2002-06-05 02:15:46 +05:30
|
|
|
/* vi: set sw=4 ts=4: */
|
|
|
|
/*
|
|
|
|
* adduser - add users to /etc/passwd and /etc/shadow
|
|
|
|
*
|
|
|
|
* Copyright (C) 1999 by Lineo, inc. and John Beppu
|
|
|
|
* Copyright (C) 1999,2000,2001 by John Beppu <beppu@codepoet.org>
|
|
|
|
*
|
2006-01-23 04:25:11 +05:30
|
|
|
* Licensed under the GPL v2 or later, see the file LICENSE in this tarball.
|
2002-06-05 02:15:46 +05:30
|
|
|
*/
|
|
|
|
|
2007-05-27 00:30:18 +05:30
|
|
|
#include "libbb.h"
|
2002-06-05 02:15:46 +05:30
|
|
|
|
2007-03-13 18:31:14 +05:30
|
|
|
#define OPT_DONT_SET_PASS (1 << 4)
|
|
|
|
#define OPT_DONT_MAKE_HOME (1 << 6)
|
2002-06-05 02:15:46 +05:30
|
|
|
|
|
|
|
|
|
|
|
/* remix */
|
|
|
|
/* EDR recoded such that the uid may be passed in *p */
|
|
|
|
static int passwd_study(const char *filename, struct passwd *p)
|
|
|
|
{
|
2007-03-13 18:31:14 +05:30
|
|
|
enum { min = 500, max = 65000 };
|
2002-06-05 02:15:46 +05:30
|
|
|
FILE *passwd;
|
2007-03-13 18:31:14 +05:30
|
|
|
/* We are using reentrant fgetpwent_r() in order to avoid
|
|
|
|
* pulling in static buffers from libc (think static build here) */
|
|
|
|
char buffer[256];
|
|
|
|
struct passwd pw;
|
|
|
|
struct passwd *result;
|
2002-06-05 02:15:46 +05:30
|
|
|
|
2006-08-03 21:11:12 +05:30
|
|
|
passwd = xfopen(filename, "r");
|
2002-06-05 02:15:46 +05:30
|
|
|
|
|
|
|
/* EDR if uid is out of bounds, set to min */
|
|
|
|
if ((p->pw_uid > max) || (p->pw_uid < min))
|
|
|
|
p->pw_uid = min;
|
|
|
|
|
2004-03-15 13:59:22 +05:30
|
|
|
/* stuff to do:
|
2002-06-05 02:15:46 +05:30
|
|
|
* make sure login isn't taken;
|
|
|
|
* find free uid and gid;
|
|
|
|
*/
|
2007-03-13 18:31:14 +05:30
|
|
|
while (!fgetpwent_r(passwd, &pw, buffer, sizeof(buffer), &result)) {
|
|
|
|
if (strcmp(pw.pw_name, p->pw_name) == 0) {
|
2002-06-05 02:15:46 +05:30
|
|
|
/* return 0; */
|
|
|
|
return 1;
|
|
|
|
}
|
2007-03-13 18:31:14 +05:30
|
|
|
if ((pw.pw_uid >= p->pw_uid) && (pw.pw_uid < max)
|
|
|
|
&& (pw.pw_uid >= min)) {
|
|
|
|
p->pw_uid = pw.pw_uid + 1;
|
2002-06-05 02:15:46 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-06-22 01:33:07 +05:30
|
|
|
if (p->pw_gid == 0) {
|
|
|
|
/* EDR check for an already existing gid */
|
|
|
|
while (getgrgid(p->pw_uid) != NULL)
|
|
|
|
p->pw_uid++;
|
|
|
|
|
|
|
|
/* EDR also check for an existing group definition */
|
|
|
|
if (getgrnam(p->pw_name) != NULL)
|
|
|
|
return 3;
|
2002-06-05 02:15:46 +05:30
|
|
|
|
2003-06-22 01:33:07 +05:30
|
|
|
/* EDR create new gid always = uid */
|
|
|
|
p->pw_gid = p->pw_uid;
|
|
|
|
}
|
2002-06-05 02:15:46 +05:30
|
|
|
|
|
|
|
/* EDR bounds check */
|
|
|
|
if ((p->pw_uid > max) || (p->pw_uid < min))
|
|
|
|
return 2;
|
|
|
|
|
|
|
|
/* return 1; */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-04-05 00:49:53 +05:30
|
|
|
static void addgroup_wrapper(struct passwd *p)
|
2002-06-05 02:15:46 +05:30
|
|
|
{
|
2002-09-16 11:52:25 +05:30
|
|
|
char *cmd;
|
2002-07-17 05:20:05 +05:30
|
|
|
|
2006-08-03 21:11:12 +05:30
|
|
|
cmd = xasprintf("addgroup -g %d \"%s\"", p->pw_gid, p->pw_name);
|
2002-07-17 05:20:05 +05:30
|
|
|
system(cmd);
|
|
|
|
free(cmd);
|
2002-06-05 02:15:46 +05:30
|
|
|
}
|
|
|
|
|
2006-01-23 04:25:11 +05:30
|
|
|
static void passwd_wrapper(const char *login) ATTRIBUTE_NORETURN;
|
2002-09-16 11:52:25 +05:30
|
|
|
|
2002-06-05 02:15:46 +05:30
|
|
|
static void passwd_wrapper(const char *login)
|
|
|
|
{
|
|
|
|
static const char prog[] = "passwd";
|
2007-02-06 06:50:12 +05:30
|
|
|
BB_EXECLP(prog, prog, login, NULL);
|
2006-10-20 18:58:22 +05:30
|
|
|
bb_error_msg_and_die("failed to execute '%s', you must set the password for '%s' manually", prog, login);
|
2002-06-05 02:15:46 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
/* putpwent(3) remix */
|
2007-03-13 18:31:14 +05:30
|
|
|
static int adduser(struct passwd *p)
|
2002-06-05 02:15:46 +05:30
|
|
|
{
|
2006-04-05 00:49:53 +05:30
|
|
|
FILE *file;
|
2006-07-17 00:28:18 +05:30
|
|
|
int addgroup = !p->pw_gid;
|
2002-06-05 02:15:46 +05:30
|
|
|
|
|
|
|
/* make sure everything is kosher and setup uid && gid */
|
2006-08-03 21:11:12 +05:30
|
|
|
file = xfopen(bb_path_passwd_file, "a");
|
2006-04-05 00:49:53 +05:30
|
|
|
fseek(file, 0, SEEK_END);
|
|
|
|
|
|
|
|
switch (passwd_study(bb_path_passwd_file, p)) {
|
|
|
|
case 1:
|
|
|
|
bb_error_msg_and_die("%s: login already in use", p->pw_name);
|
|
|
|
case 2:
|
|
|
|
bb_error_msg_and_die("illegal uid or no uids left");
|
|
|
|
case 3:
|
|
|
|
bb_error_msg_and_die("%s: group name already in use", p->pw_name);
|
2007-03-07 15:05:43 +05:30
|
|
|
}
|
2002-06-05 02:15:46 +05:30
|
|
|
|
|
|
|
/* add to passwd */
|
2006-04-05 00:49:53 +05:30
|
|
|
if (putpwent(p, file) == -1) {
|
|
|
|
bb_perror_nomsg_and_die();
|
2002-06-05 02:15:46 +05:30
|
|
|
}
|
2007-07-15 04:21:28 +05:30
|
|
|
/* Do fclose even if !ENABLE_FEATURE_CLEAN_UP.
|
|
|
|
* We will exec passwd, files must be flushed & closed before that! */
|
|
|
|
fclose(file);
|
2002-06-05 02:15:46 +05:30
|
|
|
|
2006-04-05 00:49:53 +05:30
|
|
|
#if ENABLE_FEATURE_SHADOWPASSWDS
|
2002-06-05 02:15:46 +05:30
|
|
|
/* add to shadow if necessary */
|
2007-03-24 21:36:46 +05:30
|
|
|
file = fopen_or_warn(bb_path_shadow_file, "a");
|
|
|
|
if (file) {
|
|
|
|
fseek(file, 0, SEEK_END);
|
|
|
|
fprintf(file, "%s:!:%ld:%d:%d:%d:::\n",
|
|
|
|
p->pw_name, /* username */
|
|
|
|
time(NULL) / 86400, /* sp->sp_lstchg */
|
|
|
|
0, /* sp->sp_min */
|
|
|
|
99999, /* sp->sp_max */
|
|
|
|
7); /* sp->sp_warn */
|
2007-07-15 04:21:28 +05:30
|
|
|
fclose(file);
|
2007-03-24 21:36:46 +05:30
|
|
|
}
|
2002-06-05 02:15:46 +05:30
|
|
|
#endif
|
|
|
|
|
2006-04-05 00:49:53 +05:30
|
|
|
/* add to group */
|
|
|
|
/* addgroup should be responsible for dealing w/ gshadow */
|
|
|
|
/* if using a pre-existing group, don't create one */
|
2006-07-17 00:28:18 +05:30
|
|
|
if (addgroup) addgroup_wrapper(p);
|
|
|
|
|
2002-06-05 02:15:46 +05:30
|
|
|
/* Clear the umask for this process so it doesn't
|
2007-07-15 04:21:28 +05:30
|
|
|
* screw up the permissions on the mkdir and chown. */
|
2002-06-05 02:15:46 +05:30
|
|
|
umask(0);
|
2007-03-13 18:31:14 +05:30
|
|
|
if (!(option_mask32 & OPT_DONT_MAKE_HOME)) {
|
2006-04-05 00:49:53 +05:30
|
|
|
/* Set the owner and group so it is owned by the new user,
|
|
|
|
then fix up the permissions to 2755. Can't do it before
|
|
|
|
since chown will clear the setgid bit */
|
|
|
|
if (mkdir(p->pw_dir, 0755)
|
|
|
|
|| chown(p->pw_dir, p->pw_uid, p->pw_gid)
|
|
|
|
|| chmod(p->pw_dir, 02755)) {
|
2006-09-17 21:58:10 +05:30
|
|
|
bb_perror_msg("%s", p->pw_dir);
|
|
|
|
}
|
2006-04-05 00:49:53 +05:30
|
|
|
}
|
|
|
|
|
2007-03-13 18:31:14 +05:30
|
|
|
if (!(option_mask32 & OPT_DONT_SET_PASS)) {
|
2003-06-22 01:33:07 +05:30
|
|
|
/* interactively set passwd */
|
|
|
|
passwd_wrapper(p->pw_name);
|
2002-06-05 02:15:46 +05:30
|
|
|
}
|
2003-06-22 01:33:07 +05:30
|
|
|
|
|
|
|
return 0;
|
2002-06-05 02:15:46 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* adduser will take a login_name as its first parameter.
|
|
|
|
*
|
|
|
|
* home
|
|
|
|
* shell
|
2004-03-15 13:59:22 +05:30
|
|
|
* gecos
|
2002-06-05 02:15:46 +05:30
|
|
|
*
|
|
|
|
* can be customized via command-line parameters.
|
2006-12-28 11:14:47 +05:30
|
|
|
*/
|
2007-02-03 22:58:39 +05:30
|
|
|
int adduser_main(int argc, char **argv);
|
2002-06-05 02:15:46 +05:30
|
|
|
int adduser_main(int argc, char **argv)
|
|
|
|
{
|
2003-06-22 01:33:07 +05:30
|
|
|
struct passwd pw;
|
2006-01-25 05:38:53 +05:30
|
|
|
const char *usegroup = NULL;
|
2002-06-05 02:15:46 +05:30
|
|
|
|
2006-12-26 23:07:38 +05:30
|
|
|
/* got root? */
|
|
|
|
if (geteuid()) {
|
|
|
|
bb_error_msg_and_die(bb_msg_perm_denied_are_you_root);
|
|
|
|
}
|
|
|
|
|
2007-01-30 04:21:44 +05:30
|
|
|
pw.pw_gecos = (char *)"Linux User,,,";
|
2006-04-05 00:49:53 +05:30
|
|
|
pw.pw_shell = (char *)DEFAULT_SHELL;
|
|
|
|
pw.pw_dir = NULL;
|
2003-06-22 01:33:07 +05:30
|
|
|
|
2007-07-30 18:02:37 +05:30
|
|
|
/* exactly one non-option arg */
|
|
|
|
opt_complementary = "=1";
|
2007-03-13 18:31:14 +05:30
|
|
|
getopt32(argc, argv, "h:g:s:G:DSH", &pw.pw_dir, &pw.pw_gecos, &pw.pw_shell, &usegroup);
|
2007-06-04 15:46:52 +05:30
|
|
|
argv += optind;
|
2002-06-05 02:15:46 +05:30
|
|
|
|
2007-06-04 15:46:52 +05:30
|
|
|
/* create a passwd struct */
|
|
|
|
pw.pw_name = argv[0];
|
2006-04-05 00:49:53 +05:30
|
|
|
if (!pw.pw_dir) {
|
2007-06-04 15:46:52 +05:30
|
|
|
/* create string for $HOME if not specified already */
|
|
|
|
pw.pw_dir = xasprintf("/home/%s", argv[0]);
|
2002-06-05 02:15:46 +05:30
|
|
|
}
|
2007-01-30 04:21:44 +05:30
|
|
|
pw.pw_passwd = (char *)"x";
|
2002-06-05 02:15:46 +05:30
|
|
|
pw.pw_uid = 0;
|
2006-12-28 11:14:47 +05:30
|
|
|
pw.pw_gid = usegroup ? xgroup2gid(usegroup) : 0; /* exits on failure */
|
2003-06-22 01:33:07 +05:30
|
|
|
|
2002-06-05 02:15:46 +05:30
|
|
|
/* grand finale */
|
2007-03-13 18:31:14 +05:30
|
|
|
return adduser(&pw);
|
2002-06-05 02:15:46 +05:30
|
|
|
}
|