source: MondoRescue/branches/3.2/mindi-busybox/loginutils/adduser.c@ 3186

Last change on this file since 3186 was 2725, checked in by Bruno Cornec, 13 years ago
  • Update mindi-busybox to 1.18.3 to avoid problems with the tar command which is now failing on recent versions with busybox 1.7.3
File size: 6.8 KB
Line 
1/* vi: set sw=4 ts=4: */
2/*
3 * adduser - add users to /etc/passwd and /etc/shadow
4 *
5 * Copyright (C) 1999 by Lineo, inc. and John Beppu
6 * Copyright (C) 1999,2000,2001 by John Beppu <beppu@codepoet.org>
7 *
8 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
9 */
10#include "libbb.h"
11
12#if CONFIG_LAST_SYSTEM_ID < CONFIG_FIRST_SYSTEM_ID
13#error Bad LAST_SYSTEM_ID or FIRST_SYSTEM_ID in .config
14#endif
15
16/* #define OPT_HOME (1 << 0) */ /* unused */
17/* #define OPT_GECOS (1 << 1) */ /* unused */
18#define OPT_SHELL (1 << 2)
19#define OPT_GID (1 << 3)
20#define OPT_DONT_SET_PASS (1 << 4)
21#define OPT_SYSTEM_ACCOUNT (1 << 5)
22#define OPT_DONT_MAKE_HOME (1 << 6)
23#define OPT_UID (1 << 7)
24
25/* We assume UID_T_MAX == INT_MAX */
26/* remix */
27/* recoded such that the uid may be passed in *p */
28static void passwd_study(struct passwd *p)
29{
30 int max = UINT_MAX;
31
32 if (getpwnam(p->pw_name)) {
33 bb_error_msg_and_die("%s '%s' in use", "user", p->pw_name);
34 /* this format string is reused in adduser and addgroup */
35 }
36
37 if (!(option_mask32 & OPT_UID)) {
38 if (option_mask32 & OPT_SYSTEM_ACCOUNT) {
39 p->pw_uid = CONFIG_FIRST_SYSTEM_ID;
40 max = CONFIG_LAST_SYSTEM_ID;
41 } else {
42 p->pw_uid = CONFIG_LAST_SYSTEM_ID + 1;
43 max = 64999;
44 }
45 }
46 /* check for a free uid (and maybe gid) */
47 while (getpwuid(p->pw_uid) || (p->pw_gid == (gid_t)-1 && getgrgid(p->pw_uid))) {
48 if (option_mask32 & OPT_UID) {
49 /* -u N, cannot pick uid other than N: error */
50 bb_error_msg_and_die("%s '%s' in use", "uid", itoa(p->pw_uid));
51 /* this format string is reused in adduser and addgroup */
52 }
53 if (p->pw_uid == max) {
54 bb_error_msg_and_die("no %cids left", 'u');
55 }
56 p->pw_uid++;
57 }
58
59 if (p->pw_gid == (gid_t)-1) {
60 p->pw_gid = p->pw_uid; /* new gid = uid */
61 if (getgrnam(p->pw_name)) {
62 bb_error_msg_and_die("%s '%s' in use", "group", p->pw_name);
63 /* this format string is reused in adduser and addgroup */
64 }
65 }
66}
67
68static void addgroup_wrapper(struct passwd *p, const char *group_name)
69{
70 char *cmd;
71
72 if (group_name) /* Add user to existing group */
73 cmd = xasprintf("addgroup '%s' '%s'", p->pw_name, group_name);
74 else /* Add user to his own group with the first free gid found in passwd_study */
75 cmd = xasprintf("addgroup -g %u '%s'", (unsigned)p->pw_gid, p->pw_name);
76 /* Warning: to be compatible with external addgroup programs we should use --gid instead */
77 system(cmd);
78 free(cmd);
79}
80
81static void passwd_wrapper(const char *login) NORETURN;
82
83static void passwd_wrapper(const char *login)
84{
85 BB_EXECLP("passwd", "passwd", login, NULL);
86 bb_error_msg_and_die("can't execute passwd, you must set password manually");
87}
88
89#if ENABLE_FEATURE_ADDUSER_LONG_OPTIONS
90static const char adduser_longopts[] ALIGN1 =
91 "home\0" Required_argument "h"
92 "gecos\0" Required_argument "g"
93 "shell\0" Required_argument "s"
94 "ingroup\0" Required_argument "G"
95 "disabled-password\0" No_argument "D"
96 "empty-password\0" No_argument "D"
97 "system\0" No_argument "S"
98 "no-create-home\0" No_argument "H"
99 "uid\0" Required_argument "u"
100 ;
101#endif
102
103/*
104 * adduser will take a login_name as its first parameter.
105 * home, shell, gecos:
106 * can be customized via command-line parameters.
107 */
108int adduser_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
109int adduser_main(int argc UNUSED_PARAM, char **argv)
110{
111 struct passwd pw;
112 const char *usegroup = NULL;
113 char *p;
114 unsigned opts;
115
116#if ENABLE_FEATURE_ADDUSER_LONG_OPTIONS
117 applet_long_options = adduser_longopts;
118#endif
119
120 /* got root? */
121 if (geteuid()) {
122 bb_error_msg_and_die(bb_msg_perm_denied_are_you_root);
123 }
124
125 pw.pw_gecos = (char *)"Linux User,,,";
126 pw.pw_shell = (char *)DEFAULT_SHELL;
127 pw.pw_dir = NULL;
128
129 /* exactly one non-option arg */
130 /* disable interactive passwd for system accounts */
131 opt_complementary = "=1:SD:u+";
132 if (sizeof(pw.pw_uid) == sizeof(int)) {
133 opts = getopt32(argv, "h:g:s:G:DSHu:", &pw.pw_dir, &pw.pw_gecos, &pw.pw_shell, &usegroup, &pw.pw_uid);
134 } else {
135 unsigned uid;
136 opts = getopt32(argv, "h:g:s:G:DSHu:", &pw.pw_dir, &pw.pw_gecos, &pw.pw_shell, &usegroup, &uid);
137 if (opts & OPT_UID) {
138 pw.pw_uid = uid;
139 }
140 }
141 argv += optind;
142
143 /* fill in the passwd struct */
144 pw.pw_name = argv[0];
145 die_if_bad_username(pw.pw_name);
146 if (!pw.pw_dir) {
147 /* create string for $HOME if not specified already */
148 pw.pw_dir = xasprintf("/home/%s", argv[0]);
149 }
150 pw.pw_passwd = (char *)"x";
151 if (opts & OPT_SYSTEM_ACCOUNT) {
152 if (!usegroup) {
153 usegroup = "nogroup";
154 }
155 if (!(opts & OPT_SHELL)) {
156 pw.pw_shell = (char *) "/bin/false";
157 }
158 }
159 pw.pw_gid = usegroup ? xgroup2gid(usegroup) : -1; /* exits on failure */
160
161 /* make sure everything is kosher and setup uid && maybe gid */
162 passwd_study(&pw);
163
164 p = xasprintf("x:%u:%u:%s:%s:%s",
165 (unsigned) pw.pw_uid, (unsigned) pw.pw_gid,
166 pw.pw_gecos, pw.pw_dir, pw.pw_shell);
167 if (update_passwd(bb_path_passwd_file, pw.pw_name, p, NULL) < 0) {
168 return EXIT_FAILURE;
169 }
170 if (ENABLE_FEATURE_CLEAN_UP)
171 free(p);
172
173#if ENABLE_FEATURE_SHADOWPASSWDS
174 /* /etc/shadow fields:
175 * 1. username
176 * 2. encrypted password
177 * 3. last password change (unix date (unix time/24*60*60))
178 * 4. minimum days required between password changes
179 * 5. maximum days password is valid
180 * 6. days before password is to expire that user is warned
181 * 7. days after password expires that account is disabled
182 * 8. unix date when login expires (i.e. when it may no longer be used)
183 */
184 /* fields: 2 3 4 5 6 78 */
185 p = xasprintf("!:%u:0:99999:7:::", (unsigned)(time(NULL)) / (24*60*60));
186 /* ignore errors: if file is missing we suppose admin doesn't want it */
187 update_passwd(bb_path_shadow_file, pw.pw_name, p, NULL);
188 if (ENABLE_FEATURE_CLEAN_UP)
189 free(p);
190#endif
191
192 /* add to group */
193 addgroup_wrapper(&pw, usegroup);
194
195 /* clear the umask for this process so it doesn't
196 * screw up the permissions on the mkdir and chown. */
197 umask(0);
198 if (!(opts & OPT_DONT_MAKE_HOME)) {
199 /* set the owner and group so it is owned by the new user,
200 * then fix up the permissions to 2755. Can't do it before
201 * since chown will clear the setgid bit */
202 int mkdir_err = mkdir(pw.pw_dir, 0755);
203 if (mkdir_err == 0) {
204 /* New home. Copy /etc/skel to it */
205 const char *args[] = {
206 "chown", "-R",
207 xasprintf("%u:%u", (int)pw.pw_uid, (int)pw.pw_gid),
208 pw.pw_dir, NULL
209 };
210 /* Be silent on any errors (like: no /etc/skel) */
211 logmode = LOGMODE_NONE;
212 copy_file("/etc/skel", pw.pw_dir, FILEUTILS_RECUR);
213 logmode = LOGMODE_STDIO;
214 chown_main(4, (char**)args);
215 }
216 if ((mkdir_err != 0 && errno != EEXIST)
217 || chown(pw.pw_dir, pw.pw_uid, pw.pw_gid) != 0
218 || chmod(pw.pw_dir, 02755) != 0 /* set setgid bit on homedir */
219 ) {
220 bb_simple_perror_msg(pw.pw_dir);
221 }
222 }
223
224 if (!(opts & OPT_DONT_SET_PASS)) {
225 /* interactively set passwd */
226 passwd_wrapper(pw.pw_name);
227 }
228
229 return EXIT_SUCCESS;
230}
Note: See TracBrowser for help on using the repository browser.