# a nice clean one (by removing email domains).
export SANITIZED_USER
function sanitized_username() {
- if [ -z "$USER" ]; then
- # this isn't quite normal, but maybe we have a cron user variable.
- USER=$CRONUSER
- if [ -z "$USER" ]; then
- # well, now we're just baffled at the lack of a user, but don't want
- # a blank coming back from this function.
- USER="unknown-user"
- fi
- fi
if [ -z "$SANITIZED_USER" ]; then
- export SANITIZED_USER="${USER//@*/}"
+ local ouruser="$USER"
+ if [ -z "$ouruser" ]; then
+ # this isn't quite normal, but maybe we have a cron user variable.
+ ouruser="$CRONUSER"
+ if [ -z "$ouruser" ]; then
+ # well, now we're just baffled at the lack of a user, but don't want
+ # a blank coming back from this function.
+ ouruser="unknown-user"
+ fi
+ fi
+ export SANITIZED_USER="${ouruser//@*/}"
fi
echo -n "$SANITIZED_USER"
}
if (-d $file) {
# ensure there aren't any read only files.
- system("chmod -R u+rw '$file'");
+ system("chmod -R u+rw '$file' 2>/dev/null");
+ # we hide our errors from this, since we cannot do anything about
+ # them in certain scenarios, like when we really don't have
+ # permission on the directory.
# store the directory in the trash storage.
system("$zip -rm $archive_file '$file' $DEV_NULL");
# zip up the files into the safekeeper directory.
#print "about to chmod file\n";
# make the file writable by our user if possible (which resets any
# prior permissions as long as we're the owner).
- system("chmod u+rw '$file'");
+ system("chmod u+rw '$file' 2>/dev/null");
# store the file in the trash storage.
#print "about to run: system [$zip -m $archive_file '$file' $DEV_NULL]";
system("$zip -m $archive_file '$file' $DEV_NULL");