1/*-
2 * Copyright (c) 1991, 1993
3 *	The Regents of the University of California.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 4. Neither the name of the University nor the names of its contributors
14 *    may be used to endorse or promote products derived from this software
15 *    without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 */
29
30#ifndef lint
31static const char copyright[] =
32"@(#) Copyright (c) 1991, 1993\n\
33	The Regents of the University of California.  All rights reserved.\n";
34#endif /* not lint */
35
36#ifndef lint
37#if 0
38static char sccsid[] = "@(#)id.c	8.2 (Berkeley) 2/16/94";
39#endif
40#endif /* not lint */
41#include <sys/cdefs.h>
42__FBSDID("$FreeBSD$");
43
44#include <sys/param.h>
45#include <sys/mac.h>
46
47#ifdef USE_BSM_AUDIT
48#include <bsm/audit.h>
49#endif
50
51#include <err.h>
52#include <errno.h>
53#include <grp.h>
54#include <pwd.h>
55#include <stdint.h>
56#include <stdio.h>
57#include <stdlib.h>
58#include <string.h>
59#include <unistd.h>
60
61static void	id_print(struct passwd *, int, int, int);
62static void	pline(struct passwd *);
63static void	pretty(struct passwd *);
64#ifdef USE_BSM_AUDIT
65static void	auditid(void);
66#endif
67static void	group(struct passwd *, int);
68static void	maclabel(void);
69static void	usage(void);
70static struct passwd *who(char *);
71
72static int isgroups, iswhoami;
73
74int
75main(int argc, char *argv[])
76{
77	struct group *gr;
78	struct passwd *pw;
79	int Gflag, Mflag, Pflag, ch, gflag, id, nflag, pflag, rflag, uflag;
80	int Aflag, cflag;
81	int error;
82	const char *myname;
83	char loginclass[MAXLOGNAME];
84
85	Gflag = Mflag = Pflag = gflag = nflag = pflag = rflag = uflag = 0;
86	Aflag = cflag = 0;
87
88	myname = strrchr(argv[0], '/');
89	myname = (myname != NULL) ? myname + 1 : argv[0];
90	if (strcmp(myname, "groups") == 0) {
91		isgroups = 1;
92		Gflag = nflag = 1;
93	}
94	else if (strcmp(myname, "whoami") == 0) {
95		iswhoami = 1;
96		uflag = nflag = 1;
97	}
98
99	while ((ch = getopt(argc, argv,
100	    (isgroups || iswhoami) ? "" : "APGMacgnpru")) != -1)
101		switch(ch) {
102#ifdef USE_BSM_AUDIT
103		case 'A':
104			Aflag = 1;
105			break;
106#endif
107		case 'G':
108			Gflag = 1;
109			break;
110		case 'M':
111			Mflag = 1;
112			break;
113		case 'P':
114			Pflag = 1;
115			break;
116		case 'a':
117			break;
118		case 'c':
119			cflag = 1;
120			break;
121		case 'g':
122			gflag = 1;
123			break;
124		case 'n':
125			nflag = 1;
126			break;
127		case 'p':
128			pflag = 1;
129			break;
130		case 'r':
131			rflag = 1;
132			break;
133		case 'u':
134			uflag = 1;
135			break;
136		case '?':
137		default:
138			usage();
139		}
140	argc -= optind;
141	argv += optind;
142
143	if (iswhoami && argc > 0)
144		usage();
145
146	switch(Aflag + Gflag + Mflag + Pflag + gflag + pflag + uflag) {
147	case 1:
148		break;
149	case 0:
150		if (!nflag && !rflag)
151			break;
152		/* FALLTHROUGH */
153	default:
154		usage();
155	}
156
157	pw = *argv ? who(*argv) : NULL;
158
159	if (Mflag && pw != NULL)
160		usage();
161
162#ifdef USE_BSM_AUDIT
163	if (Aflag) {
164		auditid();
165		exit(0);
166	}
167#endif
168
169	if (cflag) {
170		error = getloginclass(loginclass, sizeof(loginclass));
171		if (error != 0)
172			err(1, "loginclass");
173		(void)printf("%s\n", loginclass);
174		exit(0);
175	}
176
177	if (gflag) {
178		id = pw ? pw->pw_gid : rflag ? getgid() : getegid();
179		if (nflag && (gr = getgrgid(id)))
180			(void)printf("%s\n", gr->gr_name);
181		else
182			(void)printf("%u\n", id);
183		exit(0);
184	}
185
186	if (uflag) {
187		id = pw ? pw->pw_uid : rflag ? getuid() : geteuid();
188		if (nflag && (pw = getpwuid(id)))
189			(void)printf("%s\n", pw->pw_name);
190		else
191			(void)printf("%u\n", id);
192		exit(0);
193	}
194
195	if (Gflag) {
196		group(pw, nflag);
197		exit(0);
198	}
199
200	if (Mflag) {
201		maclabel();
202		exit(0);
203	}
204
205	if (Pflag) {
206		pline(pw);
207		exit(0);
208	}
209
210	if (pflag) {
211		pretty(pw);
212		exit(0);
213	}
214
215	if (pw) {
216		id_print(pw, 1, 0, 0);
217	}
218	else {
219		id = getuid();
220		pw = getpwuid(id);
221		id_print(pw, 0, 1, 1);
222	}
223	exit(0);
224}
225
226static void
227pretty(struct passwd *pw)
228{
229	struct group *gr;
230	u_int eid, rid;
231	char *login;
232
233	if (pw) {
234		(void)printf("uid\t%s\n", pw->pw_name);
235		(void)printf("groups\t");
236		group(pw, 1);
237	} else {
238		if ((login = getlogin()) == NULL)
239			err(1, "getlogin");
240
241		pw = getpwuid(rid = getuid());
242		if (pw == NULL || strcmp(login, pw->pw_name))
243			(void)printf("login\t%s\n", login);
244		if (pw)
245			(void)printf("uid\t%s\n", pw->pw_name);
246		else
247			(void)printf("uid\t%u\n", rid);
248
249		if ((eid = geteuid()) != rid) {
250			if ((pw = getpwuid(eid)))
251				(void)printf("euid\t%s\n", pw->pw_name);
252			else
253				(void)printf("euid\t%u\n", eid);
254		}
255		if ((rid = getgid()) != (eid = getegid())) {
256			if ((gr = getgrgid(rid)))
257				(void)printf("rgid\t%s\n", gr->gr_name);
258			else
259				(void)printf("rgid\t%u\n", rid);
260		}
261		(void)printf("groups\t");
262		group(NULL, 1);
263	}
264}
265
266static void
267id_print(struct passwd *pw, int use_ggl, int p_euid, int p_egid)
268{
269	struct group *gr;
270	gid_t gid, egid, lastgid;
271	uid_t uid, euid;
272	int cnt, ngroups;
273	long ngroups_max;
274	gid_t *groups;
275	const char *fmt;
276
277	if (pw != NULL) {
278		uid = pw->pw_uid;
279		gid = pw->pw_gid;
280	}
281	else {
282		uid = getuid();
283		gid = getgid();
284	}
285
286	ngroups_max = sysconf(_SC_NGROUPS_MAX) + 1;
287	if ((groups = malloc(sizeof(gid_t) * ngroups_max)) == NULL)
288		err(1, "malloc");
289
290	if (use_ggl && pw != NULL) {
291		ngroups = ngroups_max;
292		getgrouplist(pw->pw_name, gid, groups, &ngroups);
293	}
294	else {
295		ngroups = getgroups(ngroups_max, groups);
296	}
297
298	if (pw != NULL)
299		printf("uid=%u(%s)", uid, pw->pw_name);
300	else
301		printf("uid=%u", getuid());
302	printf(" gid=%u", gid);
303	if ((gr = getgrgid(gid)))
304		(void)printf("(%s)", gr->gr_name);
305	if (p_euid && (euid = geteuid()) != uid) {
306		(void)printf(" euid=%u", euid);
307		if ((pw = getpwuid(euid)))
308			(void)printf("(%s)", pw->pw_name);
309	}
310	if (p_egid && (egid = getegid()) != gid) {
311		(void)printf(" egid=%u", egid);
312		if ((gr = getgrgid(egid)))
313			(void)printf("(%s)", gr->gr_name);
314	}
315	fmt = " groups=%u";
316	for (lastgid = -1, cnt = 0; cnt < ngroups; ++cnt) {
317		if (lastgid == (gid = groups[cnt]))
318			continue;
319		printf(fmt, gid);
320		fmt = ",%u";
321		if ((gr = getgrgid(gid)))
322			printf("(%s)", gr->gr_name);
323		lastgid = gid;
324	}
325	printf("\n");
326	free(groups);
327}
328
329#ifdef USE_BSM_AUDIT
330static void
331auditid(void)
332{
333	auditinfo_t auditinfo;
334	auditinfo_addr_t ainfo_addr;
335	int ret, extended;
336
337	extended = 0;
338	ret = getaudit(&auditinfo);
339	if (ret < 0 && errno == E2BIG) {
340		if (getaudit_addr(&ainfo_addr, sizeof(ainfo_addr)) < 0)
341			err(1, "getaudit_addr");
342		extended = 1;
343	} else if (ret < 0)
344		err(1, "getaudit");
345	if (extended != 0) {
346		(void) printf("auid=%d\n"
347		    "mask.success=0x%08x\n"
348		    "mask.failure=0x%08x\n"
349		    "asid=%d\n"
350		    "termid_addr.port=0x%08jx\n"
351		    "termid_addr.addr[0]=0x%08x\n"
352		    "termid_addr.addr[1]=0x%08x\n"
353		    "termid_addr.addr[2]=0x%08x\n"
354		    "termid_addr.addr[3]=0x%08x\n",
355			ainfo_addr.ai_auid, ainfo_addr.ai_mask.am_success,
356			ainfo_addr.ai_mask.am_failure, ainfo_addr.ai_asid,
357			(uintmax_t)ainfo_addr.ai_termid.at_port,
358			ainfo_addr.ai_termid.at_addr[0],
359			ainfo_addr.ai_termid.at_addr[1],
360			ainfo_addr.ai_termid.at_addr[2],
361			ainfo_addr.ai_termid.at_addr[3]);
362	} else {
363		(void) printf("auid=%d\n"
364		    "mask.success=0x%08x\n"
365		    "mask.failure=0x%08x\n"
366		    "asid=%d\n"
367		    "termid.port=0x%08jx\n"
368		    "termid.machine=0x%08x\n",
369			auditinfo.ai_auid, auditinfo.ai_mask.am_success,
370			auditinfo.ai_mask.am_failure,
371			auditinfo.ai_asid, (uintmax_t)auditinfo.ai_termid.port,
372			auditinfo.ai_termid.machine);
373	}
374}
375#endif
376
377static void
378group(struct passwd *pw, int nflag)
379{
380	struct group *gr;
381	int cnt, id, lastid, ngroups;
382	long ngroups_max;
383	gid_t *groups;
384	const char *fmt;
385
386	ngroups_max = sysconf(_SC_NGROUPS_MAX) + 1;
387	if ((groups = malloc(sizeof(gid_t) * (ngroups_max))) == NULL)
388		err(1, "malloc");
389
390	if (pw) {
391		ngroups = ngroups_max;
392		(void) getgrouplist(pw->pw_name, pw->pw_gid, groups, &ngroups);
393	} else {
394		ngroups = getgroups(ngroups_max, groups);
395	}
396	fmt = nflag ? "%s" : "%u";
397	for (lastid = -1, cnt = 0; cnt < ngroups; ++cnt) {
398		if (lastid == (id = groups[cnt]))
399			continue;
400		if (nflag) {
401			if ((gr = getgrgid(id)))
402				(void)printf(fmt, gr->gr_name);
403			else
404				(void)printf(*fmt == ' ' ? " %u" : "%u",
405				    id);
406			fmt = " %s";
407		} else {
408			(void)printf(fmt, id);
409			fmt = " %u";
410		}
411		lastid = id;
412	}
413	(void)printf("\n");
414	free(groups);
415}
416
417static void
418maclabel(void)
419{
420	char *string;
421	mac_t label;
422	int error;
423
424	error = mac_prepare_process_label(&label);
425	if (error == -1)
426		errx(1, "mac_prepare_type: %s", strerror(errno));
427
428	error = mac_get_proc(label);
429	if (error == -1)
430		errx(1, "mac_get_proc: %s", strerror(errno));
431
432	error = mac_to_text(label, &string);
433	if (error == -1)
434		errx(1, "mac_to_text: %s", strerror(errno));
435
436	(void)printf("%s\n", string);
437	mac_free(label);
438	free(string);
439}
440
441static struct passwd *
442who(char *u)
443{
444	struct passwd *pw;
445	long id;
446	char *ep;
447
448	/*
449	 * Translate user argument into a pw pointer.  First, try to
450	 * get it as specified.  If that fails, try it as a number.
451	 */
452	if ((pw = getpwnam(u)))
453		return(pw);
454	id = strtol(u, &ep, 10);
455	if (*u && !*ep && (pw = getpwuid(id)))
456		return(pw);
457	errx(1, "%s: no such user", u);
458	/* NOTREACHED */
459}
460
461static void
462pline(struct passwd *pw)
463{
464
465	if (!pw) {
466		if ((pw = getpwuid(getuid())) == NULL)
467			err(1, "getpwuid");
468	}
469
470	(void)printf("%s:%s:%d:%d:%s:%ld:%ld:%s:%s:%s\n", pw->pw_name,
471			pw->pw_passwd, pw->pw_uid, pw->pw_gid, pw->pw_class,
472			(long)pw->pw_change, (long)pw->pw_expire, pw->pw_gecos,
473			pw->pw_dir, pw->pw_shell);
474}
475
476
477static void
478usage(void)
479{
480
481	if (isgroups)
482		(void)fprintf(stderr, "usage: groups [user]\n");
483	else if (iswhoami)
484		(void)fprintf(stderr, "usage: whoami\n");
485	else
486		(void)fprintf(stderr, "%s\n%s%s\n%s\n%s\n%s\n%s\n%s\n%s\n",
487		    "usage: id [user]",
488#ifdef USE_BSM_AUDIT
489		    "       id -A\n",
490#else
491		    "",
492#endif
493		    "       id -G [-n] [user]",
494		    "       id -M",
495		    "       id -P [user]",
496		    "       id -c",
497		    "       id -g [-nr] [user]",
498		    "       id -p [user]",
499		    "       id -u [-nr] [user]");
500	exit(1);
501}
502