pw_group.c revision 285398
1/*-
2 * Copyright (C) 1996
3 *	David L. Nugent.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY DAVID L. NUGENT AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED.  IN NO EVENT SHALL DAVID L. NUGENT OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
25 */
26
27#ifndef lint
28static const char rcsid[] =
29  "$FreeBSD: head/usr.sbin/pw/pw_group.c 285398 2015-07-11 18:09:27Z bapt $";
30#endif /* not lint */
31
32#include <ctype.h>
33#include <err.h>
34#include <termios.h>
35#include <stdbool.h>
36#include <unistd.h>
37#include <grp.h>
38#include <libutil.h>
39
40#include "pw.h"
41#include "bitmap.h"
42
43
44static struct passwd *lookup_pwent(const char *user);
45static void	delete_members(char ***members, int *grmembers, int *i,
46    struct carg *arg, struct group *grp);
47static int	print_group(struct group * grp);
48static gid_t    gr_gidpolicy(struct userconf * cnf, long id);
49
50static void
51set_passwd(struct group *grp, bool update)
52{
53	int		 b;
54	int		 istty;
55	struct termios	 t, n;
56	char		*p, line[256];
57
58	if (conf.fd == '-') {
59		grp->gr_passwd = "*";	/* No access */
60		return;
61	}
62
63	if ((istty = isatty(conf.fd))) {
64		n = t;
65		/* Disable echo */
66		n.c_lflag &= ~(ECHO);
67		tcsetattr(conf.fd, TCSANOW, &n);
68		printf("%sassword for group %s:", update ? "New p" : "P",
69		    grp->gr_name);
70		fflush(stdout);
71	}
72	b = read(conf.fd, line, sizeof(line) - 1);
73	if (istty) {	/* Restore state */
74		tcsetattr(conf.fd, TCSANOW, &t);
75		fputc('\n', stdout);
76		fflush(stdout);
77	}
78	if (b < 0)
79		err(EX_OSERR, "-h file descriptor");
80	line[b] = '\0';
81	if ((p = strpbrk(line, " \t\r\n")) != NULL)
82		*p = '\0';
83	if (!*line)
84		errx(EX_DATAERR, "empty password read on file descriptor %d",
85		    conf.fd);
86	if (conf.precrypted) {
87		if (strchr(line, ':') != 0)
88			errx(EX_DATAERR, "wrong encrypted passwrd");
89		grp->gr_passwd = line;
90	} else
91		grp->gr_passwd = pw_pwcrypt(line);
92}
93
94int
95pw_groupnext(struct userconf *cnf, bool quiet)
96{
97	gid_t next = gr_gidpolicy(cnf, -1);
98
99	if (quiet)
100		return (next);
101	printf("%u\n", next);
102
103	return (EXIT_SUCCESS);
104}
105
106static int
107pw_groupshow(const char *name, long id, struct group *fakegroup)
108{
109	struct group *grp = NULL;
110
111	if (id < 0 && name == NULL && !conf.all)
112		errx(EX_DATAERR, "groupname or id or '-a' required");
113
114	if (conf.all) {
115		SETGRENT();
116		while ((grp = GETGRENT()) != NULL)
117			print_group(grp);
118		ENDGRENT();
119
120		return (EXIT_SUCCESS);
121	}
122
123	grp = (name != NULL) ? GETGRNAM(name) : GETGRGID(id);
124	if (grp == NULL) {
125		if (conf.force) {
126			grp = fakegroup;
127		} else {
128			if (name == NULL)
129				errx(EX_DATAERR, "unknown gid `%ld'", id);
130			errx(EX_DATAERR, "unknown group `%s'", name);
131		}
132	}
133
134	return (print_group(grp));
135}
136
137int
138pw_group(int mode, char *name, long id, struct cargs * args)
139{
140	int		rc;
141	struct carg    *arg;
142	struct group   *grp = NULL;
143	int	        grmembers = 0;
144	char           **members = NULL;
145	struct userconf	*cnf = conf.userconf;
146
147	static struct group fakegroup =
148	{
149		"nogroup",
150		"*",
151		-1,
152		NULL
153	};
154
155	if (mode == M_NEXT)
156		return (pw_groupnext(cnf, conf.quiet));
157
158	if (mode == M_PRINT)
159		return (pw_groupshow(name, id, &fakegroup));
160
161	if (mode == M_LOCK || mode == M_UNLOCK)
162		errx(EX_USAGE, "'lock' command is not available for groups");
163
164	if (id < 0 && name == NULL)
165		errx(EX_DATAERR, "group name or id required");
166
167	grp = (name != NULL) ? GETGRNAM(name) : GETGRGID(id);
168
169	if (mode == M_UPDATE || mode == M_DELETE) {
170		if (name == NULL && grp == NULL)	/* Try harder */
171			grp = GETGRGID(id);
172
173		if (grp == NULL) {
174			if (name == NULL)
175				errx(EX_DATAERR, "unknown group `%s'", name);
176			else
177				errx(EX_DATAERR, "unknown group `%ld'", id);
178		}
179		if (name == NULL)	/* Needed later */
180			name = grp->gr_name;
181
182		/*
183		 * Handle deletions now
184		 */
185		if (mode == M_DELETE) {
186			rc = delgrent(grp);
187			if (rc == -1)
188				err(EX_IOERR, "group '%s' not available (NIS?)",
189				    name);
190			else if (rc != 0) {
191				err(EX_IOERR, "group update");
192			}
193			pw_log(cnf, mode, W_GROUP, "%s(%ld) removed", name, id);
194			return EXIT_SUCCESS;
195		} else if (mode == M_PRINT)
196			return print_group(grp);
197
198		if (id > 0)
199			grp->gr_gid = (gid_t) id;
200
201		if (conf.newname != NULL)
202			grp->gr_name = pw_checkname(conf.newname, 0);
203	} else {
204		if (name == NULL)	/* Required */
205			errx(EX_DATAERR, "group name required");
206		else if (grp != NULL)	/* Exists */
207			errx(EX_DATAERR, "group name `%s' already exists", name);
208
209		extendarray(&members, &grmembers, 200);
210		members[0] = NULL;
211		grp = &fakegroup;
212		grp->gr_name = pw_checkname(name, 0);
213		grp->gr_passwd = "*";
214		grp->gr_gid = gr_gidpolicy(cnf, id);
215		grp->gr_mem = members;
216	}
217
218	/*
219	 * This allows us to set a group password Group passwords is an
220	 * antique idea, rarely used and insecure (no secure database) Should
221	 * be discouraged, but it is apparently still supported by some
222	 * software.
223	 */
224
225	if (conf.which == W_GROUP && conf.fd != -1)
226		set_passwd(grp, mode == M_UPDATE);
227
228	if (((arg = getarg(args, 'M')) != NULL ||
229	    (arg = getarg(args, 'd')) != NULL ||
230	    (arg = getarg(args, 'm')) != NULL) && arg->val) {
231		int	i = 0;
232		char   *p;
233		struct passwd	*pwd;
234
235		/* Make sure this is not stay NULL with -M "" */
236		extendarray(&members, &grmembers, 200);
237		if (arg->ch == 'd')
238			delete_members(&members, &grmembers, &i, arg, grp);
239		else if (arg->ch == 'm') {
240			int	k = 0;
241
242			if (grp->gr_mem != NULL) {
243				while (grp->gr_mem[k] != NULL) {
244					if (extendarray(&members, &grmembers, i + 2) != -1)
245						members[i++] = grp->gr_mem[k];
246					k++;
247				}
248			}
249		}
250
251		if (arg->ch != 'd')
252			for (p = strtok(arg->val, ", \t"); p != NULL; p = strtok(NULL, ", \t")) {
253				int	j;
254
255				/*
256				 * Check for duplicates
257				 */
258				pwd = lookup_pwent(p);
259				for (j = 0; j < i && strcmp(members[j], pwd->pw_name) != 0; j++)
260					;
261				if (j == i && extendarray(&members, &grmembers, i + 2) != -1)
262					members[i++] = newstr(pwd->pw_name);
263			}
264		while (i < grmembers)
265			members[i++] = NULL;
266		grp->gr_mem = members;
267	}
268
269	if (conf.dryrun)
270		return print_group(grp);
271
272	if (mode == M_ADD && (rc = addgrent(grp)) != 0) {
273		if (rc == -1)
274			errx(EX_IOERR, "group '%s' already exists",
275			    grp->gr_name);
276		else
277			err(EX_IOERR, "group update");
278	} else if (mode == M_UPDATE && (rc = chggrent(name, grp)) != 0) {
279		if (rc == -1)
280			errx(EX_IOERR, "group '%s' not available (NIS?)",
281			    grp->gr_name);
282		else
283			err(EX_IOERR, "group update");
284	}
285
286	if (conf.newname != NULL)
287		name = conf.newname;
288	/* grp may have been invalidated */
289	if ((grp = GETGRNAM(name)) == NULL)
290		errx(EX_SOFTWARE, "group disappeared during update");
291
292	pw_log(cnf, mode, W_GROUP, "%s(%u)", grp->gr_name, grp->gr_gid);
293
294	free(members);
295
296	return EXIT_SUCCESS;
297}
298
299
300/*
301 * Lookup a passwd entry using a name or UID.
302 */
303static struct passwd *
304lookup_pwent(const char *user)
305{
306	struct passwd *pwd;
307
308	if ((pwd = GETPWNAM(user)) == NULL &&
309	    (!isdigit((unsigned char)*user) ||
310	    (pwd = getpwuid((uid_t) atoi(user))) == NULL))
311		errx(EX_NOUSER, "user `%s' does not exist", user);
312
313	return (pwd);
314}
315
316
317/*
318 * Delete requested members from a group.
319 */
320static void
321delete_members(char ***members, int *grmembers, int *i, struct carg *arg,
322    struct group *grp)
323{
324	bool matchFound;
325	char *user;
326	char *valueCopy;
327	char *valuePtr;
328	int k;
329	struct passwd *pwd;
330
331	if (grp->gr_mem == NULL)
332		return;
333
334	k = 0;
335	while (grp->gr_mem[k] != NULL) {
336		matchFound = false;
337		if ((valueCopy = strdup(arg->val)) == NULL)
338			errx(EX_UNAVAILABLE, "out of memory");
339		valuePtr = valueCopy;
340		while ((user = strsep(&valuePtr, ", \t")) != NULL) {
341			pwd = lookup_pwent(user);
342			if (strcmp(grp->gr_mem[k], pwd->pw_name) == 0) {
343				matchFound = true;
344				break;
345			}
346		}
347		free(valueCopy);
348
349		if (!matchFound &&
350		    extendarray(members, grmembers, *i + 2) != -1)
351			(*members)[(*i)++] = grp->gr_mem[k];
352
353		k++;
354	}
355
356	return;
357}
358
359
360static          gid_t
361gr_gidpolicy(struct userconf * cnf, long id)
362{
363	struct group   *grp;
364	gid_t           gid = (gid_t) - 1;
365
366	/*
367	 * Check the given gid, if any
368	 */
369	if (id > 0) {
370		gid = (gid_t) id;
371
372		if ((grp = GETGRGID(gid)) != NULL && conf.checkduplicate)
373			errx(EX_DATAERR, "gid `%u' has already been allocated", grp->gr_gid);
374	} else {
375		struct bitmap   bm;
376
377		/*
378		 * We need to allocate the next available gid under one of
379		 * two policies a) Grab the first unused gid b) Grab the
380		 * highest possible unused gid
381		 */
382		if (cnf->min_gid >= cnf->max_gid) {	/* Sanity claus^H^H^H^Hheck */
383			cnf->min_gid = 1000;
384			cnf->max_gid = 32000;
385		}
386		bm = bm_alloc(cnf->max_gid - cnf->min_gid + 1);
387
388		/*
389		 * Now, let's fill the bitmap from the password file
390		 */
391		SETGRENT();
392		while ((grp = GETGRENT()) != NULL)
393			if ((gid_t)grp->gr_gid >= (gid_t)cnf->min_gid &&
394                            (gid_t)grp->gr_gid <= (gid_t)cnf->max_gid)
395				bm_setbit(&bm, grp->gr_gid - cnf->min_gid);
396		ENDGRENT();
397
398		/*
399		 * Then apply the policy, with fallback to reuse if necessary
400		 */
401		if (cnf->reuse_gids)
402			gid = (gid_t) (bm_firstunset(&bm) + cnf->min_gid);
403		else {
404			gid = (gid_t) (bm_lastset(&bm) + 1);
405			if (!bm_isset(&bm, gid))
406				gid += cnf->min_gid;
407			else
408				gid = (gid_t) (bm_firstunset(&bm) + cnf->min_gid);
409		}
410
411		/*
412		 * Another sanity check
413		 */
414		if (gid < cnf->min_gid || gid > cnf->max_gid)
415			errx(EX_SOFTWARE, "unable to allocate a new gid - range fully used");
416		bm_dealloc(&bm);
417	}
418	return gid;
419}
420
421
422static int
423print_group(struct group * grp)
424{
425	if (!conf.pretty) {
426		char           *buf = NULL;
427
428		buf = gr_make(grp);
429		printf("%s\n", buf);
430		free(buf);
431	} else {
432		int             i;
433
434		printf("Group Name: %-15s   #%lu\n"
435		       "   Members: ",
436		       grp->gr_name, (long) grp->gr_gid);
437		if (grp->gr_mem != NULL) {
438			for (i = 0; grp->gr_mem[i]; i++)
439				printf("%s%s", i ? "," : "", grp->gr_mem[i]);
440		}
441		fputs("\n\n", stdout);
442	}
443	return EXIT_SUCCESS;
444}
445