1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD 3 * 4 * Copyright (C) 1996 5 * David L. Nugent. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 16 * THIS SOFTWARE IS PROVIDED BY DAVID L. NUGENT AND CONTRIBUTORS ``AS IS'' AND 17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19 * ARE DISCLAIMED. IN NO EVENT SHALL DAVID L. NUGENT OR CONTRIBUTORS BE LIABLE 20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26 * SUCH DAMAGE. 27 * 28 */ 29 30 #ifndef lint 31 static const char rcsid[] = 32 "$FreeBSD$"; 33 #endif /* not lint */ 34 35 #include <sys/param.h> 36 #include <sys/types.h> 37 38 #include <assert.h> 39 #include <ctype.h> 40 #include <dirent.h> 41 #include <err.h> 42 #include <errno.h> 43 #include <fcntl.h> 44 #include <grp.h> 45 #include <pwd.h> 46 #include <libutil.h> 47 #include <login_cap.h> 48 #include <paths.h> 49 #include <string.h> 50 #include <sysexits.h> 51 #include <termios.h> 52 #include <unistd.h> 53 54 #include "pw.h" 55 #include "bitmap.h" 56 #include "psdate.h" 57 58 #define LOGNAMESIZE (MAXLOGNAME-1) 59 60 static char locked_str[] = "*LOCKED*"; 61 62 static struct passwd fakeuser = { 63 "nouser", 64 "*", 65 -1, 66 -1, 67 0, 68 "", 69 "User &", 70 "/nonexistent", 71 "/bin/sh", 72 0, 73 0 74 }; 75 76 static int print_user(struct passwd *pwd, bool pretty, bool v7); 77 static uid_t pw_uidpolicy(struct userconf *cnf, intmax_t id); 78 static uid_t pw_gidpolicy(struct userconf *cnf, char *grname, char *nam, 79 gid_t prefer, bool dryrun); 80 static char *pw_homepolicy(struct userconf * cnf, char *homedir, 81 const char *user); 82 static char *pw_shellpolicy(struct userconf * cnf); 83 static char *pw_password(struct userconf * cnf, char const * user, 84 bool dryrun); 85 static char *shell_path(char const * path, char *shells[], char *sh); 86 static void rmat(uid_t uid); 87 88 static void 89 mkdir_home_parents(int dfd, const char *dir) 90 { 91 struct stat st; 92 char *dirs, *tmp; 93 94 if (*dir != '/') 95 errx(EX_DATAERR, "invalid base directory for home '%s'", dir); 96 97 dir++; 98 99 if (fstatat(dfd, dir, &st, 0) != -1) { 100 if (S_ISDIR(st.st_mode)) 101 return; 102 errx(EX_OSFILE, "root home `/%s' is not a directory", dir); 103 } 104 105 dirs = strdup(dir); 106 if (dirs == NULL) 107 errx(EX_UNAVAILABLE, "out of memory"); 108 109 tmp = strrchr(dirs, '/'); 110 if (tmp == NULL) { 111 free(dirs); 112 return; 113 } 114 tmp[0] = '\0'; 115 116 /* 117 * This is a kludge especially for Joerg :) 118 * If the home directory would be created in the root partition, then 119 * we really create it under /usr which is likely to have more space. 120 * But we create a symlink from cnf->home -> "/usr" -> cnf->home 121 */ 122 if (strchr(dirs, '/') == NULL) { 123 asprintf(&tmp, "usr/%s", dirs); 124 if (tmp == NULL) 125 errx(EX_UNAVAILABLE, "out of memory"); 126 if (mkdirat(dfd, tmp, _DEF_DIRMODE) != -1 || errno == EEXIST) { 127 fchownat(dfd, tmp, 0, 0, 0); 128 symlinkat(tmp, dfd, dirs); 129 } 130 free(tmp); 131 } 132 tmp = dirs; 133 if (fstatat(dfd, dirs, &st, 0) == -1) { 134 while ((tmp = strchr(tmp + 1, '/')) != NULL) { 135 *tmp = '\0'; 136 if (fstatat(dfd, dirs, &st, 0) == -1) { 137 if (mkdirat(dfd, dirs, _DEF_DIRMODE) == -1) 138 err(EX_OSFILE, "'%s' (root home parent) is not a directory", dirs); 139 } 140 *tmp = '/'; 141 } 142 } 143 if (fstatat(dfd, dirs, &st, 0) == -1) { 144 if (mkdirat(dfd, dirs, _DEF_DIRMODE) == -1) 145 err(EX_OSFILE, "'%s' (root home parent) is not a directory", dirs); 146 fchownat(dfd, dirs, 0, 0, 0); 147 } 148 149 free(dirs); 150 } 151 152 static void 153 create_and_populate_homedir(struct userconf *cnf, struct passwd *pwd, 154 const char *skeldir, mode_t homemode, bool update) 155 { 156 int skelfd = -1; 157 158 /* Create home parents directories */ 159 mkdir_home_parents(conf.rootfd, pwd->pw_dir); 160 161 if (skeldir != NULL && *skeldir != '\0') { 162 if (*skeldir == '/') 163 skeldir++; 164 skelfd = openat(conf.rootfd, skeldir, O_DIRECTORY|O_CLOEXEC); 165 } 166 167 copymkdir(conf.rootfd, pwd->pw_dir, skelfd, homemode, pwd->pw_uid, 168 pwd->pw_gid, 0); 169 pw_log(cnf, update ? M_UPDATE : M_ADD, W_USER, "%s(%ju) home %s made", 170 pwd->pw_name, (uintmax_t)pwd->pw_uid, pwd->pw_dir); 171 } 172 173 static int 174 pw_set_passwd(struct passwd *pwd, int fd, bool precrypted, bool update) 175 { 176 int b, istty; 177 struct termios t, n; 178 login_cap_t *lc; 179 char line[_PASSWORD_LEN+1]; 180 char *p; 181 182 if (fd == '-') { 183 if (!pwd->pw_passwd || *pwd->pw_passwd != '*') { 184 pwd->pw_passwd = "*"; /* No access */ 185 return (1); 186 } 187 return (0); 188 } 189 190 if ((istty = isatty(fd))) { 191 if (tcgetattr(fd, &t) == -1) 192 istty = 0; 193 else { 194 n = t; 195 n.c_lflag &= ~(ECHO); 196 tcsetattr(fd, TCSANOW, &n); 197 printf("%s%spassword for user %s:", 198 update ? "new " : "", 199 precrypted ? "encrypted " : "", 200 pwd->pw_name); 201 fflush(stdout); 202 } 203 } 204 b = read(fd, line, sizeof(line) - 1); 205 if (istty) { /* Restore state */ 206 tcsetattr(fd, TCSANOW, &t); 207 fputc('\n', stdout); 208 fflush(stdout); 209 } 210 211 if (b < 0) 212 err(EX_IOERR, "-%c file descriptor", 213 precrypted ? 'H' : 'h'); 214 line[b] = '\0'; 215 if ((p = strpbrk(line, "\r\n")) != NULL) 216 *p = '\0'; 217 if (!*line) 218 errx(EX_DATAERR, "empty password read on file descriptor %d", 219 fd); 220 if (precrypted) { 221 if (strchr(line, ':') != NULL) 222 errx(EX_DATAERR, "bad encrypted password"); 223 pwd->pw_passwd = strdup(line); 224 } else { 225 lc = login_getpwclass(pwd); 226 if (lc == NULL || 227 login_setcryptfmt(lc, "sha512", NULL) == NULL) 228 warn("setting crypt(3) format"); 229 login_close(lc); 230 pwd->pw_passwd = pw_pwcrypt(line); 231 } 232 return (1); 233 } 234 235 static void 236 perform_chgpwent(const char *name, struct passwd *pwd, char *nispasswd) 237 { 238 int rc; 239 struct passwd *nispwd; 240 241 /* duplicate for nis so that chgpwent is not modifying before NIS */ 242 if (nispasswd && *nispasswd == '/') 243 nispwd = pw_dup(pwd); 244 245 rc = chgpwent(name, pwd); 246 if (rc == -1) 247 errx(EX_IOERR, "user '%s' does not exist (NIS?)", pwd->pw_name); 248 else if (rc != 0) 249 err(EX_IOERR, "passwd file update"); 250 251 if (nispasswd && *nispasswd == '/') { 252 rc = chgnispwent(nispasswd, name, nispwd); 253 if (rc == -1) 254 warn("User '%s' not found in NIS passwd", pwd->pw_name); 255 else if (rc != 0) 256 warn("NIS passwd update"); 257 /* NOTE: NIS-only update errors are not fatal */ 258 } 259 } 260 261 /* 262 * The M_LOCK and M_UNLOCK functions simply add or remove 263 * a "*LOCKED*" prefix from in front of the password to 264 * prevent it decoding correctly, and therefore prevents 265 * access. Of course, this only prevents access via 266 * password authentication (not ssh, kerberos or any 267 * other method that does not use the UNIX password) but 268 * that is a known limitation. 269 */ 270 static int 271 pw_userlock(char *arg1, int mode) 272 { 273 struct passwd *pwd = NULL; 274 char *passtmp = NULL; 275 char *name; 276 bool locked = false; 277 uid_t id = (uid_t)-1; 278 279 if (geteuid() != 0) 280 errx(EX_NOPERM, "you must be root"); 281 282 if (arg1 == NULL) 283 errx(EX_DATAERR, "username or id required"); 284 285 name = arg1; 286 if (arg1[strspn(name, "0123456789")] == '\0') 287 id = pw_checkid(name, UID_MAX); 288 289 pwd = GETPWNAM(pw_checkname(name, 0)); 290 if (pwd == NULL && id != (uid_t)-1) { 291 pwd = GETPWUID(id); 292 if (pwd != NULL) 293 name = pwd->pw_name; 294 } 295 if (pwd == NULL) { 296 if (id == (uid_t)-1) 297 errx(EX_NOUSER, "no such name or uid `%ju'", (uintmax_t) id); 298 errx(EX_NOUSER, "no such user `%s'", name); 299 } 300 301 if (name == NULL) 302 name = pwd->pw_name; 303 304 if (strncmp(pwd->pw_passwd, locked_str, sizeof(locked_str) -1) == 0) 305 locked = true; 306 if (mode == M_LOCK && locked) 307 errx(EX_DATAERR, "user '%s' is already locked", pwd->pw_name); 308 if (mode == M_UNLOCK && !locked) 309 errx(EX_DATAERR, "user '%s' is not locked", pwd->pw_name); 310 311 if (mode == M_LOCK) { 312 asprintf(&passtmp, "%s%s", locked_str, pwd->pw_passwd); 313 if (passtmp == NULL) /* disaster */ 314 errx(EX_UNAVAILABLE, "out of memory"); 315 pwd->pw_passwd = passtmp; 316 } else { 317 pwd->pw_passwd += sizeof(locked_str)-1; 318 } 319 320 perform_chgpwent(name, pwd, NULL); 321 free(passtmp); 322 323 return (EXIT_SUCCESS); 324 } 325 326 static uid_t 327 pw_uidpolicy(struct userconf * cnf, intmax_t id) 328 { 329 struct passwd *pwd; 330 struct bitmap bm; 331 uid_t uid = (uid_t) - 1; 332 333 /* 334 * Check the given uid, if any 335 */ 336 if (id >= 0) { 337 uid = (uid_t) id; 338 339 if ((pwd = GETPWUID(uid)) != NULL && conf.checkduplicate) 340 errx(EX_DATAERR, "uid `%ju' has already been allocated", 341 (uintmax_t)pwd->pw_uid); 342 return (uid); 343 } 344 /* 345 * We need to allocate the next available uid under one of 346 * two policies a) Grab the first unused uid b) Grab the 347 * highest possible unused uid 348 */ 349 if (cnf->min_uid >= cnf->max_uid) { /* Sanity 350 * claus^H^H^H^Hheck */ 351 cnf->min_uid = 1000; 352 cnf->max_uid = 32000; 353 } 354 bm = bm_alloc(cnf->max_uid - cnf->min_uid + 1); 355 356 /* 357 * Now, let's fill the bitmap from the password file 358 */ 359 SETPWENT(); 360 while ((pwd = GETPWENT()) != NULL) 361 if (pwd->pw_uid >= (uid_t) cnf->min_uid && pwd->pw_uid <= (uid_t) cnf->max_uid) 362 bm_setbit(&bm, pwd->pw_uid - cnf->min_uid); 363 ENDPWENT(); 364 365 /* 366 * Then apply the policy, with fallback to reuse if necessary 367 */ 368 if (cnf->reuse_uids || (uid = (uid_t) (bm_lastset(&bm) + cnf->min_uid + 1)) > cnf->max_uid) 369 uid = (uid_t) (bm_firstunset(&bm) + cnf->min_uid); 370 371 /* 372 * Another sanity check 373 */ 374 if (uid < cnf->min_uid || uid > cnf->max_uid) 375 errx(EX_SOFTWARE, "unable to allocate a new uid - range fully used"); 376 bm_dealloc(&bm); 377 return (uid); 378 } 379 380 static uid_t 381 pw_gidpolicy(struct userconf *cnf, char *grname, char *nam, gid_t prefer, bool dryrun) 382 { 383 struct group *grp; 384 gid_t gid = (uid_t) - 1; 385 386 /* 387 * Check the given gid, if any 388 */ 389 SETGRENT(); 390 if (grname) { 391 if ((grp = GETGRNAM(grname)) == NULL) { 392 gid = pw_checkid(grname, GID_MAX); 393 grp = GETGRGID(gid); 394 } 395 gid = grp->gr_gid; 396 } else if ((grp = GETGRNAM(nam)) != NULL && 397 (grp->gr_mem == NULL || grp->gr_mem[0] == NULL)) { 398 gid = grp->gr_gid; /* Already created? Use it anyway... */ 399 } else { 400 intmax_t grid = -1; 401 402 /* 403 * We need to auto-create a group with the user's name. We 404 * can send all the appropriate output to our sister routine 405 * bit first see if we can create a group with gid==uid so we 406 * can keep the user and group ids in sync. We purposely do 407 * NOT check the gid range if we can force the sync. If the 408 * user's name dups an existing group, then the group add 409 * function will happily handle that case for us and exit. 410 */ 411 if (GETGRGID(prefer) == NULL) 412 grid = prefer; 413 if (dryrun) { 414 gid = pw_groupnext(cnf, true); 415 } else { 416 if (grid == -1) 417 grid = pw_groupnext(cnf, true); 418 groupadd(cnf, nam, grid, NULL, -1, false, false, false); 419 if ((grp = GETGRNAM(nam)) != NULL) 420 gid = grp->gr_gid; 421 } 422 } 423 ENDGRENT(); 424 return (gid); 425 } 426 427 static char * 428 pw_homepolicy(struct userconf * cnf, char *homedir, const char *user) 429 { 430 static char home[128]; 431 432 if (homedir) 433 return (homedir); 434 435 if (cnf->home == NULL || *cnf->home == '\0') 436 errx(EX_CONFIG, "no base home directory set"); 437 snprintf(home, sizeof(home), "%s/%s", cnf->home, user); 438 439 return (home); 440 } 441 442 static char * 443 shell_path(char const * path, char *shells[], char *sh) 444 { 445 if (sh != NULL && (*sh == '/' || *sh == '\0')) 446 return sh; /* specified full path or forced none */ 447 else { 448 char *p; 449 char paths[_UC_MAXLINE]; 450 451 /* 452 * We need to search paths 453 */ 454 strlcpy(paths, path, sizeof(paths)); 455 for (p = strtok(paths, ": \t\r\n"); p != NULL; p = strtok(NULL, ": \t\r\n")) { 456 int i; 457 static char shellpath[256]; 458 459 if (sh != NULL) { 460 snprintf(shellpath, sizeof(shellpath), "%s/%s", p, sh); 461 if (access(shellpath, X_OK) == 0) 462 return shellpath; 463 } else 464 for (i = 0; i < _UC_MAXSHELLS && shells[i] != NULL; i++) { 465 snprintf(shellpath, sizeof(shellpath), "%s/%s", p, shells[i]); 466 if (access(shellpath, X_OK) == 0) 467 return shellpath; 468 } 469 } 470 if (sh == NULL) 471 errx(EX_OSFILE, "can't find shell `%s' in shell paths", sh); 472 errx(EX_CONFIG, "no default shell available or defined"); 473 return NULL; 474 } 475 } 476 477 static char * 478 pw_shellpolicy(struct userconf * cnf) 479 { 480 481 return shell_path(cnf->shelldir, cnf->shells, cnf->shell_default); 482 } 483 484 #define SALTSIZE 32 485 486 static char const chars[] = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ./"; 487 488 char * 489 pw_pwcrypt(char *password) 490 { 491 int i; 492 char salt[SALTSIZE + 1]; 493 char *cryptpw; 494 static char buf[256]; 495 size_t pwlen; 496 497 /* 498 * Calculate a salt value 499 */ 500 for (i = 0; i < SALTSIZE; i++) 501 salt[i] = chars[arc4random_uniform(sizeof(chars) - 1)]; 502 salt[SALTSIZE] = '\0'; 503 504 cryptpw = crypt(password, salt); 505 if (cryptpw == NULL) 506 errx(EX_CONFIG, "crypt(3) failure"); 507 pwlen = strlcpy(buf, cryptpw, sizeof(buf)); 508 assert(pwlen < sizeof(buf)); 509 return (buf); 510 } 511 512 static char * 513 pw_password(struct userconf * cnf, char const * user, bool dryrun) 514 { 515 int i, l; 516 char pwbuf[32]; 517 518 switch (cnf->default_password) { 519 case P_NONE: /* No password at all! */ 520 return ""; 521 case P_RANDOM: /* Random password */ 522 l = (arc4random() % 8 + 8); /* 8 - 16 chars */ 523 for (i = 0; i < l; i++) 524 pwbuf[i] = chars[arc4random_uniform(sizeof(chars)-1)]; 525 pwbuf[i] = '\0'; 526 527 /* 528 * We give this information back to the user 529 */ 530 if (conf.fd == -1 && !dryrun) { 531 if (isatty(STDOUT_FILENO)) 532 printf("Password for '%s' is: ", user); 533 printf("%s\n", pwbuf); 534 fflush(stdout); 535 } 536 break; 537 case P_YES: /* user's name */ 538 strlcpy(pwbuf, user, sizeof(pwbuf)); 539 break; 540 case P_NO: /* No login - default */ 541 /* FALLTHROUGH */ 542 default: 543 return "*"; 544 } 545 return pw_pwcrypt(pwbuf); 546 } 547 548 static int 549 print_user(struct passwd * pwd, bool pretty, bool v7) 550 { 551 int j; 552 char *p; 553 struct group *grp = GETGRGID(pwd->pw_gid); 554 char uname[60] = "User &", office[60] = "[None]", 555 wphone[60] = "[None]", hphone[60] = "[None]"; 556 char acexpire[32] = "[None]", pwexpire[32] = "[None]"; 557 struct tm * tptr; 558 559 if (!pretty) { 560 p = v7 ? pw_make_v7(pwd) : pw_make(pwd); 561 printf("%s\n", p); 562 free(p); 563 return (EXIT_SUCCESS); 564 } 565 566 if ((p = strtok(pwd->pw_gecos, ",")) != NULL) { 567 strlcpy(uname, p, sizeof(uname)); 568 if ((p = strtok(NULL, ",")) != NULL) { 569 strlcpy(office, p, sizeof(office)); 570 if ((p = strtok(NULL, ",")) != NULL) { 571 strlcpy(wphone, p, sizeof(wphone)); 572 if ((p = strtok(NULL, "")) != NULL) { 573 strlcpy(hphone, p, sizeof(hphone)); 574 } 575 } 576 } 577 } 578 /* 579 * Handle '&' in gecos field 580 */ 581 if ((p = strchr(uname, '&')) != NULL) { 582 int l = strlen(pwd->pw_name); 583 int m = strlen(p); 584 585 memmove(p + l, p + 1, m); 586 memmove(p, pwd->pw_name, l); 587 *p = (char) toupper((unsigned char)*p); 588 } 589 if (pwd->pw_expire > (time_t)0 && (tptr = localtime(&pwd->pw_expire)) != NULL) 590 strftime(acexpire, sizeof acexpire, "%c", tptr); 591 if (pwd->pw_change > (time_t)0 && (tptr = localtime(&pwd->pw_change)) != NULL) 592 strftime(pwexpire, sizeof pwexpire, "%c", tptr); 593 printf("Login Name: %-15s #%-12ju Group: %-15s #%ju\n" 594 " Full Name: %s\n" 595 " Home: %-26.26s Class: %s\n" 596 " Shell: %-26.26s Office: %s\n" 597 "Work Phone: %-26.26s Home Phone: %s\n" 598 "Acc Expire: %-26.26s Pwd Expire: %s\n", 599 pwd->pw_name, (uintmax_t)pwd->pw_uid, 600 grp ? grp->gr_name : "(invalid)", (uintmax_t)pwd->pw_gid, 601 uname, pwd->pw_dir, pwd->pw_class, 602 pwd->pw_shell, office, wphone, hphone, 603 acexpire, pwexpire); 604 SETGRENT(); 605 j = 0; 606 while ((grp=GETGRENT()) != NULL) { 607 int i = 0; 608 if (grp->gr_mem != NULL) { 609 while (grp->gr_mem[i] != NULL) { 610 if (strcmp(grp->gr_mem[i], pwd->pw_name)==0) { 611 printf(j++ == 0 ? " Groups: %s" : ",%s", grp->gr_name); 612 break; 613 } 614 ++i; 615 } 616 } 617 } 618 ENDGRENT(); 619 printf("%s", j ? "\n" : ""); 620 return (EXIT_SUCCESS); 621 } 622 623 char * 624 pw_checkname(char *name, int gecos) 625 { 626 char showch[8]; 627 const char *badchars, *ch, *showtype; 628 int reject; 629 630 ch = name; 631 reject = 0; 632 if (gecos) { 633 /* See if the name is valid as a gecos (comment) field. */ 634 badchars = ":"; 635 showtype = "gecos field"; 636 } else { 637 /* See if the name is valid as a userid or group. */ 638 badchars = " ,\t:+&#%$^()!@~*?<>=|\\/\""; 639 showtype = "userid/group name"; 640 /* Userids and groups can not have a leading '-'. */ 641 if (*ch == '-') 642 reject = 1; 643 } 644 if (!reject) { 645 while (*ch) { 646 if (strchr(badchars, *ch) != NULL || 647 (!gecos && *ch < ' ') || 648 *ch == 127) { 649 reject = 1; 650 break; 651 } 652 /* 8-bit characters are only allowed in GECOS fields */ 653 if (!gecos && (*ch & 0x80)) { 654 reject = 1; 655 break; 656 } 657 ch++; 658 } 659 } 660 /* 661 * A `$' is allowed as the final character for userids and groups, 662 * mainly for the benefit of samba. 663 */ 664 if (reject && !gecos) { 665 if (*ch == '$' && *(ch + 1) == '\0') { 666 reject = 0; 667 ch++; 668 } 669 } 670 if (reject) { 671 snprintf(showch, sizeof(showch), (*ch >= ' ' && *ch < 127) 672 ? "`%c'" : "0x%02x", *ch); 673 errx(EX_DATAERR, "invalid character %s at position %td in %s", 674 showch, (ch - name), showtype); 675 } 676 if (!gecos && (ch - name) > LOGNAMESIZE) 677 errx(EX_USAGE, "name too long `%s' (max is %d)", name, 678 LOGNAMESIZE); 679 680 return (name); 681 } 682 683 static void 684 rmat(uid_t uid) 685 { 686 DIR *d = opendir("/var/at/jobs"); 687 688 if (d != NULL) { 689 struct dirent *e; 690 691 while ((e = readdir(d)) != NULL) { 692 struct stat st; 693 694 if (strncmp(e->d_name, ".lock", 5) != 0 && 695 stat(e->d_name, &st) == 0 && 696 !S_ISDIR(st.st_mode) && 697 st.st_uid == uid) { 698 char tmp[MAXPATHLEN]; 699 700 snprintf(tmp, sizeof(tmp), "/usr/bin/atrm %s", 701 e->d_name); 702 system(tmp); 703 } 704 } 705 closedir(d); 706 } 707 } 708 709 int 710 pw_user_next(int argc, char **argv, char *name __unused) 711 { 712 struct userconf *cnf = NULL; 713 const char *cfg = NULL; 714 int ch; 715 bool quiet = false; 716 uid_t next; 717 718 while ((ch = getopt(argc, argv, "C:q")) != -1) { 719 switch (ch) { 720 case 'C': 721 cfg = optarg; 722 break; 723 case 'q': 724 quiet = true; 725 break; 726 default: 727 exit(EX_USAGE); 728 } 729 } 730 731 if (quiet) 732 freopen(_PATH_DEVNULL, "w", stderr); 733 734 cnf = get_userconfig(cfg); 735 736 next = pw_uidpolicy(cnf, -1); 737 738 printf("%ju:", (uintmax_t)next); 739 pw_groupnext(cnf, quiet); 740 741 return (EXIT_SUCCESS); 742 } 743 744 int 745 pw_user_show(int argc, char **argv, char *arg1) 746 { 747 struct passwd *pwd = NULL; 748 char *name = NULL; 749 intmax_t id = -1; 750 int ch; 751 bool all = false; 752 bool pretty = false; 753 bool force = false; 754 bool v7 = false; 755 bool quiet = false; 756 757 if (arg1 != NULL) { 758 if (arg1[strspn(arg1, "0123456789")] == '\0') 759 id = pw_checkid(arg1, UID_MAX); 760 else 761 name = arg1; 762 } 763 764 while ((ch = getopt(argc, argv, "C:qn:u:FPa7")) != -1) { 765 switch (ch) { 766 case 'C': 767 /* ignore compatibility */ 768 break; 769 case 'q': 770 quiet = true; 771 break; 772 case 'n': 773 name = optarg; 774 break; 775 case 'u': 776 id = pw_checkid(optarg, UID_MAX); 777 break; 778 case 'F': 779 force = true; 780 break; 781 case 'P': 782 pretty = true; 783 break; 784 case 'a': 785 all = true; 786 break; 787 case '7': 788 v7 = true; 789 break; 790 default: 791 exit(EX_USAGE); 792 } 793 } 794 795 if (quiet) 796 freopen(_PATH_DEVNULL, "w", stderr); 797 798 if (all) { 799 SETPWENT(); 800 while ((pwd = GETPWENT()) != NULL) 801 print_user(pwd, pretty, v7); 802 ENDPWENT(); 803 return (EXIT_SUCCESS); 804 } 805 806 if (id < 0 && name == NULL) 807 errx(EX_DATAERR, "username or id required"); 808 809 pwd = (name != NULL) ? GETPWNAM(pw_checkname(name, 0)) : GETPWUID(id); 810 if (pwd == NULL) { 811 if (force) { 812 pwd = &fakeuser; 813 } else { 814 if (name == NULL) 815 errx(EX_NOUSER, "no such uid `%ju'", 816 (uintmax_t) id); 817 errx(EX_NOUSER, "no such user `%s'", name); 818 } 819 } 820 821 return (print_user(pwd, pretty, v7)); 822 } 823 824 int 825 pw_user_del(int argc, char **argv, char *arg1) 826 { 827 struct userconf *cnf = NULL; 828 struct passwd *pwd = NULL; 829 struct group *gr, *grp; 830 char *name = NULL; 831 char grname[MAXLOGNAME]; 832 char *nispasswd = NULL; 833 char file[MAXPATHLEN]; 834 char home[MAXPATHLEN]; 835 const char *cfg = NULL; 836 struct stat st; 837 intmax_t id = -1; 838 int ch, rc; 839 bool nis = false; 840 bool deletehome = false; 841 bool quiet = false; 842 843 if (arg1 != NULL) { 844 if (arg1[strspn(arg1, "0123456789")] == '\0') 845 id = pw_checkid(arg1, UID_MAX); 846 else 847 name = arg1; 848 } 849 850 while ((ch = getopt(argc, argv, "C:qn:u:rYy:")) != -1) { 851 switch (ch) { 852 case 'C': 853 cfg = optarg; 854 break; 855 case 'q': 856 quiet = true; 857 break; 858 case 'n': 859 name = optarg; 860 break; 861 case 'u': 862 id = pw_checkid(optarg, UID_MAX); 863 break; 864 case 'r': 865 deletehome = true; 866 break; 867 case 'y': 868 nispasswd = optarg; 869 break; 870 case 'Y': 871 nis = true; 872 break; 873 default: 874 exit(EX_USAGE); 875 } 876 } 877 878 if (quiet) 879 freopen(_PATH_DEVNULL, "w", stderr); 880 881 if (id < 0 && name == NULL) 882 errx(EX_DATAERR, "username or id required"); 883 884 cnf = get_userconfig(cfg); 885 886 if (nispasswd == NULL) 887 nispasswd = cnf->nispasswd; 888 889 pwd = (name != NULL) ? GETPWNAM(pw_checkname(name, 0)) : GETPWUID(id); 890 if (pwd == NULL) { 891 if (name == NULL) 892 errx(EX_NOUSER, "no such uid `%ju'", (uintmax_t) id); 893 errx(EX_NOUSER, "no such user `%s'", name); 894 } 895 896 if (PWF._altdir == PWF_REGULAR && 897 ((pwd->pw_fields & _PWF_SOURCE) != _PWF_FILES)) { 898 if ((pwd->pw_fields & _PWF_SOURCE) == _PWF_NIS) { 899 if (!nis && nispasswd && *nispasswd != '/') 900 errx(EX_NOUSER, "Cannot remove NIS user `%s'", 901 name); 902 } else { 903 errx(EX_NOUSER, "Cannot remove non local user `%s'", 904 name); 905 } 906 } 907 908 id = pwd->pw_uid; 909 if (name == NULL) 910 name = pwd->pw_name; 911 912 if (strcmp(pwd->pw_name, "root") == 0) 913 errx(EX_DATAERR, "cannot remove user 'root'"); 914 915 if (!PWALTDIR()) { 916 /* Remove crontabs */ 917 snprintf(file, sizeof(file), "/var/cron/tabs/%s", pwd->pw_name); 918 if (access(file, F_OK) == 0) { 919 snprintf(file, sizeof(file), "crontab -u %s -r", 920 pwd->pw_name); 921 system(file); 922 } 923 } 924 925 /* 926 * Save these for later, since contents of pwd may be 927 * invalidated by deletion 928 */ 929 snprintf(file, sizeof(file), "%s/%s", _PATH_MAILDIR, pwd->pw_name); 930 strlcpy(home, pwd->pw_dir, sizeof(home)); 931 gr = GETGRGID(pwd->pw_gid); 932 if (gr != NULL) 933 strlcpy(grname, gr->gr_name, LOGNAMESIZE); 934 else 935 grname[0] = '\0'; 936 937 rc = delpwent(pwd); 938 if (rc == -1) 939 err(EX_IOERR, "user '%s' does not exist", pwd->pw_name); 940 else if (rc != 0) 941 err(EX_IOERR, "passwd update"); 942 943 if (nis && nispasswd && *nispasswd=='/') { 944 rc = delnispwent(nispasswd, name); 945 if (rc == -1) 946 warnx("WARNING: user '%s' does not exist in NIS passwd", 947 pwd->pw_name); 948 else if (rc != 0) 949 warn("WARNING: NIS passwd update"); 950 } 951 952 grp = GETGRNAM(name); 953 if (grp != NULL && 954 (grp->gr_mem == NULL || *grp->gr_mem == NULL) && 955 strcmp(name, grname) == 0) 956 delgrent(GETGRNAM(name)); 957 SETGRENT(); 958 while ((grp = GETGRENT()) != NULL) { 959 int i, j; 960 char group[MAXLOGNAME]; 961 if (grp->gr_mem == NULL) 962 continue; 963 964 for (i = 0; grp->gr_mem[i] != NULL; i++) { 965 if (strcmp(grp->gr_mem[i], name) != 0) 966 continue; 967 968 for (j = i; grp->gr_mem[j] != NULL; j++) 969 grp->gr_mem[j] = grp->gr_mem[j+1]; 970 strlcpy(group, grp->gr_name, MAXLOGNAME); 971 chggrent(group, grp); 972 } 973 } 974 ENDGRENT(); 975 976 pw_log(cnf, M_DELETE, W_USER, "%s(%ju) account removed", name, 977 (uintmax_t)id); 978 979 /* Remove mail file */ 980 if (PWALTDIR() != PWF_ALT) 981 unlinkat(conf.rootfd, file + 1, 0); 982 983 /* Remove at jobs */ 984 if (!PWALTDIR() && getpwuid(id) == NULL) 985 rmat(id); 986 987 /* Remove home directory and contents */ 988 if (PWALTDIR() != PWF_ALT && deletehome && *home == '/' && 989 GETPWUID(id) == NULL && 990 fstatat(conf.rootfd, home + 1, &st, 0) != -1) { 991 rm_r(conf.rootfd, home, id); 992 pw_log(cnf, M_DELETE, W_USER, "%s(%ju) home '%s' %s" 993 "removed", name, (uintmax_t)id, home, 994 fstatat(conf.rootfd, home + 1, &st, 0) == -1 ? "" : "not " 995 "completely "); 996 } 997 998 return (EXIT_SUCCESS); 999 } 1000 1001 int 1002 pw_user_lock(int argc, char **argv, char *arg1) 1003 { 1004 int ch; 1005 1006 while ((ch = getopt(argc, argv, "Cq")) != -1) { 1007 switch (ch) { 1008 case 'C': 1009 case 'q': 1010 /* compatibility */ 1011 break; 1012 default: 1013 exit(EX_USAGE); 1014 } 1015 } 1016 1017 return (pw_userlock(arg1, M_LOCK)); 1018 } 1019 1020 int 1021 pw_user_unlock(int argc, char **argv, char *arg1) 1022 { 1023 int ch; 1024 1025 while ((ch = getopt(argc, argv, "Cq")) != -1) { 1026 switch (ch) { 1027 case 'C': 1028 case 'q': 1029 /* compatibility */ 1030 break; 1031 default: 1032 exit(EX_USAGE); 1033 } 1034 } 1035 1036 return (pw_userlock(arg1, M_UNLOCK)); 1037 } 1038 1039 static struct group * 1040 group_from_name_or_id(char *name) 1041 { 1042 const char *errstr = NULL; 1043 struct group *grp; 1044 uintmax_t id; 1045 1046 if ((grp = GETGRNAM(name)) == NULL) { 1047 id = strtounum(name, 0, GID_MAX, &errstr); 1048 if (errstr) 1049 errx(EX_NOUSER, "group `%s' does not exist", name); 1050 grp = GETGRGID(id); 1051 if (grp == NULL) 1052 errx(EX_NOUSER, "group `%s' does not exist", name); 1053 } 1054 1055 return (grp); 1056 } 1057 1058 static void 1059 split_groups(StringList **groups, char *groupsstr) 1060 { 1061 struct group *grp; 1062 char *p; 1063 char tok[] = ", \t"; 1064 1065 if (*groups == NULL) 1066 *groups = sl_init(); 1067 for (p = strtok(groupsstr, tok); p != NULL; p = strtok(NULL, tok)) { 1068 grp = group_from_name_or_id(p); 1069 sl_add(*groups, newstr(grp->gr_name)); 1070 } 1071 } 1072 1073 static void 1074 validate_grname(struct userconf *cnf, char *group) 1075 { 1076 struct group *grp; 1077 1078 if (group == NULL || *group == '\0') { 1079 cnf->default_group = ""; 1080 return; 1081 } 1082 grp = group_from_name_or_id(group); 1083 cnf->default_group = newstr(grp->gr_name); 1084 } 1085 1086 static mode_t 1087 validate_mode(char *mode) 1088 { 1089 mode_t m; 1090 void *set; 1091 1092 if ((set = setmode(mode)) == NULL) 1093 errx(EX_DATAERR, "invalid directory creation mode '%s'", mode); 1094 1095 m = getmode(set, _DEF_DIRMODE); 1096 free(set); 1097 return (m); 1098 } 1099 1100 static long 1101 validate_expire(char *str, int opt) 1102 { 1103 if (!numerics(str)) 1104 errx(EX_DATAERR, "-%c argument must be numeric " 1105 "when setting defaults: %s", (char)opt, str); 1106 return strtol(str, NULL, 0); 1107 } 1108 1109 static void 1110 mix_config(struct userconf *cmdcnf, struct userconf *cfg) 1111 { 1112 1113 if (cmdcnf->default_password < 0) 1114 cmdcnf->default_password = cfg->default_password; 1115 if (cmdcnf->reuse_uids == 0) 1116 cmdcnf->reuse_uids = cfg->reuse_uids; 1117 if (cmdcnf->reuse_gids == 0) 1118 cmdcnf->reuse_gids = cfg->reuse_gids; 1119 if (cmdcnf->nispasswd == NULL) 1120 cmdcnf->nispasswd = cfg->nispasswd; 1121 if (cmdcnf->dotdir == NULL) 1122 cmdcnf->dotdir = cfg->dotdir; 1123 if (cmdcnf->newmail == NULL) 1124 cmdcnf->newmail = cfg->newmail; 1125 if (cmdcnf->logfile == NULL) 1126 cmdcnf->logfile = cfg->logfile; 1127 if (cmdcnf->home == NULL) 1128 cmdcnf->home = cfg->home; 1129 if (cmdcnf->homemode == 0) 1130 cmdcnf->homemode = cfg->homemode; 1131 if (cmdcnf->shelldir == NULL) 1132 cmdcnf->shelldir = cfg->shelldir; 1133 if (cmdcnf->shells == NULL) 1134 cmdcnf->shells = cfg->shells; 1135 if (cmdcnf->shell_default == NULL) 1136 cmdcnf->shell_default = cfg->shell_default; 1137 if (cmdcnf->default_group == NULL) 1138 cmdcnf->default_group = cfg->default_group; 1139 if (cmdcnf->groups == NULL) 1140 cmdcnf->groups = cfg->groups; 1141 if (cmdcnf->default_class == NULL) 1142 cmdcnf->default_class = cfg->default_class; 1143 if (cmdcnf->min_uid == 0) 1144 cmdcnf->min_uid = cfg->min_uid; 1145 if (cmdcnf->max_uid == 0) 1146 cmdcnf->max_uid = cfg->max_uid; 1147 if (cmdcnf->min_gid == 0) 1148 cmdcnf->min_gid = cfg->min_gid; 1149 if (cmdcnf->max_gid == 0) 1150 cmdcnf->max_gid = cfg->max_gid; 1151 if (cmdcnf->expire_days < 0) 1152 cmdcnf->expire_days = cfg->expire_days; 1153 if (cmdcnf->password_days < 0) 1154 cmdcnf->password_days = cfg->password_days; 1155 } 1156 1157 int 1158 pw_user_add(int argc, char **argv, char *arg1) 1159 { 1160 struct userconf *cnf, *cmdcnf; 1161 struct passwd *pwd; 1162 struct group *grp; 1163 struct stat st; 1164 char args[] = "C:qn:u:c:d:e:p:g:G:mM:k:s:oL:i:w:h:H:Db:NPy:Y"; 1165 char line[_PASSWORD_LEN+1], path[MAXPATHLEN]; 1166 char *gecos, *homedir, *skel, *walk, *userid, *groupid, *grname; 1167 char *default_passwd, *name, *p; 1168 const char *cfg = NULL; 1169 login_cap_t *lc; 1170 FILE *pfp, *fp; 1171 intmax_t id = -1; 1172 time_t now; 1173 int rc, ch, fd = -1; 1174 size_t i; 1175 bool dryrun, nis, pretty, quiet, createhome, precrypted, genconf; 1176 1177 dryrun = nis = pretty = quiet = createhome = precrypted = false; 1178 genconf = false; 1179 gecos = homedir = skel = userid = groupid = default_passwd = NULL; 1180 grname = name = NULL; 1181 1182 if ((cmdcnf = calloc(1, sizeof(struct userconf))) == NULL) 1183 err(EXIT_FAILURE, "calloc()"); 1184 1185 cmdcnf->default_password = cmdcnf->expire_days = cmdcnf->password_days = -1; 1186 now = time(NULL); 1187 1188 if (arg1 != NULL) { 1189 if (arg1[strspn(arg1, "0123456789")] == '\0') 1190 id = pw_checkid(arg1, UID_MAX); 1191 else 1192 name = pw_checkname(arg1, 0); 1193 } 1194 1195 while ((ch = getopt(argc, argv, args)) != -1) { 1196 switch (ch) { 1197 case 'C': 1198 cfg = optarg; 1199 break; 1200 case 'q': 1201 quiet = true; 1202 break; 1203 case 'n': 1204 name = pw_checkname(optarg, 0); 1205 break; 1206 case 'u': 1207 userid = optarg; 1208 break; 1209 case 'c': 1210 gecos = pw_checkname(optarg, 1); 1211 break; 1212 case 'd': 1213 homedir = optarg; 1214 break; 1215 case 'e': 1216 if (genconf) 1217 cmdcnf->expire_days = validate_expire(optarg, ch); 1218 else 1219 cmdcnf->expire_days = parse_date(now, optarg); 1220 break; 1221 case 'p': 1222 if (genconf) 1223 cmdcnf->password_days = validate_expire(optarg, ch); 1224 else 1225 cmdcnf->password_days = parse_date(now, optarg); 1226 break; 1227 case 'g': 1228 validate_grname(cmdcnf, optarg); 1229 grname = optarg; 1230 break; 1231 case 'G': 1232 split_groups(&cmdcnf->groups, optarg); 1233 break; 1234 case 'm': 1235 createhome = true; 1236 break; 1237 case 'M': 1238 cmdcnf->homemode = validate_mode(optarg); 1239 break; 1240 case 'k': 1241 walk = skel = optarg; 1242 if (*walk == '/') 1243 walk++; 1244 if (fstatat(conf.rootfd, walk, &st, 0) == -1) 1245 errx(EX_OSFILE, "skeleton `%s' does not " 1246 "exists", skel); 1247 if (!S_ISDIR(st.st_mode)) 1248 errx(EX_OSFILE, "skeleton `%s' is not a " 1249 "directory", skel); 1250 cmdcnf->dotdir = skel; 1251 break; 1252 case 's': 1253 cmdcnf->shell_default = optarg; 1254 break; 1255 case 'o': 1256 conf.checkduplicate = false; 1257 break; 1258 case 'L': 1259 cmdcnf->default_class = pw_checkname(optarg, 0); 1260 break; 1261 case 'i': 1262 groupid = optarg; 1263 break; 1264 case 'w': 1265 default_passwd = optarg; 1266 break; 1267 case 'H': 1268 if (fd != -1) 1269 errx(EX_USAGE, "'-h' and '-H' are mutually " 1270 "exclusive options"); 1271 fd = pw_checkfd(optarg); 1272 precrypted = true; 1273 if (fd == '-') 1274 errx(EX_USAGE, "-H expects a file descriptor"); 1275 break; 1276 case 'h': 1277 if (fd != -1) 1278 errx(EX_USAGE, "'-h' and '-H' are mutually " 1279 "exclusive options"); 1280 fd = pw_checkfd(optarg); 1281 break; 1282 case 'D': 1283 genconf = true; 1284 break; 1285 case 'b': 1286 cmdcnf->home = optarg; 1287 break; 1288 case 'N': 1289 dryrun = true; 1290 break; 1291 case 'P': 1292 pretty = true; 1293 break; 1294 case 'y': 1295 cmdcnf->nispasswd = optarg; 1296 break; 1297 case 'Y': 1298 nis = true; 1299 break; 1300 default: 1301 exit(EX_USAGE); 1302 } 1303 } 1304 1305 if (geteuid() != 0 && ! dryrun) 1306 errx(EX_NOPERM, "you must be root"); 1307 1308 if (quiet) 1309 freopen(_PATH_DEVNULL, "w", stderr); 1310 1311 cnf = get_userconfig(cfg); 1312 1313 mix_config(cmdcnf, cnf); 1314 if (default_passwd) 1315 cmdcnf->default_password = passwd_val(default_passwd, 1316 cnf->default_password); 1317 if (genconf) { 1318 if (name != NULL) 1319 errx(EX_DATAERR, "can't combine `-D' with `-n name'"); 1320 if (userid != NULL) { 1321 if ((p = strtok(userid, ", \t")) != NULL) 1322 cmdcnf->min_uid = pw_checkid(p, UID_MAX); 1323 if (cmdcnf->min_uid == 0) 1324 cmdcnf->min_uid = 1000; 1325 if ((p = strtok(NULL, " ,\t")) != NULL) 1326 cmdcnf->max_uid = pw_checkid(p, UID_MAX); 1327 if (cmdcnf->max_uid == 0) 1328 cmdcnf->max_uid = 32000; 1329 } 1330 if (groupid != NULL) { 1331 if ((p = strtok(groupid, ", \t")) != NULL) 1332 cmdcnf->min_gid = pw_checkid(p, GID_MAX); 1333 if (cmdcnf->min_gid == 0) 1334 cmdcnf->min_gid = 1000; 1335 if ((p = strtok(NULL, " ,\t")) != NULL) 1336 cmdcnf->max_gid = pw_checkid(p, GID_MAX); 1337 if (cmdcnf->max_gid == 0) 1338 cmdcnf->max_gid = 32000; 1339 } 1340 if (write_userconfig(cmdcnf, cfg)) 1341 return (EXIT_SUCCESS); 1342 err(EX_IOERR, "config update"); 1343 } 1344 1345 if (userid) 1346 id = pw_checkid(userid, UID_MAX); 1347 if (id < 0 && name == NULL) 1348 errx(EX_DATAERR, "user name or id required"); 1349 1350 if (name == NULL) 1351 errx(EX_DATAERR, "login name required"); 1352 1353 if (GETPWNAM(name) != NULL) 1354 errx(EX_DATAERR, "login name `%s' already exists", name); 1355 1356 if (!grname) 1357 grname = cmdcnf->default_group; 1358 1359 pwd = &fakeuser; 1360 pwd->pw_name = name; 1361 pwd->pw_class = cmdcnf->default_class ? cmdcnf->default_class : ""; 1362 pwd->pw_uid = pw_uidpolicy(cmdcnf, id); 1363 pwd->pw_gid = pw_gidpolicy(cnf, grname, pwd->pw_name, 1364 (gid_t) pwd->pw_uid, dryrun); 1365 1366 /* cmdcnf->password_days and cmdcnf->expire_days hold unixtime here */ 1367 if (cmdcnf->password_days > 0) 1368 pwd->pw_change = cmdcnf->password_days; 1369 if (cmdcnf->expire_days > 0) 1370 pwd->pw_expire = cmdcnf->expire_days; 1371 1372 pwd->pw_dir = pw_homepolicy(cmdcnf, homedir, pwd->pw_name); 1373 pwd->pw_shell = pw_shellpolicy(cmdcnf); 1374 lc = login_getpwclass(pwd); 1375 if (lc == NULL || login_setcryptfmt(lc, "sha512", NULL) == NULL) 1376 warn("setting crypt(3) format"); 1377 login_close(lc); 1378 pwd->pw_passwd = pw_password(cmdcnf, pwd->pw_name, dryrun); 1379 if (pwd->pw_uid == 0 && strcmp(pwd->pw_name, "root") != 0) 1380 warnx("WARNING: new account `%s' has a uid of 0 " 1381 "(superuser access!)", pwd->pw_name); 1382 if (gecos) 1383 pwd->pw_gecos = gecos; 1384 1385 if (fd != -1) 1386 pw_set_passwd(pwd, fd, precrypted, false); 1387 1388 if (dryrun) 1389 return (print_user(pwd, pretty, false)); 1390 1391 if ((rc = addpwent(pwd)) != 0) { 1392 if (rc == -1) 1393 errx(EX_IOERR, "user '%s' already exists", 1394 pwd->pw_name); 1395 else if (rc != 0) 1396 err(EX_IOERR, "passwd file update"); 1397 } 1398 if (nis && cmdcnf->nispasswd && *cmdcnf->nispasswd == '/') { 1399 printf("%s\n", cmdcnf->nispasswd); 1400 rc = addnispwent(cmdcnf->nispasswd, pwd); 1401 if (rc == -1) 1402 warnx("User '%s' already exists in NIS passwd", 1403 pwd->pw_name); 1404 else if (rc != 0) 1405 warn("NIS passwd update"); 1406 /* NOTE: we treat NIS-only update errors as non-fatal */ 1407 } 1408 1409 if (cmdcnf->groups != NULL) { 1410 for (i = 0; i < cmdcnf->groups->sl_cur; i++) { 1411 grp = GETGRNAM(cmdcnf->groups->sl_str[i]); 1412 grp = gr_add(grp, pwd->pw_name); 1413 /* 1414 * grp can only be NULL in 2 cases: 1415 * - the new member is already a member 1416 * - a problem with memory occurs 1417 * in both cases we want to skip now. 1418 */ 1419 if (grp == NULL) 1420 continue; 1421 chggrent(grp->gr_name, grp); 1422 free(grp); 1423 } 1424 } 1425 1426 pwd = GETPWNAM(name); 1427 if (pwd == NULL) 1428 errx(EX_NOUSER, "user '%s' disappeared during update", name); 1429 1430 grp = GETGRGID(pwd->pw_gid); 1431 pw_log(cnf, M_ADD, W_USER, "%s(%ju):%s(%ju):%s:%s:%s", 1432 pwd->pw_name, (uintmax_t)pwd->pw_uid, 1433 grp ? grp->gr_name : "unknown", 1434 (uintmax_t)(grp ? grp->gr_gid : (uid_t)-1), 1435 pwd->pw_gecos, pwd->pw_dir, pwd->pw_shell); 1436 1437 /* 1438 * let's touch and chown the user's mail file. This is not 1439 * strictly necessary under BSD with a 0755 maildir but it also 1440 * doesn't hurt anything to create the empty mailfile 1441 */ 1442 if (PWALTDIR() != PWF_ALT) { 1443 snprintf(path, sizeof(path), "%s/%s", _PATH_MAILDIR, 1444 pwd->pw_name); 1445 /* Preserve contents & mtime */ 1446 close(openat(conf.rootfd, path +1, O_RDWR | O_CREAT, 0600)); 1447 fchownat(conf.rootfd, path + 1, pwd->pw_uid, pwd->pw_gid, 1448 AT_SYMLINK_NOFOLLOW); 1449 } 1450 1451 /* 1452 * Let's create and populate the user's home directory. Note 1453 * that this also `works' for editing users if -m is used, but 1454 * existing files will *not* be overwritten. 1455 */ 1456 if (PWALTDIR() != PWF_ALT && createhome && pwd->pw_dir && 1457 *pwd->pw_dir == '/' && pwd->pw_dir[1]) 1458 create_and_populate_homedir(cmdcnf, pwd, cmdcnf->dotdir, 1459 cmdcnf->homemode, false); 1460 1461 if (!PWALTDIR() && cmdcnf->newmail && *cmdcnf->newmail && 1462 (fp = fopen(cnf->newmail, "r")) != NULL) { 1463 if ((pfp = popen(_PATH_SENDMAIL " -t", "w")) == NULL) 1464 warn("sendmail"); 1465 else { 1466 fprintf(pfp, "From: root\n" "To: %s\n" 1467 "Subject: Welcome!\n\n", pwd->pw_name); 1468 while (fgets(line, sizeof(line), fp) != NULL) { 1469 /* Do substitutions? */ 1470 fputs(line, pfp); 1471 } 1472 pclose(pfp); 1473 pw_log(cnf, M_ADD, W_USER, "%s(%ju) new user mail sent", 1474 pwd->pw_name, (uintmax_t)pwd->pw_uid); 1475 } 1476 fclose(fp); 1477 } 1478 1479 if (nis && nis_update() == 0) 1480 pw_log(cnf, M_ADD, W_USER, "NIS maps updated"); 1481 1482 return (EXIT_SUCCESS); 1483 } 1484 1485 int 1486 pw_user_mod(int argc, char **argv, char *arg1) 1487 { 1488 struct userconf *cnf; 1489 struct passwd *pwd; 1490 struct group *grp; 1491 StringList *groups = NULL; 1492 char args[] = "C:qn:u:c:d:e:p:g:G:mM:l:k:s:w:L:h:H:NPYy:"; 1493 const char *cfg = NULL; 1494 char *gecos, *homedir, *grname, *name, *newname, *walk, *skel, *shell; 1495 char *passwd, *class, *nispasswd; 1496 login_cap_t *lc; 1497 struct stat st; 1498 intmax_t id = -1; 1499 int ch, fd = -1; 1500 size_t i, j; 1501 bool quiet, createhome, pretty, dryrun, nis, edited; 1502 bool precrypted; 1503 mode_t homemode = 0; 1504 time_t expire_time, password_time, now; 1505 1506 expire_time = password_time = -1; 1507 gecos = homedir = grname = name = newname = skel = shell =NULL; 1508 passwd = NULL; 1509 class = nispasswd = NULL; 1510 quiet = createhome = pretty = dryrun = nis = precrypted = false; 1511 edited = false; 1512 now = time(NULL); 1513 1514 if (arg1 != NULL) { 1515 if (arg1[strspn(arg1, "0123456789")] == '\0') 1516 id = pw_checkid(arg1, UID_MAX); 1517 else 1518 name = arg1; 1519 } 1520 1521 while ((ch = getopt(argc, argv, args)) != -1) { 1522 switch (ch) { 1523 case 'C': 1524 cfg = optarg; 1525 break; 1526 case 'q': 1527 quiet = true; 1528 break; 1529 case 'n': 1530 name = optarg; 1531 break; 1532 case 'u': 1533 id = pw_checkid(optarg, UID_MAX); 1534 break; 1535 case 'c': 1536 gecos = pw_checkname(optarg, 1); 1537 break; 1538 case 'd': 1539 homedir = optarg; 1540 break; 1541 case 'e': 1542 expire_time = parse_date(now, optarg); 1543 break; 1544 case 'p': 1545 password_time = parse_date(now, optarg); 1546 break; 1547 case 'g': 1548 group_from_name_or_id(optarg); 1549 grname = optarg; 1550 break; 1551 case 'G': 1552 split_groups(&groups, optarg); 1553 break; 1554 case 'm': 1555 createhome = true; 1556 break; 1557 case 'M': 1558 homemode = validate_mode(optarg); 1559 break; 1560 case 'l': 1561 newname = optarg; 1562 break; 1563 case 'k': 1564 walk = skel = optarg; 1565 if (*walk == '/') 1566 walk++; 1567 if (fstatat(conf.rootfd, walk, &st, 0) == -1) 1568 errx(EX_OSFILE, "skeleton `%s' does not " 1569 "exists", skel); 1570 if (!S_ISDIR(st.st_mode)) 1571 errx(EX_OSFILE, "skeleton `%s' is not a " 1572 "directory", skel); 1573 break; 1574 case 's': 1575 shell = optarg; 1576 break; 1577 case 'w': 1578 passwd = optarg; 1579 break; 1580 case 'L': 1581 class = pw_checkname(optarg, 0); 1582 break; 1583 case 'H': 1584 if (fd != -1) 1585 errx(EX_USAGE, "'-h' and '-H' are mutually " 1586 "exclusive options"); 1587 fd = pw_checkfd(optarg); 1588 precrypted = true; 1589 if (fd == '-') 1590 errx(EX_USAGE, "-H expects a file descriptor"); 1591 break; 1592 case 'h': 1593 if (fd != -1) 1594 errx(EX_USAGE, "'-h' and '-H' are mutually " 1595 "exclusive options"); 1596 fd = pw_checkfd(optarg); 1597 break; 1598 case 'N': 1599 dryrun = true; 1600 break; 1601 case 'P': 1602 pretty = true; 1603 break; 1604 case 'y': 1605 nispasswd = optarg; 1606 break; 1607 case 'Y': 1608 nis = true; 1609 break; 1610 default: 1611 exit(EX_USAGE); 1612 } 1613 } 1614 1615 if (geteuid() != 0 && ! dryrun) 1616 errx(EX_NOPERM, "you must be root"); 1617 1618 if (quiet) 1619 freopen(_PATH_DEVNULL, "w", stderr); 1620 1621 cnf = get_userconfig(cfg); 1622 1623 if (id < 0 && name == NULL) 1624 errx(EX_DATAERR, "username or id required"); 1625 1626 pwd = (name != NULL) ? GETPWNAM(pw_checkname(name, 0)) : GETPWUID(id); 1627 if (pwd == NULL) { 1628 if (name == NULL) 1629 errx(EX_NOUSER, "no such uid `%ju'", 1630 (uintmax_t) id); 1631 errx(EX_NOUSER, "no such user `%s'", name); 1632 } 1633 1634 if (name == NULL) 1635 name = pwd->pw_name; 1636 1637 if (nis && nispasswd == NULL) 1638 nispasswd = cnf->nispasswd; 1639 1640 if (PWF._altdir == PWF_REGULAR && 1641 ((pwd->pw_fields & _PWF_SOURCE) != _PWF_FILES)) { 1642 if ((pwd->pw_fields & _PWF_SOURCE) == _PWF_NIS) { 1643 if (!nis && nispasswd && *nispasswd != '/') 1644 errx(EX_NOUSER, "Cannot modify NIS user `%s'", 1645 name); 1646 } else { 1647 errx(EX_NOUSER, "Cannot modify non local user `%s'", 1648 name); 1649 } 1650 } 1651 1652 if (newname) { 1653 if (strcmp(pwd->pw_name, "root") == 0) 1654 errx(EX_DATAERR, "can't rename `root' account"); 1655 if (strcmp(pwd->pw_name, newname) != 0) { 1656 pwd->pw_name = pw_checkname(newname, 0); 1657 edited = true; 1658 } 1659 } 1660 1661 if (id >= 0 && pwd->pw_uid != id) { 1662 pwd->pw_uid = id; 1663 edited = true; 1664 if (pwd->pw_uid != 0 && strcmp(pwd->pw_name, "root") == 0) 1665 errx(EX_DATAERR, "can't change uid of `root' account"); 1666 if (pwd->pw_uid == 0 && strcmp(pwd->pw_name, "root") != 0) 1667 warnx("WARNING: account `%s' will have a uid of 0 " 1668 "(superuser access!)", pwd->pw_name); 1669 } 1670 1671 if (grname && pwd->pw_uid != 0) { 1672 grp = GETGRNAM(grname); 1673 if (grp == NULL) 1674 grp = GETGRGID(pw_checkid(grname, GID_MAX)); 1675 if (grp->gr_gid != pwd->pw_gid) { 1676 pwd->pw_gid = grp->gr_gid; 1677 edited = true; 1678 } 1679 } 1680 1681 1682 if (password_time >= 0 && pwd->pw_change != password_time) { 1683 pwd->pw_change = password_time; 1684 edited = true; 1685 } 1686 1687 if (expire_time >= 0 && pwd->pw_expire != expire_time) { 1688 pwd->pw_expire = expire_time; 1689 edited = true; 1690 } 1691 1692 if (shell) { 1693 shell = shell_path(cnf->shelldir, cnf->shells, shell); 1694 if (shell == NULL) 1695 shell = ""; 1696 if (strcmp(shell, pwd->pw_shell) != 0) { 1697 pwd->pw_shell = shell; 1698 edited = true; 1699 } 1700 } 1701 1702 if (class && strcmp(pwd->pw_class, class) != 0) { 1703 pwd->pw_class = class; 1704 edited = true; 1705 } 1706 1707 if (homedir && strcmp(pwd->pw_dir, homedir) != 0) { 1708 pwd->pw_dir = homedir; 1709 edited = true; 1710 if (fstatat(conf.rootfd, pwd->pw_dir, &st, 0) == -1) { 1711 if (!createhome) 1712 warnx("WARNING: home `%s' does not exist", 1713 pwd->pw_dir); 1714 } else if (!S_ISDIR(st.st_mode)) { 1715 warnx("WARNING: home `%s' is not a directory", 1716 pwd->pw_dir); 1717 } 1718 } 1719 1720 if (passwd && conf.fd == -1) { 1721 lc = login_getpwclass(pwd); 1722 if (lc == NULL || login_setcryptfmt(lc, "sha512", NULL) == NULL) 1723 warn("setting crypt(3) format"); 1724 login_close(lc); 1725 cnf->default_password = passwd_val(passwd, 1726 cnf->default_password); 1727 pwd->pw_passwd = pw_password(cnf, pwd->pw_name, dryrun); 1728 edited = true; 1729 } 1730 1731 if (gecos && strcmp(pwd->pw_gecos, gecos) != 0) { 1732 pwd->pw_gecos = gecos; 1733 edited = true; 1734 } 1735 1736 if (fd != -1) 1737 edited = pw_set_passwd(pwd, fd, precrypted, true); 1738 1739 if (dryrun) 1740 return (print_user(pwd, pretty, false)); 1741 1742 if (edited) /* Only updated this if required */ 1743 perform_chgpwent(name, pwd, nis ? nispasswd : NULL); 1744 /* Now perform the needed changes concern groups */ 1745 if (groups != NULL) { 1746 /* Delete User from groups using old name */ 1747 SETGRENT(); 1748 while ((grp = GETGRENT()) != NULL) { 1749 if (grp->gr_mem == NULL) 1750 continue; 1751 for (i = 0; grp->gr_mem[i] != NULL; i++) { 1752 if (strcmp(grp->gr_mem[i] , name) != 0) 1753 continue; 1754 for (j = i; grp->gr_mem[j] != NULL ; j++) 1755 grp->gr_mem[j] = grp->gr_mem[j+1]; 1756 chggrent(grp->gr_name, grp); 1757 break; 1758 } 1759 } 1760 ENDGRENT(); 1761 /* Add the user to the needed groups */ 1762 for (i = 0; i < groups->sl_cur; i++) { 1763 grp = GETGRNAM(groups->sl_str[i]); 1764 grp = gr_add(grp, pwd->pw_name); 1765 if (grp == NULL) 1766 continue; 1767 chggrent(grp->gr_name, grp); 1768 free(grp); 1769 } 1770 } 1771 /* In case of rename we need to walk over the different groups */ 1772 if (newname) { 1773 SETGRENT(); 1774 while ((grp = GETGRENT()) != NULL) { 1775 if (grp->gr_mem == NULL) 1776 continue; 1777 for (i = 0; grp->gr_mem[i] != NULL; i++) { 1778 if (strcmp(grp->gr_mem[i], name) != 0) 1779 continue; 1780 grp->gr_mem[i] = newname; 1781 chggrent(grp->gr_name, grp); 1782 break; 1783 } 1784 } 1785 } 1786 1787 /* go get a current version of pwd */ 1788 if (newname) 1789 name = newname; 1790 pwd = GETPWNAM(name); 1791 if (pwd == NULL) 1792 errx(EX_NOUSER, "user '%s' disappeared during update", name); 1793 grp = GETGRGID(pwd->pw_gid); 1794 pw_log(cnf, M_UPDATE, W_USER, "%s(%ju):%s(%ju):%s:%s:%s", 1795 pwd->pw_name, (uintmax_t)pwd->pw_uid, 1796 grp ? grp->gr_name : "unknown", 1797 (uintmax_t)(grp ? grp->gr_gid : (uid_t)-1), 1798 pwd->pw_gecos, pwd->pw_dir, pwd->pw_shell); 1799 1800 /* 1801 * Let's create and populate the user's home directory. Note 1802 * that this also `works' for editing users if -m is used, but 1803 * existing files will *not* be overwritten. 1804 */ 1805 if (PWALTDIR() != PWF_ALT && createhome && pwd->pw_dir && 1806 *pwd->pw_dir == '/' && pwd->pw_dir[1]) { 1807 if (!skel) 1808 skel = cnf->dotdir; 1809 if (homemode == 0) 1810 homemode = cnf->homemode; 1811 create_and_populate_homedir(cnf, pwd, skel, homemode, true); 1812 } 1813 1814 if (nis && nis_update() == 0) 1815 pw_log(cnf, M_UPDATE, W_USER, "NIS maps updated"); 1816 1817 return (EXIT_SUCCESS); 1818 } 1819