1 /*-
2 * SPDX-License-Identifier: BSD-3-Clause
3 *
4 * Copyright (c) 1991, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/param.h>
33 #include <sys/mac.h>
34
35 #ifdef USE_BSM_AUDIT
36 #include <bsm/audit.h>
37 #endif
38
39 #include <err.h>
40 #include <errno.h>
41 #include <grp.h>
42 #include <pwd.h>
43 #include <stdint.h>
44 #include <stdio.h>
45 #include <stdlib.h>
46 #include <string.h>
47 #include <unistd.h>
48
49 static void id_print(struct passwd *, int, int, int);
50 static void pline(struct passwd *);
51 static void pretty(struct passwd *);
52 #ifdef USE_BSM_AUDIT
53 static void auditid(void);
54 #endif
55 static void group(struct passwd *, int);
56 static void maclabel(void);
57 static void usage(void);
58 static struct passwd *who(char *);
59
60 static int isgroups, iswhoami;
61
62 int
main(int argc,char * argv[])63 main(int argc, char *argv[])
64 {
65 struct group *gr;
66 struct passwd *pw;
67 int Gflag, Mflag, Pflag, ch, gflag, id, nflag, pflag, rflag, uflag;
68 int Aflag, cflag;
69 int error;
70 const char *myname;
71 char loginclass[MAXLOGNAME];
72
73 Gflag = Mflag = Pflag = gflag = nflag = pflag = rflag = uflag = 0;
74 Aflag = cflag = 0;
75
76 myname = strrchr(argv[0], '/');
77 myname = (myname != NULL) ? myname + 1 : argv[0];
78 if (strcmp(myname, "groups") == 0) {
79 isgroups = 1;
80 Gflag = nflag = 1;
81 }
82 else if (strcmp(myname, "whoami") == 0) {
83 iswhoami = 1;
84 uflag = nflag = 1;
85 }
86
87 while ((ch = getopt(argc, argv,
88 (isgroups || iswhoami) ? "" : "APGMacgnpru")) != -1)
89 switch(ch) {
90 #ifdef USE_BSM_AUDIT
91 case 'A':
92 Aflag = 1;
93 break;
94 #endif
95 case 'G':
96 Gflag = 1;
97 break;
98 case 'M':
99 Mflag = 1;
100 break;
101 case 'P':
102 Pflag = 1;
103 break;
104 case 'a':
105 break;
106 case 'c':
107 cflag = 1;
108 break;
109 case 'g':
110 gflag = 1;
111 break;
112 case 'n':
113 nflag = 1;
114 break;
115 case 'p':
116 pflag = 1;
117 break;
118 case 'r':
119 rflag = 1;
120 break;
121 case 'u':
122 uflag = 1;
123 break;
124 case '?':
125 default:
126 usage();
127 }
128 argc -= optind;
129 argv += optind;
130
131 if (iswhoami && argc > 0)
132 usage();
133 if ((cflag || Aflag || Mflag) && argc > 0)
134 usage();
135
136 switch(Aflag + Gflag + Mflag + Pflag + gflag + pflag + uflag) {
137 case 1:
138 break;
139 case 0:
140 if (!nflag && !rflag)
141 break;
142 /* FALLTHROUGH */
143 default:
144 usage();
145 }
146
147 pw = *argv ? who(*argv) : NULL;
148
149 if (Mflag && pw != NULL)
150 usage();
151
152 #ifdef USE_BSM_AUDIT
153 if (Aflag) {
154 auditid();
155 exit(0);
156 }
157 #endif
158
159 if (cflag) {
160 error = getloginclass(loginclass, sizeof(loginclass));
161 if (error != 0)
162 err(1, "loginclass");
163 (void)printf("%s\n", loginclass);
164 exit(0);
165 }
166
167 if (gflag) {
168 id = pw ? pw->pw_gid : rflag ? getgid() : getegid();
169 if (nflag && (gr = getgrgid(id)))
170 (void)printf("%s\n", gr->gr_name);
171 else
172 (void)printf("%u\n", id);
173 exit(0);
174 }
175
176 if (uflag) {
177 id = pw ? pw->pw_uid : rflag ? getuid() : geteuid();
178 if (nflag && (pw = getpwuid(id)))
179 (void)printf("%s\n", pw->pw_name);
180 else
181 (void)printf("%u\n", id);
182 exit(0);
183 }
184
185 if (Gflag) {
186 group(pw, nflag);
187 exit(0);
188 }
189
190 if (Mflag) {
191 maclabel();
192 exit(0);
193 }
194
195 if (Pflag) {
196 pline(pw);
197 exit(0);
198 }
199
200 if (pflag) {
201 pretty(pw);
202 exit(0);
203 }
204
205 if (pw) {
206 id_print(pw, 1, 0, 0);
207 }
208 else {
209 id = getuid();
210 pw = getpwuid(id);
211 id_print(pw, 0, 1, 1);
212 }
213 exit(0);
214 }
215
216 static void
pretty(struct passwd * pw)217 pretty(struct passwd *pw)
218 {
219 struct group *gr;
220 u_int eid, rid;
221 char *login;
222
223 if (pw) {
224 (void)printf("uid\t%s\n", pw->pw_name);
225 (void)printf("groups\t");
226 group(pw, 1);
227 } else {
228 if ((login = getlogin()) == NULL)
229 err(1, "getlogin");
230
231 pw = getpwuid(rid = getuid());
232 if (pw == NULL || strcmp(login, pw->pw_name))
233 (void)printf("login\t%s\n", login);
234 if (pw)
235 (void)printf("uid\t%s\n", pw->pw_name);
236 else
237 (void)printf("uid\t%u\n", rid);
238
239 if ((eid = geteuid()) != rid) {
240 if ((pw = getpwuid(eid)))
241 (void)printf("euid\t%s\n", pw->pw_name);
242 else
243 (void)printf("euid\t%u\n", eid);
244 }
245 if ((rid = getgid()) != (eid = getegid())) {
246 if ((gr = getgrgid(rid)))
247 (void)printf("rgid\t%s\n", gr->gr_name);
248 else
249 (void)printf("rgid\t%u\n", rid);
250 }
251 (void)printf("groups\t");
252 group(NULL, 1);
253 }
254 }
255
256 static void
id_print(struct passwd * pw,int use_ggl,int p_euid,int p_egid)257 id_print(struct passwd *pw, int use_ggl, int p_euid, int p_egid)
258 {
259 struct group *gr;
260 gid_t gid, egid, lastgid;
261 uid_t uid, euid;
262 int cnt, ngroups;
263 long ngroups_max;
264 gid_t *groups;
265 const char *fmt;
266
267 if (pw != NULL) {
268 uid = pw->pw_uid;
269 gid = pw->pw_gid;
270 }
271 else {
272 uid = getuid();
273 gid = getgid();
274 }
275
276 ngroups_max = sysconf(_SC_NGROUPS_MAX) + 1;
277 if ((groups = malloc(sizeof(gid_t) * ngroups_max)) == NULL)
278 err(1, "malloc");
279
280 if (use_ggl && pw != NULL) {
281 ngroups = ngroups_max;
282 getgrouplist(pw->pw_name, gid, groups, &ngroups);
283 }
284 else {
285 ngroups = getgroups(ngroups_max, groups);
286 }
287
288 if (pw != NULL)
289 printf("uid=%u(%s)", uid, pw->pw_name);
290 else
291 printf("uid=%u", getuid());
292 printf(" gid=%u", gid);
293 if ((gr = getgrgid(gid)))
294 (void)printf("(%s)", gr->gr_name);
295 if (p_euid && (euid = geteuid()) != uid) {
296 (void)printf(" euid=%u", euid);
297 if ((pw = getpwuid(euid)))
298 (void)printf("(%s)", pw->pw_name);
299 }
300 if (p_egid && (egid = getegid()) != gid) {
301 (void)printf(" egid=%u", egid);
302 if ((gr = getgrgid(egid)))
303 (void)printf("(%s)", gr->gr_name);
304 }
305 fmt = " groups=%u";
306 for (lastgid = -1, cnt = 0; cnt < ngroups; ++cnt) {
307 if (lastgid == (gid = groups[cnt]))
308 continue;
309 printf(fmt, gid);
310 fmt = ",%u";
311 if ((gr = getgrgid(gid)))
312 printf("(%s)", gr->gr_name);
313 lastgid = gid;
314 }
315 printf("\n");
316 free(groups);
317 }
318
319 #ifdef USE_BSM_AUDIT
320 static void
auditid(void)321 auditid(void)
322 {
323 auditinfo_t auditinfo;
324 auditinfo_addr_t ainfo_addr;
325 int ret, extended;
326
327 extended = 0;
328 ret = getaudit(&auditinfo);
329 if (ret < 0 && errno == E2BIG) {
330 if (getaudit_addr(&ainfo_addr, sizeof(ainfo_addr)) < 0)
331 err(1, "getaudit_addr");
332 extended = 1;
333 } else if (ret < 0)
334 err(1, "getaudit");
335 if (extended != 0) {
336 (void) printf("auid=%d\n"
337 "mask.success=0x%08x\n"
338 "mask.failure=0x%08x\n"
339 "asid=%d\n"
340 "termid_addr.port=0x%08jx\n"
341 "termid_addr.addr[0]=0x%08x\n"
342 "termid_addr.addr[1]=0x%08x\n"
343 "termid_addr.addr[2]=0x%08x\n"
344 "termid_addr.addr[3]=0x%08x\n",
345 ainfo_addr.ai_auid, ainfo_addr.ai_mask.am_success,
346 ainfo_addr.ai_mask.am_failure, ainfo_addr.ai_asid,
347 (uintmax_t)ainfo_addr.ai_termid.at_port,
348 ainfo_addr.ai_termid.at_addr[0],
349 ainfo_addr.ai_termid.at_addr[1],
350 ainfo_addr.ai_termid.at_addr[2],
351 ainfo_addr.ai_termid.at_addr[3]);
352 } else {
353 (void) printf("auid=%d\n"
354 "mask.success=0x%08x\n"
355 "mask.failure=0x%08x\n"
356 "asid=%d\n"
357 "termid.port=0x%08jx\n"
358 "termid.machine=0x%08x\n",
359 auditinfo.ai_auid, auditinfo.ai_mask.am_success,
360 auditinfo.ai_mask.am_failure,
361 auditinfo.ai_asid, (uintmax_t)auditinfo.ai_termid.port,
362 auditinfo.ai_termid.machine);
363 }
364 }
365 #endif
366
367 static void
group(struct passwd * pw,int nflag)368 group(struct passwd *pw, int nflag)
369 {
370 struct group *gr;
371 int cnt, id, lastid, ngroups;
372 long ngroups_max;
373 gid_t *groups;
374 const char *fmt;
375
376 ngroups_max = sysconf(_SC_NGROUPS_MAX) + 1;
377 if ((groups = malloc(sizeof(gid_t) * (ngroups_max))) == NULL)
378 err(1, "malloc");
379
380 if (pw) {
381 ngroups = ngroups_max;
382 (void) getgrouplist(pw->pw_name, pw->pw_gid, groups, &ngroups);
383 } else {
384 ngroups = getgroups(ngroups_max, groups);
385 }
386 fmt = nflag ? "%s" : "%u";
387 for (lastid = -1, cnt = 0; cnt < ngroups; ++cnt) {
388 if (lastid == (id = groups[cnt]))
389 continue;
390 if (nflag) {
391 if ((gr = getgrgid(id)))
392 (void)printf(fmt, gr->gr_name);
393 else
394 (void)printf(*fmt == ' ' ? " %u" : "%u",
395 id);
396 fmt = " %s";
397 } else {
398 (void)printf(fmt, id);
399 fmt = " %u";
400 }
401 lastid = id;
402 }
403 (void)printf("\n");
404 free(groups);
405 }
406
407 static void
maclabel(void)408 maclabel(void)
409 {
410 char *string;
411 mac_t label;
412 int error;
413
414 error = mac_prepare_process_label(&label);
415 if (error == -1)
416 errx(1, "mac_prepare_type: %s", strerror(errno));
417
418 error = mac_get_proc(label);
419 if (error == -1)
420 errx(1, "mac_get_proc: %s", strerror(errno));
421
422 error = mac_to_text(label, &string);
423 if (error == -1)
424 errx(1, "mac_to_text: %s", strerror(errno));
425
426 (void)printf("%s\n", string);
427 mac_free(label);
428 free(string);
429 }
430
431 static struct passwd *
who(char * u)432 who(char *u)
433 {
434 struct passwd *pw;
435 long id;
436 char *ep;
437
438 /*
439 * Translate user argument into a pw pointer. First, try to
440 * get it as specified. If that fails, try it as a number.
441 */
442 if ((pw = getpwnam(u)))
443 return(pw);
444 id = strtol(u, &ep, 10);
445 if (*u && !*ep && (pw = getpwuid(id)))
446 return(pw);
447 errx(1, "%s: no such user", u);
448 /* NOTREACHED */
449 }
450
451 static void
pline(struct passwd * pw)452 pline(struct passwd *pw)
453 {
454
455 if (!pw) {
456 if ((pw = getpwuid(getuid())) == NULL)
457 err(1, "getpwuid");
458 }
459
460 (void)printf("%s:%s:%d:%d:%s:%ld:%ld:%s:%s:%s\n", pw->pw_name,
461 pw->pw_passwd, pw->pw_uid, pw->pw_gid, pw->pw_class,
462 (long)pw->pw_change, (long)pw->pw_expire, pw->pw_gecos,
463 pw->pw_dir, pw->pw_shell);
464 }
465
466
467 static void
usage(void)468 usage(void)
469 {
470
471 if (isgroups)
472 (void)fprintf(stderr, "usage: groups [user]\n");
473 else if (iswhoami)
474 (void)fprintf(stderr, "usage: whoami\n");
475 else
476 (void)fprintf(stderr, "%s\n%s%s\n%s\n%s\n%s\n%s\n%s\n%s\n",
477 "usage: id [user]",
478 #ifdef USE_BSM_AUDIT
479 " id -A\n",
480 #else
481 "",
482 #endif
483 " id -G [-n] [user]",
484 " id -M",
485 " id -P [user]",
486 " id -c",
487 " id -g [-nr] [user]",
488 " id -p [user]",
489 " id -u [-nr] [user]");
490 exit(1);
491 }
492