nekral-guest
0aaddfaf29
I forgot to mention compare_members_lists().
2008-01-01 14:09:47 +00:00
nekral-guest
3d82d5e452
Split check_members() out of check_grp_file() and check_sgr_file().
2008-01-01 13:50:06 +00:00
nekral-guest
612820cb9a
Split check_grp_file() and check_sgr_file() out of main().
2008-01-01 13:48:49 +00:00
nekral-guest
f6f6eeda8e
Split process_flags(), open_files(), and close_files() out of main(). New
...
global variables is_shadow, sort_mode, use_system_grp_file, and
use_system_sgr_file.
2008-01-01 13:13:47 +00:00
nekral-guest
83b9a376a2
If remove-potcdate.sin does not exist, use the one from teh po directory
...
(it is not installed automatically by autopoint.
2007-12-31 20:16:46 +00:00
nekral-guest
ca9fbc0d8e
Compilation fix. pamh needs to be global since the split of check_perms().
2007-12-31 20:15:15 +00:00
nekral-guest
1ec694eae7
Compilation fix. user was removed from the list of global variables.
2007-12-31 20:14:31 +00:00
nekral-guest
b9a00ea0ee
Fix the type of the bitfields in the commonio_entry and commonio_db
...
structures to unsigned int (instead of int).
2007-12-31 20:12:48 +00:00
nekral-guest
0cc661a2cf
Re-indent.
2007-12-31 15:34:29 +00:00
nekral-guest
d6cabcde78
Re-indent.
2007-12-31 15:32:15 +00:00
nekral-guest
4c9686df0c
Avoid assignments in comparisons.
2007-12-31 15:30:29 +00:00
nekral-guest
ce4e74c1b9
Avoid implicit brackets.
2007-12-31 15:27:23 +00:00
nekral-guest
3709183127
(compil fix) Use pw->pw_name instead of user.
2007-12-31 15:13:39 +00:00
nekral-guest
9a67b445b1
sflg needs to be global.
2007-12-31 15:07:59 +00:00
nekral-guest
ca035a53a0
Also split update_shell() out of main().
2007-12-31 15:06:22 +00:00
nekral-guest
f031095d9f
* Split also check_perms() out of main().
...
* Before pam_end(), the return value of the previous
pam API was already checked. No need to validate it again.
2007-12-31 14:54:46 +00:00
nekral-guest
7ed7e14dee
Split process_flags() out of main().
2007-12-31 14:52:52 +00:00
nekral-guest
4af02cb083
Avoid assignments in comparisons.
2007-12-31 14:37:24 +00:00
nekral-guest
ce3c44b0f7
Avoid assignments in comparisons.
2007-12-31 14:25:06 +00:00
nekral-guest
c086f6c931
Avoid implicit conversions to booleans.
2007-12-31 14:15:29 +00:00
nekral-guest
ca468cb988
Document may_change_field().
2007-12-31 14:03:14 +00:00
nekral-guest
3d04ff4037
Avoid implicit brackets.
2007-12-31 13:48:48 +00:00
nekral-guest
7279ff37f3
* New function: process_flags() split out of main().
...
The flags variables are now global.
* New functions: check_perms(), update_gecos(),
get_old_fields(), and check_fields() split out of main().
* Before pam_end(), the return value of the previous
pam API was already checked. No need to validate it again.
2007-12-31 13:43:04 +00:00
nekral-guest
d0b984528a
* src/newusers.c: Compilation fix for PAM support (pamh needs to be
...
global since the function split).
* src/chpasswd.c: Likewise.
* src/chgpasswd.c: Likewise.
* src/chpasswd.c: Avoid implicit conversions to booleans.
2007-12-31 04:57:54 +00:00
nekral-guest
e448d1acb1
Sort the tools in the NEWS entries of 4.1.1.
2007-12-31 04:34:10 +00:00
nekral-guest
f09b1404eb
Rewrote to match the previous commit message.
2007-12-31 04:31:28 +00:00
nekral-guest
db38d0b104
* src/chage.c: Fix typo: s/maximim/maximum/
...
* src/chage.c: New function: fail_exit(). Change most of the exit()
to a fail_exit, which makes sure the files are unlocked (new global
variables: pw_locked, spw_locked), the PAM transaction is ended, and
the failure is logged to libaudit (use a global user_name and user_uid
for logging).
* src/chage.c: Compilation fix for PAM support (pamh needs to be
global since the function split).
* src/chage.c: Document process_flags(), check_flags(), check_perms(),
open_files(), and close_files().
* src/chage.c: Split update_age() and get_defaults() out of main()
* src/chage.c: Drop the privileges just after opening the files.
* src/chage.c: Do not log to audit only if the user has an entry in
the shadow file.
* NEWS, src/chage.c (open_files): Also open the password file for
writing. This fix chage when the user only has a password entry (and
no shadow entries).
* src/chage.c (get_defaults): Use default values that don't change the
behavior of the account for the fields that are not specified when the
user has no shadow entry.
2007-12-31 04:29:30 +00:00
nekral-guest
3b7497b063
* Compilation fix for PAM support (pamh needs to be
...
global since the function split).
* End the PAM transaction in fail_exit().
* Document check_flags().
2007-12-30 21:48:55 +00:00
nekral-guest
d1bee8b593
Compilation fix for non-gshadow support.
2007-12-30 21:39:57 +00:00
nekral-guest
99230a30ad
I forgot to open and close gshadow.
2007-12-29 17:34:02 +00:00
nekral-guest
623010396c
Added support for gshadow.
2007-12-29 17:26:28 +00:00
nekral-guest
098173e1df
Do not add the new user to the group's members, because the group is already
...
the primary group of the new user.
2007-12-29 17:05:13 +00:00
nekral-guest
67b9c423fe
Avoid variables with the name of a type.
2007-12-29 14:52:35 +00:00
nekral-guest
b040f047fd
Avoid assignments in comparisons.
2007-12-29 14:48:33 +00:00
nekral-guest
8c4efbb8ce
Avoid implicit brackets and re-indent.
2007-12-29 14:34:39 +00:00
nekral-guest
9923513271
Before pam_end(), the return value of the previous
...
pam API was already checked. No need to validate it again.
2007-12-29 14:17:06 +00:00
nekral-guest
60a422b284
newusers cleanups
...
main() split in new functions: process_flags(), check_flags(), check_perms(),
open_files(), and close_files().
2007-12-29 14:11:54 +00:00
nekral-guest
3c890a55d8
Avoid assignments in comparisons.
2007-12-29 11:34:31 +00:00
nekral-guest
37ccc0a3d4
Re-indent.
2007-12-29 11:19:39 +00:00
nekral-guest
a7cbfedc85
* Avoid implicit brackets.
...
* Avoid implicit conversion to booleans.
2007-12-29 11:06:35 +00:00
nekral-guest
2d771a97b7
Remove dead code. It was probably put here to add more
...
information to the audit_logger.
2007-12-29 10:50:03 +00:00
nekral-guest
6ca79a36b0
Avoid using a variable with the same name as a type.
2007-12-29 10:47:04 +00:00
nekral-guest
388dcee3e4
chage cleanups
...
* src/chage.c: Before pam_end(), the return value of the previous
pam API was already checked. No need to validate it again.
* src/chage.c: main() split in new functions: process_flags(),
check_flags(), check_perms(), open_files(), and close_files().
2007-12-29 10:42:25 +00:00
nekral-guest
8563319b8b
* src/chgpasswd.c: Avoid assignments in comparisons.
...
* src/chgpasswd.c: Avoid implicit brackets.
* src/chgpasswd.c: Fix comments to match chgpasswd (group instead of
user's passwords are changed).
Fix the previous ChangeLog entries regarding chgpasswd.
2007-12-28 23:14:59 +00:00
nekral-guest
9fe450e216
Same changes as for chpasswd:
...
* src/chpasswd.c: main() split in process_flags(), check_flags(),
check_perms(), open_files(), and close_files().
2007-12-28 22:59:17 +00:00
nekral-guest
28cd038c35
Same changes as for chpasswd:
...
* src/chpasswd.c: main() split in process_flags(), check_flags(),
check_perms(), open_files(), and close_files().
2007-12-28 22:54:35 +00:00
nekral-guest
8dc959ea1f
Avoid implicit brackets.
2007-12-28 22:34:14 +00:00
nekral-guest
f54464bcf6
Re-indent.
2007-12-28 22:31:45 +00:00
nekral-guest
05651a338e
Re-indent.
2007-12-28 22:30:02 +00:00
nekral-guest
908e2cbcc7
Avoid assignments in comparisons.
2007-12-28 22:24:02 +00:00