c7302b61ef
Files with no license use the default 3-clauses BSD license. The copyright were mostly not recorded; they were updated according to the Changelog. "Julianne Frances Haugh and contributors" changed to "copyright holders and contributors".
195 lines
5.0 KiB
C
195 lines
5.0 KiB
C
/*
|
|
* Copyright (c) 1996 - 2000, Marek Michałkiewicz
|
|
* Copyright (c) 2002 - 2006, Tomasz Kłoczko
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. The name of the copyright holders or contributors may not be used to
|
|
* endorse or promote products derived from this software without
|
|
* specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
|
|
* PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
* HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
/*
|
|
* grpconv - create or update /etc/gshadow with information from
|
|
* /etc/group.
|
|
*
|
|
*/
|
|
|
|
#include <config.h>
|
|
#ident "$Id$"
|
|
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <grp.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <time.h>
|
|
#include <unistd.h>
|
|
#include "nscd.h"
|
|
#include "prototypes.h"
|
|
#ifdef SHADOWGRP
|
|
#include "groupio.h"
|
|
#include "sgroupio.h"
|
|
/*
|
|
* Global variables
|
|
*/
|
|
static int group_locked = 0;
|
|
static int gshadow_locked = 0;
|
|
|
|
/* local function prototypes */
|
|
static void fail_exit (int);
|
|
|
|
static void fail_exit (int status)
|
|
{
|
|
if (group_locked)
|
|
gr_unlock ();
|
|
if (gshadow_locked)
|
|
sgr_unlock ();
|
|
exit (status);
|
|
}
|
|
|
|
int main (int argc, char **argv)
|
|
{
|
|
const struct group *gr;
|
|
struct group grent;
|
|
const struct sgrp *sg;
|
|
struct sgrp sgent;
|
|
char *Prog = argv[0];
|
|
|
|
setlocale (LC_ALL, "");
|
|
bindtextdomain (PACKAGE, LOCALEDIR);
|
|
textdomain (PACKAGE);
|
|
|
|
if (!gr_lock ()) {
|
|
fprintf (stderr, _("%s: can't lock group file\n"), Prog);
|
|
fail_exit (5);
|
|
}
|
|
group_locked++;
|
|
if (!gr_open (O_RDWR)) {
|
|
fprintf (stderr, _("%s: can't open group file\n"), Prog);
|
|
fail_exit (1);
|
|
}
|
|
|
|
if (!sgr_lock ()) {
|
|
fprintf (stderr, _("%s: can't lock shadow group file\n"), Prog);
|
|
fail_exit (5);
|
|
}
|
|
gshadow_locked++;
|
|
if (!sgr_open (O_CREAT | O_RDWR)) {
|
|
fprintf (stderr, _("%s: can't open shadow group file\n"), Prog);
|
|
fail_exit (1);
|
|
}
|
|
|
|
/*
|
|
* Remove /etc/gshadow entries for groups not in /etc/group.
|
|
*/
|
|
sgr_rewind ();
|
|
while ((sg = sgr_next ())) {
|
|
if (gr_locate (sg->sg_name))
|
|
continue;
|
|
|
|
if (!sgr_remove (sg->sg_name)) {
|
|
/*
|
|
* This shouldn't happen (the entry exists) but...
|
|
*/
|
|
fprintf (stderr,
|
|
_("%s: can't remove shadow group %s\n"),
|
|
Prog, sg->sg_name);
|
|
fail_exit (3);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Update shadow group passwords if non-shadow password is not "x".
|
|
* Add any missing shadow group entries.
|
|
*/
|
|
gr_rewind ();
|
|
while ((gr = gr_next ())) {
|
|
sg = sgr_locate (gr->gr_name);
|
|
if (sg) {
|
|
/* update existing shadow group entry */
|
|
sgent = *sg;
|
|
if (strcmp (gr->gr_passwd, SHADOW_PASSWD_STRING) != 0)
|
|
sgent.sg_passwd = gr->gr_passwd;
|
|
} else {
|
|
static char *empty = 0;
|
|
|
|
/* add new shadow group entry */
|
|
memset (&sgent, 0, sizeof sgent);
|
|
sgent.sg_name = gr->gr_name;
|
|
sgent.sg_passwd = gr->gr_passwd;
|
|
sgent.sg_adm = ∅
|
|
}
|
|
/*
|
|
* XXX - sg_mem is redundant, it is currently always a copy
|
|
* of gr_mem. Very few programs actually use sg_mem, and all
|
|
* of them are in the shadow suite. Maybe this field could
|
|
* be used for something else? Any suggestions?
|
|
*/
|
|
sgent.sg_mem = gr->gr_mem;
|
|
|
|
if (!sgr_update (&sgent)) {
|
|
fprintf (stderr,
|
|
_
|
|
("%s: can't update shadow entry for %s\n"),
|
|
Prog, sgent.sg_name);
|
|
fail_exit (3);
|
|
}
|
|
/* remove password from /etc/group */
|
|
grent = *gr;
|
|
grent.gr_passwd = SHADOW_PASSWD_STRING; /* XXX warning: const */
|
|
if (!gr_update (&grent)) {
|
|
fprintf (stderr,
|
|
_
|
|
("%s: can't update entry for group %s\n"),
|
|
Prog, grent.gr_name);
|
|
fail_exit (3);
|
|
}
|
|
}
|
|
|
|
if (!sgr_close ()) {
|
|
fprintf (stderr, _("%s: can't update shadow group file\n"),
|
|
Prog);
|
|
fail_exit (3);
|
|
}
|
|
if (!gr_close ()) {
|
|
fprintf (stderr, _("%s: can't update group file\n"), Prog);
|
|
fail_exit (3);
|
|
}
|
|
sgr_unlock ();
|
|
gr_unlock ();
|
|
|
|
nscd_flush_cache ("group");
|
|
|
|
return 0;
|
|
}
|
|
#else /* !SHADOWGRP */
|
|
int main (int argc, char **argv)
|
|
{
|
|
fprintf (stderr,
|
|
"%s: not configured for shadow group support.\n", argv[0]);
|
|
exit (1);
|
|
}
|
|
#endif /* !SHADOWGRP */
|
|
|