newusers: Add support for assiging subordinate uids and gids.
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
This commit is contained in:
		
				
					committed by
					
						 Serge Hallyn
						Serge Hallyn
					
				
			
			
				
	
			
			
			
						parent
						
							d5b3092331
						
					
				
				
					commit
					2cc8c2c0dc
				
			
							
								
								
									
										124
									
								
								src/newusers.c
									
									
									
									
									
								
							
							
						
						
									
										124
									
								
								src/newusers.c
									
									
									
									
									
								
							| @@ -65,6 +65,7 @@ | ||||
| #include "pwio.h" | ||||
| #include "sgroupio.h" | ||||
| #include "shadowio.h" | ||||
| #include "subordinateio.h" | ||||
| #include "chkname.h" | ||||
|  | ||||
| /* | ||||
| @@ -82,6 +83,8 @@ static long sha_rounds = 5000; | ||||
| #endif				/* USE_SHA_CRYPT */ | ||||
| #endif				/* !USE_PAM */ | ||||
|  | ||||
| static bool is_sub_uid = false; | ||||
| static bool is_sub_gid = false; | ||||
| static bool is_shadow; | ||||
| #ifdef SHADOWGRP | ||||
| static bool is_shadow_grp; | ||||
| @@ -90,6 +93,8 @@ static bool sgr_locked = false; | ||||
| static bool pw_locked = false; | ||||
| static bool gr_locked = false; | ||||
| static bool spw_locked = false; | ||||
| static bool sub_uid_locked = false; | ||||
| static bool sub_gid_locked = false; | ||||
|  | ||||
| /* local function prototypes */ | ||||
| static void usage (int status); | ||||
| @@ -178,6 +183,20 @@ static void fail_exit (int code) | ||||
| 		} | ||||
| 	} | ||||
| #endif | ||||
| 	if (sub_uid_locked) { | ||||
| 		if (sub_uid_unlock () == 0) { | ||||
| 			fprintf (stderr, _("%s: failed to unlock %s\n"), Prog, sub_uid_dbname ()); | ||||
| 			SYSLOG ((LOG_ERR, "failed to unlock %s", sub_uid_dbname ())); | ||||
| 			/* continue */ | ||||
| 		} | ||||
| 	} | ||||
| 	if (sub_gid_locked) { | ||||
| 		if (sub_gid_unlock () == 0) { | ||||
| 			fprintf (stderr, _("%s: failed to unlock %s\n"), Prog, sub_gid_dbname ()); | ||||
| 			SYSLOG ((LOG_ERR, "failed to unlock %s", sub_gid_dbname ())); | ||||
| 			/* continue */ | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	exit (code); | ||||
| } | ||||
| @@ -759,6 +778,24 @@ static void open_files (void) | ||||
| 		sgr_locked = true; | ||||
| 	} | ||||
| #endif | ||||
| 	if (is_sub_uid) { | ||||
| 		if (sub_uid_lock () == 0) { | ||||
| 			fprintf (stderr, | ||||
| 			         _("%s: cannot lock %s; try again later.\n"), | ||||
| 			         Prog, sub_uid_dbname ()); | ||||
| 			fail_exit (EXIT_FAILURE); | ||||
| 		} | ||||
| 		sub_uid_locked = true; | ||||
| 	} | ||||
| 	if (is_sub_gid) { | ||||
| 		if (sub_gid_lock () == 0) { | ||||
| 			fprintf (stderr, | ||||
| 			         _("%s: cannot lock %s; try again later.\n"), | ||||
| 			         Prog, sub_gid_dbname ()); | ||||
| 			fail_exit (EXIT_FAILURE); | ||||
| 		} | ||||
| 		sub_gid_locked = true; | ||||
| 	} | ||||
|  | ||||
| 	if (pw_open (O_RDWR) == 0) { | ||||
| 		fprintf (stderr, _("%s: cannot open %s\n"), Prog, pw_dbname ()); | ||||
| @@ -778,6 +815,22 @@ static void open_files (void) | ||||
| 		fail_exit (EXIT_FAILURE); | ||||
| 	} | ||||
| #endif | ||||
| 	if (is_sub_uid) { | ||||
| 		if (sub_uid_open (O_RDWR) == 0) { | ||||
| 			fprintf (stderr, | ||||
| 			         _("%s: cannot open %s\n"), | ||||
| 			         Prog, sub_uid_dbname ()); | ||||
| 			fail_exit (EXIT_FAILURE); | ||||
| 		} | ||||
| 	} | ||||
| 	if (is_sub_gid) { | ||||
| 		if (sub_gid_open (O_RDWR) == 0) { | ||||
| 			fprintf (stderr, | ||||
| 			         _("%s: cannot open %s\n"), | ||||
| 			         Prog, sub_gid_dbname ()); | ||||
| 			fail_exit (EXIT_FAILURE); | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| /* | ||||
| @@ -822,6 +875,19 @@ static void close_files (void) | ||||
| 		SYSLOG ((LOG_ERR, "failure while writing changes to %s", gr_dbname ())); | ||||
| 		fail_exit (EXIT_FAILURE); | ||||
| 	} | ||||
| 	if (is_sub_uid  && (sub_uid_close () == 0)) { | ||||
| 		fprintf (stderr, | ||||
| 		         _("%s: failure while writing changes to %s\n"), Prog, sub_uid_dbname ()); | ||||
| 		SYSLOG ((LOG_ERR, "failure while writing changes to %s", sub_uid_dbname ())); | ||||
| 		fail_exit (EXIT_FAILURE); | ||||
| 	} | ||||
| 	if (is_sub_gid  && (sub_gid_close () == 0)) { | ||||
| 		fprintf (stderr, | ||||
| 		         _("%s: failure while writing changes to %s\n"), Prog, sub_gid_dbname ()); | ||||
| 		SYSLOG ((LOG_ERR, "failure while writing changes to %s", sub_gid_dbname ())); | ||||
| 		fail_exit (EXIT_FAILURE); | ||||
| 	} | ||||
|  | ||||
| 	if (gr_unlock () == 0) { | ||||
| 		fprintf (stderr, | ||||
| 		         _("%s: failed to unlock %s\n"), | ||||
| @@ -850,6 +916,22 @@ static void close_files (void) | ||||
| 		sgr_locked = false; | ||||
| 	} | ||||
| #endif | ||||
| 	if (is_sub_uid) { | ||||
| 		if (sub_uid_unlock () == 0) { | ||||
| 			fprintf (stderr, _("%s: failed to unlock %s\n"), Prog, sub_uid_dbname ()); | ||||
| 			SYSLOG ((LOG_ERR, "failed to unlock %s", sub_uid_dbname ())); | ||||
| 			/* continue */ | ||||
| 		} | ||||
| 		sub_uid_locked = false; | ||||
| 	} | ||||
| 	if (is_sub_gid) { | ||||
| 		if (sub_gid_unlock () == 0) { | ||||
| 			fprintf (stderr, _("%s: failed to unlock %s\n"), Prog, sub_gid_dbname ()); | ||||
| 			SYSLOG ((LOG_ERR, "failed to unlock %s", sub_gid_dbname ())); | ||||
| 			/* continue */ | ||||
| 		} | ||||
| 		sub_gid_locked = false; | ||||
| 	} | ||||
| } | ||||
|  | ||||
| int main (int argc, char **argv) | ||||
| @@ -891,6 +973,8 @@ int main (int argc, char **argv) | ||||
| #ifdef SHADOWGRP | ||||
| 	is_shadow_grp = sgr_file_present (); | ||||
| #endif | ||||
| 	is_sub_uid = sub_uid_file_present (); | ||||
| 	is_sub_gid = sub_gid_file_present (); | ||||
|  | ||||
| 	open_files (); | ||||
|  | ||||
| @@ -1071,6 +1155,46 @@ int main (int argc, char **argv) | ||||
| 			errors++; | ||||
| 			continue; | ||||
| 		} | ||||
|  | ||||
| 		/* | ||||
| 		 * Add subordinate uids if the user does not have them. | ||||
| 		 */ | ||||
| 		if (is_sub_uid && !sub_uid_assigned(fields[0])) { | ||||
| 			uid_t sub_uid_start = 0; | ||||
| 			unsigned long sub_uid_count = 0; | ||||
| 			if (find_new_sub_uids(fields[0], &sub_uid_start, &sub_uid_count) == 0) { | ||||
| 				if (sub_uid_add(fields[0], sub_uid_start, sub_uid_count) == 0) { | ||||
| 					fprintf (stderr, | ||||
| 						_("%s: failed to prepare new %s entry\n"), | ||||
| 						Prog, sub_uid_dbname ()); | ||||
| 				} | ||||
| 			} else { | ||||
| 				fprintf (stderr, | ||||
| 					_("%s: can't find subordinate user range\n"), | ||||
| 					Prog); | ||||
| 				errors++; | ||||
| 			} | ||||
| 		} | ||||
| 	 | ||||
| 		/* | ||||
| 		 * Add subordinate gids if the user does not have them. | ||||
| 		 */ | ||||
| 		if (is_sub_gid && !sub_gid_assigned(fields[0])) { | ||||
| 			gid_t sub_gid_start = 0; | ||||
| 			unsigned long sub_gid_count = 0; | ||||
| 			if (find_new_sub_gids(fields[0], &sub_gid_start, &sub_gid_count) == 0) { | ||||
| 				if (sub_gid_add(fields[0], sub_gid_start, sub_gid_count) == 0) { | ||||
| 					fprintf (stderr, | ||||
| 						_("%s: failed to prepare new %s entry\n"), | ||||
| 						Prog, sub_uid_dbname ()); | ||||
| 				} | ||||
| 			} else { | ||||
| 				fprintf (stderr, | ||||
| 					_("%s: can't find subordinate group range\n"), | ||||
| 					Prog); | ||||
| 				errors++; | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	/* | ||||
|   | ||||
		Reference in New Issue
	
	Block a user