/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License (the "License"). * You may not use this file except in compliance with the License. * * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE * or http://www.opensolaris.org/os/licensing. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at usr/src/OPENSOLARIS.LICENSE. * If applicable, add the following below this CDDL HEADER, with the * fields enclosed by brackets "[]" replaced with your own identifying * information: Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END */ /* * Copyright 2006 Sun Microsystems, Inc. All rights reserved. * Use is subject to license terms. * * getpwent.c * * lib/nsswitch/compat/getpwent.c -- name-service-switch backend for getpwnam() * et al that does 4.x compatibility. It looks in /etc/passwd; if it finds * passwd entries there that begin with "+" or "-", it consults other * services. By default it uses NIS (YP), but the user can override this * with a "passwd_compat" entry in /etc/nsswitch.conf, e.g. * passwd_compat: nisplus * * This code tries to produce the same results as the 4.x code, even when * the latter seems ill thought-out (mostly in the handling of netgroups, * "-", and the combination thereof). Bug-compatible, in other words. * Though we do try to be more reasonable about the format of "+" and "-" * entries here, i.e. you don't have to pad them with spurious colons and * bogus uid/gid values. * * Caveats: * - More than one source may be specified, with the usual switch semantics, * but having multiple sources here is definitely odd. * - People who recursively specify "compat" deserve what they get. * - Entries that begin with "+@" or "-@" are interpreted using * getnetgrent() and innetgr(), which use the "netgroup" entry in * /etc/nsswitch.conf. If the sources for "passwd_compat" and "netgroup" * differ, everything should work fine, but the semantics will be pretty * confusing. */ #pragma ident "%Z%%M% %I% %E% SMI" #include #include /* For PASSWD (pathname to passwd file) */ #include #include #include "compat_common.h" static DEFINE_NSS_DB_ROOT(db_root); static void _nss_initf_passwd_compat(p) nss_db_params_t *p; { p->name = NSS_DBNAM_PASSWD; p->config_name = NSS_DBNAM_PASSWD_COMPAT; p->default_config = NSS_DEFCONF_PASSWD_COMPAT; } static const char * get_pwname(argp) nss_XbyY_args_t *argp; { struct passwd *p = (struct passwd *)argp->returnval; return (p->pw_name); } static int check_pwname(argp) nss_XbyY_args_t *argp; { struct passwd *p = (struct passwd *)argp->returnval; return (strcmp(p->pw_name, argp->key.name) == 0); } static nss_status_t getbyname(be, a) compat_backend_ptr_t be; void *a; { nss_XbyY_args_t *argp = (nss_XbyY_args_t *)a; return (_nss_compat_XY_all(be, argp, check_pwname, NSS_DBOP_PASSWD_BYNAME)); } static int check_pwuid(argp) nss_XbyY_args_t *argp; { struct passwd *p = (struct passwd *)argp->returnval; return (p->pw_uid == argp->key.uid); } static nss_status_t getbyuid(be, a) compat_backend_ptr_t be; void *a; { nss_XbyY_args_t *argp = (nss_XbyY_args_t *)a; return (_nss_compat_XY_all(be, argp, check_pwuid, NSS_DBOP_PASSWD_BYUID)); } /*ARGSUSED*/ static int merge_pwents(be, argp, fields) compat_backend_ptr_t be; nss_XbyY_args_t *argp; const char **fields; { struct passwd *pw = (struct passwd *)argp->buf.result; char *buf = malloc(NSS_LINELEN_PASSWD); char *s; int parsestat; int len; int buflen; if (buf == 0) { return (NSS_STR_PARSE_PARSE); /* Really "out of memory", but PARSE_PARSE will have to do */ } /* * Don't allow overriding of * - username * - uid * - gid * That's what the SunOS 4.x code did; who are we to question it... */ s = buf; buflen = argp->buf.buflen; if (fields[1] != 0) len = snprintf(s, buflen, "%s:%s", pw->pw_name, fields[1]); else { /* ====> Does this do the right thing? */ if (pw->pw_age != 0 && *pw->pw_age != '\0') len = snprintf(s, buflen, "%s:%s,%s", pw->pw_name, pw->pw_passwd, pw->pw_age); else len = snprintf(s, buflen, "%s:%s", pw->pw_name, pw->pw_passwd); } if (len > buflen) return (NSS_STR_PARSE_ERANGE); s += len; buflen -= len; len = snprintf(s, buflen, ":%ld:%ld:%s:%s:%s", pw->pw_uid, pw->pw_gid, fields[4] != 0 ? fields[4] : pw->pw_gecos, fields[5] != 0 ? fields[5] : pw->pw_dir, fields[6] != 0 ? fields[6] : pw->pw_shell); if (len > buflen) return (NSS_STR_PARSE_ERANGE); s += len; len = s - buf; /* * if asked, return the data in /etc file format */ if (be->return_string_data == 1) { /* reset the result ptr to the original value */ argp->buf.result = NULL; if (len > argp->buf.buflen) { parsestat = NSS_STR_PARSE_ERANGE; } else { (void) strncpy(argp->buf.buffer, buf, len); argp->returnval = argp->buf.buffer; argp->returnlen = len; parsestat = NSS_SUCCESS; } } else { parsestat = (*argp->str2ent)(buf, len, argp->buf.result, argp->buf.buffer, argp->buf.buflen); } free(buf); return (parsestat); } static compat_backend_op_t passwd_ops[] = { _nss_compat_destr, _nss_compat_endent, _nss_compat_setent, _nss_compat_getent, getbyname, getbyuid }; /*ARGSUSED*/ nss_backend_t * _nss_compat_passwd_constr(dummy1, dummy2, dummy3) const char *dummy1, *dummy2, *dummy3; { return (_nss_compat_constr(passwd_ops, sizeof (passwd_ops) / sizeof (passwd_ops[0]), PASSWD, NSS_LINELEN_PASSWD, &db_root, _nss_initf_passwd_compat, 1, get_pwname, merge_pwents)); }