),50) as DESCR from IN7_MK_BAZA_DYSTRYBUCJI as t1
  887. left join IN7_MK_BAZA_DYSTRYBUCJI as t2 on t1.P_ID=t2.ID
  888. where t1.A_STATUS!='DELETED' ".$SQL_LIMIT;
  889. $res2=DB::query($sql);
  890. echo " SQL*".$sql."* rows : ".$rows."\n ";
  891. while($h2=DB::fetch_array($res2)) {
  892. $PR_ID=$h2['ID'];
  893. $PR_GROUP=$h2['A_ADM_COMPANY'];
  894. $PR_CLASS=$h2['A_CLASSIFIED'];
  895. $PR_L_AP_US=$h2['L_APPOITMENT_USER'];
  896. $PR_L_AP_US_MAN=$h2['T2_L_APPOITMENT_USER'];
  897. $PR_DESC=str_replace($_SESSION['CONFIG']['BAD_FILE_SIGNS'],$_SESSION['CONFIG']['OK_FILE_SIGNS'],$h2['DESCR']);
  898. $LINK_PROJ=$PROJ_mount_point."/".$PR_ID.".*";
  899. $FILE_EXIST=0;
  900. exec("ls -d ".$LINK_PROJ." 2>/dev/null ",$LINK_PROJ_CUST,$stderr);
  901. if($stderr==0) {
  902. $LINK_PROJ_CUST=$LINK_PROJ_CUST[0];
  903. echo "\n152:jest katalog (".$LINK_PROJ.") ".$LINK_PROJ_CUST." \n mkdir -p ".$LINK_PROJ_CUST."/PISMA_LINK \n";
  904. system("mkdir -p ".$LINK_PROJ_CUST."/PISMA_LINK");
  905. $FILE_EXIST=1;
  906. } else {
  907. echo "\n155:brak katalogu (".$stderr.")(".$stdout.") ".$PR_ID." for ".$PR_DESC." bedzie : mkdir ".$PROJ_mount_point."/".$PR_ID.".".$PR_DESC ;
  908. system("mkdir ".$PROJ_mount_point."/".$PR_ID.".".$PR_DESC);
  909. $FILE_EXIST=1;
  910. system("mkdir -p ".$LINK_PROJ_CUST."/PISMA_LINK");
  911. }
  912. if($FILE_EXIST==1) {
  913. make_proj_perm($LINK_PROJ,$PR_GROUP,$PR_CLASS,$PR_L_AP_US,$PR_L_AP_US_MAN,$PR_DESC);
  914. }
  915. $sql="select ID,K_TYP_KORESP from IN7_DZIENNIK_KORESP where ID_PROJECT=".$PR_ID." ; ";
  916. $res4=DB::query($sql);
  917. //echo " SQL*".$sql."* rows : ".$rows."\n";
  918. while($h4=DB::fetch_array($res4)) {
  919. $PR_ID=$h2['ID'];
  920. $LINK_PISMO=$PISMA_mount_point."/".$h4['K_TYP_KORESP']."/".$h4['ID'].".*";
  921. $FILE_EXIST=0;
  922. #teraz pisma
  923. //for PISMO in `echo "select concat(ID,'#;#',K_TYP_KORESP) from IN7_DZIENNIK_KORESP where ID_PROJECT=${PR_ID} ; "|mysql -s -u${DB_USER} -p${DB_PASS} -h${DB_HOST} -D${DB_NAME} |sed 's/\ /_/g' ` ; do
  924. //echo "175:PISMO is ${PISMO}"
  925. //PISMO_ID=`echo ${PISMO} |awk -F'#;#' '{ print $1 }'`
  926. //PISMO_GDZIE=`echo ${PISMO} |awk -F'#;#' '{ print $2 }'`
  927. //LINK_PISMO="${mount_point}/${PISMA_mount_point}/${PISMO_GDZIE}/${PISMO_ID}.*"
  928. exec("ls ".$LINK_PISMO." 2>/dev/null >/dev/null",$stdout,$stderr);
  929. if($stderr==0) {
  930. echo "\njest pismo ".$LINK_PISMO ;
  931. //make_proj_perm($LINK_PISMO,$PR_GROUP,$PR_CLASS,$PR_L_AP_US,$PR_L_AP_US_MAN,$PR_DESC);
  932. echo "\n177:chmod -R 0770 ".$LINK_PISMO ;
  933. system("chmod -R 0770 ".$LINK_PISMO);
  934. if(!empty($PR_GROUP) && ($PR_GROUP!="N/S;")) {
  935. echo "\n180:chgrp -R ".$PR_GROUP." ".$LINK_PISMO." ";
  936. system("chgrp -R ".$PR_GROUP." ".$LINK_PISMO);
  937. // echo "Czyszcze group_clear ${LINK_PROJ} "
  938. group_clear($LINK_PISMO);
  939. // echo "183:ONLY APPEND chmod -R +a user:_www allow (..) ${LINK_PISMO} "
  940. system("chmod -R +a \"user:_www allow add_file,search,add_subdirectory,read,readattr,append,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit\" ".$LINK_PISMO);
  941. echo "\n185:ONLY READ!! chmod -R +a group:".$PR_GROUP." allow read... ".$LINK_PISMO." ";
  942. system("chmod -R +a \"group:".$PR_GROUP." allow add_file,append,search,add_subdirectory,read,readattr,readextattr,readsecurity,file_inherit,directory_inherit\" ".$LINK_PISMO);
  943. //robie symlinki
  944. // system("ln ".$LINK_PISMO." ".$LINK_PROJ_CUST."/PISMA_LINK/");
  945. }
  946. } else {
  947. echo "\n194: brak pism dla dziennika ".$LINK_PISMO;
  948. // #FILE_EXIST=0
  949. }
  950. }
  951. }
  952. }
  953. } //eof func
  954. class SyncPerms {
  955. public static function getLastRunDate() {
  956. if (($argFromDate = V::get('_fromDate', '', $_GET)) != '') {
  957. // Format: 2013-10-07 23:46
  958. if (strlen($argFromDate) == 16
  959. && substr($argFromDate, 4, 1) == '-'
  960. && substr($argFromDate, 7, 1) == '-'
  961. && substr($argFromDate, 10, 1) == '-'
  962. && substr($argFromDate, 13, 1) == ':'
  963. && is_numeric(str_replace(array('-', ':'), '', $argFromDate))
  964. ) {
  965. $lastRunDate = mktime(substr($argFromDate, 11, 2), substr($argFromDate, 14, 2), 0, substr($argFromDate, 5, 2), substr($argFromDate, 8, 2), substr($argFromDate, 0, 4));
  966. $lastRunDate = date("Y-m-d H:i", $lastRunDate);
  967. }
  968. }
  969. if (!$lastRunDate) {
  970. $lastRunDate = mktime(date("H") - 1, date("i"), date("s"), date("n"), date("j"), date("Y"));
  971. $lastRunDate = date("Y-m-d H:i", $lastRunDate);
  972. }
  973. //$lastRunDate = '2013-09-01 01:00';
  974. echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">lastRunDate (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($lastRunDate);echo'</pre>';
  975. return $lastRunDate;
  976. }
  977. public static function installTable() {
  978. $db = DB::getDB();
  979. if (!$db) {
  980. die("DB Error: No DB!");
  981. }
  982. $sql = "
  983. CREATE TABLE IF NOT EXISTS `_SYNC_FILE_PERMS` (
  984. `ID` int(11) NOT NULL AUTO_INCREMENT,
  985. `ID_PROJECT` int(11) NOT NULL,
  986. `L_APPOITMENT_USER` varchar(64) DEFAULT '',
  987. `A_ADM_COMPANY` varchar(64) NOT NULL DEFAULT '',
  988. `A_CLASSIFIED` varchar(64) NOT NULL DEFAULT '',
  989. `PARENT_L_APPOITMENT_USER` varchar(64) NOT NULL DEFAULT '',
  990. `A_LAST_SYNC` datetime NOT NULL DEFAULT '0000-00-00 00:00:00',
  991. `A_SYNCHRONIZED` tinyint(4) NOT NULL DEFAULT '0',
  992. PRIMARY KEY (`ID`),
  993. UNIQUE KEY `ID_PROJECT` (`ID_PROJECT`)
  994. ) ENGINE=MyISAM DEFAULT CHARSET=latin2 ;
  995. ";
  996. $db->query($sql);
  997. }
  998. public static function run($script_name, $domain, $arg2, $arg3) {
  999. if ($arg2 == 'addToLaunchctl') {
  1000. system("echo \"<?xml version=\"1.0\" encoding=\"UTF-8\"?>
  1001. <!DOCTYPE plist PUBLIC \"-//Apple Computer//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">
  1002. <plist version=\"1.0\">
  1003. <dict>
  1004. <key>Disabled</key>
  1005. <false/>
  1006. <key>Label</key>
  1007. <string>pl.biallnet.sync_perms.php</string>
  1008. <key>UserName</key>
  1009. <string>root</string>
  1010. <key>ProgramArguments</key>
  1011. <array>
  1012. <string>php</string>
  1013. <string>{$_SERVER["argv"][0]}</string>
  1014. <string>{$_SERVER["argv"][1]}</string>
  1015. </array>
  1016. <key>StartInterval</key>
  1017. <integer>60</integer>
  1018. </dict>
  1019. </plist>
  1020. \" > /Library/LaunchDaemons/pl.biallnet.sync_perms.php.plist");
  1021. echo "Run By Root: launchctl load /Library/LaunchDaemons/pl.biallnet.sync_perms.php.plist\n";
  1022. }
  1023. else if ($arg2 == 'newFiles') {
  1024. $time = new stdClass();
  1025. $time->start = time();
  1026. self::fixLastModifiedFiles();
  1027. self::saveTask(-1);
  1028. }
  1029. else if ($arg2 == 'nextTask') {
  1030. $time = new stdClass();
  1031. $time->start = time();
  1032. self::installTable();
  1033. self::generateTasksNewRecords();
  1034. self::generateTasksUpdated();
  1035. $limit = V::get('_limit', 1, $_GET, 'int');
  1036. for ($i = 0; $i < $limit; $i++) {
  1037. $time->cur = time();
  1038. if ($time->cur - $time->start > 60 * 5) {
  1039. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:2px solid red;text-align:left;">Force-break time('.($time->cur - $time->start).') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';echo'</pre>';}
  1040. break;
  1041. }
  1042. $task = self::getTask();
  1043. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">time('.($time->cur - $time->start).') task (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($task);echo'</pre>';}
  1044. if (!$task) {
  1045. break;
  1046. }
  1047. self::executeTask($task);
  1048. self::saveTask($task->ID_PROJECT);
  1049. }
  1050. }
  1051. else {
  1052. self::installTable();
  1053. $fixedProjIds = self::fixLastModifiedByFiles();
  1054. self::fixLastModifiedByDB($fixedProjIds);
  1055. }
  1056. }
  1057. public static function generateTasksUpdated() {
  1058. $db = DB::getDB();
  1059. if (!$db) {
  1060. die("DB Error: No DB!");
  1061. }
  1062. $sqlTest = "select p.ID, p.`L_APPOITMENT_USER`, p.`A_ADM_COMPANY`, p.`A_CLASSIFIED`, s. *
  1063. from `_SYNC_FILE_PERMS` as s, `IN7_MK_BAZA_DYSTRYBUCJI` as p, `IN7_MK_BAZA_DYSTRYBUCJI` as pp
  1064. where
  1065. s.`ID_PROJECT`=p.`ID` and pp.`ID`=p.`P_ID`
  1066. and (
  1067. s.`L_APPOITMENT_USER`!=p.`L_APPOITMENT_USER`
  1068. or s.`A_ADM_COMPANY`!=p.`A_ADM_COMPANY`
  1069. or s.`A_CLASSIFIED`!=p.`A_CLASSIFIED`
  1070. or s.`PARENT_L_APPOITMENT_USER`!=pp.`L_APPOITMENT_USER`
  1071. )
  1072. ";
  1073. $sql = "update `_SYNC_FILE_PERMS` as s, `IN7_MK_BAZA_DYSTRYBUCJI` as p, `IN7_MK_BAZA_DYSTRYBUCJI` as pp
  1074. set
  1075. s.`L_APPOITMENT_USER`=p.`L_APPOITMENT_USER`
  1076. , s.`A_ADM_COMPANY`=p.`A_ADM_COMPANY`
  1077. , s.`A_CLASSIFIED`=p.`A_CLASSIFIED`
  1078. , s.`PARENT_L_APPOITMENT_USER`=pp.`L_APPOITMENT_USER`
  1079. , s.`A_SYNCHRONIZED`=0
  1080. where
  1081. s.`ID_PROJECT`=p.`ID` and pp.`ID`=p.`P_ID`
  1082. and (
  1083. s.`L_APPOITMENT_USER`!=p.`L_APPOITMENT_USER`
  1084. or s.`A_ADM_COMPANY`!=p.`A_ADM_COMPANY`
  1085. or s.`A_CLASSIFIED`!=p.`A_CLASSIFIED`
  1086. or s.`PARENT_L_APPOITMENT_USER`!=pp.`L_APPOITMENT_USER`
  1087. )
  1088. ";
  1089. $res = $db->query($sql);
  1090. }
  1091. public static function generateTasksNewRecords() {
  1092. $db = DB::getDB();
  1093. if (!$db) {
  1094. die("DB Error: No DB!");
  1095. }
  1096. $sql = "insert ignore into `_SYNC_FILE_PERMS` (`ID_PROJECT`, `L_APPOITMENT_USER`, `A_ADM_COMPANY`, `A_CLASSIFIED`, `PARENT_L_APPOITMENT_USER`)
  1097. values (-1, '', '', '', '');
  1098. ";
  1099. $res = $db->query($sql);
  1100. $sql = "insert ignore into `_SYNC_FILE_PERMS` (`ID_PROJECT`, `L_APPOITMENT_USER`, `A_ADM_COMPANY`, `A_CLASSIFIED`, `PARENT_L_APPOITMENT_USER`)
  1101. select p.`ID`, p.`L_APPOITMENT_USER`, p.`A_ADM_COMPANY`, p.`A_CLASSIFIED`, pp.`L_APPOITMENT_USER`
  1102. from `IN7_MK_BAZA_DYSTRYBUCJI` as p
  1103. left join `IN7_MK_BAZA_DYSTRYBUCJI` as pp on (pp.`ID`=p.`P_ID`)
  1104. where p.`A_STATUS`!='DELETED'
  1105. ";
  1106. $res = $db->query($sql);
  1107. }
  1108. /**
  1109. * Znajdź najstarszy aktualizowany projekt.
  1110. */
  1111. public static function getTask() {
  1112. $task = null;
  1113. $db = DB::getDB();
  1114. if (!$db) {
  1115. die("DB Error: No DB!");
  1116. }
  1117. $sql = "select s.*
  1118. , p.`L_APPOITMENT_USER` as p__L_APPOITMENT_USER
  1119. , p.`A_ADM_COMPANY` as p__A_ADM_COMPANY
  1120. , p.`A_CLASSIFIED` as p__A_CLASSIFIED
  1121. , pp.`L_APPOITMENT_USER` as p__PARENT_L_APPOITMENT_USER
  1122. , p.`M_DIST_DESC` as p__M_DIST_DESC
  1123. from `_SYNC_FILE_PERMS` as s
  1124. left join `IN7_MK_BAZA_DYSTRYBUCJI` as p on(p.`ID`=s.`ID_PROJECT`)
  1125. left join `IN7_MK_BAZA_DYSTRYBUCJI` as pp on(pp.`ID`=p.`P_ID`)
  1126. where s.`A_SYNCHRONIZED`=0
  1127. order by s.`A_LAST_SYNC` asc, s.`ID` asc
  1128. limit 1
  1129. ";
  1130. $res = $db->query($sql);
  1131. if ($r = $db->fetch($res)) {
  1132. $task = $r;
  1133. }
  1134. return $task;
  1135. }
  1136. public static function getLastFilesTime() {
  1137. $lastFilesTime = null;
  1138. $db = DB::getDB();
  1139. if (!$db) {
  1140. die("DB Error: No DB!");
  1141. }
  1142. $sql = "select s.`A_LAST_SYNC`
  1143. from `_SYNC_FILE_PERMS` as s
  1144. where s.`ID_PROJECT`=-1
  1145. ";
  1146. $res = $db->query($sql);
  1147. if ($r = $db->fetch($res)) {
  1148. $lastFilesTime = $r->A_LAST_SYNC;
  1149. }
  1150. if (!$lastFilesTime) {
  1151. $lastFilesTime = mktime(date("H"), date("i") - 10, date("s"), date("n"), date("j"), date("Y"));
  1152. $lastFilesTime = date("Y-m-d H:i", $lastFilesTime);
  1153. }
  1154. return $lastFilesTime;
  1155. }
  1156. public static function saveTask($idProject) {
  1157. $task = null;
  1158. $db = DB::getDB();
  1159. if (!$db) {
  1160. die("DB Error: No DB!");
  1161. }
  1162. $sql = "update `_SYNC_FILE_PERMS` as s
  1163. set s.`A_SYNCHRONIZED`=1
  1164. , s.`A_LAST_SYNC`=NOW()
  1165. where s.`ID_PROJECT`={$idProject}
  1166. ";
  1167. $res = $db->query($sql);
  1168. return $task;
  1169. }
  1170. public static function executeTask($task) {
  1171. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">executeTask (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($task);echo'</pre>';}
  1172. $confTblName = 'IN7_MK_BAZA_DYSTRYBUCJI_COLUMN';
  1173. $PROJ_mount_point = FoldersConfig::get($confTblName, 'mount_point');
  1174. $project = new stdClass();
  1175. $project->ID = $task->ID_PROJECT;
  1176. $project->L_APPOITMENT_USER = $task->p__L_APPOITMENT_USER;
  1177. $project->A_ADM_COMPANY = $task->p__A_ADM_COMPANY;
  1178. $project->A_CLASSIFIED = $task->p__A_CLASSIFIED;
  1179. $project->PARENT_L_APPOITMENT_USER = $task->p__PARENT_L_APPOITMENT_USER;
  1180. $project->M_DIST_DESC = $task->p__M_DIST_DESC;
  1181. $folderConf = FoldersConfig::getAll($confTblName);
  1182. $uploader = new FileUploader($confTblName, $project);
  1183. $errMsg = '';
  1184. if (!$uploader->setConfig($folderConf, $errMsg)) {
  1185. trigger_error("Error: folders config!", E_USER_NOTICE);
  1186. die("Error: folders config!");
  1187. }
  1188. $uploader->findFolder();
  1189. $mainFolder = $uploader->getDestFolder();
  1190. if(V::get('DBG', '', $_GET, 'int') > 2){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">generated folderName('.$project->ID.') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';var_dump($uploader);echo'</pre>';}
  1191. if (!$mainFolder) {
  1192. $mainFolder = $uploader->generateFolderName();
  1193. $mainFolderPath = rtrim($PROJ_mount_point, '/') . '/' . $mainFolder;
  1194. if(V::get('DBG', '', $_GET, 'int') > 2){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">generated folderName('.$project->ID.') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array($mainFolder, $mainFolderPath));echo'</pre>';}
  1195. exec("mkdir {$mainFolderPath}");
  1196. mkdir($mainFolderPath, 0770, true);
  1197. @chmod($mainFolderPath, 0770);
  1198. if (!file_exists($mainFolderPath)) {
  1199. trigger_error("Error: Nie udało się utworzyć folderu! ({$mainFolder})", E_USER_NOTICE);
  1200. return false;
  1201. }
  1202. $requirePermsExt = self::getRequiredPermsExtByRecord($project);
  1203. $file = new stdClass();
  1204. $file->name = $mainFolder;
  1205. $file->path = $mainFolder;
  1206. $file->owner = '';
  1207. $file->group = '';
  1208. $file->perms = '';
  1209. $file->isDir = true;
  1210. $file->permsExt = array();
  1211. $cmdList = self::fixFilePerms($file, $requirePermsExt, "{$PROJ_mount_point}/" . addslashes($mainFolder), $project);
  1212. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">cmdList-P('.$project->ID.') fixFilePerms (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($cmdList);echo'</pre>';}
  1213. }
  1214. else {
  1215. $cmdList = self::fixProject($project, $mainFolder, $PROJ_mount_point);
  1216. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">cmdList-P('.$project->ID.') fixProject (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($cmdList);echo'</pre>';}
  1217. $cmdKorepList = self::fixProjectKoresp($project);
  1218. if (!empty($cmdKorepList)) {
  1219. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">cmdList-P('.$project->ID.') fixProjectKoresp (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($cmdKorepList);echo'</pre>';}
  1220. foreach ($cmdKorepList as $vCmd) {
  1221. $cmdList[] = $vCmd;
  1222. }
  1223. }
  1224. // TODO: $cmdDrukiList = self::fixProjectDruki($project, $mainFolder, $PROJ_mount_point);
  1225. }
  1226. if (!empty($cmdList)) {
  1227. foreach ($cmdList as $vCmd) {
  1228. if(V::get('DBG', '', $_GET, 'int') > 1){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">Exec-cmdList-P('.$project->ID.') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($vCmd);echo'</pre>';}
  1229. exec($vCmd, $out, $outValue);
  1230. if(V::get('DBG', '', $_GET, 'int') > 1){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">Done-cmdList-P('.$project->ID.') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array($outValue, $out));echo'</pre>';}
  1231. if ($outValue != 0) {
  1232. trigger_error("Error-cmd: {$vCmd}", E_USER_NOTICE);
  1233. }
  1234. }
  1235. }
  1236. }
  1237. public static function getRequiredPermsExtByRecord($project) {
  1238. $requirePermsExt = array();
  1239. if (!$project->L_APPOITMENT_USER && !$project->A_ADM_COMPANY) {// no owner, no write group
  1240. // TODO: group PODMIOT
  1241. $requirePermsExt["group:workgroup"] = array('write', 'read');
  1242. }
  1243. else {
  1244. if ($project->L_APPOITMENT_USER) {
  1245. $requirePermsExt["user:{$project->L_APPOITMENT_USER}"] = array('write', 'read');
  1246. }
  1247. if (!empty($project->A_ADM_COMPANY) && $project->A_ADM_COMPANY == $project->A_CLASSIFIED) {
  1248. $requirePermsExt["group:{$project->A_ADM_COMPANY}"] = array('read', 'write');
  1249. }
  1250. else if (empty($project->A_ADM_COMPANY) && empty($project->A_CLASSIFIED)) {
  1251. $requirePermsExt["group:workgroup"] = array('write', 'read');
  1252. }
  1253. else {
  1254. if ($project->A_ADM_COMPANY) {
  1255. $requirePermsExt["group:{$project->A_ADM_COMPANY}"] = array('write');
  1256. }
  1257. if ($project->A_CLASSIFIED) {
  1258. $requirePermsExt["group:{$project->A_CLASSIFIED}"] = array('read');
  1259. }
  1260. }
  1261. }
  1262. // add parent owner
  1263. if (!empty($project->PARENT_L_APPOITMENT_USER) && $project->PARENT_L_APPOITMENT_USER != $project->L_APPOITMENT_USER) {
  1264. $requirePermsExt["user:{$project->PARENT_L_APPOITMENT_USER}"] = array('write', 'read');
  1265. }
  1266. // add user:_www perms read, write
  1267. $requirePermsExt["user:_www"] = array('write', 'read');
  1268. return $requirePermsExt;
  1269. }
  1270. /**
  1271. * Used for files added/modified by samba/afp.
  1272. *
  1273. * Last execute time is stored as ID_PROJECT = -1 in _SYNC_FILE_PERMS
  1274. * @see getLastFilesTime
  1275. */
  1276. public static function fixLastModifiedFiles() {
  1277. $db = DB::getDB();
  1278. if (!$db) {
  1279. die("DB Error: No DB!");
  1280. }
  1281. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">fixLastModifiedFiles (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r("fixLastModifiedFiles");echo'</pre>';}
  1282. $PROJ_mount_point = FoldersConfig::get('IN7_MK_BAZA_DYSTRYBUCJI_COLUMN', 'mount_point');
  1283. $PISMA_mount_point = FoldersConfig::get('IN7_DZIENNIK_KORESP_COLUMN', 'mount_point');
  1284. $foundProjectFiles = array();
  1285. $lastRunDate = self::getLastFilesTime();
  1286. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">$lastRunDate (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($lastRunDate);echo'</pre>';}
  1287. //exec("cd {$PROJ_mount_point}; find . -newermt '{$lastRunDate}' ", $foundPaths);
  1288. exec("cd {$PROJ_mount_point}; find . -newermt '{$lastRunDate}' -type f -exec ls -lea '{}' \;", $filesWithPerms);
  1289. if (!empty($filesWithPerms)) {
  1290. $filesWithPermsTree = array();
  1291. $lastName = '';
  1292. foreach ($filesWithPerms as $line) {
  1293. if (substr($line, 0, 1) == '-') {// file name
  1294. $fileParts = array();
  1295. $filePartsArr = explode(' ', $line);
  1296. foreach ($filePartsArr as $vPart) {
  1297. if (!empty($vPart) || $vPart === '0') {
  1298. $fileParts[] = $vPart;
  1299. }
  1300. }
  1301. while (count($fileParts) > 9) {
  1302. $lastPart = array_pop($fileParts);
  1303. $prevPart = array_pop($fileParts);
  1304. array_push($fileParts, "{$prevPart} {$lastPart}");
  1305. }
  1306. $file = new stdClass();
  1307. if (!isset($fileParts[8])) {
  1308. echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">Error parse file name (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('line'=>$line, 'fileParts'=>$fileParts));echo'</pre>';
  1309. //continue;
  1310. }
  1311. $file->name = end($fileParts);
  1312. $file->path = end($fileParts);
  1313. $file->owner = $fileParts[2];
  1314. $file->group = $fileParts[3];
  1315. $file->perms = $fileParts[0];
  1316. $file->isDir = (substr($line, 0, 1) == 'd');
  1317. $file->permsExt = array();
  1318. $filesWithPermsTree[$file->name] = $file;
  1319. $lastName = $file->name;
  1320. }
  1321. else if (substr($line, 0, 1) == ' ') {// extended perm line
  1322. if ($lastName == '..') {
  1323. continue;
  1324. }
  1325. $filesWithPermsTree[$file->name]->permsExt[] = trim($line);
  1326. }
  1327. else {// parse error
  1328. $lastName = '..';
  1329. }
  1330. }
  1331. foreach ($filesWithPermsTree as $vFile) {
  1332. $vFile->path = ltrim($vFile->path, './');
  1333. $vFile->path = explode('/', $vFile->path);
  1334. $vFile->projectFolder = array_shift($vFile->path);
  1335. $vFile->path = implode('/', $vFile->path);
  1336. $projId = explode('.', $vFile->projectFolder);
  1337. $projId = reset($projId);
  1338. if (is_numeric($projId) && $projId > 0) {
  1339. $foundProjectFiles[$projId][] = $vFile;
  1340. }
  1341. }
  1342. }
  1343. if(V::get('DBG', '', $_GET, 'int') > 1){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">filesWithPerms (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): '."path: {$PROJ_mount_point}\n";print_r($filesWithPerms);echo'</pre>';}
  1344. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">foundProjectFiles (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): '."path: {$PROJ_mount_point}\n";print_r($foundProjectFiles);echo'</pre>';}
  1345. if (!empty($foundProjectFiles)) {
  1346. $sql = "select p.`ID`
  1347. , p.`L_APPOITMENT_USER`
  1348. , p.`A_ADM_COMPANY`
  1349. , p.`A_CLASSIFIED`
  1350. , pp.`L_APPOITMENT_USER` as PARENT_L_APPOITMENT_USER
  1351. from IN7_MK_BAZA_DYSTRYBUCJI as p
  1352. left join IN7_MK_BAZA_DYSTRYBUCJI as pp on (pp.ID=p.P_ID)
  1353. where p.`ID` in (" . implode(',', array_keys($foundProjectFiles)) . ")
  1354. ";
  1355. $res = $db->query($sql);
  1356. while ($r = $db->fetch($res)) {
  1357. $requirePermsExt = self::getRequiredPermsExtByRecord($r);
  1358. foreach ($foundProjectFiles[$r->ID] as $vFile) {
  1359. $cmdList = self::fixFilePerms($vFile, $requirePermsExt, "{$PROJ_mount_point}/" . addslashes($vFile->projectFolder), $r);
  1360. if (!empty($cmdList)) {
  1361. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">$cmdList P('.$r->ID.') total('.count($cmdList).') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($cmdList);echo'</pre>';}
  1362. } else {
  1363. if(V::get('DBG', '', $_GET, 'int') > 1){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">$cmdList P('.$r->ID.') total('.count($cmdList).') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($cmdList);echo'</pre>';}
  1364. }
  1365. }
  1366. }
  1367. }
  1368. }
  1369. /**
  1370. * TODO: RMME
  1371. * @returns array - last modified project ids.
  1372. */
  1373. public static function fixLastModifiedByFiles() {
  1374. $db = DB::getDB();
  1375. if (!$db) {
  1376. die("DB Error: No DB!");
  1377. }
  1378. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">fixLastModifiedByFiles (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r("fixLastModifiedByFiles");echo'</pre>';}
  1379. /*
  1380. * $ man find:
  1381. -newer file
  1382. True if the current file has a more recent last modification time than file.
  1383. -newerXY file
  1384. True if the current file has a more recent last access time (X=a), inode creation time (X=B), change time (X=c),
  1385. or modification time (X=m) than the last access time (Y=a), inode creation time (Y=B), change time (Y=c), or mod-
  1386. ification time (Y=m) of file. In addition, if Y=t, then file is instead interpreted as a direct date specifica-
  1387. tion of the form understood by cvs(1). Note that -newermm is equivalent to -newer.
  1388. *
  1389. * $ man chmod:
  1390. -i Removes the 'inherited' bit from all entries in the named file(s) ACLs.
  1391. *
  1392. * chmod -a "admin allow write" file1 # remove line
  1393. * chmod -a# 1 file1 # remove line at position 1
  1394. *
  1395. * chmod +a nie zmienia modify date: find . -newermt '2013-10-07 ...'
  1396. */
  1397. // find /Library/Server/Web/Data/Sites/Default/PLIKI/PROJEKTY -newermt '2013-10-07 16:20'
  1398. $PROJ_mount_point = FoldersConfig::get('IN7_MK_BAZA_DYSTRYBUCJI_COLUMN', 'mount_point');
  1399. $PISMA_mount_point = FoldersConfig::get('IN7_DZIENNIK_KORESP_COLUMN', 'mount_point');
  1400. $foundProjectIds = array();
  1401. $lastRunDate = self::getLastRunDate();
  1402. exec("cd {$PROJ_mount_point}; find . -newermt '{$lastRunDate}' ", $foundPaths);
  1403. if (!empty($foundPaths)) {
  1404. foreach ($foundPaths as $path) {
  1405. $path = ltrim($path, './');
  1406. $folder = explode('/', $path);
  1407. $folder = reset($folder);
  1408. $projId = explode('.', $folder);
  1409. $projId = reset($projId);
  1410. if (is_numeric($projId)) {
  1411. $foundProjectIds[$projId] = $folder;
  1412. }
  1413. }
  1414. }
  1415. if(V::get('DBG', '', $_GET, 'int') > 1){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">foundPaths (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): '."path: {$PROJ_mount_point}\n";print_r($foundPaths);echo'</pre>';}
  1416. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">foundProjectIds (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): '."path: {$PROJ_mount_point}\n";print_r($foundProjectIds);echo'</pre>';}
  1417. if (!empty($foundProjectIds)) {
  1418. $sql = "select p.`ID`
  1419. , p.`L_APPOITMENT_USER`
  1420. , p.`A_ADM_COMPANY`
  1421. , p.`A_CLASSIFIED`
  1422. , pp.`L_APPOITMENT_USER` as PARENT_L_APPOITMENT_USER
  1423. from IN7_MK_BAZA_DYSTRYBUCJI as p
  1424. left join IN7_MK_BAZA_DYSTRYBUCJI as pp on (pp.ID=p.P_ID)
  1425. where p.`ID` in (" . implode(',', array_keys($foundProjectIds)) . ")
  1426. ";
  1427. $res = $db->query($sql);
  1428. while ($r = $db->fetch($res)) {
  1429. $mainFolder = $foundProjectIds[$r->ID];
  1430. $cmdList = self::fixProject($r, $mainFolder, $PROJ_mount_point);
  1431. if (!empty($cmdList)) {
  1432. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">$cmdList P('.$r->ID.') total('.count($cmdList).') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($cmdList);echo'</pre>';}
  1433. } else {
  1434. if(V::get('DBG', '', $_GET, 'int') > 1){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">$cmdList P('.$r->ID.') total('.count($cmdList).') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($cmdList);echo'</pre>';}
  1435. }
  1436. }
  1437. }
  1438. return array_keys($foundProjectIds);
  1439. }
  1440. /**
  1441. * TODO: RMME
  1442. */
  1443. public static function fixLastModifiedByDB($fixedProjIds) {
  1444. $db = DB::getDB();
  1445. if (!$db) {
  1446. die("DB Error: No DB!");
  1447. }
  1448. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">fixLastModifiedByDB (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r("fixLastModifiedByDB");echo'</pre>';}
  1449. $sqlWhereAdd = '';
  1450. if (!empty($fixedProjIds)) {
  1451. $sqlWhereAdd = " and p.`ID` not in (" . implode(',', $fixedProjIds) . ") ";
  1452. }
  1453. $projectList = array();
  1454. $lastRunDate = self::getLastRunDate();
  1455. $sql = "select p.`ID`
  1456. , p.`L_APPOITMENT_USER`
  1457. , p.`A_ADM_COMPANY`
  1458. , p.`A_CLASSIFIED`
  1459. , pp.`L_APPOITMENT_USER` as PARENT_L_APPOITMENT_USER
  1460. from IN7_MK_BAZA_DYSTRYBUCJI as p
  1461. left join IN7_MK_BAZA_DYSTRYBUCJI as pp on (pp.ID=p.P_ID)
  1462. where
  1463. ( p.`A_RECORD_UPDATE_DATE`>'{$lastRunDate}'
  1464. or p.`A_RECORD_CREATE_DATE`>'{$lastRunDate}'
  1465. )
  1466. {$sqlWhereAdd}
  1467. ";
  1468. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">sql (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($sql);echo'</pre>';}
  1469. $res = $db->query($sql);
  1470. while ($r = $db->fetch($res)) {
  1471. $projectList[$r->ID] = $r;
  1472. }
  1473. if(V::get('DBG', '', $_GET, 'int') > 1){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">projectList (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($projectList);echo'</pre>';}
  1474. }
  1475. public static function fixProjectKoresp($project) {
  1476. $db = DB::getDB();
  1477. if (!$db) {
  1478. die("DB Error: No DB!");
  1479. }
  1480. $PISMA_mount_point = FoldersConfig::get('IN7_DZIENNIK_KORESP_COLUMN', 'mount_point');
  1481. $PISMA_mount_point = rtrim($PISMA_mount_point, '/');
  1482. $pismaList = array();
  1483. // $PISMA_mount_point / {TYP_KORESP} / {ID} . *
  1484. $sql = "select k.`ID`
  1485. , k.`K_TYP_KORESP`
  1486. from `IN7_DZIENNIK_KORESP` as k
  1487. where k.`ID_PROJECT`={$project->ID}
  1488. ";
  1489. $res = $db->query($sql);
  1490. while ($r = $db->fetch($res)) {
  1491. $pismaList[$r->ID] = $r->K_TYP_KORESP;
  1492. }
  1493. if (empty($pismaList)) {
  1494. return false;
  1495. }
  1496. $lsCmd = array();
  1497. foreach ($pismaList as $kID => $vTyp) {
  1498. $lsCmd[] = "{$vTyp}/{$kID}.*";
  1499. }
  1500. if (empty($lsCmd)) {
  1501. return false;
  1502. }
  1503. $lsCmd = 'ls -le ' . implode($lsCmd, ' ');
  1504. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">Koreps lsCmd (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($lsCmd);echo'</pre>';}
  1505. exec("cd {$PISMA_mount_point}; {$lsCmd} ", $filesWithPerms);
  1506. if (!empty($filesWithPerms)) {
  1507. $filesWithPermsTree = array();
  1508. $lastName = '';
  1509. foreach ($filesWithPerms as $line) {
  1510. if (substr($line, 0, 1) == '-') {// file name
  1511. $fileParts = array();
  1512. $filePartsArr = explode(' ', $line);
  1513. foreach ($filePartsArr as $vPart) {
  1514. if (!empty($vPart) || $vPart === '0') {
  1515. $fileParts[] = $vPart;
  1516. }
  1517. }
  1518. while (count($fileParts) > 9) {
  1519. $lastPart = array_pop($fileParts);
  1520. $prevPart = array_pop($fileParts);
  1521. array_push($fileParts, "{$prevPart} {$lastPart}");
  1522. }
  1523. $file = new stdClass();
  1524. if (!isset($fileParts[8])) {
  1525. echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">Error parse file name (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('line'=>$line, 'fileParts'=>$fileParts));echo'</pre>';
  1526. //continue;
  1527. }
  1528. $file->name = end($fileParts);
  1529. $file->path = end($fileParts);
  1530. $file->owner = $fileParts[2];
  1531. $file->group = $fileParts[3];
  1532. $file->perms = $fileParts[0];
  1533. $file->isDir = (substr($line, 0, 1) == 'd');
  1534. $file->permsExt = array();
  1535. $filesWithPermsTree[$file->name] = $file;
  1536. $lastName = $file->name;
  1537. }
  1538. else if (substr($line, 0, 1) == ' ') {// extended perm line
  1539. if ($lastName == '..') {
  1540. continue;
  1541. }
  1542. $filesWithPermsTree[$file->name]->permsExt[] = trim($line);
  1543. }
  1544. else {// parse error
  1545. $lastName = '..';
  1546. }
  1547. }
  1548. }
  1549. if(V::get('DBG', '', $_GET, 'int') > 2){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">filesWithPerms (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): '."path: {$PROJ_mount_point}\n";print_r($filesWithPerms);echo'</pre>';}
  1550. if(V::get('DBG', '', $_GET, 'int') > 1){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">filesWithPermsTree (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): '."path: {$PROJ_mount_point}\n";print_r($filesWithPermsTree);echo'</pre>';}
  1551. $cmdList = array();
  1552. $requirePermsExt = self::getRequiredPermsExtByRecord($project);
  1553. foreach ($filesWithPermsTree as $kFileName => $vFile) {
  1554. $cmdFile = self::fixFilePerms($vFile, $requirePermsExt, "{$PISMA_mount_point}", $project);
  1555. if (!empty($cmdFile)) {
  1556. foreach ($cmdFile as $vCmd) {
  1557. $cmdList[] = $vCmd;
  1558. }
  1559. }
  1560. }
  1561. return $cmdList;
  1562. }
  1563. public static function fixProject($r, $mainFolder, $PROJ_mount_point) {
  1564. if ($r->ID == 1695) {// TODO: 8853 pliki w katalog - stary HANDLOWY
  1565. if(V::get('DBG', '', $_GET, 'int') > 0){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">TODO: pomin - za dużo plików ('.$r->ID.'/'.$mainFolder.') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($r);echo'</pre>';}
  1566. return false;
  1567. }
  1568. if(V::get('DBG', '', $_GET, 'int') > 1){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">r('.$r->ID.'/'.$mainFolder.') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($r);echo'</pre>';}
  1569. $requirePermsExt = self::getRequiredPermsExtByRecord($r);
  1570. //make_proj_perm($LINK_PROJ, $PR_GROUP, $PR_CLASS, $PR_L_AP_US, $PR_L_AP_US_MAN, $PR_DESC);
  1571. $filesWithPerms = array();
  1572. exec("cd \"{$PROJ_mount_point}/" . addslashes($mainFolder) . "\"; ls -Rlea . ", $filesWithPerms);
  1573. if(V::get('DBG', '', $_GET, 'int') > 2){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">$filesWithPerms (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($filesWithPerms);echo'</pre>';}
  1574. $filesWithPermsTree = array();
  1575. $lastName = '';
  1576. $folderParent = '';
  1577. foreach ($filesWithPerms as $line) {
  1578. if (substr($line, 0, 1) == '-' || substr($line, 0, 1) == 'd') {// file name
  1579. $fileParts = array();
  1580. $filePartsArr = explode(' ', $line);
  1581. foreach ($filePartsArr as $vPart) {
  1582. if (!empty($vPart) || $vPart === '0') {
  1583. $fileParts[] = $vPart;
  1584. }
  1585. }
  1586. while (count($fileParts) > 9) {
  1587. $lastPart = array_pop($fileParts);
  1588. $prevPart = array_pop($fileParts);
  1589. array_push($fileParts, "{$prevPart} {$lastPart}");
  1590. }
  1591. if (end($fileParts) == '..' || (end($fileParts) == '.' && $folderParent)) {
  1592. $lastName = '..';
  1593. continue;
  1594. }
  1595. $file = new stdClass();
  1596. if (!isset($fileParts[8])) {
  1597. echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">Error parse file name (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('line'=>$line, 'fileParts'=>$fileParts));echo'</pre>';
  1598. //continue;
  1599. }
  1600. $file->name = end($fileParts);
  1601. $file->path = array();
  1602. if ($folderParent) $file->path[] = $folderParent;
  1603. $file->path[] = end($fileParts);
  1604. $file->path = implode('/', $file->path);
  1605. $file->owner = $fileParts[2];
  1606. $file->group = $fileParts[3];
  1607. $file->perms = $fileParts[0];
  1608. $file->isDir = (substr($line, 0, 1) == 'd');
  1609. $file->permsExt = array();
  1610. $filesWithPermsTree[$file->name] = $file;
  1611. $lastName = $file;
  1612. }
  1613. else if (substr($line, 0, 1) == ' ') {// extended perm line
  1614. if ($lastName == '..') {
  1615. continue;
  1616. }
  1617. $filesWithPermsTree[$file->name]->permsExt[] = trim($line);
  1618. }
  1619. else if (substr($line, 0, 2) == './' && substr($line, -1) == ':') {// folder
  1620. $folderParent = substr($line, 2, -1);
  1621. }
  1622. else if (substr($line, 0, 5) == 'total') {
  1623. continue;
  1624. }
  1625. else if (empty($line)) {
  1626. $folderParent = '';
  1627. continue;
  1628. }
  1629. }
  1630. if(V::get('DBG', '', $_GET, 'int') > 1){echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">$filesWithPermsTree (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($filesWithPermsTree);echo'</pre>';}
  1631. // check perms
  1632. /*
  1633. files:
  1634. W read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown
  1635. W read,write,execute,append,readattr,writeattr,readextattr,writeextattr,readsecurity
  1636. R read, execute, readattr, readextattr, readsecurity
  1637. dir:
  1638. W list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity,writesecurity,chown,file_inherit,directory_inherit
  1639. W list,add_file,search,add_subdirectory,delete_child,readattr,writeattr,readextattr,writeextattr,readsecurity, file_inherit,directory_inherit
  1640. R list, search, readattr, readextattr, readsecurity, file_inherit,directory_inherit
  1641. */
  1642. $cmdList = array();
  1643. foreach ($filesWithPermsTree as $kFileName => $vFile) {
  1644. $cmdFile = self::fixFilePerms($vFile, $requirePermsExt, "{$PROJ_mount_point}/" . addslashes($mainFolder), $r);
  1645. if (!empty($cmdFile)) {
  1646. foreach ($cmdFile as $vCmd) {
  1647. $cmdList[] = $vCmd;
  1648. }
  1649. }
  1650. }
  1651. return $cmdList;
  1652. }
  1653. public static function fixFilePerms($vFile, $requirePermsExt, $mainPath, $r) {
  1654. $vReqPermsExt = array();
  1655. foreach ($requirePermsExt as $kPermObj => $vPerms) {
  1656. $vReqPermsExt[$kPermObj] = array();
  1657. foreach ($vPerms as $vPerm) {
  1658. if ($vFile->isDir) {
  1659. if ($vPerm == 'read') {
  1660. $vReqPermsExt[$kPermObj]['list'] = 0;
  1661. $vReqPermsExt[$kPermObj]['search'] = 0;
  1662. $vReqPermsExt[$kPermObj]['readattr'] = 0;
  1663. $vReqPermsExt[$kPermObj]['readextattr'] = 0;
  1664. $vReqPermsExt[$kPermObj]['readsecurity'] = 0;
  1665. $vReqPermsExt[$kPermObj]['file_inherit'] = 0;
  1666. $vReqPermsExt[$kPermObj]['directory_inherit'] = 0;
  1667. }
  1668. else if ($vPerm == 'write') {
  1669. $vReqPermsExt[$kPermObj]['add_file'] = 0;
  1670. $vReqPermsExt[$kPermObj]['add_subdirectory'] = 0;
  1671. $vReqPermsExt[$kPermObj]['delete_child'] = 0;
  1672. $vReqPermsExt[$kPermObj]['writeattr'] = 0;
  1673. $vReqPermsExt[$kPermObj]['writeextattr'] = 0;
  1674. $vReqPermsExt[$kPermObj]['writesecurity'] = 0;
  1675. $vReqPermsExt[$kPermObj]['chown'] = 0;
  1676. }
  1677. }
  1678. else {
  1679. if ($vPerm == 'read') {
  1680. $vReqPermsExt[$kPermObj]['read'] = 0;
  1681. $vReqPermsExt[$kPermObj]['execute'] = 0;
  1682. $vReqPermsExt[$kPermObj]['readattr'] = 0;
  1683. $vReqPermsExt[$kPermObj]['readextattr'] = 0;
  1684. $vReqPermsExt[$kPermObj]['readsecurity'] = 0;
  1685. }
  1686. else if ($vPerm == 'write') {
  1687. $vReqPermsExt[$kPermObj]['write'] = 0;
  1688. $vReqPermsExt[$kPermObj]['append'] = 0;
  1689. $vReqPermsExt[$kPermObj]['writeattr'] = 0;
  1690. $vReqPermsExt[$kPermObj]['writeextattr'] = 0;
  1691. $vReqPermsExt[$kPermObj]['writesecurity'] = 0;
  1692. $vReqPermsExt[$kPermObj]['chown'] = 0;
  1693. }
  1694. }
  1695. }
  1696. }
  1697. $permsToRemove = array();
  1698. foreach ($vFile->permsExt as $vPermExtLine) {
  1699. $vPermExtArr = explode(' ', $vPermExtLine);
  1700. $vPermExt = new stdClass();
  1701. $vPermExt->nr = trim($vPermExtArr[0], ' :');
  1702. $vPermExt->permObj = $vPermExtArr[1];
  1703. $vPermExt->perms = '';
  1704. if (count($vPermExtArr) == 4) {
  1705. $vPermExt->perms = explode(',', $vPermExtArr[3]);
  1706. }
  1707. else if (count($vPermExtArr) == 5 && $vPermExtArr[2] == 'inherited') {
  1708. $vPermExt->perms = explode(',', $vPermExtArr[4]);
  1709. }
  1710. else {
  1711. echo "Error: Perm Ext Line format! ({$vPermExtLine})";
  1712. continue;
  1713. }
  1714. $permFound = false;
  1715. foreach ($vReqPermsExt as $kPermObj => $vPerms) {
  1716. if (false !== strpos($vPermExtLine, $kPermObj)) {
  1717. foreach ($vPerms as $kPerm => $vPermChecked) {
  1718. if (in_array($kPerm, $vPermExt->perms)) {
  1719. $vReqPermsExt[$kPermObj][$kPerm] = 1;
  1720. $permFound = true;
  1721. }
  1722. }
  1723. }
  1724. }
  1725. if (!$permFound) {
  1726. $permsToRemove[] = $vPermExt->nr;
  1727. }
  1728. //echo'<pre style="max-height:200px;overflow:auto;border:1px solid red;text-align:left;">$vReqPermsExt('.$vFile->name.') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r($vReqPermsExt);echo'</pre>';
  1729. }
  1730. if (!empty($permsToRemove)) {
  1731. if(V::get('DBG', '', $_GET, 'int') > 1){echo'<pre style="max-height:300px;overflow:auto;border:1px solid red;text-align:left;">TO-rm('.$r->ID.'): $permsToRemove('.$vFile->name.') isDir('.$vFile->isDir.') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('permsToRemove'=>$permsToRemove, 'vFile->permsExt'=>$vFile->permsExt, 'r'=>$r));echo'</pre>';}
  1732. $permsToRemove = array_reverse($permsToRemove);
  1733. foreach ($permsToRemove as $vPermInd) {
  1734. $cmdList []= "chmod -a# {$vPermInd} \"{$mainPath}/{$vFile->path}\" ";
  1735. }
  1736. }
  1737. $permsToAdd = array();
  1738. foreach ($vReqPermsExt as $kPermObj => $vPerms) {
  1739. foreach ($vPerms as $kPerm => $vPermChecked) {
  1740. if (!$vPermChecked) {
  1741. $permsToAdd[$kPermObj][$kPerm] = 1;
  1742. }
  1743. }
  1744. }
  1745. if (!empty($permsToAdd)) {
  1746. if(V::get('DBG', '', $_GET, 'int') > 1){echo'<pre style="max-height:300px;overflow:auto;border:1px solid red;text-align:left;">TO-add('.$r->ID.'): $permsToAdd('.$vFile->name.') isDir('.$vFile->isDir.') (' . __CLASS__ . '::' . __FUNCTION__ . ':' . __LINE__ . '): ';print_r(array('permsToAdd'=>$permsToAdd, 'vFile->permsExt'=>$vFile->permsExt, 'r'=>$r));echo'</pre>';}
  1747. foreach ($permsToAdd as $kPermObj => $vPerms) {
  1748. $cmdList []= "chmod +a \"{$kPermObj} allow " . implode(',', array_keys($vPerms)) . "\" \"{$mainPath}/{$vFile->path}\" ";
  1749. }
  1750. }
  1751. return $cmdList;
  1752. }
  1753. }
  1754. //dodatkowo synchronizacja automatyczna uprawnien
  1755. //SEF('KIKE_MIGRACJA_KIKE_AUTH');
  1756. //if(strstr($_SESSION['SYSTEM_PROFILE_STRING'],'KIKE' )) KIKE_MIGRACJA_KIKE_AUTH($LAST_TIMESTAMP);
  1757. ?>