X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=loginutils%2Fadduser.c;h=eee4a000d63b14a535b7dfb543f7bf550b660254;hb=a0898170d876aeeea19eb144556afd05819db450;hp=7455f23a6e4223233f18b1b1ee863b282f1cde86;hpb=2c0d0f00513e44f8545eb0756f874a25f54f9b40;p=oweals%2Fbusybox.git diff --git a/loginutils/adduser.c b/loginutils/adduser.c index 7455f23a6..eee4a000d 100644 --- a/loginutils/adduser.c +++ b/loginutils/adduser.c @@ -5,292 +5,196 @@ * Copyright (C) 1999 by Lineo, inc. and John Beppu * Copyright (C) 1999,2000,2001 by John Beppu * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; either version 2 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU - * General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA - * + * Licensed under the GPL v2 or later, see the file LICENSE in this tarball. */ -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include "busybox.h" - - +#include "libbb.h" -/* structs __________________________ */ +#define OPT_DONT_SET_PASS (1 << 4) +#define OPT_DONT_MAKE_HOME (1 << 6) -typedef struct { - uid_t u; - gid_t g; -} Id; - -/* data _____________________________ */ - -/* defaults : should this be in an external file? */ -static const char default_passwd[] = "x"; -static const char default_gecos[] = "Linux User,,,"; -static const char default_home_prefix[] = "/home"; -static const char default_shell[] = "/bin/sh"; - -#ifdef CONFIG_FEATURE_SHADOWPASSWDS -/* shadow in use? */ -static int shadow_enabled = 0; -#endif /* remix */ /* EDR recoded such that the uid may be passed in *p */ static int passwd_study(const char *filename, struct passwd *p) { - struct passwd *pw; + enum { min = 500, max = 65000 }; FILE *passwd; + /* We are using reentrant fgetpwent_r() in order to avoid + * pulling in static buffers from libc (think static build here) */ + char buffer[256]; + struct passwd pw; + struct passwd *result; - const int min = 500; - const int max = 65000; - - passwd = wfopen(filename, "r"); - if (!passwd) - return 4; + passwd = xfopen(filename, "r"); /* EDR if uid is out of bounds, set to min */ if ((p->pw_uid > max) || (p->pw_uid < min)) p->pw_uid = min; - /* stuff to do: + /* stuff to do: * make sure login isn't taken; * find free uid and gid; */ - while ((pw = fgetpwent(passwd))) { - if (strcmp(pw->pw_name, p->pw_name) == 0) { + while (!fgetpwent_r(passwd, &pw, buffer, sizeof(buffer), &result)) { + if (strcmp(pw.pw_name, p->pw_name) == 0) { /* return 0; */ return 1; } - if ((pw->pw_uid >= p->pw_uid) && (pw->pw_uid < max) - && (pw->pw_uid >= min)) { - p->pw_uid = pw->pw_uid + 1; + if ((pw.pw_uid >= p->pw_uid) && (pw.pw_uid < max) + && (pw.pw_uid >= min)) { + p->pw_uid = pw.pw_uid + 1; } } - /* EDR check for an already existing gid */ - while (getgrgid(p->pw_uid) != NULL) - p->pw_uid++; + if (p->pw_gid == 0) { + /* EDR check for an already existing gid */ + while (getgrgid(p->pw_uid) != NULL) + p->pw_uid++; + + /* EDR also check for an existing group definition */ + if (getgrnam(p->pw_name) != NULL) + return 3; - /* EDR also check for an existing group definition */ - if (getgrnam(p->pw_name) != NULL) - return 3; + /* EDR create new gid always = uid */ + p->pw_gid = p->pw_uid; + } /* EDR bounds check */ if ((p->pw_uid > max) || (p->pw_uid < min)) return 2; - /* EDR create new gid always = uid */ - p->pw_gid = p->pw_uid; - /* return 1; */ return 0; } -static void addgroup_wrapper(const char *login, gid_t gid) +static void addgroup_wrapper(struct passwd *p) { - char *cmd = xmalloc(strlen(login)+32); + char *cmd; - sprintf(cmd, "addgroup -g %d %s", gid, login); + cmd = xasprintf("addgroup -g %d \"%s\"", p->pw_gid, p->pw_name); system(cmd); free(cmd); } +static void passwd_wrapper(const char *login) ATTRIBUTE_NORETURN; + static void passwd_wrapper(const char *login) { - static const char prog[] = "passwd"; - execlp(prog, prog, login, NULL); - error_msg_and_die("Failed to execute 'passwd', you must set the password for '%s' manually", login); + static const char prog[] ALIGN1 = "passwd"; + + BB_EXECLP(prog, prog, login, NULL); + bb_error_msg_and_die("failed to execute '%s', you must set the password for '%s' manually", prog, login); } /* putpwent(3) remix */ -static int adduser(const char *filename, struct passwd *p) +static int adduser(struct passwd *p) { - FILE *passwd; - int r; -#ifdef CONFIG_FEATURE_SHADOWPASSWDS - FILE *shadow; - struct spwd *sp; -#endif + FILE *file; + int addgroup = !p->pw_gid; /* make sure everything is kosher and setup uid && gid */ - passwd = wfopen(filename, "a"); - if (passwd == NULL) { - /* return -1; */ - return 1; - } - fseek(passwd, 0, SEEK_END); - - /* if (passwd_study(filename, p) == 0) { */ - r = passwd_study(filename, p); - if (r) { - if (r == 1) - error_msg("%s: login already in use", p->pw_name); - else if (r == 2) - error_msg("illegal uid or no uids left"); - else if (r == 3) - error_msg("group name %s already in use", p->pw_name); - else - error_msg("generic error."); - /* return -1; */ - return 1; + file = xfopen(bb_path_passwd_file, "a"); + fseek(file, 0, SEEK_END); + + switch (passwd_study(bb_path_passwd_file, p)) { + case 1: + bb_error_msg_and_die("%s: login already in use", p->pw_name); + case 2: + bb_error_msg_and_die("illegal uid or no uids left"); + case 3: + bb_error_msg_and_die("%s: group name already in use", p->pw_name); } /* add to passwd */ - if (putpwent(p, passwd) == -1) { - /* return -1; */ - return 1; + if (putpwent(p, file) == -1) { + bb_perror_nomsg_and_die(); } - fclose(passwd); + /* Do fclose even if !ENABLE_FEATURE_CLEAN_UP. + * We will exec passwd, files must be flushed & closed before that! */ + fclose(file); -#ifdef CONFIG_FEATURE_SHADOWPASSWDS +#if ENABLE_FEATURE_SHADOWPASSWDS /* add to shadow if necessary */ - if (shadow_enabled) { - shadow = wfopen(shadow_file, "a"); - if (shadow == NULL) { - /* return -1; */ - return 1; - } - fseek(shadow, 0, SEEK_END); - sp = pwd_to_spwd(p); - sp->sp_max = 99999; /* debianish */ - sp->sp_warn = 7; - fprintf(shadow, "%s:!:%ld:%ld:%ld:%ld:::\n", - sp->sp_namp, sp->sp_lstchg, sp->sp_min, sp->sp_max, - sp->sp_warn); - fclose(shadow); + file = fopen_or_warn(bb_path_shadow_file, "a"); + if (file) { + fseek(file, 0, SEEK_END); + fprintf(file, "%s:!:%ld:%d:%d:%d:::\n", + p->pw_name, /* username */ + time(NULL) / 86400, /* sp->sp_lstchg */ + 0, /* sp->sp_min */ + 99999, /* sp->sp_max */ + 7); /* sp->sp_warn */ + fclose(file); } #endif /* add to group */ /* addgroup should be responsible for dealing w/ gshadow */ - addgroup_wrapper(p->pw_name, p->pw_gid); + /* if using a pre-existing group, don't create one */ + if (addgroup) addgroup_wrapper(p); /* Clear the umask for this process so it doesn't - * * screw up the permissions on the mkdir and chown. */ + * screw up the permissions on the mkdir and chown. */ umask(0); - - /* mkdir */ - if (mkdir(p->pw_dir, 0755)) { - perror_msg("%s", p->pw_dir); - } - /* Set the owner and group so it is owned by the new user. */ - if (chown(p->pw_dir, p->pw_uid, p->pw_gid)) { - perror_msg("%s", p->pw_dir); + if (!(option_mask32 & OPT_DONT_MAKE_HOME)) { + /* Set the owner and group so it is owned by the new user, + then fix up the permissions to 2755. Can't do it before + since chown will clear the setgid bit */ + if (mkdir(p->pw_dir, 0755) + || chown(p->pw_dir, p->pw_uid, p->pw_gid) + || chmod(p->pw_dir, 02755)) { + bb_perror_msg("%s", p->pw_dir); + } } - /* Now fix up the permissions to 2755. Can't do it before now - * since chown will clear the setgid bit */ - if (chmod(p->pw_dir, 02755)) { - perror_msg("%s", p->pw_dir); + + if (!(option_mask32 & OPT_DONT_SET_PASS)) { + /* interactively set passwd */ + passwd_wrapper(p->pw_name); } - /* interactively set passwd */ - passwd_wrapper(p->pw_name); return 0; } - -/* return current uid (root is always uid == 0, right?) */ -static inline uid_t i_am_not_root(void) -{ - return geteuid(); -} - /* * adduser will take a login_name as its first parameter. * * home * shell - * gecos + * gecos * * can be customized via command-line parameters. - * ________________________________________________________________________ */ + */ +int adduser_main(int argc, char **argv); int adduser_main(int argc, char **argv) { - int opt; - const char *login; - const char *gecos; - const char *home = NULL; - const char *shell; - struct passwd pw; - - /* init */ - if (argc < 2) { - show_usage(); - } - gecos = default_gecos; - shell = default_shell; - - /* get args */ - while ((opt = getopt (argc, argv, "h:g:s:")) != -1) - switch (opt) { - case 'h': - home = optarg; - break; - case 'g': - gecos = optarg; - break; - case 's': - shell = optarg; - break; - default: - show_usage (); - break; - } + const char *usegroup = NULL; /* got root? */ - if (i_am_not_root()) { - error_msg_and_die( "Only root may add a user or group to the system."); + if (geteuid()) { + bb_error_msg_and_die(bb_msg_perm_denied_are_you_root); } - /* get login */ - if (optind >= argc) { - error_msg_and_die( "no user specified"); - } - login = argv[optind]; + pw.pw_gecos = (char *)"Linux User,,,"; + pw.pw_shell = (char *)DEFAULT_SHELL; + pw.pw_dir = NULL; - /* create string for $HOME if not specified already */ - if (!home) { - home = concat_path_file(default_home_prefix, login); - } -#ifdef CONFIG_FEATURE_SHADOWPASSWDS - /* is /etc/shadow in use? */ - shadow_enabled = (0 == access(shadow_file, F_OK)); -#endif + /* exactly one non-option arg */ + opt_complementary = "=1"; + getopt32(argv, "h:g:s:G:DSH", &pw.pw_dir, &pw.pw_gecos, &pw.pw_shell, &usegroup); + argv += optind; /* create a passwd struct */ - pw.pw_name = (char *)login; - pw.pw_passwd = (char *)default_passwd; + pw.pw_name = argv[0]; + if (!pw.pw_dir) { + /* create string for $HOME if not specified already */ + pw.pw_dir = xasprintf("/home/%s", argv[0]); + } + pw.pw_passwd = (char *)"x"; pw.pw_uid = 0; - pw.pw_gid = 0; - pw.pw_gecos = (char *)gecos; - pw.pw_dir = (char *)home; - pw.pw_shell = (char *)shell; + pw.pw_gid = usegroup ? xgroup2gid(usegroup) : 0; /* exits on failure */ /* grand finale */ - return adduser(passwd_file, &pw); + return adduser(&pw); } - -/* $Id: adduser.c,v 1.3 2002/07/16 23:50:05 sandman Exp $ */