adduser.sh revision 109720
1#!/bin/sh
2#
3# Copyright (c) 2002 Michael Telahun Makonnen. All rights reserved.
4#
5# Redistribution and use in source and binary forms, with or without
6# modification, are permitted provided that the following conditions
7# are met:
8# 1. Redistributions of source code must retain the above copyright
9#    notice, this list of conditions and the following disclaimer.
10# 2. Redistributions in binary form must reproduce the above copyright
11#    notice, this list of conditions and the following disclaimer in the
12#    documentation and/or other materials provided with the distribution.
13# 3. The name of the author may not be used to endorse or promote products
14#    derived from this software without specific prior written permission.
15#
16# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17# IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18# OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19# IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21# NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25# THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26#
27#       Email: Mike Makonnen <mtm@identd.net>
28#
29# $FreeBSD: head/usr.sbin/adduser/adduser.sh 109720 2003-01-23 01:57:30Z mtm $
30#
31
32# err msg
33#       Display $msg on stderr, unless we're being quiet.
34# 
35err() {
36	if [ -z "$quietflag" ]; then
37        	echo 1>&2 ${THISCMD}: ERROR: $*
38	fi
39}
40
41# info msg
42#       Display $msg on stdout, unless we're being quiet.
43# 
44info() {
45	if [ -z "$quietflag" ]; then
46        	echo ${THISCMD}: INFO: $*
47	fi
48}
49
50# get_nextuid
51#	Output the value of $_uid if it is available for use. If it
52#	is not, output the value of the next higher uid that is available.
53#	If a uid is not specified, output the first available uid, as indicated
54#	by pw(8).
55# 
56get_nextuid () {
57	_uid=$1
58	_nextuid=
59
60	if [ -z "$_uid" ]; then
61		_nextuid="`${PWCMD} usernext | cut -f1 -d:`"
62	else
63		while : ; do
64			${PWCMD} usershow $_uid > /dev/null 2>&1
65			if [ ! "$?" -eq 0 ]; then
66				_nextuid=$_uid
67				break
68			fi
69			_uid=$(($_uid + 1))
70		done
71	fi
72	echo $_nextuid
73}
74
75# show_usage
76#	Display usage information for this utility.
77#
78show_usage() {
79	echo "usage: ${THISCMD} [options]"
80	echo "  options may include:"
81	echo "  -C		save to the configuration file only"
82	echo "  -E		disable this account after creation"
83	echo "  -G		additional groups to add accounts to"
84	echo "  -L		login class of the user"
85	echo "  -N		do not read configuration file"
86	echo "  -d		home directory"
87	echo "  -f		file from which input will be received"
88	echo "  -h		display this usage message"
89	echo "  -k		path to skeleton home directory"
90	echo "  -m		user welcome message file"
91	echo "  -q		absolute minimal user feedback"
92	echo "  -s		shell"
93	echo "  -u		uid to start at"
94	echo "  -w		password type: no, none, yes or random"
95}
96
97# valid_shells
98#	Outputs a list of valid shells from /etc/shells. Only the
99#	basename of the shell is output.
100#
101valid_shells() {
102	_prefix=
103	cat ${ETCSHELLS} |
104	while read _path _junk ; do
105		case $_path in
106		\#*|'')
107			;;
108		*)
109			echo -n "${_prefix}`basename $_path`"
110			_prefix=' '
111			;;
112		esac
113	done
114}
115
116# fullpath_from_shell shell
117#	Given $shell, the basename component of a valid shell, get the
118#	full path to the shell from the /etc/shells file.
119#
120fullpath_from_shell() {
121	_shell=$1
122	[ -z "$_shell" ] && return 1
123
124	cat ${ETCSHELLS} |
125	while read _path _junk ; do
126		case "$_path" in
127		\#*|'')
128			;;
129		*)
130			if [ "`basename $_path`" = "$_shell" ]; then
131				echo $_path
132				return 0
133			fi
134			;;
135		esac
136	done
137	return 1
138}
139
140# save_config
141#	Save some variables to a configuration file.
142#	Note: not all script variables are saved, only those that
143#	      it makes sense to save.
144#
145save_config() {
146	echo "# Configuration file for adduser(8)."     >  ${ADDUSERCONF}
147	echo "# NOTE: only *some* variables are saved." >> ${ADDUSERCONF}
148	echo "# Last Modified on `date`."		      >> ${ADDUSERCONF}
149	echo ''				>> ${ADDUSERCONF}
150	echo "defaultclass=$uclass"	>> ${ADDUSERCONF}
151	echo "defaultgroups=$ugroups"	>> ${ADDUSERCONF}
152	echo "passwdtype=$passwdtype" 	>> ${ADDUSERCONF}
153	echo "homeprefix=$homeprefix" 	>> ${ADDUSERCONF}
154	echo "defaultshell=$ushell"	>> ${ADDUSERCONF}
155	echo "udotdir=$udotdir"		>> ${ADDUSERCONF}
156	echo "msgfile=$msgfile"		>> ${ADDUSERCONF}
157	echo "disableflag=$disableflag" >> ${ADDUSERCONF}
158}
159
160# add_user
161#	Add a user to the user database. If the user chose to send a welcome
162#	message or lock the account, do so.
163#
164add_user() {
165
166	# Is this a configuration run? If so, don't modify user database.
167	#
168	if [ -n "$configflag" ]; then
169		save_config
170		return
171	fi
172
173	_uid=
174	_name=
175	_comment=
176	_gecos=
177	_home=
178	_group=
179	_grouplist=
180	_shell=
181	_class=
182	_dotdir=
183	_expire=
184	_pwexpire=
185	_passwd=
186	_upasswd=
187	_passwdmethod=
188
189	_name="-n '$username'"
190	[ -n "$uuid" ] && _uid="-u '$uuid'"
191	[ -n "$ulogingroup" ] && _group="-g '$ulogingroup'"
192	[ -n "$ugroups" ] && _grouplist="-G '$ugroups'"
193	[ -n "$ushell" ] && _shell="-s '$ushell'"
194	[ -n "$uhome" ] && _home="-m -d '$uhome'"
195	[ -n "$uclass" ] && _class="-L '$uclass'"
196	[ -n "$ugecos" ] && _comment="-c '$ugecos'"
197	[ -n "$udotdir" ] && _dotdir="-k '$udotdir'"
198	[ -n "$uexpire" ] && _expire="-e '$uexpire'"
199	[ -n "$upwexpire" ] && _pwexpire="-p '$upwexpire'"
200	case $passwdtype in
201	no)
202		_passwdmethod="-w no"
203		_passwd="-h -"
204		;;
205	yes)
206		_passwdmethod="-w yes"
207		_passwd="-h 0"
208		_upasswd="echo '$upass' |"
209		;;
210	none)
211		_passwdmethod="-w none"
212		;;
213	random)
214		_passwdmethod="-w random"
215		;;
216	esac
217
218	_pwcmd="$_upasswd ${PWCMD} useradd $_uid $_name $_group $_grouplist $_comment"
219	_pwcmd="$_pwcmd $_shell $_class $_home $_dotdir $_passwdmethod $_passwd"
220	_pwcmd="$_pwcmd $_expire $_pwexpire"
221
222	if ! _output=`eval $_pwcmd` ; then
223		err "There was an error adding user ($username)."
224		return 1
225	else
226		info "Successfully added ($username) to the user database."
227		if [ "random" = "$passwdtype" ]; then
228			randompass="$_output"
229			info "Password for ($username) is: $randompass"
230		fi
231	fi
232
233	if [ -n "$disableflag" ]; then
234		if ${PWCMD} lock $username ; then
235			info "Account ($username) is locked."
236		else
237			info "Account ($username) could NOT be locked."
238		fi
239	fi
240
241	_line=
242	_owner=
243	_perms=
244	if [ -n "$msgflag" ]; then
245		[ -r "$msgfile" ] && {
246			# We're evaluating the contents of an external file.
247			# Let's not open ourselves up for attack. _perms will
248			# be empty if it's writeable only by the owner. _owner
249			# will *NOT* be empty if the file is owned by root.
250			#
251			_dir="`dirname $msgfile`"
252			_file="`basename $msgfile`"
253			_perms=`/usr/bin/find $_dir -name $_file -perm +07022 -prune`
254			_owner=`/usr/bin/find $_dir -name $_file -user 0 -prune`
255			if [ -z "$_owner" -o -n "$_perms" ]; then
256				err "The message file ($msgfile) may be writeable only by root."
257				return 1
258			fi
259			cat "$msgfile" |
260			while read _line ; do
261				eval echo "$_line"
262			done | ${MAILCMD} -s"Welcome" ${username}
263			info "Sent welcome message to ($username)."
264		}
265	fi
266}
267
268# get_user
269#	Reads username of the account from standard input or from a global
270#	variable containing an account line from a file. The username is
271#	required. If this is an interactive session it will prompt in
272#	a loop until a username is entered. If it is batch processing from
273#	a file it will output an error message and return to the caller.
274#
275get_user() {
276	_input=
277
278	# No need to take down user names if this is a configuration saving run.
279	[ -n "$configflag" ] && return
280
281	while : ; do
282		if [ -z "$fflag" ]; then
283			echo -n "Username: "
284			read _input
285		else
286			_input="`echo "$fileline" | cut -f1 -d:`"
287		fi
288
289		# There *must* be a username. If this is an interactive
290		# session give the user an opportunity to retry.
291		#
292		if [ -z "$_input" ]; then
293			err "You must enter a username!"
294			[ -z "$fflag" ] && continue
295		fi
296		break
297	done
298	username="$_input"
299}
300
301# get_gecos
302#	Reads extra information about the user. Can be used both in interactive
303#	and batch (from file) mode.
304#
305get_gecos() {
306	_input=
307
308	# No need to take down additional user information for a configuration run.
309	[ -n "$configflag" ] && return
310
311	if [ -z "$fflag" ]; then
312		echo -n "Full name: "
313		read _input
314	else
315		_input="`echo "$fileline" | cut -f7 -d:`"
316	fi
317	ugecos="$_input"
318}
319
320# get_shell
321#	Get the account's shell. Works in interactive and batch mode. It
322#	accepts only the base name of the shell, NOT the full path.
323#	If an invalid shell is entered it will simply use the default shell.
324#
325get_shell() {
326	_input=
327	_fullpath=
328	ushell="$defaultshell"
329
330	# Make sure the current value of the shell is a valid one
331	_shellchk="grep '^$ushell$' ${ETCSHELLS} > /dev/null 2>&1"
332	eval $_shellchk || {
333		err "Invalid shell ($ushell). Using default shell ${defaultshell}."
334		ushell="$defaultshell"
335	}
336
337	if [ -z "$fflag" ]; then
338		echo -n "Shell ($shells) [`basename $ushell`]: "
339		read _input
340	else
341		_input="`echo "$fileline" | cut -f9 -d:`"
342	fi
343	if [ -n "$_input" ]; then
344		_fullpath=`fullpath_from_shell $_input`
345		if [ -n "$_fullpath" ]; then
346			ushell="$_fullpath"
347		else
348			err "Invalid shell selection. Using default shell ${defaultshell}."
349			ushell="$defaultshell"
350		fi
351	fi
352}
353
354# get_homedir
355#	Reads the account's home directory. Used both with interactive input
356#	and batch input.
357#
358get_homedir() {
359	_input=
360	if [ -z "$fflag" ]; then
361		echo -n "Home directory [${homeprefix}/${username}]: "
362		read _input
363	else
364		_input="`echo "$fileline" | cut -f8 -d:`"
365	fi
366
367	if [ -n "$_input" ]; then
368		uhome="$_input"
369		# if this is a configuration run, then user input is the home
370		# directory prefix. Otherwise it is understood to
371		# be $prefix/$user
372		#
373		[ -z "$configflag" ] && homeprefix="`dirname $uhome`" || homeprefix="$uhome"
374	else
375		uhome="${homeprefix}/${username}"
376	fi
377}
378
379# get_uid
380#	Reads a numeric userid in an interactive or batch session. Automatically
381#	allocates one if it is not specified.
382#
383get_uid() {
384	uuid=${uidstart}
385	_input=
386	_prompt=
387
388	# No need to take down uids for a configuration saving run.
389	[ -n "$configflag" ] && return
390
391	if [ -n "$uuid" ]; then
392		_prompt="Uid [$uuid]: "
393	else
394		_prompt="Uid (Leave empty for default): "
395	fi
396	if [ -z "$fflag" ]; then
397		echo -n "$_prompt"
398		read _input
399	else
400		_input="`echo "$fileline" | cut -f2 -d:`"
401	fi
402
403	[ -n "$_input" ] && uuid=$_input
404	uuid=`get_nextuid $uuid`
405	uidstart=$uuid
406}
407
408# get_class
409#	Reads login class of account. Can be used in interactive or batch mode.
410#
411get_class() {
412	uclass="$defaultclass"
413	_input=
414	_class=${uclass:-"default"}
415
416	if [ -z "$fflag" ]; then
417		echo -n "Login class [$_class]: "
418		read _input
419	else
420		_input="`echo "$fileline" | cut -f4 -d:`"
421	fi
422
423	[ -n "$_input" ] && uclass="$_input"
424}
425
426# get_logingroup
427#	Reads user's login group. Can be used in both interactive and batch
428#	modes. The specified value can be a group name or its numeric id.
429#	This routine leaves the field blank if nothing is provided. The pw(8)
430#	command will then provide a login group with the same name as the username.
431#
432get_logingroup() {
433	ulogingroup=
434	_input=
435
436	# No need to take down a login group for a configuration saving run.
437	[ -n "$configflag" ] && return
438
439	if [ -z "$fflag" ]; then
440		echo -n "Login group [$username]: "
441		read _input
442	else
443		_input="`echo "$fileline" | cut -f3 -d:`"
444	fi
445
446	# Pw(8) will use the username as login group if it's left empty
447	[ -n "$_input" ] && ulogingroup="$_input" || ulogingroup=
448}
449
450# get_groups
451#	Read additional groups for the user. It can be used in both interactive
452#	and batch modes.
453#
454get_groups() {
455	ugroups="$defaultgroups"
456	_input=
457	_group=${ulogingroup:-"${username}"}
458
459	if [ -z "$configflag" ]; then
460		[ -z "$fflag" ] && echo -n "Login group is $_group. Invite $username"
461		[ -z "$fflag" ] && echo -n " into other groups? [$ugroups]: "
462	else
463		[ -z "$fflag" ] && echo -n "Enter additional groups [$ugroups]: "
464	fi
465	read _input
466
467	[ -n "$_input" ] && ugroups="$_input"
468}
469
470# get_expire_dates
471#	Read expiry information for the account and also for the password. This
472#	routine is used only from batch processing mode.
473#
474get_expire_dates() {
475	upwexpire="`echo "$fileline" | cut -f5 -d:`"
476	uexpire="`echo "$fileline" | cut -f6 -d:`"
477}
478
479# get_password
480#	Read the password in batch processing mode. The password field matters
481#	only when the password type is "yes" or "random". If the field is empty and the
482#	password type is "yes", then it assumes the account has an empty passsword
483#	and changes the password type accordingly. If the password type is "random"
484#	and the password field is NOT empty, then it assumes the account will NOT
485#	have a random password and set passwdtype to "yes."
486#
487get_password() {
488	# We may temporarily change a password type. Make sure it's changed
489	# back to whatever it was before we process the next account.
490	#
491	[ -n "$savedpwtype" ] && {
492		passwdtype=$savedpwtype
493		savedpwtype=
494	}
495
496	# There may be a ':' in the password
497	upass=${fileline#*:*:*:*:*:*:*:*:*:}
498
499	if [ -z "$upass" ]; then
500		case $passwdtype in
501		yes)
502			# if it's empty, assume an empty password
503			passwdtype=none
504			savedpwtype=yes
505			;;
506		esac
507	else
508		case $passwdtype in
509		random)
510			passwdtype=yes
511			savedpwtype=random
512			;;
513		esac
514	fi
515}
516
517# input_from_file
518#	Reads a line of account information from standard input and
519#	adds it to the user database.
520#
521input_from_file() {
522	_field=
523
524	while read fileline ; do
525		case "$fileline" in
526		\#*|'')
527			return 0
528			;;
529		esac
530
531		get_user || continue
532		get_gecos
533		get_uid
534		get_logingroup
535		get_class
536		get_shell
537		get_homedir
538		get_password
539		get_expire_dates
540
541		add_user
542	done
543}
544
545# input_interactive
546#	Prompts for user information interactively, and commits to
547#	the user database.
548#
549input_interactive() {
550
551	_disable=
552	_pass=
553	_passconfirm=
554	_random="no"
555	_emptypass="no"
556	_usepass="yes"
557	case $passwdtype in
558	none)
559		_emptypass="yes"
560		_usepass="yes"
561		;;
562	no)
563		_usepass="no"
564		;;
565	random)
566		_random="yes"
567		;;
568	esac
569
570	get_user
571	get_gecos
572	get_uid
573	get_logingroup
574	get_groups
575	get_class
576	get_shell
577	get_homedir
578
579	while : ; do
580		echo -n "Use password-based authentication? [$_usepass]: "
581		read _input
582		[ -z "$_input" ] && _input=$_usepass
583		case $_input in
584		[Nn][Oo]|[Nn])
585			passwdtype="no"
586			;;
587		[Yy][Ee][Ss]|[Yy][Ee]|[Yy])
588			while : ; do
589				echo -n "Use an empty password? (yes/no) [$_emptypass]: "
590				read _input
591				[ -n "$_input" ] && _emptypass=$_input
592				case $_emptypass in
593				[Nn][Oo]|[Nn])
594					echo -n "Use a random password? (yes/no) [$_random]: "
595					read _input
596					[ -n "$_input" ] && _random="$_input"
597					case $_random in
598					[Yy][Ee][Ss]|[Yy][Ee]|[Yy])
599						passwdtype="random"
600						break
601						;;
602					esac
603					passwdtype="yes"
604					trap 'stty echo; exit' 0 1 2 3 15
605					stty -echo
606					echo -n "Enter password: "
607					read upass
608					echo''
609					echo -n "Enter password again: "
610					read _passconfirm
611					echo ''
612					stty echo
613					# if user entered a blank password
614					# explicitly ask again.
615					[ -z "$upass" -a -z "$_passconfirm" ] \
616					    && continue
617					;;
618				[Yy][Ee][Ss]|[Yy][Ee]|[Yy])
619					passwdtype="none"
620					break;
621					;;
622				*)
623					# invalid answer; repeat the loop
624					continue
625					;;
626				esac
627				if [ "$upass" != "$_passconfirm" ]; then
628					echo "Passwords did not match!"
629					continue
630				fi
631				break
632			done
633			;;
634		*)
635			# invalid answer; repeat loop
636			continue
637			;;
638		esac
639		break;
640	done
641	_disable=${disableflag:-"no"}
642	while : ; do
643		echo -n "Lock out the account after creation? [$_disable]: "
644		read _input
645		[ -z "$_input" ] && _input=$_disable
646		case $_input in
647		[Nn][Oo]|[Nn])
648			disableflag=
649			;;
650		[Yy][Ee][Ss]|[Yy][Ee]|[Yy])
651			disableflag=yes
652			;;
653		*)
654			# invalid answer; repeat loop
655			continue
656			;;
657		esac
658		break
659	done
660	
661	# Display the information we have so far and prompt to
662	# commit it.
663	#
664	_disable=${disableflag:-"no"}
665	[ -z "$configflag" ] && printf "%-10s : %s\n" Username $username
666	case $passwdtype in
667	yes)
668		_pass='*****'
669		;;
670	no)
671		_pass='<disabled>'
672		;;
673	none)
674		_pass='<blank>'
675		;;
676	random)
677		_pass='<random>'
678		;;
679	esac
680	printf "%-10s : %s\n" "Password" "$_pass"
681	[ -z "$configflag" ] && printf "%-10s : %s\n" "Full Name" "$ugecos"
682	[ -z "$configflag" ] && printf "%-10s : %s\n" "Uid" "$uuid"
683	printf "%-10s : %s\n" "Class" "$uclass"
684	[ -z "$configflag" ] && printf "%-10s : %s %s\n" "Groups" "${ulogingroup:-$username}" "$ugroups"
685	printf "%-10s : %s\n" "Home" "$uhome"
686	printf "%-10s : %s\n" "Shell" "$ushell"
687	printf "%-10s : %s\n" "Locked" "$_disable"
688	while : ; do
689		echo -n "OK? (yes/no): "
690		read _input
691		case $_input in
692		[Nn][Oo]|[Nn])
693			return 1
694			;;
695		[Yy][Ee][Ss]|[Yy][Ee]|[Yy])
696			add_user
697			;;
698		*)
699			continue
700			;;
701		esac
702		break
703	done
704	return 0
705}
706
707#### END SUBROUTINE DEFENITION ####
708
709THISCMD=`/usr/bin/basename $0`
710DEFAULTSHELL=/bin/sh
711ADDUSERCONF="${ADDUSERCONF:-/etc/adduser.conf}"
712PWCMD="${PWCMD:-/usr/sbin/pw}"
713MAILCMD="${MAILCMD:-mail}"
714ETCSHELLS="${ETCSHELLS:-/etc/shells}"
715
716# Set default values
717#
718username=
719uuid=
720uidstart=
721ugecos=
722ulogingroup=
723uclass=
724uhome=
725upass=
726ushell=
727udotdir=/usr/share/skel
728ugroups=
729uexpire=
730upwexpire=
731shells="`valid_shells`"
732passwdtype="yes"
733msgfile=/etc/adduser.msg
734msgflag=
735quietflag=
736configflag=
737fflag=
738infile=
739disableflag=
740readconfig="yes"
741homeprefix="/home"
742randompass=
743fileline=
744savedpwtype=
745defaultclass=
746defaultgoups=
747defaultshell="${DEFAULTSHELL}"
748
749# Make sure the user running this program is root. This isn't a security
750# measure as much as it is a usefull method of reminding the user to
751# 'su -' before he/she wastes time entering data that won't be saved.
752#
753procowner=${procowner:-`/usr/bin/id -u`}
754if [ "$procowner" != "0" ]; then
755	err 'you must be the super-user (uid 0) to use this utility.'
756	exit 1
757fi
758
759# Overide from our conf file
760# Quickly go through the commandline line to see if we should read
761# from our configuration file. The actual parsing of the commandline
762# arguments happens after we read in our configuration file (commandline
763# should override configuration file).
764#
765for _i in $* ; do
766	if [ "$_i" = "-N" ]; then
767		readconfig=
768		break;
769	fi
770done
771if [ -n "$readconfig" ]; then
772	# On a long-lived system, the first time this script is run it
773	# will barf upon reading the configuration file for its perl predecessor.
774	if ( . ${ADDUSERCONF} > /dev/null 2>&1 ); then
775		[ -r ${ADDUSERCONF} ] && . ${ADDUSERCONF} > /dev/null 2>&1
776	fi
777fi 
778
779# Proccess command-line options
780#
781for _switch ; do
782	case $_switch in
783	-L)
784		defaultclass="$2"
785		shift; shift
786		;;
787	-C)
788		configflag=yes
789		shift
790		;;
791	-E)
792		disableflag=yes
793		shift
794		;;
795	-k)
796		udotdir="$2"
797		shift; shift
798		;;
799	-f)
800		[ "$2" != "-" ] && infile="$2"
801		fflag=yes
802		shift; shift
803		;;
804	-G)
805		defaultgroups="$2"
806		shift; shift
807		;;
808	-h)
809		show_usage
810		exit 0
811		;;
812	-d)
813		homeprefix="$2"
814		shift; shift
815		;;
816	-m)
817		case "$2" in
818		[Nn][Oo])
819			msgflag=
820			;;
821		*)
822			msgflag=yes
823			msgfile="$2"
824			;;
825		esac
826		shift; shift
827		;;
828	-N)
829		readconfig=
830		shift
831		;;
832	-w)
833		case "$2" in
834		no|none|random|yes)
835			passwdtype=$2
836			;;
837		*)
838			show_usage
839			exit 1
840			;;
841		esac
842		shift; shift
843		;;
844	-q)
845		quietflag=yes
846		shift
847		;;
848	-s)
849		defaultshell="`fullpath_from_shell $2`"
850		shift; shift
851		;;
852	-u)
853		uidstart=$2
854		shift; shift
855		;;
856	esac
857done
858
859# If the -f switch was used, get input from a file. Otherwise,
860# this is an interactive session.
861#
862if [ -n "$fflag" ]; then
863	if [ -z "$infile" ]; then
864		input_from_file
865	elif [ -n "$infile" ]; then
866		if [ -r "$infile" ]; then
867			input_from_file < $infile
868		else
869			err "File ($infile) is unreadable or does not exist."
870		fi
871	fi
872else
873	input_interactive
874fi
875