pw_group.c revision 30259
120253Sjoerg/*- 220302Sjoerg * Copyright (C) 1996 320302Sjoerg * David L. Nugent. All rights reserved. 420253Sjoerg * 520253Sjoerg * Redistribution and use in source and binary forms, with or without 620253Sjoerg * modification, are permitted provided that the following conditions 720253Sjoerg * are met: 820253Sjoerg * 1. Redistributions of source code must retain the above copyright 920302Sjoerg * notice, this list of conditions and the following disclaimer. 1020253Sjoerg * 2. Redistributions in binary form must reproduce the above copyright 1120253Sjoerg * notice, this list of conditions and the following disclaimer in the 1220253Sjoerg * documentation and/or other materials provided with the distribution. 1320253Sjoerg * 1420302Sjoerg * THIS SOFTWARE IS PROVIDED BY DAVID L. NUGENT AND CONTRIBUTORS ``AS IS'' AND 1520253Sjoerg * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 1620253Sjoerg * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 1720302Sjoerg * ARE DISCLAIMED. IN NO EVENT SHALL DAVID L. NUGENT OR CONTRIBUTORS BE LIABLE 1820253Sjoerg * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 1920253Sjoerg * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 2020253Sjoerg * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 2120253Sjoerg * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 2220253Sjoerg * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 2320253Sjoerg * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 2420253Sjoerg * SUCH DAMAGE. 2520253Sjoerg */ 2620253Sjoerg 2730259Scharnier#ifndef lint 2830259Scharnierstatic const char rcsid[] = 2930259Scharnier "$Id$"; 3030259Scharnier#endif /* not lint */ 3130259Scharnier 3220253Sjoerg#include <ctype.h> 3330259Scharnier#include <err.h> 3420253Sjoerg#include <termios.h> 3530259Scharnier#include <unistd.h> 3620253Sjoerg 3720253Sjoerg#include "pw.h" 3820253Sjoerg#include "bitmap.h" 3920747Sdavidn#include "pwupd.h" 4020253Sjoerg 4120253Sjoerg 4220253Sjoergstatic int print_group(struct group * grp, int pretty); 4320253Sjoergstatic gid_t gr_gidpolicy(struct userconf * cnf, struct cargs * args); 4420253Sjoerg 4520253Sjoergint 4620253Sjoergpw_group(struct userconf * cnf, int mode, struct cargs * args) 4720253Sjoerg{ 4820253Sjoerg struct carg *a_name = getarg(args, 'n'); 4920253Sjoerg struct carg *a_gid = getarg(args, 'g'); 5020253Sjoerg struct carg *arg; 5120253Sjoerg struct group *grp = NULL; 5220747Sdavidn int grmembers = 0; 5320747Sdavidn char **members = NULL; 5420253Sjoerg 5520253Sjoerg static struct group fakegroup = 5620253Sjoerg { 5720253Sjoerg "nogroup", 5820253Sjoerg "*", 5920253Sjoerg -1, 6020253Sjoerg NULL 6120253Sjoerg }; 6220253Sjoerg 6320267Sjoerg /* 6420267Sjoerg * With M_NEXT, we only need to return the 6520267Sjoerg * next gid to stdout 6620267Sjoerg */ 6720267Sjoerg if (mode == M_NEXT) 6820267Sjoerg { 6920267Sjoerg gid_t next = gr_gidpolicy(cnf, args); 7020267Sjoerg if (getarg(args, 'q')) 7120267Sjoerg return next; 7220267Sjoerg printf("%ld\n", (long)next); 7320267Sjoerg return EXIT_SUCCESS; 7420267Sjoerg } 7520267Sjoerg 7620253Sjoerg if (mode == M_PRINT && getarg(args, 'a')) { 7720267Sjoerg int pretty = getarg(args, 'P') != NULL; 7820253Sjoerg 7920253Sjoerg setgrent(); 8020253Sjoerg while ((grp = getgrent()) != NULL) 8120253Sjoerg print_group(grp, pretty); 8220253Sjoerg endgrent(); 8320267Sjoerg return EXIT_SUCCESS; 8420253Sjoerg } 8520253Sjoerg if (a_gid == NULL) { 8620253Sjoerg if (a_name == NULL) 8730259Scharnier errx(EX_DATAERR, "group name or id required"); 8820253Sjoerg 8920253Sjoerg if (mode != M_ADD && grp == NULL && isdigit(*a_name->val)) { 9020253Sjoerg (a_gid = a_name)->ch = 'g'; 9120253Sjoerg a_name = NULL; 9220253Sjoerg } 9320253Sjoerg } 9420253Sjoerg grp = (a_name != NULL) ? getgrnam(a_name->val) : getgrgid((gid_t) atoi(a_gid->val)); 9520253Sjoerg 9620253Sjoerg if (mode == M_UPDATE || mode == M_DELETE || mode == M_PRINT) { 9720253Sjoerg if (a_name == NULL && grp == NULL) /* Try harder */ 9820253Sjoerg grp = getgrgid(atoi(a_gid->val)); 9920253Sjoerg 10020253Sjoerg if (grp == NULL) { 10120253Sjoerg if (mode == M_PRINT && getarg(args, 'F')) { 10220747Sdavidn char *fmems[1]; 10320747Sdavidn fmems[0] = NULL; 10420253Sjoerg fakegroup.gr_name = a_name ? a_name->val : "nogroup"; 10520253Sjoerg fakegroup.gr_gid = a_gid ? (gid_t) atol(a_gid->val) : -1; 10620747Sdavidn fakegroup.gr_mem = fmems; 10720267Sjoerg return print_group(&fakegroup, getarg(args, 'P') != NULL); 10820253Sjoerg } 10930259Scharnier errx(EX_DATAERR, "unknown group `%s'", a_name ? a_name->val : a_gid->val); 11020253Sjoerg } 11120253Sjoerg if (a_name == NULL) /* Needed later */ 11220253Sjoerg a_name = addarg(args, 'n', grp->gr_name); 11320253Sjoerg 11420253Sjoerg /* 11520253Sjoerg * Handle deletions now 11620253Sjoerg */ 11720253Sjoerg if (mode == M_DELETE) { 11820253Sjoerg gid_t gid = grp->gr_gid; 11920253Sjoerg 12020253Sjoerg if (delgrent(grp) == -1) 12130259Scharnier err(EX_IOERR, "error updating group file"); 12220253Sjoerg pw_log(cnf, mode, W_GROUP, "%s(%ld) removed", a_name->val, (long) gid); 12320267Sjoerg return EXIT_SUCCESS; 12420253Sjoerg } else if (mode == M_PRINT) 12520267Sjoerg return print_group(grp, getarg(args, 'P') != NULL); 12620253Sjoerg 12720253Sjoerg if (a_gid) 12820253Sjoerg grp->gr_gid = (gid_t) atoi(a_gid->val); 12920253Sjoerg 13020253Sjoerg if ((arg = getarg(args, 'l')) != NULL) 13120679Sdavidn grp->gr_name = pw_checkname((u_char *)arg->val, 0); 13220253Sjoerg } else { 13320253Sjoerg if (a_name == NULL) /* Required */ 13430259Scharnier errx(EX_DATAERR, "group name required"); 13520253Sjoerg else if (grp != NULL) /* Exists */ 13630259Scharnier errx(EX_DATAERR, "group name `%s' already exists", a_name->val); 13720253Sjoerg 13820747Sdavidn extendarray(&members, &grmembers, 200); 13920747Sdavidn members[0] = NULL; 14020253Sjoerg grp = &fakegroup; 14120679Sdavidn grp->gr_name = pw_checkname((u_char *)a_name->val, 0); 14220253Sjoerg grp->gr_passwd = "*"; 14320253Sjoerg grp->gr_gid = gr_gidpolicy(cnf, args); 14420253Sjoerg grp->gr_mem = members; 14520253Sjoerg } 14620253Sjoerg 14720253Sjoerg /* 14820253Sjoerg * This allows us to set a group password Group passwords is an 14920253Sjoerg * antique idea, rarely used and insecure (no secure database) Should 15020253Sjoerg * be discouraged, but it is apparently still supported by some 15120253Sjoerg * software. 15220253Sjoerg */ 15320253Sjoerg 15420253Sjoerg if ((arg = getarg(args, 'h')) != NULL) { 15520253Sjoerg if (strcmp(arg->val, "-") == 0) 15620253Sjoerg grp->gr_passwd = "*"; /* No access */ 15720253Sjoerg else { 15820253Sjoerg int fd = atoi(arg->val); 15920253Sjoerg int b; 16020253Sjoerg int istty = isatty(fd); 16120253Sjoerg struct termios t; 16220253Sjoerg char *p, line[256]; 16320253Sjoerg 16420253Sjoerg if (istty) { 16520253Sjoerg if (tcgetattr(fd, &t) == -1) 16620253Sjoerg istty = 0; 16720253Sjoerg else { 16820253Sjoerg struct termios n = t; 16920253Sjoerg 17020253Sjoerg /* Disable echo */ 17120253Sjoerg n.c_lflag &= ~(ECHO); 17220253Sjoerg tcsetattr(fd, TCSANOW, &n); 17320253Sjoerg printf("%sassword for group %s:", (mode == M_UPDATE) ? "New p" : "P", grp->gr_name); 17420253Sjoerg fflush(stdout); 17520253Sjoerg } 17620253Sjoerg } 17720253Sjoerg b = read(fd, line, sizeof(line) - 1); 17820253Sjoerg if (istty) { /* Restore state */ 17920253Sjoerg tcsetattr(fd, TCSANOW, &t); 18020253Sjoerg fputc('\n', stdout); 18120253Sjoerg fflush(stdout); 18220253Sjoerg } 18320253Sjoerg if (b < 0) { 18430259Scharnier warn("-h file descriptor"); 18520267Sjoerg return EX_OSERR; 18620253Sjoerg } 18720253Sjoerg line[b] = '\0'; 18820253Sjoerg if ((p = strpbrk(line, " \t\r\n")) != NULL) 18920253Sjoerg *p = '\0'; 19020253Sjoerg if (!*line) 19130259Scharnier errx(EX_DATAERR, "empty password read on file descriptor %d", fd); 19220253Sjoerg grp->gr_passwd = pw_pwcrypt(line); 19320253Sjoerg } 19420253Sjoerg } 19520267Sjoerg 19620267Sjoerg if (((arg = getarg(args, 'M')) != NULL || (arg = getarg(args, 'm')) != NULL) && arg->val) { 19720267Sjoerg int i = 0; 19820267Sjoerg char *p; 19920267Sjoerg struct passwd *pwd; 20020267Sjoerg 20120747Sdavidn /* Make sure this is not stay NULL with -M "" */ 20220747Sdavidn extendarray(&members, &grmembers, 200); 20320267Sjoerg if (arg->ch == 'm') { 20420747Sdavidn int k = 0; 20520747Sdavidn 20620747Sdavidn while (grp->gr_mem[k] != NULL) { 20720747Sdavidn if (extendarray(&members, &grmembers, i + 2) != -1) { 20820747Sdavidn members[i++] = grp->gr_mem[k]; 20920747Sdavidn } 21020747Sdavidn k++; 21120267Sjoerg } 21220267Sjoerg } 21320747Sdavidn for (p = strtok(arg->val, ", \t"); p != NULL; p = strtok(NULL, ", \t")) { 21420267Sjoerg int j; 21520267Sjoerg if ((pwd = getpwnam(p)) == NULL) { 21620267Sjoerg if (!isdigit(*p) || (pwd = getpwuid((uid_t) atoi(p))) == NULL) 21730259Scharnier errx(EX_NOUSER, "user `%s' does not exist", p); 21820267Sjoerg } 21920267Sjoerg /* 22020267Sjoerg * Check for duplicates 22120267Sjoerg */ 22220267Sjoerg for (j = 0; j < i && strcmp(members[j], pwd->pw_name)!=0; j++) 22320267Sjoerg ; 22420747Sdavidn if (j == i && extendarray(&members, &grmembers, i + 2) != -1) 22520267Sjoerg members[i++] = newstr(pwd->pw_name); 22620267Sjoerg } 22720747Sdavidn while (i < grmembers) 22820267Sjoerg members[i++] = NULL; 22920267Sjoerg grp->gr_mem = members; 23020267Sjoerg } 23120267Sjoerg 23220267Sjoerg if (getarg(args, 'N') != NULL) 23320267Sjoerg return print_group(grp, getarg(args, 'P') != NULL); 23420267Sjoerg 23520253Sjoerg if ((mode == M_ADD && !addgrent(grp)) || (mode == M_UPDATE && !chggrent(a_name->val, grp))) { 23630259Scharnier warn("group update"); 23720267Sjoerg return EX_IOERR; 23820253Sjoerg } 23920253Sjoerg /* grp may have been invalidated */ 24020253Sjoerg if ((grp = getgrnam(a_name->val)) == NULL) 24130259Scharnier errx(EX_SOFTWARE, "group disappeared during update"); 24220253Sjoerg 24320253Sjoerg pw_log(cnf, mode, W_GROUP, "%s(%ld)", grp->gr_name, (long) grp->gr_gid); 24420253Sjoerg 24520747Sdavidn if (members) 24620747Sdavidn free(members); 24720747Sdavidn 24820267Sjoerg return EXIT_SUCCESS; 24920253Sjoerg} 25020253Sjoerg 25120253Sjoerg 25220253Sjoergstatic gid_t 25320253Sjoerggr_gidpolicy(struct userconf * cnf, struct cargs * args) 25420253Sjoerg{ 25520253Sjoerg struct group *grp; 25620253Sjoerg gid_t gid = (gid_t) - 1; 25720253Sjoerg struct carg *a_gid = getarg(args, 'g'); 25820253Sjoerg 25920253Sjoerg /* 26020253Sjoerg * Check the given gid, if any 26120253Sjoerg */ 26220253Sjoerg if (a_gid != NULL) { 26320253Sjoerg gid = (gid_t) atol(a_gid->val); 26420253Sjoerg 26520253Sjoerg if ((grp = getgrgid(gid)) != NULL && getarg(args, 'o') == NULL) 26630259Scharnier errx(EX_DATAERR, "gid `%ld' has already been allocated", (long) grp->gr_gid); 26720253Sjoerg } else { 26820253Sjoerg struct bitmap bm; 26920253Sjoerg 27020253Sjoerg /* 27120253Sjoerg * We need to allocate the next available gid under one of 27220253Sjoerg * two policies a) Grab the first unused gid b) Grab the 27320253Sjoerg * highest possible unused gid 27420253Sjoerg */ 27520253Sjoerg if (cnf->min_gid >= cnf->max_gid) { /* Sanity claus^H^H^H^Hheck */ 27620253Sjoerg cnf->min_gid = 1000; 27720253Sjoerg cnf->max_gid = 32000; 27820253Sjoerg } 27920253Sjoerg bm = bm_alloc(cnf->max_gid - cnf->min_gid + 1); 28020253Sjoerg 28120253Sjoerg /* 28220253Sjoerg * Now, let's fill the bitmap from the password file 28320253Sjoerg */ 28420253Sjoerg setgrent(); 28520253Sjoerg while ((grp = getgrent()) != NULL) 28620253Sjoerg if (grp->gr_gid >= (int) cnf->min_gid && grp->gr_gid <= (int) cnf->max_gid) 28720253Sjoerg bm_setbit(&bm, grp->gr_gid - cnf->min_gid); 28820253Sjoerg endgrent(); 28920253Sjoerg 29020253Sjoerg /* 29120253Sjoerg * Then apply the policy, with fallback to reuse if necessary 29220253Sjoerg */ 29320253Sjoerg if (cnf->reuse_gids) 29420253Sjoerg gid = (gid_t) (bm_firstunset(&bm) + cnf->min_gid); 29520253Sjoerg else { 29620253Sjoerg gid = (gid_t) (bm_lastset(&bm) + 1); 29720253Sjoerg if (!bm_isset(&bm, gid)) 29820253Sjoerg gid += cnf->min_gid; 29920253Sjoerg else 30020253Sjoerg gid = (gid_t) (bm_firstunset(&bm) + cnf->min_gid); 30120253Sjoerg } 30220253Sjoerg 30320253Sjoerg /* 30420253Sjoerg * Another sanity check 30520253Sjoerg */ 30620253Sjoerg if (gid < cnf->min_gid || gid > cnf->max_gid) 30730259Scharnier errx(EX_SOFTWARE, "unable to allocate a new gid - range fully used"); 30820253Sjoerg bm_dealloc(&bm); 30920253Sjoerg } 31020253Sjoerg return gid; 31120253Sjoerg} 31220253Sjoerg 31320253Sjoerg 31420253Sjoergstatic int 31520253Sjoergprint_group(struct group * grp, int pretty) 31620253Sjoerg{ 31720253Sjoerg if (!pretty) { 31820747Sdavidn int buflen = 0; 31920747Sdavidn char *buf = NULL; 32020253Sjoerg 32120747Sdavidn fmtgrent(&buf, &buflen, grp); 32220253Sjoerg fputs(buf, stdout); 32320747Sdavidn free(buf); 32420253Sjoerg } else { 32520253Sjoerg int i; 32620253Sjoerg 32722398Sdavidn printf("Group Name: %-15s #%lu\n" 32820747Sdavidn " Members: ", 32920253Sjoerg grp->gr_name, (long) grp->gr_gid); 33020747Sdavidn for (i = 0; grp->gr_mem[i]; i++) 33120253Sjoerg printf("%s%s", i ? "," : "", grp->gr_mem[i]); 33220253Sjoerg fputs("\n\n", stdout); 33320253Sjoerg } 33420267Sjoerg return EXIT_SUCCESS; 33520253Sjoerg} 336