pw_user.c revision 286196
155682Smarkm/*- 2233294Sstas * Copyright (C) 1996 3233294Sstas * David L. Nugent. All rights reserved. 4233294Sstas * 555682Smarkm * Redistribution and use in source and binary forms, with or without 6233294Sstas * modification, are permitted provided that the following conditions 7233294Sstas * are met: 8233294Sstas * 1. Redistributions of source code must retain the above copyright 955682Smarkm * notice, this list of conditions and the following disclaimer. 10233294Sstas * 2. Redistributions in binary form must reproduce the above copyright 11233294Sstas * notice, this list of conditions and the following disclaimer in the 1255682Smarkm * documentation and/or other materials provided with the distribution. 13233294Sstas * 14233294Sstas * THIS SOFTWARE IS PROVIDED BY DAVID L. NUGENT AND CONTRIBUTORS ``AS IS'' AND 15233294Sstas * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 1655682Smarkm * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 17233294Sstas * ARE DISCLAIMED. IN NO EVENT SHALL DAVID L. NUGENT OR CONTRIBUTORS BE LIABLE 18233294Sstas * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19233294Sstas * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 2055682Smarkm * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21233294Sstas * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22233294Sstas * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23233294Sstas * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24233294Sstas * SUCH DAMAGE. 25233294Sstas * 26233294Sstas */ 27233294Sstas 28233294Sstas#ifndef lint 29233294Sstasstatic const char rcsid[] = 30233294Sstas "$FreeBSD: head/usr.sbin/pw/pw_user.c 286196 2015-08-02 12:47:50Z bapt $"; 31233294Sstas#endif /* not lint */ 3255682Smarkm 3355682Smarkm#include <ctype.h> 3455682Smarkm#include <err.h> 3555682Smarkm#include <fcntl.h> 3672445Sassar#include <inttypes.h> 3772445Sassar#include <sys/param.h> 38178825Sdfr#include <dirent.h> 3955682Smarkm#include <paths.h> 40233294Sstas#include <termios.h> 41233294Sstas#include <sys/types.h> 4255682Smarkm#include <sys/time.h> 4355682Smarkm#include <sys/resource.h> 4455682Smarkm#include <login_cap.h> 4572445Sassar#include <pwd.h> 4655682Smarkm#include <grp.h> 4755682Smarkm#include <libutil.h> 4855682Smarkm#include "pw.h" 49233294Sstas#include "bitmap.h" 50233294Sstas 51233294Sstas#define LOGNAMESIZE (MAXLOGNAME-1) 5255682Smarkm 5355682Smarkmstatic char locked_str[] = "*LOCKED*"; 5455682Smarkm 5555682Smarkmstatic struct passwd fakeuser = { 5655682Smarkm "nouser", 57233294Sstas "*", 58233294Sstas -1, 5955682Smarkm -1, 6072445Sassar 0, 61233294Sstas "", 6272445Sassar "User &", 6372445Sassar "/nonexistent", 6472445Sassar "/bin/sh", 65178825Sdfr 0, 66178825Sdfr 0 6772445Sassar}; 68233294Sstas 69233294Sstasstatic int print_user(struct passwd *pwd, bool pretty, bool v7); 7055682Smarkmstatic uid_t pw_uidpolicy(struct userconf *cnf, intmax_t id); 71233294Sstasstatic uid_t pw_gidpolicy(struct userconf *cnf, char *grname, char *nam, 7272445Sassar gid_t prefer, bool dryrun); 73233294Sstasstatic char *pw_homepolicy(struct userconf * cnf, char *homedir, 74233294Sstas const char *user); 7555682Smarkmstatic char *pw_shellpolicy(struct userconf * cnf); 7655682Smarkmstatic char *pw_password(struct userconf * cnf, char const * user, 7755682Smarkm bool dryrun); 7855682Smarkmstatic char *shell_path(char const * path, char *shells[], char *sh); 7955682Smarkmstatic void rmat(uid_t uid); 8055682Smarkmstatic void rmopie(char const * name); 8155682Smarkm 8255682Smarkmstatic void 8355682Smarkmcreate_and_populate_homedir(struct userconf *cnf, struct passwd *pwd, 8455682Smarkm const char *skeldir, mode_t homemode, bool update) 8555682Smarkm{ 8655682Smarkm int skelfd = -1; 8755682Smarkm 8855682Smarkm if (skeldir != NULL && *skeldir != '\0') { 8955682Smarkm if (*skeldir == '/') 9055682Smarkm skeldir++; 9155682Smarkm skelfd = openat(conf.rootfd, skeldir, O_DIRECTORY|O_CLOEXEC); 92178825Sdfr } 93178825Sdfr 94233294Sstas copymkdir(conf.rootfd, pwd->pw_dir, skelfd, homemode, pwd->pw_uid, 95178825Sdfr pwd->pw_gid, 0); 9655682Smarkm pw_log(cnf, update ? M_UPDATE : M_ADD, W_USER, "%s(%ju) home %s made", 97233294Sstas pwd->pw_name, (uintmax_t)pwd->pw_uid, pwd->pw_dir); 9855682Smarkm} 9978527Sassar 10055682Smarkmstatic int 10172445Sassarpw_set_passwd(struct passwd *pwd, int fd, bool precrypted, bool update) 10272445Sassar{ 10372445Sassar int b, istty; 10455682Smarkm struct termios t, n; 105233294Sstas login_cap_t *lc; 106178825Sdfr char line[_PASSWORD_LEN+1]; 107233294Sstas char *p; 108233294Sstas 10955682Smarkm if (fd == '-') { 11055682Smarkm if (!pwd->pw_passwd || *pwd->pw_passwd != '*') { 11155682Smarkm pwd->pw_passwd = "*"; /* No access */ 11255682Smarkm return (1); 11355682Smarkm } 11455682Smarkm return (0); 11555682Smarkm } 11655682Smarkm 11755682Smarkm if ((istty = isatty(fd))) { 118178825Sdfr if (tcgetattr(fd, &t) == -1) 119178825Sdfr istty = 0; 12055682Smarkm else { 121178825Sdfr n = t; 122178825Sdfr n.c_lflag &= ~(ECHO); 123178825Sdfr tcsetattr(fd, TCSANOW, &n); 124178825Sdfr printf("%s%spassword for user %s:", 125178825Sdfr update ? "new " : "", 126233294Sstas precrypted ? "encrypted " : "", 127178825Sdfr pwd->pw_name); 128178825Sdfr fflush(stdout); 129178825Sdfr } 130233294Sstas } 131178825Sdfr b = read(fd, line, sizeof(line) - 1); 132178825Sdfr if (istty) { /* Restore state */ 133233294Sstas tcsetattr(fd, TCSANOW, &t); 134178825Sdfr fputc('\n', stdout); 135233294Sstas fflush(stdout); 136178825Sdfr } 137178825Sdfr 138178825Sdfr if (b < 0) 139178825Sdfr err(EX_IOERR, "-%c file descriptor", 140178825Sdfr precrypted ? 'H' : 'h'); 141178825Sdfr line[b] = '\0'; 142178825Sdfr if ((p = strpbrk(line, "\r\n")) != NULL) 14355682Smarkm *p = '\0'; 14455682Smarkm if (!*line) 14555682Smarkm errx(EX_DATAERR, "empty password read on file descriptor %d", 14655682Smarkm fd); 14755682Smarkm if (precrypted) { 14855682Smarkm if (strchr(line, ':') != NULL) 14955682Smarkm errx(EX_DATAERR, "bad encrypted password"); 15055682Smarkm pwd->pw_passwd = strdup(line); 15172445Sassar } else { 15272445Sassar lc = login_getpwclass(pwd); 153178825Sdfr if (lc == NULL || 154233294Sstas login_setcryptfmt(lc, "sha512", NULL) == NULL) 155178825Sdfr warn("setting crypt(3) format"); 156178825Sdfr login_close(lc); 157178825Sdfr pwd->pw_passwd = pw_pwcrypt(line); 158178825Sdfr } 159178825Sdfr return (1); 160178825Sdfr} 161178825Sdfr 162178825Sdfrstatic void 163233294Sstasperform_chgpwent(const char *name, struct passwd *pwd, char *nispasswd) 164233294Sstas{ 165233294Sstas int rc; 166233294Sstas struct passwd *nispwd; 167233294Sstas 168233294Sstas /* duplicate for nis so that chgpwent is not modifying before NIS */ 169233294Sstas if (nispasswd && *nispasswd == '/') 170233294Sstas nispwd = pw_dup(pwd); 171233294Sstas 172233294Sstas rc = chgpwent(name, pwd); 173233294Sstas if (rc == -1) 174233294Sstas errx(EX_IOERR, "user '%s' does not exist (NIS?)", pwd->pw_name); 175233294Sstas else if (rc != 0) 176233294Sstas err(EX_IOERR, "passwd file update"); 17778527Sassar 17878527Sassar if (nispasswd && *nispasswd == '/') { 17978527Sassar rc = chgnispwent(nispasswd, name, nispwd); 18078527Sassar if (rc == -1) 181233294Sstas warn("User '%s' not found in NIS passwd", pwd->pw_name); 182233294Sstas else if (rc != 0) 183233294Sstas warn("NIS passwd update"); 184233294Sstas /* NOTE: NIS-only update errors are not fatal */ 185233294Sstas } 186233294Sstas} 187233294Sstas 18872445Sassar/* 189233294Sstas * The M_LOCK and M_UNLOCK functions simply add or remove 19055682Smarkm * a "*LOCKED*" prefix from in front of the password to 191233294Sstas * prevent it decoding correctly, and therefore prevents 192233294Sstas * access. Of course, this only prevents access via 19355682Smarkm * password authentication (not ssh, kerberos or any 194233294Sstas * other method that does not use the UNIX password) but 195233294Sstas * that is a known limitation. 196233294Sstas */ 197233294Sstasstatic int 198233294Sstaspw_userlock(char *arg1, int mode) 199233294Sstas{ 20055682Smarkm struct passwd *pwd = NULL; 20155682Smarkm char *passtmp = NULL; 202 char *name; 203 bool locked = false; 204 uid_t id; 205 206 if (geteuid() != 0) 207 errx(EX_NOPERM, "you must be root"); 208 209 if (arg1 == NULL) 210 errx(EX_DATAERR, "username or id required"); 211 212 if (strspn(arg1, "0123456789") == strlen(arg1)) 213 id = pw_checkid(arg1, UID_MAX); 214 else 215 name = arg1; 216 217 pwd = (name != NULL) ? GETPWNAM(pw_checkname(name, 0)) : GETPWUID(id); 218 if (pwd == NULL) { 219 if (name == NULL) 220 errx(EX_NOUSER, "no such uid `%ju'", (uintmax_t) id); 221 errx(EX_NOUSER, "no such user `%s'", name); 222 } 223 224 if (name == NULL) 225 name = pwd->pw_name; 226 227 if (strncmp(pwd->pw_passwd, locked_str, sizeof(locked_str) -1) == 0) 228 locked = true; 229 if (mode == M_LOCK && locked) 230 errx(EX_DATAERR, "user '%s' is already locked", pwd->pw_name); 231 if (mode == M_UNLOCK && !locked) 232 errx(EX_DATAERR, "user '%s' is not locked", pwd->pw_name); 233 234 if (mode == M_LOCK) { 235 asprintf(&passtmp, "%s%s", locked_str, pwd->pw_passwd); 236 if (passtmp == NULL) /* disaster */ 237 errx(EX_UNAVAILABLE, "out of memory"); 238 pwd->pw_passwd = passtmp; 239 } else { 240 pwd->pw_passwd += sizeof(locked_str)-1; 241 } 242 243 perform_chgpwent(name, pwd, NULL); 244 free(passtmp); 245 246 return (EXIT_SUCCESS); 247} 248 249static uid_t 250pw_uidpolicy(struct userconf * cnf, intmax_t id) 251{ 252 struct passwd *pwd; 253 struct bitmap bm; 254 uid_t uid = (uid_t) - 1; 255 256 /* 257 * Check the given uid, if any 258 */ 259 if (id >= 0) { 260 uid = (uid_t) id; 261 262 if ((pwd = GETPWUID(uid)) != NULL && conf.checkduplicate) 263 errx(EX_DATAERR, "uid `%ju' has already been allocated", 264 (uintmax_t)pwd->pw_uid); 265 return (uid); 266 } 267 /* 268 * We need to allocate the next available uid under one of 269 * two policies a) Grab the first unused uid b) Grab the 270 * highest possible unused uid 271 */ 272 if (cnf->min_uid >= cnf->max_uid) { /* Sanity 273 * claus^H^H^H^Hheck */ 274 cnf->min_uid = 1000; 275 cnf->max_uid = 32000; 276 } 277 bm = bm_alloc(cnf->max_uid - cnf->min_uid + 1); 278 279 /* 280 * Now, let's fill the bitmap from the password file 281 */ 282 SETPWENT(); 283 while ((pwd = GETPWENT()) != NULL) 284 if (pwd->pw_uid >= (uid_t) cnf->min_uid && pwd->pw_uid <= (uid_t) cnf->max_uid) 285 bm_setbit(&bm, pwd->pw_uid - cnf->min_uid); 286 ENDPWENT(); 287 288 /* 289 * Then apply the policy, with fallback to reuse if necessary 290 */ 291 if (cnf->reuse_uids || (uid = (uid_t) (bm_lastset(&bm) + cnf->min_uid + 1)) > cnf->max_uid) 292 uid = (uid_t) (bm_firstunset(&bm) + cnf->min_uid); 293 294 /* 295 * Another sanity check 296 */ 297 if (uid < cnf->min_uid || uid > cnf->max_uid) 298 errx(EX_SOFTWARE, "unable to allocate a new uid - range fully used"); 299 bm_dealloc(&bm); 300 return (uid); 301} 302 303static uid_t 304pw_gidpolicy(struct userconf *cnf, char *grname, char *nam, gid_t prefer, bool dryrun) 305{ 306 struct group *grp; 307 gid_t gid = (uid_t) - 1; 308 309 /* 310 * Check the given gid, if any 311 */ 312 SETGRENT(); 313 if (grname) { 314 if ((grp = GETGRNAM(grname)) == NULL) { 315 gid = pw_checkid(grname, GID_MAX); 316 grp = GETGRGID(gid); 317 } 318 gid = grp->gr_gid; 319 } else if ((grp = GETGRNAM(nam)) != NULL && 320 (grp->gr_mem == NULL || grp->gr_mem[0] == NULL)) { 321 gid = grp->gr_gid; /* Already created? Use it anyway... */ 322 } else { 323 intmax_t grid = -1; 324 325 /* 326 * We need to auto-create a group with the user's name. We 327 * can send all the appropriate output to our sister routine 328 * bit first see if we can create a group with gid==uid so we 329 * can keep the user and group ids in sync. We purposely do 330 * NOT check the gid range if we can force the sync. If the 331 * user's name dups an existing group, then the group add 332 * function will happily handle that case for us and exit. 333 */ 334 if (GETGRGID(prefer) == NULL) 335 grid = prefer; 336 if (dryrun) { 337 gid = pw_groupnext(cnf, true); 338 } else { 339 if (grid == -1) 340 grid = pw_groupnext(cnf, true); 341 groupadd(cnf, nam, grid, NULL, -1, false, false, false); 342 if ((grp = GETGRNAM(nam)) != NULL) 343 gid = grp->gr_gid; 344 } 345 } 346 ENDGRENT(); 347 return (gid); 348} 349 350static char * 351pw_homepolicy(struct userconf * cnf, char *homedir, const char *user) 352{ 353 static char home[128]; 354 355 if (homedir) 356 return (homedir); 357 358 if (cnf->home == NULL || *cnf->home == '\0') 359 errx(EX_CONFIG, "no base home directory set"); 360 snprintf(home, sizeof(home), "%s/%s", cnf->home, user); 361 362 return (home); 363} 364 365static char * 366shell_path(char const * path, char *shells[], char *sh) 367{ 368 if (sh != NULL && (*sh == '/' || *sh == '\0')) 369 return sh; /* specified full path or forced none */ 370 else { 371 char *p; 372 char paths[_UC_MAXLINE]; 373 374 /* 375 * We need to search paths 376 */ 377 strlcpy(paths, path, sizeof(paths)); 378 for (p = strtok(paths, ": \t\r\n"); p != NULL; p = strtok(NULL, ": \t\r\n")) { 379 int i; 380 static char shellpath[256]; 381 382 if (sh != NULL) { 383 snprintf(shellpath, sizeof(shellpath), "%s/%s", p, sh); 384 if (access(shellpath, X_OK) == 0) 385 return shellpath; 386 } else 387 for (i = 0; i < _UC_MAXSHELLS && shells[i] != NULL; i++) { 388 snprintf(shellpath, sizeof(shellpath), "%s/%s", p, shells[i]); 389 if (access(shellpath, X_OK) == 0) 390 return shellpath; 391 } 392 } 393 if (sh == NULL) 394 errx(EX_OSFILE, "can't find shell `%s' in shell paths", sh); 395 errx(EX_CONFIG, "no default shell available or defined"); 396 return NULL; 397 } 398} 399 400static char * 401pw_shellpolicy(struct userconf * cnf) 402{ 403 404 return shell_path(cnf->shelldir, cnf->shells, cnf->shell_default); 405} 406 407#define SALTSIZE 32 408 409static char const chars[] = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ./"; 410 411char * 412pw_pwcrypt(char *password) 413{ 414 int i; 415 char salt[SALTSIZE + 1]; 416 char *cryptpw; 417 static char buf[256]; 418 419 /* 420 * Calculate a salt value 421 */ 422 for (i = 0; i < SALTSIZE; i++) 423 salt[i] = chars[arc4random_uniform(sizeof(chars) - 1)]; 424 salt[SALTSIZE] = '\0'; 425 426 cryptpw = crypt(password, salt); 427 if (cryptpw == NULL) 428 errx(EX_CONFIG, "crypt(3) failure"); 429 return strcpy(buf, cryptpw); 430} 431 432static char * 433pw_password(struct userconf * cnf, char const * user, bool dryrun) 434{ 435 int i, l; 436 char pwbuf[32]; 437 438 switch (cnf->default_password) { 439 case -1: /* Random password */ 440 l = (arc4random() % 8 + 8); /* 8 - 16 chars */ 441 for (i = 0; i < l; i++) 442 pwbuf[i] = chars[arc4random_uniform(sizeof(chars)-1)]; 443 pwbuf[i] = '\0'; 444 445 /* 446 * We give this information back to the user 447 */ 448 if (conf.fd == -1 && !dryrun) { 449 if (isatty(STDOUT_FILENO)) 450 printf("Password for '%s' is: ", user); 451 printf("%s\n", pwbuf); 452 fflush(stdout); 453 } 454 break; 455 456 case -2: /* No password at all! */ 457 return ""; 458 459 case 0: /* No login - default */ 460 default: 461 return "*"; 462 463 case 1: /* user's name */ 464 strlcpy(pwbuf, user, sizeof(pwbuf)); 465 break; 466 } 467 return pw_pwcrypt(pwbuf); 468} 469 470static int 471print_user(struct passwd * pwd, bool pretty, bool v7) 472{ 473 int j; 474 char *p; 475 struct group *grp = GETGRGID(pwd->pw_gid); 476 char uname[60] = "User &", office[60] = "[None]", 477 wphone[60] = "[None]", hphone[60] = "[None]"; 478 char acexpire[32] = "[None]", pwexpire[32] = "[None]"; 479 struct tm * tptr; 480 481 if (!pretty) { 482 p = v7 ? pw_make_v7(pwd) : pw_make(pwd); 483 printf("%s\n", p); 484 free(p); 485 return (EXIT_SUCCESS); 486 } 487 488 if ((p = strtok(pwd->pw_gecos, ",")) != NULL) { 489 strlcpy(uname, p, sizeof(uname)); 490 if ((p = strtok(NULL, ",")) != NULL) { 491 strlcpy(office, p, sizeof(office)); 492 if ((p = strtok(NULL, ",")) != NULL) { 493 strlcpy(wphone, p, sizeof(wphone)); 494 if ((p = strtok(NULL, "")) != NULL) { 495 strlcpy(hphone, p, sizeof(hphone)); 496 } 497 } 498 } 499 } 500 /* 501 * Handle '&' in gecos field 502 */ 503 if ((p = strchr(uname, '&')) != NULL) { 504 int l = strlen(pwd->pw_name); 505 int m = strlen(p); 506 507 memmove(p + l, p + 1, m); 508 memmove(p, pwd->pw_name, l); 509 *p = (char) toupper((unsigned char)*p); 510 } 511 if (pwd->pw_expire > (time_t)0 && (tptr = localtime(&pwd->pw_expire)) != NULL) 512 strftime(acexpire, sizeof acexpire, "%c", tptr); 513 if (pwd->pw_change > (time_t)0 && (tptr = localtime(&pwd->pw_change)) != NULL) 514 strftime(pwexpire, sizeof pwexpire, "%c", tptr); 515 printf("Login Name: %-15s #%-12ju Group: %-15s #%ju\n" 516 " Full Name: %s\n" 517 " Home: %-26.26s Class: %s\n" 518 " Shell: %-26.26s Office: %s\n" 519 "Work Phone: %-26.26s Home Phone: %s\n" 520 "Acc Expire: %-26.26s Pwd Expire: %s\n", 521 pwd->pw_name, (uintmax_t)pwd->pw_uid, 522 grp ? grp->gr_name : "(invalid)", (uintmax_t)pwd->pw_gid, 523 uname, pwd->pw_dir, pwd->pw_class, 524 pwd->pw_shell, office, wphone, hphone, 525 acexpire, pwexpire); 526 SETGRENT(); 527 j = 0; 528 while ((grp=GETGRENT()) != NULL) { 529 int i = 0; 530 if (grp->gr_mem != NULL) { 531 while (grp->gr_mem[i] != NULL) { 532 if (strcmp(grp->gr_mem[i], pwd->pw_name)==0) { 533 printf(j++ == 0 ? " Groups: %s" : ",%s", grp->gr_name); 534 break; 535 } 536 ++i; 537 } 538 } 539 } 540 ENDGRENT(); 541 printf("%s", j ? "\n" : ""); 542 return (EXIT_SUCCESS); 543} 544 545char * 546pw_checkname(char *name, int gecos) 547{ 548 char showch[8]; 549 const char *badchars, *ch, *showtype; 550 int reject; 551 552 ch = name; 553 reject = 0; 554 if (gecos) { 555 /* See if the name is valid as a gecos (comment) field. */ 556 badchars = ":!@"; 557 showtype = "gecos field"; 558 } else { 559 /* See if the name is valid as a userid or group. */ 560 badchars = " ,\t:+&#%$^()!@~*?<>=|\\/\""; 561 showtype = "userid/group name"; 562 /* Userids and groups can not have a leading '-'. */ 563 if (*ch == '-') 564 reject = 1; 565 } 566 if (!reject) { 567 while (*ch) { 568 if (strchr(badchars, *ch) != NULL || *ch < ' ' || 569 *ch == 127) { 570 reject = 1; 571 break; 572 } 573 /* 8-bit characters are only allowed in GECOS fields */ 574 if (!gecos && (*ch & 0x80)) { 575 reject = 1; 576 break; 577 } 578 ch++; 579 } 580 } 581 /* 582 * A `$' is allowed as the final character for userids and groups, 583 * mainly for the benefit of samba. 584 */ 585 if (reject && !gecos) { 586 if (*ch == '$' && *(ch + 1) == '\0') { 587 reject = 0; 588 ch++; 589 } 590 } 591 if (reject) { 592 snprintf(showch, sizeof(showch), (*ch >= ' ' && *ch < 127) 593 ? "`%c'" : "0x%02x", *ch); 594 errx(EX_DATAERR, "invalid character %s at position %td in %s", 595 showch, (ch - name), showtype); 596 } 597 if (!gecos && (ch - name) > LOGNAMESIZE) 598 errx(EX_USAGE, "name too long `%s' (max is %d)", name, 599 LOGNAMESIZE); 600 601 return (name); 602} 603 604static void 605rmat(uid_t uid) 606{ 607 DIR *d = opendir("/var/at/jobs"); 608 609 if (d != NULL) { 610 struct dirent *e; 611 612 while ((e = readdir(d)) != NULL) { 613 struct stat st; 614 615 if (strncmp(e->d_name, ".lock", 5) != 0 && 616 stat(e->d_name, &st) == 0 && 617 !S_ISDIR(st.st_mode) && 618 st.st_uid == uid) { 619 char tmp[MAXPATHLEN]; 620 621 snprintf(tmp, sizeof(tmp), "/usr/bin/atrm %s", e->d_name); 622 system(tmp); 623 } 624 } 625 closedir(d); 626 } 627} 628 629static void 630rmopie(char const * name) 631{ 632 char tmp[1014]; 633 FILE *fp; 634 int fd; 635 size_t len; 636 off_t atofs = 0; 637 638 if ((fd = openat(conf.rootfd, "etc/opiekeys", O_RDWR)) == -1) 639 return; 640 641 fp = fdopen(fd, "r+"); 642 len = strlen(name); 643 644 while (fgets(tmp, sizeof(tmp), fp) != NULL) { 645 if (strncmp(name, tmp, len) == 0 && tmp[len]==' ') { 646 /* Comment username out */ 647 if (fseek(fp, atofs, SEEK_SET) == 0) 648 fwrite("#", 1, 1, fp); 649 break; 650 } 651 atofs = ftell(fp); 652 } 653 /* 654 * If we got an error of any sort, don't update! 655 */ 656 fclose(fp); 657} 658 659int 660pw_user_next(int argc, char **argv, char *name __unused) 661{ 662 struct userconf *cnf = NULL; 663 const char *cfg = NULL; 664 int ch; 665 bool quiet = false; 666 uid_t next; 667 668 while ((ch = getopt(argc, argv, "Cq")) != -1) { 669 switch (ch) { 670 case 'C': 671 cfg = optarg; 672 break; 673 case 'q': 674 quiet; 675 break; 676 } 677 } 678 679 if (quiet) 680 freopen(_PATH_DEVNULL, "w", stderr); 681 682 cnf = get_userconfig(cfg); 683 684 next = pw_uidpolicy(cnf, -1); 685 686 printf("%ju:", (uintmax_t)next); 687 pw_groupnext(cnf, quiet); 688 689 return (EXIT_SUCCESS); 690} 691 692int 693pw_user_show(int argc, char **argv, char *arg1) 694{ 695 struct passwd *pwd = NULL; 696 char *name = NULL; 697 uid_t id = -1; 698 int ch; 699 bool all = false; 700 bool pretty = false; 701 bool force = false; 702 bool v7 = false; 703 bool quiet = false; 704 705 if (arg1 != NULL) { 706 if (strspn(arg1, "0123456789") == strlen(arg1)) 707 id = pw_checkid(arg1, UID_MAX); 708 else 709 name = arg1; 710 } 711 712 while ((ch = getopt(argc, argv, "C:qn:u:FPa7")) != -1) { 713 switch (ch) { 714 case 'C': 715 /* ignore compatibility */ 716 break; 717 case 'q': 718 quiet = true; 719 break; 720 case 'n': 721 name = optarg; 722 break; 723 case 'u': 724 id = pw_checkid(optarg, UID_MAX); 725 break; 726 case 'F': 727 force = true; 728 break; 729 case 'P': 730 pretty = true; 731 break; 732 case 'a': 733 all = true; 734 break; 735 case 7: 736 v7 = true; 737 break; 738 } 739 } 740 741 if (quiet) 742 freopen(_PATH_DEVNULL, "w", stderr); 743 744 if (all) { 745 SETPWENT(); 746 while ((pwd = GETPWENT()) != NULL) 747 print_user(pwd, pretty, v7); 748 ENDPWENT(); 749 return (EXIT_SUCCESS); 750 } 751 752 if (id < 0 && name == NULL) 753 errx(EX_DATAERR, "username or id required"); 754 755 pwd = (name != NULL) ? GETPWNAM(pw_checkname(name, 0)) : GETPWUID(id); 756 if (pwd == NULL) { 757 if (force) { 758 pwd = &fakeuser; 759 } else { 760 if (name == NULL) 761 errx(EX_NOUSER, "no such uid `%ju'", 762 (uintmax_t) id); 763 errx(EX_NOUSER, "no such user `%s'", name); 764 } 765 } 766 767 return (print_user(pwd, pretty, v7)); 768} 769 770int 771pw_user_del(int argc, char **argv, char *arg1) 772{ 773 struct userconf *cnf = NULL; 774 struct passwd *pwd = NULL; 775 struct group *gr, *grp; 776 char *name = NULL; 777 char grname[MAXLOGNAME]; 778 char *nispasswd = NULL; 779 char file[MAXPATHLEN]; 780 char home[MAXPATHLEN]; 781 const char *cfg = NULL; 782 struct stat st; 783 uid_t id; 784 int ch, rc; 785 bool nis = false; 786 bool deletehome = false; 787 bool quiet = false; 788 789 if (arg1 != NULL) { 790 if (strspn(arg1, "0123456789") == strlen(arg1)) 791 id = pw_checkid(arg1, UID_MAX); 792 else 793 name = arg1; 794 } 795 796 while ((ch = getopt(argc, argv, "C:qn:u:rYy:")) != -1) { 797 switch (ch) { 798 case 'C': 799 cfg = optarg; 800 break; 801 case 'q': 802 quiet = true; 803 break; 804 case 'n': 805 name = optarg; 806 break; 807 case 'u': 808 id = pw_checkid(optarg, UID_MAX); 809 break; 810 case 'r': 811 deletehome = true; 812 break; 813 case 'y': 814 nispasswd = optarg; 815 break; 816 case 'Y': 817 nis = true; 818 break; 819 } 820 } 821 822 if (quiet) 823 freopen(_PATH_DEVNULL, "w", stderr); 824 825 if (id < 0 && name == NULL) 826 errx(EX_DATAERR, "username or id required"); 827 828 cnf = get_userconfig(cfg); 829 830 if (nispasswd == NULL) 831 nispasswd = cnf->nispasswd; 832 833 pwd = (name != NULL) ? GETPWNAM(pw_checkname(name, 0)) : GETPWUID(id); 834 if (pwd == NULL) { 835 if (name == NULL) 836 errx(EX_NOUSER, "no such uid `%ju'", (uintmax_t) id); 837 errx(EX_NOUSER, "no such user `%s'", name); 838 } 839 840 if (PWF._altdir == PWF_REGULAR && 841 ((pwd->pw_fields & _PWF_SOURCE) != _PWF_FILES)) { 842 if ((pwd->pw_fields & _PWF_SOURCE) == _PWF_NIS) { 843 if (!nis && nispasswd && *nispasswd != '/') 844 errx(EX_NOUSER, "Cannot remove NIS user `%s'", 845 name); 846 } else { 847 errx(EX_NOUSER, "Cannot remove non local user `%s'", 848 name); 849 } 850 } 851 852 id = pwd->pw_uid; 853 if (name == NULL) 854 name = pwd->pw_name; 855 856 if (strcmp(pwd->pw_name, "root") == 0) 857 errx(EX_DATAERR, "cannot remove user 'root'"); 858 859 /* Remove opie record from /etc/opiekeys */ 860 if (PWALTDIR() != PWF_ALT) 861 rmopie(pwd->pw_name); 862 863 if (!PWALTDIR()) { 864 /* Remove crontabs */ 865 snprintf(file, sizeof(file), "/var/cron/tabs/%s", pwd->pw_name); 866 if (access(file, F_OK) == 0) { 867 snprintf(file, sizeof(file), "crontab -u %s -r", pwd->pw_name); 868 system(file); 869 } 870 } 871 872 /* 873 * Save these for later, since contents of pwd may be 874 * invalidated by deletion 875 */ 876 snprintf(file, sizeof(file), "%s/%s", _PATH_MAILDIR, pwd->pw_name); 877 strlcpy(home, pwd->pw_dir, sizeof(home)); 878 gr = GETGRGID(pwd->pw_gid); 879 if (gr != NULL) 880 strlcpy(grname, gr->gr_name, LOGNAMESIZE); 881 else 882 grname[0] = '\0'; 883 884 rc = delpwent(pwd); 885 if (rc == -1) 886 err(EX_IOERR, "user '%s' does not exist", pwd->pw_name); 887 else if (rc != 0) 888 err(EX_IOERR, "passwd update"); 889 890 if (nis && nispasswd && *nispasswd=='/') { 891 rc = delnispwent(nispasswd, name); 892 if (rc == -1) 893 warnx("WARNING: user '%s' does not exist in NIS passwd", 894 pwd->pw_name); 895 else if (rc != 0) 896 warn("WARNING: NIS passwd update"); 897 } 898 899 grp = GETGRNAM(name); 900 if (grp != NULL && 901 (grp->gr_mem == NULL || *grp->gr_mem == NULL) && 902 strcmp(name, grname) == 0) 903 delgrent(GETGRNAM(name)); 904 SETGRENT(); 905 while ((grp = GETGRENT()) != NULL) { 906 int i, j; 907 char group[MAXLOGNAME]; 908 if (grp->gr_mem == NULL) 909 continue; 910 911 for (i = 0; grp->gr_mem[i] != NULL; i++) { 912 if (strcmp(grp->gr_mem[i], name) != 0) 913 continue; 914 915 for (j = i; grp->gr_mem[j] != NULL; j++) 916 grp->gr_mem[j] = grp->gr_mem[j+1]; 917 strlcpy(group, grp->gr_name, MAXLOGNAME); 918 chggrent(group, grp); 919 } 920 } 921 ENDGRENT(); 922 923 pw_log(cnf, M_DELETE, W_USER, "%s(%ju) account removed", name, 924 (uintmax_t)id); 925 926 /* Remove mail file */ 927 if (PWALTDIR() != PWF_ALT) 928 unlinkat(conf.rootfd, file + 1, 0); 929 930 /* Remove at jobs */ 931 if (!PWALTDIR() && getpwuid(id) == NULL) 932 rmat(id); 933 934 /* Remove home directory and contents */ 935 if (PWALTDIR() != PWF_ALT && deletehome && *home == '/' && 936 GETPWUID(id) == NULL && 937 fstatat(conf.rootfd, home + 1, &st, 0) != -1) { 938 rm_r(conf.rootfd, home, id); 939 pw_log(cnf, M_DELETE, W_USER, "%s(%ju) home '%s' %s" 940 "removed", name, (uintmax_t)id, home, 941 fstatat(conf.rootfd, home + 1, &st, 0) == -1 ? "" : "not " 942 "completely "); 943 } 944 945 return (EXIT_SUCCESS); 946} 947 948int 949pw_user_lock(int argc, char **argv, char *arg1) 950{ 951 int ch; 952 953 while ((ch = getopt(argc, argv, "Cq")) != -1) { 954 switch (ch) { 955 case 'C': 956 case 'q': 957 /* compatibility */ 958 break; 959 } 960 } 961 962 return (pw_userlock(arg1, M_LOCK)); 963} 964 965int 966pw_user_unlock(int argc, char **argv, char *arg1) 967{ 968 int ch; 969 970 while ((ch = getopt(argc, argv, "Cq")) != -1) { 971 switch (ch) { 972 case 'C': 973 case 'q': 974 /* compatibility */ 975 break; 976 } 977 } 978 979 return (pw_userlock(arg1, M_UNLOCK)); 980} 981 982static struct group * 983group_from_name_or_id(char *name) 984{ 985 const char *errstr = NULL; 986 struct group *grp; 987 uintmax_t id; 988 989 if ((grp = GETGRNAM(name)) == NULL) { 990 id = strtounum(name, 0, GID_MAX, &errstr); 991 if (errstr) 992 errx(EX_NOUSER, "group `%s' does not exist", name); 993 grp = GETGRGID(id); 994 if (grp == NULL) 995 errx(EX_NOUSER, "group `%s' does not exist", name); 996 } 997 998 return (grp); 999} 1000 1001static void 1002split_groups(StringList **groups, char *groupsstr) 1003{ 1004 struct group *grp; 1005 char *p; 1006 char tok[] = ", \t"; 1007 1008 for (p = strtok(groupsstr, tok); p != NULL; p = strtok(NULL, tok)) { 1009 grp = group_from_name_or_id(p); 1010 if (*groups == NULL) 1011 *groups = sl_init(); 1012 sl_add(*groups, newstr(grp->gr_name)); 1013 } 1014} 1015 1016static void 1017validate_grname(struct userconf *cnf, char *group) 1018{ 1019 struct group *grp; 1020 1021 if (group == NULL || *group == '\0') { 1022 cnf->default_group = ""; 1023 return; 1024 } 1025 grp = group_from_name_or_id(group); 1026 cnf->default_group = newstr(grp->gr_name); 1027} 1028 1029static mode_t 1030validate_mode(char *mode) 1031{ 1032 mode_t m; 1033 void *set; 1034 1035 if ((set = setmode(mode)) == NULL) 1036 errx(EX_DATAERR, "invalid directory creation mode '%s'", mode); 1037 1038 m = getmode(set, _DEF_DIRMODE); 1039 free(set); 1040 return (m); 1041} 1042 1043static void 1044mix_config(struct userconf *cmdcnf, struct userconf *cfg) 1045{ 1046 1047 if (cmdcnf->default_password == 0) 1048 cmdcnf->default_password = cfg->default_password; 1049 if (cmdcnf->reuse_uids == 0) 1050 cmdcnf->reuse_uids = cfg->reuse_uids; 1051 if (cmdcnf->reuse_gids == 0) 1052 cmdcnf->reuse_gids = cfg->reuse_gids; 1053 if (cmdcnf->nispasswd == NULL) 1054 cmdcnf->nispasswd = cfg->nispasswd; 1055 if (cmdcnf->dotdir == NULL) 1056 cmdcnf->dotdir = cfg->dotdir; 1057 if (cmdcnf->newmail == NULL) 1058 cmdcnf->newmail = cfg->newmail; 1059 if (cmdcnf->logfile == NULL) 1060 cmdcnf->logfile = cfg->logfile; 1061 if (cmdcnf->home == NULL) 1062 cmdcnf->home = cfg->home; 1063 if (cmdcnf->homemode == 0) 1064 cmdcnf->homemode = cfg->homemode; 1065 if (cmdcnf->shelldir == NULL) 1066 cmdcnf->shelldir = cfg->shelldir; 1067 if (cmdcnf->shells == NULL) 1068 cmdcnf->shells = cfg->shells; 1069 if (cmdcnf->shell_default == NULL) 1070 cmdcnf->shell_default = cfg->shell_default; 1071 if (cmdcnf->default_group == NULL) 1072 cmdcnf->default_group = cfg->default_group; 1073 if (cmdcnf->groups == NULL) 1074 cmdcnf->groups = cfg->groups; 1075 if (cmdcnf->default_class == NULL) 1076 cmdcnf->default_class = cfg->default_class; 1077 if (cmdcnf->min_uid == 0) 1078 cmdcnf->min_uid = cfg->min_uid; 1079 if (cmdcnf->max_uid == 0) 1080 cmdcnf->max_uid = cfg->max_uid; 1081 if (cmdcnf->min_gid == 0) 1082 cmdcnf->min_gid = cfg->min_gid; 1083 if (cmdcnf->max_gid == 0) 1084 cmdcnf->max_gid = cfg->max_gid; 1085 if (cmdcnf->expire_days == 0) 1086 cmdcnf->expire_days = cfg->expire_days; 1087 if (cmdcnf->password_days == 0) 1088 cmdcnf->password_days = cfg->password_days; 1089} 1090 1091int 1092pw_user_add(int argc, char **argv, char *arg1) 1093{ 1094 struct userconf *cnf, *cmdcnf; 1095 struct passwd *pwd; 1096 struct group *grp; 1097 struct stat st; 1098 char args[] = "C:qn:u:c:d:e:p:g:G:mM:k:s:oL:i:w:h:H:Db:NPy:Y"; 1099 char line[_PASSWORD_LEN+1], path[MAXPATHLEN]; 1100 char *gecos, *homedir, *skel, *walk, *userid, *groupid, *grname; 1101 char *default_passwd, *name, *p; 1102 const char *cfg; 1103 login_cap_t *lc; 1104 FILE *pfp, *fp; 1105 intmax_t id = -1; 1106 time_t now; 1107 int rc, ch, fd = -1; 1108 size_t i; 1109 bool dryrun, nis, pretty, quiet, createhome, precrypted, genconf; 1110 1111 dryrun = nis = pretty = quiet = createhome = precrypted = false; 1112 genconf = false; 1113 gecos = homedir = skel = userid = groupid = default_passwd = NULL; 1114 grname = name = NULL; 1115 1116 if ((cmdcnf = calloc(1, sizeof(struct userconf))) == NULL) 1117 err(EXIT_FAILURE, "calloc()"); 1118 1119 if (arg1 != NULL) { 1120 if (strspn(arg1, "0123456789") == strlen(arg1)) 1121 id = pw_checkid(arg1, UID_MAX); 1122 else 1123 name = arg1; 1124 } 1125 1126 while ((ch = getopt(argc, argv, args)) != -1) { 1127 switch (ch) { 1128 case 'C': 1129 cfg = optarg; 1130 break; 1131 case 'q': 1132 quiet = true; 1133 break; 1134 case 'n': 1135 name = optarg; 1136 break; 1137 case 'u': 1138 userid = optarg; 1139 break; 1140 case 'c': 1141 gecos = pw_checkname(optarg, 1); 1142 break; 1143 case 'd': 1144 homedir = optarg; 1145 break; 1146 case 'e': 1147 now = time(NULL); 1148 cmdcnf->expire_days = parse_date(now, optarg); 1149 break; 1150 case 'p': 1151 now = time(NULL); 1152 cmdcnf->password_days = parse_date(now, optarg); 1153 break; 1154 case 'g': 1155 validate_grname(cmdcnf, optarg); 1156 grname = optarg; 1157 break; 1158 case 'G': 1159 split_groups(&cmdcnf->groups, optarg); 1160 break; 1161 case 'm': 1162 createhome = true; 1163 break; 1164 case 'M': 1165 cmdcnf->homemode = validate_mode(optarg); 1166 break; 1167 case 'k': 1168 walk = skel = optarg; 1169 if (*walk == '/') 1170 walk++; 1171 if (fstatat(conf.rootfd, walk, &st, 0) == -1) 1172 errx(EX_OSFILE, "skeleton `%s' does not " 1173 "exists", skel); 1174 if (!S_ISDIR(st.st_mode)) 1175 errx(EX_OSFILE, "skeleton `%s' is not a " 1176 "directory", skel); 1177 cmdcnf->dotdir = skel; 1178 break; 1179 case 's': 1180 cmdcnf->shell_default = optarg; 1181 break; 1182 case 'o': 1183 conf.checkduplicate = false; 1184 break; 1185 case 'L': 1186 cmdcnf->default_class = pw_checkname(optarg, 0); 1187 break; 1188 case 'i': 1189 groupid = optarg; 1190 break; 1191 case 'w': 1192 default_passwd = optarg; 1193 break; 1194 case 'H': 1195 if (fd != -1) 1196 errx(EX_USAGE, "'-h' and '-H' are mutually " 1197 "exclusive options"); 1198 fd = pw_checkfd(optarg); 1199 precrypted = true; 1200 if (fd == '-') 1201 errx(EX_USAGE, "-H expects a file descriptor"); 1202 break; 1203 case 'h': 1204 if (fd != -1) 1205 errx(EX_USAGE, "'-h' and '-H' are mutually " 1206 "exclusive options"); 1207 fd = pw_checkfd(optarg); 1208 break; 1209 case 'D': 1210 genconf = true; 1211 break; 1212 case 'b': 1213 cmdcnf->home = optarg; 1214 break; 1215 case 'N': 1216 dryrun = true; 1217 break; 1218 case 'P': 1219 pretty = true; 1220 break; 1221 case 'y': 1222 cmdcnf->nispasswd = optarg; 1223 break; 1224 case 'Y': 1225 nis = true; 1226 break; 1227 } 1228 } 1229 1230 if (geteuid() != 0 && ! dryrun) 1231 errx(EX_NOPERM, "you must be root"); 1232 1233 if (quiet) 1234 freopen(_PATH_DEVNULL, "w", stderr); 1235 1236 cnf = get_userconfig(cfg); 1237 1238 mix_config(cmdcnf, cnf); 1239 if (default_passwd) 1240 cmdcnf->default_password = boolean_val(default_passwd, 1241 cnf->default_password); 1242 if (genconf) { 1243 if (name != NULL) 1244 errx(EX_DATAERR, "can't combine `-D' with `-n name'"); 1245 if (userid != NULL) { 1246 if ((p = strtok(userid, ", \t")) != NULL) 1247 cmdcnf->min_uid = pw_checkid(p, UID_MAX); 1248 if (cmdcnf->min_uid == 0) 1249 cmdcnf->min_uid = 1000; 1250 if ((p = strtok(NULL, " ,\t")) != NULL) 1251 cmdcnf->max_uid = pw_checkid(p, UID_MAX); 1252 if (cmdcnf->max_uid == 0) 1253 cmdcnf->max_uid = 32000; 1254 } 1255 if (groupid != NULL) { 1256 if ((p = strtok(groupid, ", \t")) != NULL) 1257 cmdcnf->min_gid = pw_checkid(p, GID_MAX); 1258 if (cmdcnf->min_gid == 0) 1259 cmdcnf->min_gid = 1000; 1260 if ((p = strtok(NULL, " ,\t")) != NULL) 1261 cmdcnf->max_gid = pw_checkid(p, GID_MAX); 1262 if (cmdcnf->max_gid == 0) 1263 cmdcnf->max_gid = 32000; 1264 } 1265 if (write_userconfig(cmdcnf, cfg)) 1266 return (EXIT_SUCCESS); 1267 err(EX_IOERR, "config update"); 1268 } 1269 1270 if (userid) 1271 id = pw_checkid(userid, UID_MAX); 1272 if (id < 0 && name == NULL) 1273 errx(EX_DATAERR, "user name or id required"); 1274 1275 if (name == NULL) 1276 errx(EX_DATAERR, "login name required"); 1277 1278 pwd = &fakeuser; 1279 pwd->pw_name = name; 1280 pwd->pw_class = cmdcnf->default_class ? cmdcnf->default_class : ""; 1281 pwd->pw_uid = pw_uidpolicy(cmdcnf, id); 1282 pwd->pw_gid = pw_gidpolicy(cnf, grname, pwd->pw_name, 1283 (gid_t) pwd->pw_uid, dryrun); 1284 pwd->pw_change = cmdcnf->password_days; 1285 pwd->pw_expire = cmdcnf->expire_days; 1286 pwd->pw_dir = pw_homepolicy(cmdcnf, homedir, pwd->pw_name); 1287 pwd->pw_shell = pw_shellpolicy(cmdcnf); 1288 lc = login_getpwclass(pwd); 1289 if (lc == NULL || login_setcryptfmt(lc, "sha512", NULL) == NULL) 1290 warn("setting crypt(3) format"); 1291 login_close(lc); 1292 pwd->pw_passwd = pw_password(cmdcnf, pwd->pw_name, dryrun); 1293 if (pwd->pw_uid == 0 && strcmp(pwd->pw_name, "root") != 0) 1294 warnx("WARNING: new account `%s' has a uid of 0 " 1295 "(superuser access!)", pwd->pw_name); 1296 if (gecos) 1297 pwd->pw_gecos = gecos; 1298 1299 if (fd != -1) 1300 pw_set_passwd(pwd, fd, precrypted, false); 1301 1302 if (dryrun) 1303 return (print_user(pwd, pretty, false)); 1304 1305 if ((rc = addpwent(pwd)) != 0) { 1306 if (rc == -1) 1307 errx(EX_IOERR, "user '%s' already exists", 1308 pwd->pw_name); 1309 else if (rc != 0) 1310 err(EX_IOERR, "passwd file update"); 1311 } 1312 if (nis && cmdcnf->nispasswd && *cmdcnf->nispasswd == '/') { 1313 printf("%s\n", cmdcnf->nispasswd); 1314 rc = addnispwent(cmdcnf->nispasswd, pwd); 1315 if (rc == -1) 1316 warnx("User '%s' already exists in NIS passwd", pwd->pw_name); 1317 else if (rc != 0) 1318 warn("NIS passwd update"); 1319 /* NOTE: we treat NIS-only update errors as non-fatal */ 1320 } 1321 1322 if (cmdcnf->groups != NULL) { 1323 for (i = 0; i < cmdcnf->groups->sl_cur; i++) { 1324 grp = GETGRNAM(cmdcnf->groups->sl_str[i]); 1325 grp = gr_add(grp, pwd->pw_name); 1326 /* 1327 * grp can only be NULL in 2 cases: 1328 * - the new member is already a member 1329 * - a problem with memory occurs 1330 * in both cases we want to skip now. 1331 */ 1332 if (grp == NULL) 1333 continue; 1334 chggrent(grp->gr_name, grp); 1335 free(grp); 1336 } 1337 } 1338 1339 pwd = GETPWNAM(name); 1340 if (pwd == NULL) 1341 errx(EX_NOUSER, "user '%s' disappeared during update", name); 1342 1343 grp = GETGRGID(pwd->pw_gid); 1344 pw_log(cnf, M_ADD, W_USER, "%s(%ju):%s(%ju):%s:%s:%s", 1345 pwd->pw_name, (uintmax_t)pwd->pw_uid, 1346 grp ? grp->gr_name : "unknown", (uintmax_t)(grp ? grp->gr_gid : (uid_t)-1), 1347 pwd->pw_gecos, pwd->pw_dir, pwd->pw_shell); 1348 1349 /* 1350 * let's touch and chown the user's mail file. This is not 1351 * strictly necessary under BSD with a 0755 maildir but it also 1352 * doesn't hurt anything to create the empty mailfile 1353 */ 1354 if (PWALTDIR() != PWF_ALT) { 1355 snprintf(path, sizeof(path), "%s/%s", _PATH_MAILDIR, 1356 pwd->pw_name); 1357 /* Preserve contents & mtime */ 1358 close(openat(conf.rootfd, path +1, O_RDWR | O_CREAT, 0600)); 1359 fchownat(conf.rootfd, path + 1, pwd->pw_uid, pwd->pw_gid, 1360 AT_SYMLINK_NOFOLLOW); 1361 } 1362 1363 /* 1364 * Let's create and populate the user's home directory. Note 1365 * that this also `works' for editing users if -m is used, but 1366 * existing files will *not* be overwritten. 1367 */ 1368 if (PWALTDIR() != PWF_ALT && createhome && pwd->pw_dir && 1369 *pwd->pw_dir == '/' && pwd->pw_dir[1]) 1370 create_and_populate_homedir(cmdcnf, pwd, cmdcnf->dotdir, 1371 cmdcnf->homemode, false); 1372 1373 if (!PWALTDIR() && cmdcnf->newmail && *cmdcnf->newmail && 1374 (fp = fopen(cnf->newmail, "r")) != NULL) { 1375 if ((pfp = popen(_PATH_SENDMAIL " -t", "w")) == NULL) 1376 warn("sendmail"); 1377 else { 1378 fprintf(pfp, "From: root\n" "To: %s\n" 1379 "Subject: Welcome!\n\n", pwd->pw_name); 1380 while (fgets(line, sizeof(line), fp) != NULL) { 1381 /* Do substitutions? */ 1382 fputs(line, pfp); 1383 } 1384 pclose(pfp); 1385 pw_log(cnf, M_ADD, W_USER, "%s(%ju) new user mail sent", 1386 pwd->pw_name, (uintmax_t)pwd->pw_uid); 1387 } 1388 fclose(fp); 1389 } 1390 1391 if (nis && nis_update() == 0) 1392 pw_log(cnf, M_ADD, W_USER, "NIS maps updated"); 1393 1394 return (EXIT_SUCCESS); 1395} 1396 1397int 1398pw_user_mod(int argc, char **argv, char *arg1) 1399{ 1400 struct userconf *cnf; 1401 struct passwd *pwd; 1402 struct group *grp; 1403 StringList *groups = NULL; 1404 char args[] = "C:qn:u:c:d:e:p:g:G:mM:l:k:s:w:L:h:H:NPYy:"; 1405 const char *cfg; 1406 char *gecos, *homedir, *grname, *name, *newname, *walk, *skel, *shell; 1407 char *passwd, *class, *nispasswd; 1408 login_cap_t *lc; 1409 struct stat st; 1410 intmax_t id = -1; 1411 int ch, fd = -1; 1412 size_t i, j; 1413 bool quiet, createhome, pretty, dryrun, nis, edited, docreatehome; 1414 mode_t homemode = 0; 1415 time_t expire_days, password_days, now, precrypted; 1416 1417 expire_days = password_days = -1; 1418 gecos = homedir = grname = name = newname = skel = shell =NULL; 1419 passwd = NULL; 1420 class = nispasswd = NULL; 1421 quiet = createhome = pretty = dryrun = nis = precrypted = false; 1422 edited = docreatehome = false; 1423 1424 if (arg1 != NULL) { 1425 if (strspn(arg1, "0123456789") == strlen(arg1)) 1426 id = pw_checkid(arg1, UID_MAX); 1427 else 1428 name = arg1; 1429 } 1430 1431 while ((ch = getopt(argc, argv, args)) != -1) { 1432 switch (ch) { 1433 case 'C': 1434 cfg = optarg; 1435 break; 1436 case 'q': 1437 quiet = true; 1438 break; 1439 case 'n': 1440 name = optarg; 1441 break; 1442 case 'u': 1443 id = pw_checkid(optarg, UID_MAX); 1444 break; 1445 case 'c': 1446 gecos = pw_checkname(optarg, 1); 1447 break; 1448 case 'd': 1449 homedir = optarg; 1450 break; 1451 case 'e': 1452 now = time(NULL); 1453 expire_days = parse_date(now, optarg); 1454 break; 1455 case 'p': 1456 now = time(NULL); 1457 password_days = parse_date(now, optarg); 1458 break; 1459 case 'g': 1460 group_from_name_or_id(optarg); 1461 grname = optarg; 1462 break; 1463 case 'G': 1464 split_groups(&groups, optarg); 1465 break; 1466 case 'm': 1467 createhome = true; 1468 break; 1469 case 'M': 1470 homemode = validate_mode(optarg); 1471 break; 1472 case 'l': 1473 newname = optarg; 1474 break; 1475 case 'k': 1476 walk = skel = optarg; 1477 if (*walk == '/') 1478 walk++; 1479 if (fstatat(conf.rootfd, walk, &st, 0) == -1) 1480 errx(EX_OSFILE, "skeleton `%s' does not " 1481 "exists", skel); 1482 if (!S_ISDIR(st.st_mode)) 1483 errx(EX_OSFILE, "skeleton `%s' is not a " 1484 "directory", skel); 1485 break; 1486 case 's': 1487 shell = optarg; 1488 break; 1489 case 'w': 1490 passwd = optarg; 1491 break; 1492 case 'L': 1493 class = pw_checkname(optarg, 0); 1494 break; 1495 case 'H': 1496 if (fd != -1) 1497 errx(EX_USAGE, "'-h' and '-H' are mutually " 1498 "exclusive options"); 1499 fd = pw_checkfd(optarg); 1500 precrypted = true; 1501 if (fd == '-') 1502 errx(EX_USAGE, "-H expects a file descriptor"); 1503 break; 1504 case 'h': 1505 if (fd != -1) 1506 errx(EX_USAGE, "'-h' and '-H' are mutually " 1507 "exclusive options"); 1508 fd = pw_checkfd(optarg); 1509 break; 1510 case 'N': 1511 dryrun = true; 1512 break; 1513 case 'P': 1514 pretty = true; 1515 break; 1516 case 'y': 1517 nispasswd = optarg; 1518 break; 1519 case 'Y': 1520 nis = true; 1521 break; 1522 } 1523 } 1524 1525 if (geteuid() != 0 && ! dryrun) 1526 errx(EX_NOPERM, "you must be root"); 1527 1528 if (quiet) 1529 freopen(_PATH_DEVNULL, "w", stderr); 1530 1531 cnf = get_userconfig(cfg); 1532 1533 if (id < 0 && name == NULL) 1534 errx(EX_DATAERR, "username or id required"); 1535 1536 pwd = (name != NULL) ? GETPWNAM(pw_checkname(name, 0)) : GETPWUID(id); 1537 if (pwd == NULL) { 1538 if (name == NULL) 1539 errx(EX_NOUSER, "no such uid `%ju'", 1540 (uintmax_t) id); 1541 errx(EX_NOUSER, "no such user `%s'", name); 1542 } 1543 1544 if (name == NULL) 1545 name = pwd->pw_name; 1546 1547 if (nis && nispasswd == NULL) 1548 nispasswd = cnf->nispasswd; 1549 1550 if (PWF._altdir == PWF_REGULAR && 1551 ((pwd->pw_fields & _PWF_SOURCE) != _PWF_FILES)) { 1552 if ((pwd->pw_fields & _PWF_SOURCE) == _PWF_NIS) { 1553 if (!nis && nispasswd && *nispasswd != '/') 1554 errx(EX_NOUSER, "Cannot modify NIS user `%s'", 1555 name); 1556 } else { 1557 errx(EX_NOUSER, "Cannot modify non local user `%s'", 1558 name); 1559 } 1560 } 1561 1562 if (newname) { 1563 if (strcmp(pwd->pw_name, "root") == 0) 1564 errx(EX_DATAERR, "can't rename `root' account"); 1565 if (strcmp(pwd->pw_name, newname) != 0) { 1566 pwd->pw_name = pw_checkname(newname, 0); 1567 edited = true; 1568 } 1569 } 1570 1571 if (id > 0 && pwd->pw_uid != id) { 1572 pwd->pw_uid = id; 1573 edited = true; 1574 if (pwd->pw_uid != 0 && strcmp(pwd->pw_name, "root") == 0) 1575 errx(EX_DATAERR, "can't change uid of `root' account"); 1576 if (pwd->pw_uid == 0 && strcmp(pwd->pw_name, "root") != 0) 1577 warnx("WARNING: account `%s' will have a uid of 0 (superuser access!)", pwd->pw_name); 1578 } 1579 1580 if (grname && pwd->pw_uid != 0) { 1581 grp = GETGRNAM(grname); 1582 if (grp == NULL) 1583 grp = GETGRGID(pw_checkid(grname, GID_MAX)); 1584 if (grp->gr_gid != pwd->pw_gid) { 1585 pwd->pw_gid = grp->gr_gid; 1586 edited = true; 1587 } 1588 } 1589 1590 if (password_days >= 0 && pwd->pw_change != password_days) { 1591 pwd->pw_change = password_days; 1592 edited = true; 1593 } 1594 1595 if (expire_days >= 0 && pwd->pw_expire != expire_days) { 1596 pwd->pw_expire = expire_days; 1597 edited = true; 1598 } 1599 1600 if (shell) { 1601 shell = shell_path(cnf->shelldir, cnf->shells, shell); 1602 if (shell == NULL) 1603 shell = ""; 1604 if (strcmp(shell, pwd->pw_shell) != 0) { 1605 pwd->pw_shell = shell; 1606 edited = true; 1607 } 1608 } 1609 1610 if (class && strcmp(pwd->pw_class, class) != 0) { 1611 pwd->pw_class = class; 1612 edited = true; 1613 } 1614 1615 if (homedir && strcmp(pwd->pw_dir, homedir) != 0) { 1616 pwd->pw_dir = homedir; 1617 if (fstatat(conf.rootfd, pwd->pw_dir, &st, 0) == -1) { 1618 if (!createhome) 1619 warnx("WARNING: home `%s' does not exist", 1620 pwd->pw_dir); 1621 else 1622 docreatehome = true; 1623 } else if (!S_ISDIR(st.st_mode)) { 1624 warnx("WARNING: home `%s' is not a directory", 1625 pwd->pw_dir); 1626 } 1627 } 1628 1629 if (passwd && conf.fd == -1) { 1630 lc = login_getpwclass(pwd); 1631 if (lc == NULL || login_setcryptfmt(lc, "sha512", NULL) == NULL) 1632 warn("setting crypt(3) format"); 1633 login_close(lc); 1634 pwd->pw_passwd = pw_password(cnf, pwd->pw_name, dryrun); 1635 edited = true; 1636 } 1637 1638 if (gecos && strcmp(pwd->pw_gecos, gecos) != 0) { 1639 pwd->pw_gecos = gecos; 1640 edited = true; 1641 } 1642 1643 if (fd != -1) 1644 edited = pw_set_passwd(pwd, fd, precrypted, true); 1645 1646 if (dryrun) 1647 return (print_user(pwd, pretty, false)); 1648 1649 if (edited) /* Only updated this if required */ 1650 perform_chgpwent(name, pwd, nis ? nispasswd : NULL); 1651 /* Now perform the needed changes concern groups */ 1652 if (groups != NULL) { 1653 /* Delete User from groups using old name */ 1654 SETGRENT(); 1655 while ((grp = GETGRENT()) != NULL) { 1656 if (grp->gr_mem == NULL) 1657 continue; 1658 for (i = 0; grp->gr_mem[i] != NULL; i++) { 1659 if (strcmp(grp->gr_mem[i] , name) != 0) 1660 continue; 1661 for (j = i; grp->gr_mem[j] != NULL ; j++) 1662 grp->gr_mem[j] = grp->gr_mem[j+1]; 1663 chggrent(grp->gr_name, grp); 1664 break; 1665 } 1666 } 1667 ENDGRENT(); 1668 /* Add the user to the needed groups */ 1669 for (i = 0; i < groups->sl_cur; i++) { 1670 grp = GETGRNAM(groups->sl_str[i]); 1671 grp = gr_add(grp, pwd->pw_name); 1672 if (grp == NULL) 1673 continue; 1674 chggrent(grp->gr_name, grp); 1675 free(grp); 1676 } 1677 } 1678 /* In case of rename we need to walk over the different groups */ 1679 if (newname) { 1680 SETGRENT(); 1681 while ((grp = GETGRENT()) != NULL) { 1682 if (grp->gr_mem == NULL) 1683 continue; 1684 for (i = 0; grp->gr_mem[i] != NULL; i++) { 1685 if (strcmp(grp->gr_mem[i], name) != 0) 1686 continue; 1687 grp->gr_mem[i] = newname; 1688 chggrent(grp->gr_name, grp); 1689 break; 1690 } 1691 } 1692 } 1693 1694 /* go get a current version of pwd */ 1695 if (newname) 1696 name = newname; 1697 pwd = GETPWNAM(name); 1698 if (pwd == NULL) 1699 errx(EX_NOUSER, "user '%s' disappeared during update", name); 1700 grp = GETGRGID(pwd->pw_gid); 1701 pw_log(cnf, M_UPDATE, W_USER, "%s(%ju):%s(%ju):%s:%s:%s", 1702 pwd->pw_name, (uintmax_t)pwd->pw_uid, 1703 grp ? grp->gr_name : "unknown", 1704 (uintmax_t)(grp ? grp->gr_gid : (uid_t)-1), 1705 pwd->pw_gecos, pwd->pw_dir, pwd->pw_shell); 1706 1707 /* 1708 * Let's create and populate the user's home directory. Note 1709 * that this also `works' for editing users if -m is used, but 1710 * existing files will *not* be overwritten. 1711 */ 1712 if (PWALTDIR() != PWF_ALT && docreatehome && pwd->pw_dir && 1713 *pwd->pw_dir == '/' && pwd->pw_dir[1]) { 1714 if (!skel) 1715 skel = cnf->dotdir; 1716 if (homemode == 0) 1717 homemode = cnf->homemode; 1718 create_and_populate_homedir(cnf, pwd, skel, homemode, true); 1719 } 1720 1721 if (nis && nis_update() == 0) 1722 pw_log(cnf, M_UPDATE, W_USER, "NIS maps updated"); 1723 1724 return (EXIT_SUCCESS); 1725} 1726