| 1 |
/*- |
| 2 |
* Copyright (C) 1996 |
| 3 |
* David L. Nugent. All rights reserved. |
| 4 |
* |
| 5 |
* Redistribution and use in source and binary forms, with or without |
| 6 |
* modification, are permitted provided that the following conditions |
| 7 |
* are met: |
| 8 |
* 1. Redistributions of source code must retain the above copyright |
| 9 |
* notice, this list of conditions and the following disclaimer. |
| 10 |
* 2. Redistributions in binary form must reproduce the above copyright |
| 11 |
* notice, this list of conditions and the following disclaimer in the |
| 12 |
* documentation and/or other materials provided with the distribution. |
| 13 |
* |
| 14 |
* THIS SOFTWARE IS PROVIDED BY DAVID L. NUGENT AND CONTRIBUTORS ``AS IS'' AND |
| 15 |
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 16 |
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 17 |
* ARE DISCLAIMED. IN NO EVENT SHALL DAVID L. NUGENT OR CONTRIBUTORS BE LIABLE |
| 18 |
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| 19 |
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| 20 |
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 21 |
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| 22 |
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 23 |
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 24 |
* SUCH DAMAGE. |
| 25 |
*/ |
| 26 |
|
| 27 |
#ifndef lint |
| 28 |
static const char rcsid[] = |
| 29 |
"$FreeBSD$"; |
| 30 |
#endif /* not lint */ |
| 31 |
|
| 32 |
#include <ctype.h> |
| 33 |
#include <err.h> |
| 34 |
#include <grp.h> |
| 35 |
#include <libutil.h> |
| 36 |
#include <paths.h> |
| 37 |
#include <string.h> |
| 38 |
#include <sysexits.h> |
| 39 |
#include <termios.h> |
| 40 |
#include <unistd.h> |
| 41 |
|
| 42 |
#include "pw.h" |
| 43 |
#include "bitmap.h" |
| 44 |
|
| 45 |
static struct passwd *lookup_pwent(const char *user); |
| 46 |
static void delete_members(struct group *grp, char *list); |
| 47 |
static int print_group(struct group * grp, bool pretty); |
| 48 |
static gid_t gr_gidpolicy(struct userconf * cnf, intmax_t id); |
| 49 |
|
| 50 |
static void |
| 51 |
grp_set_passwd(struct group *grp, bool update, int fd, bool precrypted) |
| 52 |
{ |
| 53 |
int b; |
| 54 |
int istty; |
| 55 |
struct termios t, n; |
| 56 |
char *p, line[256]; |
| 57 |
|
| 58 |
if (fd == -1) |
| 59 |
return; |
| 60 |
|
| 61 |
if (fd == '-') { |
| 62 |
grp->gr_passwd = "*"; /* No access */ |
| 63 |
return; |
| 64 |
} |
| 65 |
|
| 66 |
if ((istty = isatty(fd))) { |
| 67 |
n = t; |
| 68 |
/* Disable echo */ |
| 69 |
n.c_lflag &= ~(ECHO); |
| 70 |
tcsetattr(fd, TCSANOW, &n); |
| 71 |
printf("%sassword for group %s:", update ? "New p" : "P", |
| 72 |
grp->gr_name); |
| 73 |
fflush(stdout); |
| 74 |
} |
| 75 |
b = read(fd, line, sizeof(line) - 1); |
| 76 |
if (istty) { /* Restore state */ |
| 77 |
tcsetattr(fd, TCSANOW, &t); |
| 78 |
fputc('\n', stdout); |
| 79 |
fflush(stdout); |
| 80 |
} |
| 81 |
if (b < 0) |
| 82 |
err(EX_OSERR, "-h file descriptor"); |
| 83 |
line[b] = '\0'; |
| 84 |
if ((p = strpbrk(line, " \t\r\n")) != NULL) |
| 85 |
*p = '\0'; |
| 86 |
if (!*line) |
| 87 |
errx(EX_DATAERR, "empty password read on file descriptor %d", |
| 88 |
conf.fd); |
| 89 |
if (precrypted) { |
| 90 |
if (strchr(line, ':') != 0) |
| 91 |
errx(EX_DATAERR, "wrong encrypted passwrd"); |
| 92 |
grp->gr_passwd = line; |
| 93 |
} else |
| 94 |
grp->gr_passwd = pw_pwcrypt(line); |
| 95 |
} |
| 96 |
|
| 97 |
int |
| 98 |
pw_groupnext(struct userconf *cnf, bool quiet) |
| 99 |
{ |
| 100 |
gid_t next = gr_gidpolicy(cnf, -1); |
| 101 |
|
| 102 |
if (quiet) |
| 103 |
return (next); |
| 104 |
printf("%ju\n", (uintmax_t)next); |
| 105 |
|
| 106 |
return (EXIT_SUCCESS); |
| 107 |
} |
| 108 |
|
| 109 |
static struct group * |
| 110 |
getgroup(char *name, intmax_t id, bool fatal) |
| 111 |
{ |
| 112 |
struct group *grp; |
| 113 |
|
| 114 |
if (id < 0 && name == NULL) |
| 115 |
errx(EX_DATAERR, "groupname or id required"); |
| 116 |
grp = (name != NULL) ? GETGRNAM(name) : GETGRGID(id); |
| 117 |
if (grp == NULL) { |
| 118 |
if (!fatal) |
| 119 |
return (NULL); |
| 120 |
if (name == NULL) |
| 121 |
errx(EX_DATAERR, "unknown gid `%ju'", id); |
| 122 |
errx(EX_DATAERR, "unknown group `%s'", name); |
| 123 |
} |
| 124 |
return (grp); |
| 125 |
} |
| 126 |
|
| 127 |
/* |
| 128 |
* Lookup a passwd entry using a name or UID. |
| 129 |
*/ |
| 130 |
static struct passwd * |
| 131 |
lookup_pwent(const char *user) |
| 132 |
{ |
| 133 |
struct passwd *pwd; |
| 134 |
|
| 135 |
if ((pwd = GETPWNAM(user)) == NULL && |
| 136 |
(!isdigit((unsigned char)*user) || |
| 137 |
(pwd = getpwuid((uid_t) atoi(user))) == NULL)) |
| 138 |
errx(EX_NOUSER, "user `%s' does not exist", user); |
| 139 |
|
| 140 |
return (pwd); |
| 141 |
} |
| 142 |
|
| 143 |
|
| 144 |
/* |
| 145 |
* Delete requested members from a group. |
| 146 |
*/ |
| 147 |
static void |
| 148 |
delete_members(struct group *grp, char *list) |
| 149 |
{ |
| 150 |
char *p; |
| 151 |
int k; |
| 152 |
|
| 153 |
if (grp->gr_mem == NULL) |
| 154 |
return; |
| 155 |
|
| 156 |
for (p = strtok(list, ", \t"); p != NULL; p = strtok(NULL, ", \t")) { |
| 157 |
for (k = 0; grp->gr_mem[k] != NULL; k++) { |
| 158 |
if (strcmp(grp->gr_mem[k], p) == 0) |
| 159 |
break; |
| 160 |
} |
| 161 |
if (grp->gr_mem[k] == NULL) /* No match */ |
| 162 |
continue; |
| 163 |
|
| 164 |
for (; grp->gr_mem[k] != NULL; k++) |
| 165 |
grp->gr_mem[k] = grp->gr_mem[k+1]; |
| 166 |
} |
| 167 |
} |
| 168 |
|
| 169 |
static gid_t |
| 170 |
gr_gidpolicy(struct userconf * cnf, intmax_t id) |
| 171 |
{ |
| 172 |
struct group *grp; |
| 173 |
struct bitmap bm; |
| 174 |
gid_t gid = (gid_t) - 1; |
| 175 |
|
| 176 |
/* |
| 177 |
* Check the given gid, if any |
| 178 |
*/ |
| 179 |
if (id > 0) { |
| 180 |
gid = (gid_t) id; |
| 181 |
|
| 182 |
if ((grp = GETGRGID(gid)) != NULL && conf.checkduplicate) |
| 183 |
errx(EX_DATAERR, "gid `%ju' has already been allocated", |
| 184 |
(uintmax_t)grp->gr_gid); |
| 185 |
return (gid); |
| 186 |
} |
| 187 |
|
| 188 |
/* |
| 189 |
* We need to allocate the next available gid under one of |
| 190 |
* two policies a) Grab the first unused gid b) Grab the |
| 191 |
* highest possible unused gid |
| 192 |
*/ |
| 193 |
if (cnf->min_gid >= cnf->max_gid) { /* Sanity claus^H^H^H^Hheck */ |
| 194 |
cnf->min_gid = 1000; |
| 195 |
cnf->max_gid = 32000; |
| 196 |
} |
| 197 |
bm = bm_alloc(cnf->max_gid - cnf->min_gid + 1); |
| 198 |
|
| 199 |
/* |
| 200 |
* Now, let's fill the bitmap from the password file |
| 201 |
*/ |
| 202 |
SETGRENT(); |
| 203 |
while ((grp = GETGRENT()) != NULL) |
| 204 |
if ((gid_t)grp->gr_gid >= (gid_t)cnf->min_gid && |
| 205 |
(gid_t)grp->gr_gid <= (gid_t)cnf->max_gid) |
| 206 |
bm_setbit(&bm, grp->gr_gid - cnf->min_gid); |
| 207 |
ENDGRENT(); |
| 208 |
|
| 209 |
/* |
| 210 |
* Then apply the policy, with fallback to reuse if necessary |
| 211 |
*/ |
| 212 |
if (cnf->reuse_gids) |
| 213 |
gid = (gid_t) (bm_firstunset(&bm) + cnf->min_gid); |
| 214 |
else { |
| 215 |
gid = (gid_t) (bm_lastset(&bm) + 1); |
| 216 |
if (!bm_isset(&bm, gid)) |
| 217 |
gid += cnf->min_gid; |
| 218 |
else |
| 219 |
gid = (gid_t) (bm_firstunset(&bm) + cnf->min_gid); |
| 220 |
} |
| 221 |
|
| 222 |
/* |
| 223 |
* Another sanity check |
| 224 |
*/ |
| 225 |
if (gid < cnf->min_gid || gid > cnf->max_gid) |
| 226 |
errx(EX_SOFTWARE, "unable to allocate a new gid - range fully " |
| 227 |
"used"); |
| 228 |
bm_dealloc(&bm); |
| 229 |
return (gid); |
| 230 |
} |
| 231 |
|
| 232 |
static int |
| 233 |
print_group(struct group * grp, bool pretty) |
| 234 |
{ |
| 235 |
char *buf = NULL; |
| 236 |
int i; |
| 237 |
|
| 238 |
if (pretty) { |
| 239 |
printf("Group Name: %-15s #%lu\n" |
| 240 |
" Members: ", |
| 241 |
grp->gr_name, (long) grp->gr_gid); |
| 242 |
if (grp->gr_mem != NULL) { |
| 243 |
for (i = 0; grp->gr_mem[i]; i++) |
| 244 |
printf("%s%s", i ? "," : "", grp->gr_mem[i]); |
| 245 |
} |
| 246 |
fputs("\n\n", stdout); |
| 247 |
return (EXIT_SUCCESS); |
| 248 |
} |
| 249 |
|
| 250 |
buf = gr_make(grp); |
| 251 |
printf("%s\n", buf); |
| 252 |
free(buf); |
| 253 |
return (EXIT_SUCCESS); |
| 254 |
} |
| 255 |
|
| 256 |
int |
| 257 |
pw_group_next(int argc, char **argv, char *arg1 __unused) |
| 258 |
{ |
| 259 |
struct userconf *cnf; |
| 260 |
const char *cfg = NULL; |
| 261 |
int ch; |
| 262 |
bool quiet; |
| 263 |
|
| 264 |
while ((ch = getopt(argc, argv, "Cq")) != -1) { |
| 265 |
switch (ch) { |
| 266 |
case 'C': |
| 267 |
cfg = optarg; |
| 268 |
break; |
| 269 |
case 'q': |
| 270 |
quiet = true; |
| 271 |
break; |
| 272 |
} |
| 273 |
} |
| 274 |
|
| 275 |
if (quiet) |
| 276 |
freopen(_PATH_DEVNULL, "w", stderr); |
| 277 |
cnf = get_userconfig(cfg); |
| 278 |
return (pw_groupnext(cnf, quiet)); |
| 279 |
} |
| 280 |
|
| 281 |
int |
| 282 |
pw_group_show(int argc, char **argv, char *arg1) |
| 283 |
{ |
| 284 |
struct group *grp = NULL; |
| 285 |
char *name; |
| 286 |
intmax_t id = -1; |
| 287 |
int ch; |
| 288 |
bool all, force, quiet, pretty; |
| 289 |
|
| 290 |
all = force = quiet = pretty = false; |
| 291 |
|
| 292 |
struct group fakegroup = { |
| 293 |
"nogroup", |
| 294 |
"*", |
| 295 |
-1, |
| 296 |
NULL |
| 297 |
}; |
| 298 |
|
| 299 |
if (arg1 != NULL) { |
| 300 |
if (arg1[strspn(arg1, "0123456789")] == '\0') |
| 301 |
id = pw_checkid(arg1, GID_MAX); |
| 302 |
else |
| 303 |
name = arg1; |
| 304 |
} |
| 305 |
|
| 306 |
while ((ch = getopt(argc, argv, "C:qn:g:FPa")) != -1) { |
| 307 |
switch (ch) { |
| 308 |
case 'C': |
| 309 |
/* ignore compatibility */ |
| 310 |
break; |
| 311 |
case 'q': |
| 312 |
quiet = true; |
| 313 |
break; |
| 314 |
case 'n': |
| 315 |
name = optarg; |
| 316 |
break; |
| 317 |
case 'g': |
| 318 |
id = pw_checkid(optarg, GID_MAX); |
| 319 |
break; |
| 320 |
case 'F': |
| 321 |
force = true; |
| 322 |
break; |
| 323 |
case 'P': |
| 324 |
pretty = true; |
| 325 |
break; |
| 326 |
case 'a': |
| 327 |
all = true; |
| 328 |
break; |
| 329 |
} |
| 330 |
} |
| 331 |
|
| 332 |
if (quiet) |
| 333 |
freopen(_PATH_DEVNULL, "w", stderr); |
| 334 |
|
| 335 |
if (all) { |
| 336 |
SETGRENT(); |
| 337 |
while ((grp = GETGRENT()) != NULL) |
| 338 |
print_group(grp, pretty); |
| 339 |
ENDGRENT(); |
| 340 |
return (EXIT_SUCCESS); |
| 341 |
} |
| 342 |
|
| 343 |
grp = getgroup(name, id, !force); |
| 344 |
if (grp == NULL) |
| 345 |
grp = &fakegroup; |
| 346 |
|
| 347 |
return (print_group(grp, pretty)); |
| 348 |
} |
| 349 |
|
| 350 |
int |
| 351 |
pw_group_del(int argc, char **argv, char *arg1) |
| 352 |
{ |
| 353 |
struct userconf *cnf = NULL; |
| 354 |
struct group *grp = NULL; |
| 355 |
char *name; |
| 356 |
const char *cfg = NULL; |
| 357 |
intmax_t id = -1; |
| 358 |
int ch, rc; |
| 359 |
bool quiet = false; |
| 360 |
bool nis = false; |
| 361 |
|
| 362 |
if (arg1 != NULL) { |
| 363 |
if (arg1[strspn(arg1, "0123456789")] == '\0') |
| 364 |
id = pw_checkid(arg1, GID_MAX); |
| 365 |
else |
| 366 |
name = arg1; |
| 367 |
} |
| 368 |
|
| 369 |
while ((ch = getopt(argc, argv, "C:qn:g:Y")) != -1) { |
| 370 |
switch (ch) { |
| 371 |
case 'C': |
| 372 |
cfg = optarg; |
| 373 |
break; |
| 374 |
case 'q': |
| 375 |
quiet = true; |
| 376 |
break; |
| 377 |
case 'n': |
| 378 |
name = optarg; |
| 379 |
break; |
| 380 |
case 'g': |
| 381 |
id = pw_checkid(optarg, GID_MAX); |
| 382 |
break; |
| 383 |
case 'Y': |
| 384 |
nis = true; |
| 385 |
break; |
| 386 |
} |
| 387 |
} |
| 388 |
|
| 389 |
if (quiet) |
| 390 |
freopen(_PATH_DEVNULL, "w", stderr); |
| 391 |
grp = getgroup(name, id, true); |
| 392 |
cnf = get_userconfig(cfg); |
| 393 |
rc = delgrent(grp); |
| 394 |
if (rc == -1) |
| 395 |
err(EX_IOERR, "group '%s' not available (NIS?)", name); |
| 396 |
else if (rc != 0) |
| 397 |
err(EX_IOERR, "group update"); |
| 398 |
pw_log(cnf, M_DELETE, W_GROUP, "%s(%ju) removed", name, |
| 399 |
(uintmax_t)id); |
| 400 |
|
| 401 |
if (nis && nis_update() == 0) |
| 402 |
pw_log(cnf, M_DELETE, W_GROUP, "NIS maps updated"); |
| 403 |
|
| 404 |
return (EXIT_SUCCESS); |
| 405 |
} |
| 406 |
|
| 407 |
static bool |
| 408 |
grp_has_member(struct group *grp, const char *name) |
| 409 |
{ |
| 410 |
int j; |
| 411 |
|
| 412 |
for (j = 0; grp->gr_mem != NULL && grp->gr_mem[j] != NULL; j++) |
| 413 |
if (strcmp(grp->gr_mem[j], name) == 0) |
| 414 |
return (true); |
| 415 |
return (false); |
| 416 |
} |
| 417 |
|
| 418 |
static void |
| 419 |
grp_add_members(struct group **grp, char *members) |
| 420 |
{ |
| 421 |
struct passwd *pwd; |
| 422 |
char *p; |
| 423 |
char tok[] = ", \t"; |
| 424 |
|
| 425 |
if (members == NULL) |
| 426 |
return; |
| 427 |
for (p = strtok(members, tok); p != NULL; p = strtok(NULL, tok)) { |
| 428 |
pwd = lookup_pwent(p); |
| 429 |
if (grp_has_member(*grp, pwd->pw_name)) |
| 430 |
continue; |
| 431 |
*grp = gr_add(*grp, pwd->pw_name); |
| 432 |
} |
| 433 |
} |
| 434 |
|
| 435 |
int |
| 436 |
groupadd(struct userconf *cnf, char *name, gid_t id, char *members, int fd, |
| 437 |
bool dryrun, bool pretty, bool precrypted) |
| 438 |
{ |
| 439 |
struct group *grp; |
| 440 |
int rc; |
| 441 |
|
| 442 |
struct group fakegroup = { |
| 443 |
"nogroup", |
| 444 |
"*", |
| 445 |
-1, |
| 446 |
NULL |
| 447 |
}; |
| 448 |
|
| 449 |
grp = &fakegroup; |
| 450 |
grp->gr_name = pw_checkname(name, 0); |
| 451 |
grp->gr_passwd = "*"; |
| 452 |
grp->gr_gid = gr_gidpolicy(cnf, id); |
| 453 |
grp->gr_mem = NULL; |
| 454 |
|
| 455 |
/* |
| 456 |
* This allows us to set a group password Group passwords is an |
| 457 |
* antique idea, rarely used and insecure (no secure database) Should |
| 458 |
* be discouraged, but it is apparently still supported by some |
| 459 |
* software. |
| 460 |
*/ |
| 461 |
grp_set_passwd(grp, false, fd, precrypted); |
| 462 |
grp_add_members(&grp, members); |
| 463 |
if (dryrun) |
| 464 |
return (print_group(grp, pretty)); |
| 465 |
|
| 466 |
if ((rc = addgrent(grp)) != 0) { |
| 467 |
if (rc == -1) |
| 468 |
errx(EX_IOERR, "group '%s' already exists", |
| 469 |
grp->gr_name); |
| 470 |
else |
| 471 |
err(EX_IOERR, "group update"); |
| 472 |
} |
| 473 |
|
| 474 |
pw_log(cnf, M_ADD, W_GROUP, "%s(%ju)", grp->gr_name, |
| 475 |
(uintmax_t)grp->gr_gid); |
| 476 |
|
| 477 |
return (EXIT_SUCCESS); |
| 478 |
} |
| 479 |
|
| 480 |
int |
| 481 |
pw_group_add(int argc, char **argv, char *arg1) |
| 482 |
{ |
| 483 |
struct userconf *cnf = NULL; |
| 484 |
char *name = NULL; |
| 485 |
char *members = NULL; |
| 486 |
const char *cfg = NULL; |
| 487 |
intmax_t id = -1; |
| 488 |
int ch, rc, fd = -1; |
| 489 |
bool quiet, precrypted, dryrun, pretty, nis; |
| 490 |
|
| 491 |
quiet = precrypted = dryrun = pretty = nis = false; |
| 492 |
|
| 493 |
if (arg1 != NULL) { |
| 494 |
if (arg1[strspn(arg1, "0123456789")] == '\0') |
| 495 |
id = pw_checkid(arg1, GID_MAX); |
| 496 |
else |
| 497 |
name = arg1; |
| 498 |
} |
| 499 |
|
| 500 |
while ((ch = getopt(argc, argv, "C:qn:g:h:H:M:oNPY")) != -1) { |
| 501 |
switch (ch) { |
| 502 |
case 'C': |
| 503 |
cfg = optarg; |
| 504 |
break; |
| 505 |
case 'q': |
| 506 |
quiet = true; |
| 507 |
break; |
| 508 |
case 'n': |
| 509 |
name = optarg; |
| 510 |
break; |
| 511 |
case 'g': |
| 512 |
id = pw_checkid(optarg, GID_MAX); |
| 513 |
break; |
| 514 |
case 'H': |
| 515 |
if (fd != -1) |
| 516 |
errx(EX_USAGE, "'-h' and '-H' are mutually " |
| 517 |
"exclusive options"); |
| 518 |
fd = pw_checkfd(optarg); |
| 519 |
precrypted = true; |
| 520 |
if (fd == '-') |
| 521 |
errx(EX_USAGE, "-H expects a file descriptor"); |
| 522 |
break; |
| 523 |
case 'h': |
| 524 |
if (fd != -1) |
| 525 |
errx(EX_USAGE, "'-h' and '-H' are mutually " |
| 526 |
"exclusive options"); |
| 527 |
fd = pw_checkfd(optarg); |
| 528 |
break; |
| 529 |
case 'M': |
| 530 |
members = optarg; |
| 531 |
break; |
| 532 |
case 'o': |
| 533 |
conf.checkduplicate = false; |
| 534 |
break; |
| 535 |
case 'N': |
| 536 |
dryrun = true; |
| 537 |
break; |
| 538 |
case 'P': |
| 539 |
pretty = true; |
| 540 |
break; |
| 541 |
case 'Y': |
| 542 |
nis = true; |
| 543 |
break; |
| 544 |
} |
| 545 |
} |
| 546 |
|
| 547 |
if (quiet) |
| 548 |
freopen(_PATH_DEVNULL, "w", stderr); |
| 549 |
if (name == NULL) |
| 550 |
errx(EX_DATAERR, "group name required"); |
| 551 |
if (GETGRNAM(name) != NULL) |
| 552 |
errx(EX_DATAERR, "group name `%s' already exists", name); |
| 553 |
cnf = get_userconfig(cfg); |
| 554 |
rc = groupadd(cnf, name, gr_gidpolicy(cnf, id), members, fd, dryrun, |
| 555 |
pretty, precrypted); |
| 556 |
if (nis && rc == EXIT_SUCCESS && nis_update() == 0) |
| 557 |
pw_log(cnf, M_ADD, W_GROUP, "NIS maps updated"); |
| 558 |
|
| 559 |
return (rc); |
| 560 |
} |
| 561 |
|
| 562 |
int |
| 563 |
pw_group_mod(int argc, char **argv, char *arg1) |
| 564 |
{ |
| 565 |
struct userconf *cnf; |
| 566 |
struct group *grp = NULL; |
| 567 |
const char *cfg = NULL; |
| 568 |
char *oldmembers = NULL; |
| 569 |
char *members = NULL; |
| 570 |
char *newmembers = NULL; |
| 571 |
char *newname = NULL; |
| 572 |
char *name = NULL; |
| 573 |
intmax_t id = -1; |
| 574 |
int ch, rc, fd = -1; |
| 575 |
bool quiet, pretty, dryrun, nis, precrypted; |
| 576 |
|
| 577 |
quiet = pretty = dryrun = nis = precrypted = false; |
| 578 |
|
| 579 |
if (arg1 != NULL) { |
| 580 |
if (arg1[strspn(arg1, "0123456789")] == '\0') |
| 581 |
id = pw_checkid(arg1, GID_MAX); |
| 582 |
else |
| 583 |
name = arg1; |
| 584 |
} |
| 585 |
|
| 586 |
while ((ch = getopt(argc, argv, "C:qn:d:g:l:h:H:M:m:NPY")) != -1) { |
| 587 |
switch (ch) { |
| 588 |
case 'C': |
| 589 |
cfg = optarg; |
| 590 |
break; |
| 591 |
case 'q': |
| 592 |
quiet = true; |
| 593 |
break; |
| 594 |
case 'n': |
| 595 |
name = optarg; |
| 596 |
break; |
| 597 |
case 'g': |
| 598 |
id = pw_checkid(optarg, GID_MAX); |
| 599 |
break; |
| 600 |
case 'd': |
| 601 |
oldmembers = optarg; |
| 602 |
break; |
| 603 |
case 'l': |
| 604 |
newname = optarg; |
| 605 |
break; |
| 606 |
case 'H': |
| 607 |
if (fd != -1) |
| 608 |
errx(EX_USAGE, "'-h' and '-H' are mutually " |
| 609 |
"exclusive options"); |
| 610 |
fd = pw_checkfd(optarg); |
| 611 |
precrypted = true; |
| 612 |
if (fd == '-') |
| 613 |
errx(EX_USAGE, "-H expects a file descriptor"); |
| 614 |
break; |
| 615 |
case 'h': |
| 616 |
if (fd != -1) |
| 617 |
errx(EX_USAGE, "'-h' and '-H' are mutually " |
| 618 |
"exclusive options"); |
| 619 |
fd = pw_checkfd(optarg); |
| 620 |
break; |
| 621 |
case 'M': |
| 622 |
members = optarg; |
| 623 |
break; |
| 624 |
case 'm': |
| 625 |
newmembers = optarg; |
| 626 |
break; |
| 627 |
case 'N': |
| 628 |
dryrun = true; |
| 629 |
break; |
| 630 |
case 'P': |
| 631 |
pretty = true; |
| 632 |
break; |
| 633 |
case 'Y': |
| 634 |
nis = true; |
| 635 |
break; |
| 636 |
} |
| 637 |
} |
| 638 |
if (quiet) |
| 639 |
freopen(_PATH_DEVNULL, "w", stderr); |
| 640 |
cnf = get_userconfig(cfg); |
| 641 |
grp = getgroup(name, id, true); |
| 642 |
if (name == NULL) |
| 643 |
name = grp->gr_name; |
| 644 |
if (id > 0) |
| 645 |
grp->gr_gid = id; |
| 646 |
|
| 647 |
if (newname != NULL) |
| 648 |
grp->gr_name = pw_checkname(newname, 0); |
| 649 |
|
| 650 |
grp_set_passwd(grp, true, fd, precrypted); |
| 651 |
/* |
| 652 |
* Keep the same logic as old code for now: |
| 653 |
* if -M is passed, -d and -m are ignored |
| 654 |
* then id -d, -m is ignored |
| 655 |
* last is -m |
| 656 |
*/ |
| 657 |
|
| 658 |
if (members) { |
| 659 |
grp->gr_mem = NULL; |
| 660 |
grp_add_members(&grp, members); |
| 661 |
} else if (oldmembers) { |
| 662 |
delete_members(grp, oldmembers); |
| 663 |
} else if (newmembers) { |
| 664 |
grp_add_members(&grp, newmembers); |
| 665 |
} |
| 666 |
|
| 667 |
if ((rc = chggrent(name, grp)) != 0) { |
| 668 |
if (rc == -1) |
| 669 |
errx(EX_IOERR, "group '%s' not available (NIS?)", |
| 670 |
grp->gr_name); |
| 671 |
else |
| 672 |
err(EX_IOERR, "group update"); |
| 673 |
} |
| 674 |
|
| 675 |
if (newname) |
| 676 |
name = newname; |
| 677 |
|
| 678 |
/* grp may have been invalidated */ |
| 679 |
if ((grp = GETGRNAM(name)) == NULL) |
| 680 |
errx(EX_SOFTWARE, "group disappeared during update"); |
| 681 |
|
| 682 |
pw_log(cnf, M_UPDATE, W_GROUP, "%s(%ju)", grp->gr_name, |
| 683 |
(uintmax_t)grp->gr_gid); |
| 684 |
|
| 685 |
if (nis && nis_update() == 0) |
| 686 |
pw_log(cnf, M_UPDATE, W_GROUP, "NIS maps updated"); |
| 687 |
|
| 688 |
return (EXIT_SUCCESS); |
| 689 |
} |