1#! /usr/bin/ksh 2# 3# CDDL HEADER START 4# 5# The contents of this file are subject to the terms of the 6# Common Development and Distribution License (the "License"). 7# You may not use this file except in compliance with the License. 8# 9# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 10# or http://www.opensolaris.org/os/licensing. 11# See the License for the specific language governing permissions 12# and limitations under the License. 13# 14# When distributing Covered Code, include this CDDL HEADER in each 15# file and include the License file at usr/src/OPENSOLARIS.LICENSE. 16# If applicable, add the following below this CDDL HEADER, with the 17# fields enclosed by brackets "[]" replaced with your own identifying 18# information: Portions Copyright [yyyy] [name of copyright owner] 19# 20# CDDL HEADER END 21# 22# 23# Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved. 24# 25 26# 27# inityp2l -- Utility to generate YP (NIS) to LDAP 28# configuration file (/etc/default/ypserv) 29# and mapping file (/var/yp/NISLDAPmapping) 30# 31 32 33 34# 35# Displays message corresponding to the argument tag passed. 36# 37display_msg() 38{ 39 case "$1" in 40 usage) cat <<EOF 41 42 $PROG: [ -m mapping_file ] [ -c config_file ] 43 m <mapping_file> Name of the generated NISLDAP mapping file 44 Default is /var/yp/NISLDAPmapping 45 c <config_file> Name of the generated ypserv configuration file 46 Default is /etc/default/ypserv 47 48EOF 49 ;; 50 no_config_file_name_specified) cat <<EOF 51 52You have not specified the config file name. You still have the 53option to skip creating this file, specify a config file name, or 54continue creating it with the default file name (${CONFIG_FILE}). 55 56EOF 57 ;; 58 no_mapping_file_name_specified) cat <<EOF 59 60You have not specified the mapping file name. You still have the 61option to skip creating this file, specify a mapping file name, or 62continue creating it with the default file name (${MAP_FILE}). 63 64EOF 65 ;; 66 new_config_file_name_help) cat <<EOF 67 68You can either specify a new file name, or accept the default 69config file name (${CONFIG_FILE}). 70 71It is recommended not to use the default file name since this 72script just helps with rapid creation of a config file. You 73should examine it's content before using it. 74 75EOF 76 ;; 77 new_mapping_file_name_help) cat <<EOF 78 79You can either specify a new file name, or accept the default 80mapping file name (${MAP_FILE}). 81 82It is recommended not to use the default file name since this 83script just helps with rapid creation of a mapping file. You 84should examine it's content before using it. And if there are 85custom maps, then their entries in the mapping file need to be 86customized too. 87 88Also, creation of default mapping file would cause NIS components 89to work in NIS to LDAP (N2L), rather than traditional NIS, mode 90when next restarted. 91 92EOF 93 ;; 94 backup_config_file) cat <<EOF 95 96The config file "${CONFIG_FILE}" already exists. It is strongly 97recommended that you BACKUP this file before running $PROG. 98 99However, even if you continue, you would be given the option to 100back up this file before it gets overwritten. 101 102EOF 103 ;; 104 backup_mapping_file) cat <<EOF 105 106The mapping file "${MAP_FILE}" already exists. It is strongly 107recommended that you BACKUP this file before running $PROG. 108 109However, even if you continue, you would be given the option to 110back up this file before it gets overwritten. 111 112EOF 113 ;; 114 warn_n2l_mode) cat <<EOF 115 116Warning : Creation of default mapping file (`basename $MAP_FILE`) 117 at default location (`dirname $MAP_FILE`) would cause NIS 118 components to work in NIS to LDAP (N2L) mode, rather than 119 traditional NIS mode, when next restarted. 120 121 "$PROG" assists with rapid creation of a simple N2L mapping 122 file. The user should examine it's content before using it. 123 For custom maps, this file needs to be customized which can 124 be done using standard text editors. 125 126EOF 127 ;; 128 config_auth_method_menu) cat <<EOF 129 The following are the supported Authentication Methods - 130 1 none 131 2 simple 132 3 sasl/cram-md5 133 4 sasl/digest-md5 134EOF 135 ;; 136 auth_method_menu) cat <<EOF 137 The following are the supported Authentication Methods - 138 1 simple 139 2 sasl/cram-md5 140 3 sasl/digest-md5 141EOF 142 ;; 143 tls_method_menu) cat <<EOF 144 The following are the supported TLS Methods - 145 1 none 146 2 ssl 147EOF 148 ;; 149 retrieve_error_action_menu) cat <<EOF 150 The following are the supported actions - 151 1 use_cached 152 2 fail 153EOF 154 ;; 155 store_error_action_menu) cat <<EOF 156 The following are the supported actions - 157 1 retry 158 2 fail 159EOF 160 ;; 161 sorry) cat <<EOF 162 163HELP - No help is available for this topic. 164 165EOF 166 ;; 167 backup_config_file_cont_help) cat <<EOF 168 169HELP - Since $PROG will overwrite the existing config file, it is 170 strongly recommended that you backup this file prior to 171 running this utility. 172 173 However, even if you continue, you would be given the option 174 to back up this file before it gets overwritten. 175 176EOF 177 ;; 178 backup_config_file_help) cat <<EOF 179 180HELP - If you choose to backup the existing config file, it would be 181 saved with current date and time suffix in yymmdd.HH.MM.SS format. 182 183EOF 184 ;; 185 backup_mapping_file_cont_help) cat <<EOF 186 187HELP - Since $PROG will overwrite the existing mapping file, it is 188 strongly recommended that you backup this file prior to running 189 this utility. 190 191 However, even if you continue, you would be given the option to 192 back up this file before it gets overwritten. 193 194EOF 195 ;; 196 backup_mapping_file_help) cat <<EOF 197 198HELP - If you choose to backup the existing mapping file, it would be 199 saved with current date and time suffix in yymmdd.HH.MM.SS format. 200 201EOF 202 ;; 203 warn_n2l_mode_help) cat <<EOF 204 205HELP - It is strongly recommended that the mapping file is created at 206 non-default location (other than `dirname $MAP_FILE`). After this, 207 it's content should be verified, custom maps should be handled, 208 and if NIS components are desired to run in NIS to LDAP (N2L), 209 then only it should be copied at the default location. 210 211EOF 212 ;; 213 nisLDAPconfigDN_help) cat <<EOF 214 215HELP - The DN which stores the configuration information in LDAP. 216 There is no default value for this field. Leave empty or 217 undefined to get this information from config file (ypserv). 218 219EOF 220 ;; 221 nisLDAPconfigPreferredServerList_help) cat <<EOF 222 223HELP - List of directory servers to provide the configuration 224 information. There is no default. The preferred servers 225 must be entered IN THE ORDER you wish to have them contacted. 226 The preferred server list is a space separated list of IP 227 addresses. Providing port numbers is optional, and when not 228 supplied, port 389 is assumed. For an LDAP server running 229 on this machine, at port 389, use "127.0.0.1:389". 230 231EOF 232 ;; 233 auth_help) cat <<EOF 234 235HELP - The authentication method to be used to obtain information 236 from LDAP server. The supported methods are provided in menu. 237 238EOF 239 ;; 240 tls_help) cat <<EOF 241 242HELP - The transport layer security used for connection to the LDAP 243 server. In order to successfully use transport layer security, 244 the server must also support the chosen values. The supported 245 methods are provided in menu. Default is "$DEF_TLS". 246 247EOF 248 ;; 249 TLSCertificateDBPath_help) cat <<EOF 250 251HELP - The absolute path name of the directory containing the certificate 252 database. The default value is "$DEF_TLSCertificateDBPath" 253 254EOF 255 ;; 256 nisLDAPconfigProxyUser_help) cat <<EOF 257 258HELP - The bind DN of the proxy user used to obtain configuration 259 information. There is no default value. If the value ends 260 with a comma, the value of the nisLDAPconfigDN attribute 261 is appended. 262 263EOF 264 ;; 265 ProxyPassword_warn) cat <<EOF 266 267Warning : In order to avoid having this password publicly visible 268 on the machine, the password should appear only in the 269 configuration file, and the file should have an appropriate 270 owner, group, and file mode. 271 272 So, once this file is ready, please modify appropriately 273 to make sure this file is well protected. 274 275EOF 276 ;; 277 preferredServerList_help) cat <<EOF 278 279HELP - List of directory servers for mapping data to/from LDAP. 280 There is no default. The preferred servers must be entered 281 IN THE ORDER you wish to have them contacted. The preferred 282 server list is a space separated list of IP addresses. 283 Providing port numbers is optional, and when not supplied, 284 port 389 is assumed. For an LDAP server running on this 285 machine, at port 389, use "127.0.0.1:389". 286 287EOF 288 ;; 289 nisLDAPproxyUser_help) cat <<EOF 290 291HELP - The bind DN of the proxy user the ypserv to read or write 292 from or to LDAP. Assumed to have the appropriate permission 293 to read and modify LDAP data. There is no default value. If 294 the value ends with a comma, the value of the context for 295 the current domain (as defined by a nisLDAPdomainContext 296 attribute (NISLDAPmapping(4))) is appended. 297 298EOF 299 ;; 300 nisLDAPbindTimeout_help) cat <<EOF 301 302HELP - The amount of time in seconds after which an LDAP bind operation 303 will timeout. Default is $DEF_nisLDAPbindTimeout seconds. 304 Decimal values are allowed. 305 306EOF 307 ;; 308 nisLDAPsearchTimeout_help) cat <<EOF 309 310HELP - The amount of time in seconds after which an LDAP search operation 311 will timeout. Default is $DEF_nisLDAPsearchTimeout seconds. 312 Decimal values are allowed. 313 314EOF 315 ;; 316 nisLDAPmodifyTimeout_help) cat <<EOF 317 318HELP - The amount of time in seconds after which an LDAP modify operation 319 will timeout. Default is $DEF_nisLDAPmodifyTimeout seconds. 320 Decimal values are allowed. 321 322EOF 323 ;; 324 nisLDAPaddTimeout_help) cat <<EOF 325 326HELP - The amount of time in seconds after which an LDAP add operation 327 will timeout. Default is $DEF_nisLDAPaddTimeout seconds. 328 Decimal values are allowed. 329 330EOF 331 ;; 332 nisLDAPdeleteTimeout_help) cat <<EOF 333 334HELP - The amount of time in seconds after which an LDAP delete operation 335 will timeout. Default is $DEF_nisLDAPdeleteTimeout seconds. 336 Decimal values are allowed. 337 338EOF 339 ;; 340 nisLDAPsearchTimeLimit_help) cat <<EOF 341 342HELP - Establish a value for the LDAP_OPT_TIMELIMIT option, which 343 suggests a time limit for the search operation on the LDAP 344 server. The server may impose its own constraints on possible 345 values. See your LDAP server documentation. The default is the 346 nisLDAPsearchTimeout ($DEF_nisLDAPsearchTimeout seconds) value. 347 Only integer values are allowed. 348 349 Since the nisLDAPsearchTimeout limits the amount of time the 350 client ypserv will wait for completion of a search operation, 351 setting the nisLDAPsearchTimeLimit larger than the 352 nisLDAPsearchTimeout is not recommended. 353 354EOF 355 ;; 356 nisLDAPsearchSizeLimit_help) cat <<EOF 357 358HELP - Establish a value for the LDAP_OPT_SIZELIMIT option, which 359 suggests a size limit, in bytes, for the search results on 360 the LDAP server. The server may impose its own constraints 361 on possible values. See your LDAP server documentation. The 362 default is $DEF_nisLDAPsearchSizeLimit, which means unlimited. 363 Only integer values are allowed. 364 365EOF 366 ;; 367 nisLDAPfollowReferral_help) cat <<EOF 368 369HELP - Determines if the ypserv should follow referrals or not. 370 Recognized values are yes and no. Default is $DEF_nisLDAPfollowReferral. 371 372EOF 373 ;; 374 nisLDAPretrieveErrorAction_help) cat <<EOF 375 376HELP - If an error occurs while trying to retrieve an entry from 377 LDAP, one of the following actions can be selected: 378 379 use_cached : Retry the retrieval the number of time specified 380 by nisLDAPretrieveErrorAttempts, with the 381 nisLDAPretrieveErrorTimeout value controlling 382 the wait between each attempt. 383 384 If all attempts fail then log a warning and 385 return the value currently in the cache to the 386 client. This is the default value. 387 388 fail : Proceed as for 'use_cached' but if all attempts 389 fail return a YPERR_YPERR error to the client. 390 391EOF 392 ;; 393 nisLDAPretrieveErrorAttempts_help) cat <<EOF 394 395HELP - The number of times a failed retrieval should be retried. 396 The default is unlimited. Note while retries are made, the 397 NIS daemon will be prevented from servicing further requests. 398 Hence, values other than 1 should be used with caution. 399 400EOF 401 ;; 402 nisLDAPretrieveErrorTimeout_help) cat <<EOF 403 404HELP - The timeout (in seconds) between each new attempt to retrieve 405 LDAP data. Default is $DEF_nisLDAPretrieveErrorTimeout seconds. 406 407EOF 408 ;; 409 nisLDAPstoreErrorAction_help) cat <<EOF 410 411HELP - If an error occurs while trying to store data to the LDAP 412 repository, one of the following actions can be selected : 413 414 retry : Retry operation nisLDAPstoreErrorAttempts times with 415 nisLDAPstoreErrorTimeout seconds between each attempt. 416 Note while retries are made the NIS daemon will be 417 prevented from servicing further requests. Use with 418 caution. This is the default value. 419 420 fail : Return YPERR_YPERR error to the client. 421 422EOF 423 ;; 424 nisLDAPstoreErrorAttempts_help) cat <<EOF 425 426HELP - The number of times a failed attempt to store data to the 427 LDAP repository should be retried. The default is unlimited. 428 429 The value for nisLDAPstoreErrorAttempts is ignored unless 430 nisLDAPstoreErrorAction=retry. 431 432EOF 433 ;; 434 nisLDAPstoreErrorTimeout_help) cat <<EOF 435 436HELP - The timeout (in seconds) between each new attempt to store 437 LDAP data. Default is $DEF_nisLDAPstoreErrorTimeout seconds. 438 439 The value for nisLDAPstoreErrorTimeout is ignored unless 440 nisLDAPstoreErrorAction=retry. 441 442EOF 443 ;; 444 selectDomain4N2L_help) cat <<EOF 445 446HELP - Whether this domain needs to be served by YP to LDAP transition 447 solution. The default is no in which case the data in this 448 domain would not be taken care for transitioning to LDAP. 449 450EOF 451 ;; 452 generate_comment_info_for_cust_map_help) cat <<EOF 453 454HELP - If selected, this script will try to add relevant comments 455 in the mapping file which might help in customizing the 456 mapping information for custom maps. 457 458EOF 459 ;; 460 generate_mapping_info_for_cust_map_help) cat <<EOF 461 462HELP - If selected, this script will try to generate mapping 463 information for this map assuming it is a "simple" map. 464 465 A map is assumed to be "simple" if each entry of this map 466 has only one "key value" entry in YP, and if each map entry 467 can be represented as a single DIT string in the LDAP server. 468 469 If this map is not a simple map and you do want to store it 470 in LDAP, you have two options : 471 472 1 - Answer yes, and this script would generate the mapping 473 information for this map assuming it is a simple map. 474 And once the execution of the script is over, you can 475 customize the mapping information by hand editing the 476 mapping file. 477 478 2 - Answer no, and this script would not generate mapping 479 info for this map. And once the execution of the script 480 is over, you can include the customized mapping 481 information by hand editing the mapping file. 482 483EOF 484 ;; 485 nisLDAPdomainContext_help) cat <<EOF 486 487HELP - This parameter defines the context (default location) in 488 the directory tree at which all the name service entries 489 for this particular domain would be stored. 490 491EOF 492 ;; 493 nisLDAPyppasswddDomains_help) cat <<EOF 494 495HELP - Lists the domains for which password changes should be 496 made. If this is not present then the value returned by 497 'domainname' will be used. 498 499 NIS password change requests do not specify the domains in 500 which any given password should be changed. (In traditional 501 NIS this information is effectively hard coded in the NIS 502 makefile.) 503 504EOF 505 ;; 506 custom_map_comment_char_help) cat <<EOF 507 508HELP - If selected, it will allow you to specify a character which 509 would represent the start of the special 'comment' field in 510 a given NIS map. If this attribute is not present then the 511 default comment character '#' is used. 512 513 If a map cannot contain comments then the blank comment 514 character ('') should be specified (just hit the return key). 515 516EOF 517 ;; 518 same_comment_char_help) cat <<EOF 519 520HELP - If selected, for a given map, it will allow you to specify 521 a common comment character for all the domains. 522 523 Or else by selecting NO, for the same map, you would be 524 given the option to specify different comment character 525 for different domains. 526 527EOF 528 ;; 529 secure_flag_on_help) cat <<EOF 530 531HELP - Secure flag is set on maps which are generated with 532 "makedbm -s". When converting data from LDAP to YP, 533 it adds YP_SECURE entries. 534 535EOF 536 ;; 537 secure_flag_all_domains_help) cat <<EOF 538 539HELP - If selected, it will allow you to set the secure flag on 540 for this map for all the domains. 541 542 Or else by selecting NO, you would be given the option to 543 set this flag, for the same map, on per domain basis. 544 545EOF 546 ;; 547 interdomain_flag_on_help) cat <<EOF 548 549HELP - Interdomain flag is set on a set of maps which are generated 550 with "makedbm -b". It signals NIS servers to use the domain 551 name resolver for host name and address lookups for hosts 552 not found in the maps. 553 554 If selected, it adds YP_INTERDOMAIN entries in these maps 555 when converting data from LDAP to YP. 556 557EOF 558 ;; 559 interdomain_flag_all_domains_help) cat <<EOF 560 561HELP - If selected, it will allow you to set the interdomain flag 562 on for all the domains. 563 564 Or else by selecting NO, you would be given the option to 565 set this flag on per domain basis. 566 567EOF 568 ;; 569 initialTTLlo_help) cat <<EOF 570 571HELP - The lower limit for the initial TTL (in seconds) for data 572 read from disk when the ypserv starts. If initialTTLhi also 573 is specified, the actual initialTTL will be randomly selected 574 from the interval initialTTLlo to initialTTLhi (inclusive). 575 576 Leaving the field empty yields the default value of $DEF_iTTLlo. 577 578EOF 579 ;; 580 initialTTLhi_help) cat <<EOF 581 582HELP - The upper limit for the initial TTL (in seconds). 583 If left empty, defaults to "$DEF_iTTLhi". 584 585EOF 586 ;; 587 runningTTL_help) cat <<EOF 588 589HELP - The TTL (in seconds) for data retrieved from LDAP while the 590 ypserv is running. If left empty, defaults to "$DEF_runTTL". 591 592EOF 593 ;; 594 default_ttl_help) cat <<EOF 595 596HELP - The default TTL value for each map is set to : 597 ${DEF_iTTLlo}:${DEF_iTTLhi}:${DEF_runTTL} 598 599 Select yes if you want to change the current TTL value. 600 601EOF 602 ;; 603 non_default_same_ttl_help) cat <<EOF 604 605HELP - Select yes if you want to set a new TTL value, but want 606 to keep it same for all the maps. 607 608EOF 609 ;; 610 non_default_different_ttl_help) cat <<EOF 611 612HELP - Select yes if you want to set TTL value for each map, but 613 want to keep it same for all the domains. 614 615EOF 616 ;; 617 default_different_ttl_help) cat <<EOF 618 619HELP - Select yes if you want to accept the default TTL 620 value for this map. 621 622EOF 623 ;; 624 same_ttl_across_domains_help) cat <<EOF 625 626HELP - Select yes if you want to set TTL value for the map, 627 but want to keep it same for all the domains. 628 629EOF 630 ;; 631 632 esac 633} 634 635# 636# Echo the message passed only if DEBUG is set. 637# Reduces the line width significantly. 638# 639d_echo() 640{ 641[ DEBUG -eq 1 ] && echo $@ 642} 643 644 645# 646# get_ans(): gets an answer from the user. 647# $1 instruction/comment/description/question 648# $2 default value 649# 650get_ans() 651{ 652 if [ -z "$2" ] 653 then 654 echo "$1 \c" 655 else 656 echo "$1 [$2] \c" 657 fi 658 659 read ANS 660 if [ -z "$ANS" ] 661 then 662 ANS=$2 663 fi 664} 665 666 667# 668# get_ans_req(): gets an answer (required) from the user, NULL value not allowed. 669# $@ instruction/comment/description/question 670# 671get_ans_req() 672{ 673 ANS="" # Set ANS to NULL. 674 while [ "$ANS" = "" ] 675 do 676 get_ans "$@" 677 [ "$ANS" = "" ] && echo "NULL value not allowed!" 678 done 679} 680 681 682# 683# get_integer(): Querys and verifies that number entered is integer. 684# Function will repeat prompt user for integer value. 685# $1 Message text. 686# $2 default value. 687# $3 Help argument. 688# 689get_integer() 690{ 691 ANS="" # Set ANS to NULL. 692 NUM="" 693 694 get_ans "$1" "$2" 695 696 # Verify that value is integer. 697 while not_integer $ANS 698 do 699 case "$ANS" in 700 [Hh] | help | Help | \?) display_msg ${3:-sorry} ;; 701 * ) echo "Invalid value: \"${ANS}\". \c" 702 ;; 703 esac 704 705 # Get a new value. 706 get_ans "Enter an integer value:" "$2" 707 done 708 NUM=$ANS 709} 710 711 712# 713# get_number(): Querys and verifies that number entered is numeric. 714# Function will repeat prompt user for numeric value. 715# $1 Message text. 716# $2 default value. 717# $3 Help argument. 718# 719get_number() 720{ 721 ANS="" # Set ANS to NULL. 722 NUM="" 723 724 get_ans "$1" "$2" 725 726 # Verify that value is numeric. 727 while not_numeric $ANS 728 do 729 case "$ANS" in 730 [Hh] | help | Help | \?) display_msg ${3:-sorry} ;; 731 * ) echo "Invalid value: \"${ANS}\". \c" 732 ;; 733 esac 734 735 # Get a new value. 736 get_ans "Enter a numeric value:" "$2" 737 done 738 NUM=$ANS 739} 740 741 742# 743# get_pos_int(): Only allows positive integer. 744# 745# $1 - Prompt message. 746# $2 - Default value (require). 747# $3 - Optional help argument. 748get_pos_int() 749{ 750 while : 751 do 752 get_integer "$1" "$2" "$3" 753 754 if [ $ANS -lt 0 ]; then 755 echo "Invalid number: please enter a positive integer." 756 else 757 break # Positive integer 758 fi 759 done 760} 761 762 763# 764# get_pos_num(): Only allows positive number. 765# 766# $1 - Prompt message. 767# $2 - Default value (require). 768# $3 - Optional help argument. 769get_pos_num() 770{ 771 while : 772 do 773 get_number "$1" "$2" "$3" 774 775 if [ $ANS -lt 0 ]; then 776 echo "Invalid number: please enter a positive number." 777 else 778 break # Positive number 779 fi 780 done 781} 782 783 784# 785# 786# get_passwd(): Reads a password from the user and verify with second. 787# $@ instruction/comment/description/question 788# 789get_passwd() 790{ 791 [ $DEBUG -eq 1 ] && echo "In get_passwd()" 792 793 # Temporary PASSWD variables 794 _PASS1="" 795 _PASS2="" 796 797 # Handle signals, so that echo can be turned back on if Ctrl-C. 798 trap "/usr/bin/stty echo; exit" 1 2 3 6 15 799 800 /usr/bin/stty -echo # Turn echo OFF 801 802 # Endless loop that continues until passwd and re-entered passwd 803 # match. 804 while : 805 do 806 ANS="" # Set ANS to NULL. 807 808 # Don't allow NULL for first try. 809 while [ "$ANS" = "" ] 810 do 811 get_ans "$@" 812 [ "$ANS" = "" ] && echo "" && echo "NULL passwd not allowed!" 813 done 814 _PASS1=$ANS # Store first try. 815 816 # Get second try. 817 echo "" 818 get_ans "Re-enter passwd:" 819 _PASS2=$ANS 820 821 # Test if passwords are identical. 822 if [ "$_PASS1" = "$_PASS2" ]; then 823 break 824 fi 825 826 # Move cursor down to next line and print ERROR message. 827 echo "" 828 echo "ERROR: passwords don't match; try again." 829 done 830 831 /usr/bin/stty echo # Turn echo ON 832 833 # Removed signal handler 834 trap 1 2 3 6 15 835 836 echo "" 837} 838 839 840# 841# get_passwd_nochk(): Reads a password from the user w/o check. 842# $@ instruction/comment/description/question 843# 844get_passwd_nochk() 845{ 846 [ $DEBUG -eq 1 ] && echo "In get_passwd_nochk()" 847 848 # Handle signals, so that echo can be turned back on if Ctrl-C. 849 trap "/usr/bin/stty echo; exit" 1 2 3 6 15 850 851 /usr/bin/stty -echo # Turn echo OFF 852 853 get_ans "$@" 854 855 /usr/bin/stty echo # Turn echo ON 856 857 # Removed signal handler 858 trap 1 2 3 6 15 859 860 echo "" 861} 862 863 864# 865# get_confirm(): Get confirmation from the user. (Y/Yes or N/No) 866# $1 - Message 867# $2 - default value. 868# 869get_confirm() 870{ 871 _ANSWER= 872 873 while : 874 do 875 # Display Internal ERROR if $2 not set. 876 if [ -z "$2" ]; then 877 echo "INTERNAL ERROR: get_confirm requires 2 args, 3rd is optional." 878 exit 2 879 fi 880 881 # Display prompt. 882 echo "$1 [$2] \c" 883 884 # Get the ANSWER. 885 read _ANSWER 886 if [ "$_ANSWER" = "" ] && [ -n "$2" ] ; then 887 _ANSWER=$2 888 fi 889 case "$_ANSWER" in 890 [Yy] | yes | Yes | YES) return 1 ;; 891 [Nn] | no | No | NO) return 0 ;; 892 [Hh] | help | Help | \?) display_msg ${3:-sorry};; 893 * ) echo "Please enter y or n." ;; 894 esac 895 done 896} 897 898 899# 900# get_confirm_nodef(): Get confirmation from the user. (Y/Yes or N/No) 901# No default value supported. Returns 1 for yes. 902# 903get_confirm_nodef() 904{ 905 _ANSWER= 906 907 while : 908 do 909 echo "$@ \c" 910 read _ANSWER 911 case "$_ANSWER" in 912 [Yy] | yes | Yes | YES) return 1 ;; 913 [Nn] | no | No | NO) return 0 ;; 914 * ) echo "Please enter y or n." ;; 915 esac 916 done 917} 918 919 920# 921# is_integer(): Tells if a string is numeric integer. 922# 0 = Integer 923# 1 = NOT Integer 924# 925is_integer() 926{ 927 # Check for parameter. 928 if [ $# -ne 1 ]; then 929 return 1 930 fi 931 932 # Determine if integer. 933 expr "$1" + 1 > /dev/null 2>&1 934 935 if [ $? -ge 2 ]; then 936 return 1 937 fi 938 939 # Made it here, it's Numeric. 940 return 0 941} 942 943 944# 945# not_integer(): Reverses the return values of is_integer. Useful 946# for if and while statements that want to test for 947# non-integer data. 948# 0 = NOT Integer 949# 1 = Integer 950# 951not_integer() 952{ 953 is_integer $1 954 if [ $? -eq 0 ]; then 955 return 1 956 else 957 return 0 958 fi 959} 960 961 962# 963# is_numeric(): Tells if a string is numeric. 964# 0 = Numeric 965# 1 = NOT Numeric 966# 967is_numeric() 968{ 969 # Check for parameter. 970 if [ $# -ne 1 ]; then 971 return 1 972 fi 973 974 # Determine if numeric. 975 let _NUM="$1 + 1" > /dev/null 2>&1 976 977 if [ $? -eq 0 ]; then 978 return 0 979 fi 980 981} 982 983 984# 985# not_numeric(): Reverses the return values of is_numeric. Useful 986# for if and while statements that want to test for 987# non-numeric data. 988# 0 = NOT Numeric 989# 1 = Numeric 990# 991not_numeric() 992{ 993 is_numeric $1 994 if [ $? -eq 0 ]; then 995 return 1 996 else 997 return 0 998 fi 999} 1000 1001 1002# 1003# domain_2_dc(): Convert a domain name into dc string. 1004# $1 .. Domain name. 1005# 1006domain_2_dc() 1007{ 1008 _DOM=$1 # Domain parameter. 1009 _DOM_2_DC="" # Return value from function. 1010 _FIRST=1 # Flag for first time. 1011 1012 export _DOM_2_DC # Make visible for others. 1013 1014 # Convert "."'s to spaces for "for" loop. 1015 domtmp="`echo ${_DOM} | tr '.' ' '`" 1016 for i in $domtmp; do 1017 if [ $_FIRST -eq 1 ]; then 1018 _DOM_2_DC="dc=${i}" 1019 _FIRST=0 1020 else 1021 _DOM_2_DC="${_DOM_2_DC},dc=${i}" 1022 fi 1023 done 1024} 1025 1026 1027# 1028# is_root_user(): Check to see if logged in as super user. 1029# 1030is_root_user() 1031{ 1032 case `id` in 1033 uid=0\(root\)*) return 0 ;; 1034 * ) return 1 ;; 1035 esac 1036} 1037 1038 1039# 1040# parse_arg(): Parses the command line arguments and sets the 1041# appropriate variables. 1042# 1043parse_arg() 1044{ 1045 while getopts ":dm:c:" ARG 1046 do 1047 case $ARG in 1048 d) DEBUG=1;; 1049 1050 m) MAP_FILE=$OPTARG 1051 MAPPING_FILE_SPECIFIED=1;; 1052 1053 c) CONFIG_FILE=$OPTARG 1054 CONFIG_FILE_SPECIFIED=1;; 1055 1056 \?) echo "**ERROR: Invalid option '$OPTARG'" 1057 display_msg usage 1058 exit 1;; 1059 esac 1060 done 1061 1062 shift `expr $OPTIND - 1` 1063 if [ $# -gt 0 ]; then 1064 echo "**ERROR: wrong usage " 1065 display_msg usage 1066 exit 1 1067 fi 1068} 1069 1070 1071# 1072# present() : Checks if the first argument exists in the 1073# argument list. Returns 0 if found, else 1. 1074# 1075present () 1076{ 1077_ELEMENT=$1 1078 1079shift 1080ARG_LIST=$@ 1081 1082for item in $ARG_LIST 1083do 1084 [ "$_ELEMENT" = "$item" ] && return 0 1085done 1086 1087# If reached here, then the clement does not exist 1088return 1 1089} 1090 1091 1092# 1093# remove() : Returns a new string after removing the first 1094# argument in the argument list. 1095# 1096remove () 1097{ 1098_ELEMENT=$1 1099 1100shift 1101ARG_LIST=$@ 1102 1103NEW_LIST="" 1104 1105for item in $ARG_LIST 1106do 1107 [ "$_ELEMENT" != "$item" ] && NEW_LIST="$NEW_LIST $item" 1108done 1109 1110echo $NEW_LIST 1111return 0 1112} 1113 1114 1115# 1116# merge_lists() : Returns a list after merging elements 1117# (uniquely) supplied in the argument list. 1118# 1119merge_lists() 1120{ 1121MERGED_LIST="" 1122 1123for _VAR in "$@" 1124do 1125 if ! present $_VAR $MERGED_LIST; then 1126 MERGED_LIST="$MERGED_LIST $_VAR" 1127 fi 1128done 1129 1130echo $MERGED_LIST 1131return 0 1132} 1133 1134 1135# 1136# init(): initializes variables and options 1137# 1138init() 1139{ 1140# General variables. 1141DEBUG=0 # Set Debug OFF 1142 1143MAPPING_FILE_SPECIFIED=0 # No file name passed 1144CONFIG_FILE_SPECIFIED=0 # No file name passed 1145 1146# Prevent others from snooping 1147umask 077 1148 1149# Set default config and mapping files. 1150DEFAULT_MAP_FILE="/var/yp/NISLDAPmapping" 1151DEFAULT_CONFIG_FILE="/etc/default/ypserv" 1152 1153MAP_FILE="$DEFAULT_MAP_FILE" 1154CONFIG_FILE="$DEFAULT_CONFIG_FILE" 1155 1156# Set and create TMPDIR. Use a safe place to discourage hackers. 1157TMPDIR="/var/yp/inityp2l" 1158 1159# Temporary file names to be used to prevent system starting in 1160# N2L mode in case something goes wrong during file creation. 1161TMPCONF="ypserv-tmp" 1162TMPMAP="NISLDAPmapping-tmp" 1163 1164# Remove if the temp directory has been leftover 1165[ -d "$TMPDIR" ] && rm -rf $TMPDIR 1166mkdir $TMPDIR 1167if [ $? -ne 0 ]; then 1168 echo ERROR : Failed to create temp directory $TMPDIR 1169 exit 1 1170fi 1171 1172# Initialize the default NIS maps. 1173DEFAULT_NIS_MAPS="passwd.byname 1174 passwd.byuid 1175 group.byname 1176 group.bygid 1177 hosts.byaddr 1178 hosts.byname 1179 ipnodes.byaddr 1180 ipnodes.byname 1181 ethers.byaddr 1182 ethers.byname 1183 networks.byaddr 1184 networks.byname 1185 rpc.bynumber 1186 services.byname 1187 services.byservicename 1188 printers.conf.byname 1189 project.byname 1190 project.byprojid 1191 protocols.byname 1192 protocols.bynumber 1193 netgroup 1194 netgroup.byuser 1195 netgroup.byhost 1196 bootparams 1197 mail.aliases 1198 mail.byaddr 1199 publickey.byname 1200 netid.byname 1201 netmasks.byaddr 1202 passwd.adjunct.byname 1203 group.adjunct.byname 1204 timezone.byname 1205 auth_attr 1206 exec_attr 1207 prof_attr 1208 user_attr 1209 audit_user 1210 auto.master 1211 auto.home 1212 ypservers" 1213 1214set -A DEF_NIS_MAP_ARRAY $DEFAULT_NIS_MAPS 1215 1216# The default TTL maps in database ID format. 1217DEF_TTL_MAPLIST="audit_user 1218 auto.home 1219 auto.master 1220 auth_attr 1221 bootparams 1222 ethers 1223 exec_attr 1224 group 1225 group.adjunct.byname 1226 keys.host 1227 keys.pass 1228 keys.nobody 1229 hosts 1230 multihosts 1231 ipnodes 1232 multiipnodes 1233 netgroup 1234 networks 1235 passwd 1236 passwd.adjunct.byname 1237 printers.conf.byname 1238 prof_attr 1239 project 1240 protocols 1241 services 1242 mail.aliases 1243 mail.mapping 1244 netid.host 1245 netid.pass 1246 netmasks.byaddr 1247 rpc.bynumber 1248 ageing.byname 1249 timezone.byname 1250 user_attr 1251 ypservers" 1252 1253 1254# Initialize default values for config parameters. 1255 1256configDN_flag=0 1257DEF_nisLDAPconfigDN="" 1258DEF_TLS=none 1259DEF_TLSCertificateDBPath=/var/yp/ 1260DEF_nisLDAPbindTimeout=15 1261DEF_nisLDAPsearchTimeout=180 1262DEF_nisLDAPmodifyTimeout=15 1263DEF_nisLDAPaddTimeout=15 1264DEF_nisLDAPdeleteTimeout=15 1265DEF_nisLDAPsearchTimeLimit=${DEF_nisLDAPsearchTimeout} 1266DEF_nisLDAPsearchSizeLimit=0 1267DEF_nisLDAPfollowReferral=no 1268DEF_nisLDAPretrieveErrorAction=use_cached 1269 1270# The default is unlimited, but since it prevents the NIS daemon, 1271# from servicing further requests, set 1 as the suggested value. 1272SUG_nisLDAPretrieveErrorAttempts=1 1273DEF_nisLDAPretrieveErrorTimeout=15 1274DEF_nisLDAPstoreErrorAction=retry 1275 1276# The default is unlimited, but set 1 as the suggested value. 1277SUG_nisLDAPstoreErrorAttempts=1 1278DEF_nisLDAPstoreErrorTimeout=15 1279 1280# Default TTL values (in seconds) for NIS MAPS for mapping file. 1281DEF_iTTLlo=1800 1282DEF_iTTLhi=5400 1283DEF_runTTL=3600 1284 1285} 1286 1287 1288# 1289# config_auth_menu_handler(): Enter the authentication method 1290# for config server. 1291# 1292config_auth_menu_handler() 1293{ 1294 # Display Auth menu 1295 display_msg config_auth_method_menu 1296 1297 # Get a Valid choice. 1298 while : 1299 do 1300 # Display appropriate prompt and get answer. 1301 get_ans_req " Choose one Authentication Method (h=help):" 1302 1303 # Determine choice. 1304 _MENU_CHOICE=$ANS 1305 case "$_MENU_CHOICE" in 1306 1) _AUTHMETHOD="none" 1307 break ;; 1308 2) _AUTHMETHOD="simple" 1309 break ;; 1310 3) _AUTHMETHOD="sasl/cram-md5" 1311 break ;; 1312 4) _AUTHMETHOD="sasl/digest-md5" 1313 break ;; 1314 h) display_msg auth_help ;; 1315 *) echo "Please enter 1-4, or h=help." ;; 1316 esac 1317 done 1318} 1319 1320 1321# 1322# auth_menu_handler(): Enter the Authentication method for LDAP server. 1323# 1324auth_menu_handler() 1325{ 1326 # Display Auth menu 1327 display_msg auth_method_menu 1328 1329 # Get a Valid choice. 1330 while : 1331 do 1332 # Display appropriate prompt and get answer. 1333 get_ans_req " Choose one Authentication Method (h=help):" 1334 1335 # Determine choice. 1336 _MENU_CHOICE=$ANS 1337 case "$_MENU_CHOICE" in 1338 1) _AUTHMETHOD="simple" 1339 break ;; 1340 2) _AUTHMETHOD="sasl/cram-md5" 1341 break ;; 1342 3) _AUTHMETHOD="sasl/digest-md5" 1343 break ;; 1344 h) display_msg auth_help ;; 1345 *) echo "Please enter 1-3, or h=help." ;; 1346 esac 1347 done 1348} 1349 1350 1351# 1352# tls_menu_handler(): Enter the transport layer security 1353# 1354tls_menu_handler() 1355{ 1356 # Display TLS menu 1357 display_msg tls_method_menu 1358 1359 # Get a Valid choice. 1360 while : 1361 do 1362 # Display appropriate prompt and get answer. 1363 # Default value is "none". 1364 1365 get_ans " Choose one Transport Layer Security Method (h=help):" "1" 1366 1367 # Determine choice. 1368 _MENU_CHOICE=$ANS 1369 case "$_MENU_CHOICE" in 1370 1) _TLSMETHOD="none" 1371 break ;; 1372 2) _TLSMETHOD="ssl" 1373 break ;; 1374 h) display_msg tls_help ;; 1375 *) echo "Please enter 1, 2, or h=help." ;; 1376 esac 1377 done 1378} 1379 1380 1381# 1382# retrieve_error_action_menu_handler(): Enter the retrieve error action 1383# 1384retrieve_error_action_menu_handler() 1385{ 1386 # Display retrieve error action menu 1387 display_msg retrieve_error_action_menu 1388 1389 # Get a Valid choice. 1390 while : 1391 do 1392 # Display appropriate prompt and get answer. use_cached is default 1393 get_ans " Choose one retrieval error action (h=help):" "1" 1394 1395 # Determine choice. 1396 _MENU_CHOICE=$ANS 1397 case "$_MENU_CHOICE" in 1398 1) _RET_ERR_ACT="use_cached" 1399 break ;; 1400 2) _RET_ERR_ACT="fail" 1401 break ;; 1402 h) display_msg nisLDAPretrieveErrorAction_help ;; 1403 *) echo "Please enter 1, 2, or h=help." ;; 1404 esac 1405 done 1406} 1407 1408 1409# 1410# store_error_action_menu_handler(): Enter the store error action 1411# 1412store_error_action_menu_handler() 1413{ 1414 # Display store error action menu 1415 display_msg store_error_action_menu 1416 1417 # Get a Valid choice. 1418 while : 1419 do 1420 # Display appropriate prompt and get answer. retry is default 1421 get_ans " Choose one store error action (h=help):" "1" 1422 1423 # Determine choice. 1424 _MENU_CHOICE=$ANS 1425 case "$_MENU_CHOICE" in 1426 1) _STOR_ERR_ACT="retry" 1427 break ;; 1428 2) _STOR_ERR_ACT="fail" 1429 break ;; 1430 h) display_msg nisLDAPstoreErrorAction_help ;; 1431 *) echo "Please enter 1, 2, or h=help." ;; 1432 esac 1433 done 1434} 1435 1436 1437# 1438# cleanup(): Remove the TMPDIR and all files in it. 1439# 1440cleanup() 1441{ 1442[ $DEBUG -eq 1 ] && echo "In cleanup()" 1443 1444# Leave the temp directory if debug is set 1445[ $DEBUG -eq 0 ] && rm -rf $TMPDIR 1446} 1447 1448 1449# Save existing config file if elected 1450check_back_config_file() 1451{ 1452if [ -f $CONFIG_FILE ]; then 1453 display_msg backup_config_file 1454 1455 get_confirm "Do you wish to continue (y/n/h)?" \ 1456 "n" "backup_config_file_cont_help" 1457 1458 if [ $? -eq 0 ]; then # if No, cleanup and exit. 1459 cleanup ; exit 1 1460 fi 1461 1462 get_confirm "Do you wish to backup the config file "${CONFIG_FILE}" (y/n/h)?" \ 1463 "y" "backup_config_file_help" 1464 1465 if [ $? -eq 1 ]; then # Save the old config file with timestamp 1466 1467 # SCCS converts '% H %' (without spaces) in current date during putback. 1468 # So use some other combination. 1469 SUFFIX=`date '+%d%h%Y.%H:%M:%S'` 1470 1471 cp -p $CONFIG_FILE ${CONFIG_FILE}-${SUFFIX} 1472 echo " Saved existing $CONFIG_FILE as ${CONFIG_FILE}-${SUFFIX}" 1473 fi 1474fi 1475} 1476 1477 1478# Save existing mapping file if elected 1479check_back_mapping_file() 1480{ 1481if [ -f $MAP_FILE ]; then 1482 display_msg backup_mapping_file 1483 1484 get_confirm "Do you wish to continue (y/n/h)?" \ 1485 "n" "backup_mapping_file_cont_help" 1486 1487 if [ $? -eq 0 ]; then # if No, cleanup and exit. 1488 cleanup ; exit 1 1489 fi 1490 1491 get_confirm "Do you wish to backup the map file "${MAP_FILE}" (y/n/h)?" \ 1492 "y" "backup_mapping_file_help" 1493 1494 if [ $? -eq 1 ]; then # if Yes, save the old map file with timestamp 1495 1496 # SCCS converts '% H %' (without spaces) in current date during putback. 1497 # So use some other combination. 1498 SUFFIX=`date '+%d%h%Y.%H:%M:%S'` 1499 1500 cp -p $MAP_FILE ${MAP_FILE}-${SUFFIX} 1501 echo " Saved existing $MAP_FILE as ${MAP_FILE}-${SUFFIX}" 1502 fi 1503 1504else 1505 if [ "$MAP_FILE" = "$DEFAULT_MAP_FILE" ]; then 1506 display_msg warn_n2l_mode 1507 1508 get_confirm "Do you wish to continue (y/n/h)?" \ 1509 "n" "warn_n2l_mode_help" 1510 1511 if [ $? -eq 0 ]; then 1512 cleanup ; exit 1 1513 fi 1514 fi 1515fi 1516} 1517 1518 1519put_config_file_copyright_info() 1520{ 1521 1522# Start with an empty file, so don't append, but overwrite here. 1523# Just change the name, but keep the same date and version number 1524# as in the ident string of this script. 1525 1526grep "ident \"@(#)$PROG" $ABS_PROG | \ 1527 sed "s/${PROG}/${NEW_NAME}/g" > $CONFIG_FILE 1528 1529echo "\ 1530# 1531# CDDL HEADER START 1532# 1533# The contents of this file are subject to the terms of the 1534# Common Development and Distribution License (the "License"). 1535# You may not use this file except in compliance with the License. 1536# 1537# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 1538# or http://www.opensolaris.org/os/licensing. 1539# See the License for the specific language governing permissions 1540# and limitations under the License. 1541# 1542# When distributing Covered Code, include this CDDL HEADER in each 1543# file and include the License file at usr/src/OPENSOLARIS.LICENSE. 1544# If applicable, add the following below this CDDL HEADER, with the 1545# fields enclosed by brackets "[]" replaced with your own identifying 1546# information: Portions Copyright [yyyy] [name of copyright owner] 1547# 1548# CDDL HEADER END 1549# 1550# 1551# Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved. 1552#\ 1553" >> $MAP_FILE 1554} 1555 1556 1557get_nisLDAPconfigDN() 1558{ 1559while : 1560do 1561 1562get_ans "DN for configuration information (h=help):" 1563 1564# If help continue, otherwise break. 1565case "$ANS" in 1566 [Hh] | help | Help | \?) display_msg nisLDAPconfigDN_help ;; 1567 * ) break ;; 1568esac 1569done 1570 1571nisLDAPconfigDN="${ANS}" 1572 1573# Store in config file only if a non-default value is specified. 1574if [ "$ANS" != "${DEF_nisLDAPconfigDN}" ]; then 1575 echo "nisLDAPconfigDN=${ANS}" >> $CONFIG_FILE 1576fi 1577 1578# Ask remaining config server related questions only if this 1579# DN is set. So, if a value is specified, set a flag. 1580 1581[ "$ANS" != "" ] && configDN_flag=1 1582} 1583 1584 1585get_nisLDAPconfigPreferredServerList() 1586{ 1587while : 1588do 1589 1590get_ans_req "Preferred server list for configuration information (h=help):" 1591 1592# If help continue, otherwise break. 1593case "$ANS" in 1594 [Hh] | help | Help | \?) display_msg nisLDAPconfigPreferredServerList_help ;; 1595 * ) break ;; 1596esac 1597done 1598 1599nisLDAPconfigPreferredServerList=${ANS} 1600echo "nisLDAPconfigPreferredServerList=${ANS}" >> $CONFIG_FILE 1601} 1602 1603 1604get_nisLDAPconfigAuthenticationMethod() 1605{ 1606_AUTHMETHOD="" 1607 1608echo "Select the Authentication Method for configuration server :" 1609config_auth_menu_handler 1610 1611nisLDAPconfigAuthenticationMethod=${_AUTHMETHOD} 1612echo "nisLDAPconfigAuthenticationMethod=${_AUTHMETHOD}" >> $CONFIG_FILE 1613} 1614 1615 1616get_nisLDAPconfigTLS() 1617{ 1618_TLSMETHOD="" 1619 1620echo "Select the Transport Layer Security (TLS) for configuration server :" 1621tls_menu_handler 1622 1623nisLDAPconfigTLS=${_TLSMETHOD} 1624 1625# Store in config file only if a non-default value is specified. 1626if [ "${_TLSMETHOD}" != "${DEF_TLS}" ]; then 1627 echo "nisLDAPconfigTLS=${_TLSMETHOD}" >> $CONFIG_FILE 1628fi 1629} 1630 1631 1632get_nisLDAPconfigTLSCertificateDBPath() 1633{ 1634while : 1635do 1636 1637get_ans "Path with TLS Certificate DB for configuration server (h=help):"\ 1638 "${DEF_TLSCertificateDBPath}" 1639 1640# If help continue, otherwise break. 1641case "$ANS" in 1642 [Hh] | help | Help | \?) display_msg TLSCertificateDBPath_help ;; 1643 * ) break ;; 1644esac 1645done 1646 1647nisLDAPconfigTLSCertificateDBPath=${ANS} 1648 1649# Store in config file only if a non-default value is specified. 1650if [ "$ANS" != "${DEF_TLSCertificateDBPath}" ]; then 1651 echo "nisLDAPconfigTLSCertificateDBPath=${ANS}" >> $CONFIG_FILE 1652fi 1653} 1654 1655 1656get_nisLDAPconfigProxyUser() 1657{ 1658while : 1659do 1660 1661get_ans_req "Proxy user bind DN to obtain configuration information (h=help):" 1662# If help continue, otherwise break. 1663case "$ANS" in 1664 [Hh] | help | Help | \?) display_msg nisLDAPconfigProxyUser_help ;; 1665 * ) break ;; 1666esac 1667done 1668 1669nisLDAPconfigProxyUser=${ANS} 1670echo "nisLDAPconfigProxyUser=${ANS}" >> $CONFIG_FILE 1671} 1672 1673 1674get_nisLDAPconfigProxyPassword() 1675{ 1676get_passwd "Proxy user password to obtain configuration information :" 1677nisLDAPconfigProxyPassword=${ANS} 1678 1679echo "nisLDAPconfigProxyPassword=${ANS}" >> $CONFIG_FILE 1680 1681display_msg ProxyPassword_warn 1682} 1683 1684 1685get_preferredServerList() 1686{ 1687while : 1688do 1689 1690get_ans_req "Preferred server list for mapping data to/from LDAP (h=help):" 1691 1692# If help continue, otherwise break. 1693case "$ANS" in 1694 [Hh] | help | Help | \?) display_msg preferredServerList_help ;; 1695 * ) break ;; 1696esac 1697done 1698 1699preferredServerList=${ANS} 1700echo "preferredServerList=${ANS}" >> $CONFIG_FILE 1701} 1702 1703 1704get_authenticationMethod() 1705{ 1706_AUTHMETHOD="" 1707 1708echo "Select the Authentication Method for mapping data to/from LDAP :" 1709auth_menu_handler 1710 1711authenticationMethod=${_AUTHMETHOD} 1712echo "authenticationMethod=${_AUTHMETHOD}" >> $CONFIG_FILE 1713} 1714 1715 1716get_nisLDAPTLS() 1717{ 1718_TLSMETHOD="" 1719 1720echo "Select the Transport Layer Security (TLS) for mapping data to/from LDAP :" 1721tls_menu_handler 1722 1723nisLDAPTLS=${_TLSMETHOD} 1724 1725# Store in config file only if a non-default value is specified. 1726if [ "${_TLSMETHOD}" != "${DEF_TLS}" ]; then 1727 echo "nisLDAPTLS=${_TLSMETHOD}" >> $CONFIG_FILE 1728fi 1729} 1730 1731 1732get_nisLDAPTLSCertificateDBPath() 1733{ 1734while : 1735do 1736 1737get_ans "Path with TLS Certificate DB for LDAP data server (h=help):"\ 1738 "${DEF_nisLDAPTLSCertificateDBPath}" 1739 1740# If help continue, otherwise break. 1741case "$ANS" in 1742 [Hh] | help | Help | \?) display_msg TLSCertificateDBPath_help ;; 1743 * ) break ;; 1744esac 1745done 1746 1747nisLDAPTLSCertificateDBPath=${ANS} 1748 1749# Store in config file only if a non-default value is specified. 1750if [ "$ANS" != "${DEF_TLSCertificateDBPath}" ]; then 1751 echo "nisLDAPTLSCertificateDBPath=${ANS}" >> $CONFIG_FILE 1752fi 1753} 1754 1755 1756get_nisLDAPproxyUser() 1757{ 1758while : 1759do 1760 1761get_ans_req "Proxy user bind DN to read/write data from/to LDAP (h=help):" 1762 1763# If help continue, otherwise break. 1764case "$ANS" in 1765 [Hh] | help | Help | \?) display_msg nisLDAPproxyUser_help ;; 1766 * ) break ;; 1767esac 1768done 1769 1770nisLDAPproxyUser=${ANS} 1771echo "nisLDAPproxyUser=${ANS}" >> $CONFIG_FILE 1772} 1773 1774 1775get_nisLDAPproxyPassword() 1776{ 1777get_passwd "Proxy user password to read/write data from/to LDAP :" 1778nisLDAPproxyPassword=${ANS} 1779 1780echo "nisLDAPproxyPassword=${ANS}" >> $CONFIG_FILE 1781 1782display_msg ProxyPassword_warn 1783} 1784 1785 1786get_nisLDAPbindTimeout() 1787{ 1788get_pos_int "Timeout value (in seconds) for LDAP bind operation (h=help):" \ 1789 "${DEF_nisLDAPbindTimeout}" "nisLDAPbindTimeout_help" 1790 1791nisLDAPbindTimeout=${NUM} 1792 1793# Store in config file only if a non-default value is specified. 1794if [ $NUM -ne ${DEF_nisLDAPbindTimeout} ]; then 1795 echo "nisLDAPbindTimeout=${NUM}" >> $CONFIG_FILE 1796fi 1797} 1798 1799 1800get_nisLDAPsearchTimeout() 1801{ 1802get_pos_int "Timeout value (in seconds) for LDAP search operation (h=help):" \ 1803 "${DEF_nisLDAPsearchTimeout}" "nisLDAPsearchTimeout_help" 1804 1805nisLDAPsearchTimeout=${NUM} 1806 1807# Store in config file only if a non-default value is specified. 1808if [ $NUM -ne ${DEF_nisLDAPsearchTimeout} ]; then 1809 echo "nisLDAPsearchTimeout=${NUM}" >> $CONFIG_FILE 1810fi 1811} 1812 1813 1814get_nisLDAPmodifyTimeout() 1815{ 1816get_pos_int "Timeout value (in seconds) for LDAP modify operation (h=help):" \ 1817 "${DEF_nisLDAPmodifyTimeout}" "nisLDAPmodifyTimeout_help" 1818 1819nisLDAPmodifyTimeout=${NUM} 1820 1821# Store in config file only if a non-default value is specified. 1822if [ $NUM -ne ${DEF_nisLDAPmodifyTimeout} ]; then 1823 echo "nisLDAPmodifyTimeout=${NUM}" >> $CONFIG_FILE 1824fi 1825} 1826 1827 1828get_nisLDAPaddTimeout() 1829{ 1830get_pos_int "Timeout value (in seconds) for LDAP add operation (h=help):" \ 1831 "${DEF_nisLDAPaddTimeout}" "nisLDAPaddTimeout_help" 1832 1833nisLDAPaddTimeout=${NUM} 1834 1835# Store in config file only if a non-default value is specified. 1836if [ $NUM -ne ${DEF_nisLDAPaddTimeout} ]; then 1837 echo "nisLDAPaddTimeout=${NUM}" >> $CONFIG_FILE 1838fi 1839} 1840 1841 1842get_nisLDAPdeleteTimeout() 1843{ 1844get_pos_int "Timeout value (in seconds) for LDAP delete operation (h=help):" \ 1845 "${DEF_nisLDAPdeleteTimeout}" "nisLDAPdeleteTimeout_help" 1846 1847nisLDAPdeleteTimeout=${NUM} 1848 1849# Store in config file only if a non-default value is specified. 1850if [ $NUM -ne ${DEF_nisLDAPdeleteTimeout} ]; then 1851 echo "nisLDAPdeleteTimeout=${NUM}" >> $CONFIG_FILE 1852fi 1853} 1854 1855 1856get_nisLDAPsearchTimeLimit() 1857{ 1858get_pos_int "Time limit (in seconds) for search operation on LDAP server (h=help):" \ 1859 "${DEF_nisLDAPsearchTimeLimit}" "nisLDAPsearchTimeLimit_help" 1860 1861nisLDAPsearchTimeLimit=${NUM} 1862 1863# Store in config file only if a non-default value is specified. 1864if [ $NUM -ne ${DEF_nisLDAPsearchTimeLimit} ]; then 1865 echo "nisLDAPsearchTimeLimit=${NUM}" >> $CONFIG_FILE 1866fi 1867} 1868 1869 1870get_nisLDAPsearchSizeLimit() 1871{ 1872get_pos_int "Size limit (in bytes) for search operation on LDAP server (h=help):" \ 1873 "${DEF_nisLDAPsearchSizeLimit}" "nisLDAPsearchSizeLimit_help" 1874 1875nisLDAPsearchSizeLimit=${NUM} 1876 1877# Store in config file only if a non-default value is specified. 1878if [ $NUM -ne ${DEF_nisLDAPsearchSizeLimit} ]; then 1879 echo "nisLDAPsearchSizeLimit=${NUM}" >> $CONFIG_FILE 1880fi 1881} 1882 1883 1884get_nisLDAPfollowReferral() 1885{ 1886get_confirm "Should the ypserv follow LDAP referrals (y/n/h):" \ 1887 "n" "nisLDAPfollowReferral_help" 1888 1889if [ $? -eq 1 ]; then 1890 _ANS="yes" 1891else 1892 _ANS="no" 1893fi 1894 1895# Store in config file only if a non-default value is specified. 1896if [ "${_ANS}" != "${DEF_nisLDAPfollowReferral}" ]; then 1897 echo "nisLDAPfollowReferral=${_ANS}" >> $CONFIG_FILE 1898fi 1899} 1900 1901 1902get_nisLDAPretrieveErrorAction() 1903{ 1904_RET_ERR_ACT="" 1905 1906echo "Select the action to be taken in case of LDAP retrieval error :" 1907retrieve_error_action_menu_handler 1908 1909nisLDAPretrieveErrorAction=${_RET_ERR_ACT} 1910 1911# Store in config file only if a non-default value is specified. 1912if [ "${_RET_ERR_ACT}" != "${DEF_nisLDAPretrieveErrorAction}" ]; then 1913 echo "nisLDAPretrieveErrorAction=${_RET_ERR_ACT}" >> $CONFIG_FILE 1914fi 1915} 1916 1917 1918get_nisLDAPretrieveErrorAttempts() 1919{ 1920 1921get_pos_int "Number of attempts in case of LDAP retrieval error (h=help):" \ 1922 "$SUG_nisLDAPretrieveErrorAttempts" \ 1923 "nisLDAPretrieveErrorAttempts_help" 1924 1925nisLDAPretrieveErrorAttempts=${NUM} 1926 1927echo "nisLDAPretrieveErrorAttempts=${NUM}" >> $CONFIG_FILE 1928} 1929 1930 1931get_nisLDAPretrieveErrorTimeout() 1932{ 1933# if nisLDAPretrieveErrorAttempts=0, then no point in asking 1934# for timeout vales as it is ignored anyway. 1935 1936[ $nisLDAPretrieveErrorAttempts -eq 0 ] && return 0 1937 1938get_pos_int "Timeout (in seconds) between each new attempt to retrieve LDAP data (h=help):"\ 1939 "${DEF_nisLDAPretrieveErrorTimeout}" \ 1940 "nisLDAPretrieveErrorTimeout_help" 1941 1942nisLDAPretrieveErrorTimeout=${NUM} 1943 1944# Store in config file only if a non-default value is specified. 1945if [ $NUM -ne ${DEF_nisLDAPretrieveErrorTimeout} ]; then 1946 echo "nisLDAPretrieveErrorTimeout=${NUM}" >> $CONFIG_FILE 1947fi 1948} 1949 1950 1951get_nisLDAPstoreErrorAction() 1952{ 1953_STOR_ERR_ACT="" 1954 1955echo "Select the action to be taken in case of LDAP store error :" 1956store_error_action_menu_handler 1957 1958nisLDAPstoreErrorAction=${_STOR_ERR_ACT} 1959 1960# Store in config file only if a non-default value is specified. 1961if [ "${_STOR_ERR_ACT}" != "${DEF_nisLDAPstoreErrorAction}" ]; then 1962 echo "nisLDAPstoreErrorAction=${_STOR_ERR_ACT}" >> $CONFIG_FILE 1963fi 1964} 1965 1966 1967get_nisLDAPstoreErrorAttempts() 1968{ 1969 1970# if nisLDAPstoreErrorAction="fail", then no point in asking 1971# for no. of attempts or timeout vales as they are ignored. 1972 1973[ "$nisLDAPstoreErrorAction" = "fail" ] && return 0 1974 1975get_pos_int "Number of attempts in case of LDAP store error (h=help):" \ 1976 "$SUG_nisLDAPstoreErrorAttempts" \ 1977 "nisLDAPstoreErrorAttempts_help" 1978 1979nisLDAPstoreErrorAttempts=${NUM} 1980 1981echo "nisLDAPstoreErrorAttempts=${NUM}" >> $CONFIG_FILE 1982} 1983 1984 1985get_nisLDAPstoreErrorTimeout() 1986{ 1987 1988# if nisLDAPstoreErrorAction="fail", then no point in asking 1989# for no. of attempts or timeout vales as they are ignored. 1990 1991[ "$nisLDAPstoreErrorAction" = "fail" ] && return 0 1992 1993# Similarly, if nisLDAPstoreErrorAttempts=0, ignore this question. 1994 1995[ $nisLDAPstoreErrorAttempts -eq 0 ] && return 0 1996 1997get_pos_int "Timeout (in seconds) between each new attempt to write LDAP data (h=help):"\ 1998 "${DEF_nisLDAPstoreErrorTimeout}" \ 1999 "nisLDAPstoreErrorTimeout_help" 2000 2001nisLDAPstoreErrorTimeout=${NUM} 2002 2003# Store in config file only if a non-default value is specified. 2004if [ $NUM -ne ${DEF_nisLDAPstoreErrorTimeout} ]; then 2005 echo "nisLDAPstoreErrorTimeout=${NUM}" >> $CONFIG_FILE 2006fi 2007} 2008 2009 2010 2011create_config_file() 2012{ 2013 2014# To prevent from leaving a partial config file in case some error or 2015# signal takes place, store the output being generated in a temporary 2016# file first, and move it at the final destination only at the end if 2017# everything goes fine. 2018 2019_CONFIG_FILE=$CONFIG_FILE 2020CONFIG_FILE=${TMPDIR}/${TMPCONF}.$$ 2021 2022echo "Generating config file temporarily as \"${CONFIG_FILE}\"" 2023 2024# Truncate the file before we append anything. 2025# Place copyright information 2026put_config_file_copyright_info 2027 2028# Filter out all the YP domains in /var/yp 2029# The list of domains is stored in list "VARYP_DMN_LIST" 2030 2031echo "\ 2032# 2033# Configuration file for ypserv(1M); see ypserv(4) for more information, 2034# and NISLDAPmapping(4) for configuration of NIS to LDAP mapping. 2035 2036# Unless otherwise noted, commented lines show default values. 2037" >> $CONFIG_FILE 2038 2039echo "\ 2040# Where to look for configuration information in LDAP. Leave empty or 2041# undefined to use this file, in which case the values of the other 2042# 'nisLdapConfig*' attributes are ignored. 2043# 2044#nisLDAPconfigDN=\ 2045" >> $CONFIG_FILE 2046 2047get_nisLDAPconfigDN 2048 2049echo " 2050 2051# Server(s) for configuration information. There is no default; 2052# use the value on the line below for an LDAP server running on 2053# this machine, at port 389. 2054#nisLDAPconfigPreferredServerList=127.0.0.1:389\ 2055" >> $CONFIG_FILE 2056 2057[ $configDN_flag -eq 1 ] && get_nisLDAPconfigPreferredServerList 2058 2059echo " 2060 2061# Authentication method(s) to obtain configuration information. 2062#\ 2063" >> $CONFIG_FILE 2064 2065[ $configDN_flag -eq 1 ] && get_nisLDAPconfigAuthenticationMethod 2066 2067echo " 2068 2069# Transport layer security for configuration information 2070# 2071#nisLDAPconfigTLS=${DEF_TLS}\ 2072" >> $CONFIG_FILE 2073 2074[ $configDN_flag -eq 1 ] && get_nisLDAPconfigTLS 2075 2076echo " 2077 2078# Certificate DB for transport layer security 2079# 2080#nisLDAPconfigTLSCertificateDBPath=${DEF_TLSCertificateDBPath}\ 2081" >> $CONFIG_FILE 2082 2083# ask for Certificate DB only if SSL is set 2084if [ "${nisLDAPconfigTLS}" = "ssl" ]; then 2085 [ $configDN_flag -eq 1 ] && get_nisLDAPconfigTLSCertificateDBPath 2086fi 2087 2088echo " 2089 2090# Proxy user(s) to obtain configuration information. The line below 2091# is an example of the format. 2092# 2093#nisLDAPconfigProxyUser=cn=nisAdmin,ou=People,\ 2094" >> $CONFIG_FILE 2095 2096# Ask proxy user bind DN only if needed. 2097if [ "${nisLDAPconfigAuthenticationMethod}" != "none" ]; then 2098 [ $configDN_flag -eq 1 ] && get_nisLDAPconfigProxyUser 2099fi 2100 2101echo " 2102 2103# Password for proxy user. Must be supplied if the authentication method 2104# requires a password. If a password appears in this file, it should be 2105# protected appropriately against access by unauthorized users. 2106# 2107#nisLDAPconfigProxyPassword=\ 2108" >> $CONFIG_FILE 2109 2110if [ "${nisLDAPconfigAuthenticationMethod}" != "none" ]; then 2111 [ $configDN_flag -eq 1 ] && get_nisLDAPconfigProxyPassword 2112fi 2113 2114echo " 2115 2116# Server list for mapping data to/from LDAP. There is no default; 2117# use the value on the line below for an LDAP server running on 2118# this machine, at port 389. 2119#preferredServerList=127.0.0.1:389\ 2120" >> $CONFIG_FILE 2121 2122get_preferredServerList 2123 2124echo " 2125 2126# Authentication method for mapping data to/from LDAP 2127#\ 2128" >> $CONFIG_FILE 2129 2130get_authenticationMethod 2131 2132echo " 2133 2134# Transport layer security for mapping data to/from LDAP. 2135# 2136#nisLDAPTLS=${DEF_TLS}\ 2137" >> $CONFIG_FILE 2138 2139get_nisLDAPTLS 2140 2141echo " 2142 2143# Certificate DB for transport layer security 2144# 2145#nisLDAPTLSCertificateDBPath=${DEF_TLSCertificateDBPath}\ 2146" >> $CONFIG_FILE 2147 2148# ask for Certificate DB only if SSL is set 2149if [ "${nisLDAPTLS}" = "ssl" ]; then 2150 get_nisLDAPTLSCertificateDBPath 2151fi 2152 2153echo " 2154 2155# Proxy user for ypserv. Assumed to have appropriate permission to read 2156# and/or create or modify LDAP data. The line below is an example of the 2157# format. 2158# 2159#nisLDAPproxyUser=cn=nisAdmin,ou=People,\ 2160" >> $CONFIG_FILE 2161 2162# Ask proxy user bind DN only if needed. 2163if [ "${authenticationMethod}" != "none" ]; then 2164 get_nisLDAPproxyUser 2165fi 2166 2167echo " 2168 2169# Password for proxy user. Must be supplied if the authentication method 2170# requires a password. If a password appears in this file, it should be 2171# protected appropriately against unauthorized access. 2172# 2173#nisLDAPproxyPassword=\ 2174" >> $CONFIG_FILE 2175 2176if [ "${authenticationMethod}" != "none" ]; then 2177 get_nisLDAPproxyPassword 2178fi 2179 2180echo " 2181 2182# Timeouts and time/size limits for LDAP operations. 2183# 2184#nisLDAPbindTimeout=${DEF_nisLDAPbindTimeout}\ 2185" >> $CONFIG_FILE 2186 2187get_nisLDAPbindTimeout 2188 2189echo " 2190#nisLDAPsearchTimeout=${DEF_nisLDAPsearchTimeout}\ 2191" >> $CONFIG_FILE 2192 2193get_nisLDAPsearchTimeout 2194 2195echo " 2196#nisLDAPmodifyTimeout=${DEF_nisLDAPmodifyTimeout}\ 2197" >> $CONFIG_FILE 2198 2199get_nisLDAPmodifyTimeout 2200 2201echo " 2202#nisLDAPaddTimeout=${DEF_nisLDAPaddTimeout}\ 2203" >> $CONFIG_FILE 2204 2205get_nisLDAPaddTimeout 2206 2207echo " 2208#nisLDAPdeleteTimeout=${DEF_nisLDAPdeleteTimeout}\ 2209" >> $CONFIG_FILE 2210 2211get_nisLDAPdeleteTimeout 2212 2213echo " 2214#nisLDAPsearchTimeLimit=${DEF_nisLDAPsearchTimeLimit}\ 2215" >> $CONFIG_FILE 2216 2217get_nisLDAPsearchTimeLimit 2218 2219echo " 2220#nisLDAPsearchSizeLimit=${DEF_nisLDAPsearchSizeLimit}\ 2221" >> $CONFIG_FILE 2222 2223get_nisLDAPsearchSizeLimit 2224 2225echo " 2226 2227# Should the ypserv follow LDAP referrals ? 2228# 2229#nisLDAPfollowReferral=${DEF_nisLDAPfollowReferral}\ 2230" >> $CONFIG_FILE 2231 2232get_nisLDAPfollowReferral 2233 2234echo " 2235 2236# Action, number of attempts, and timeout following an LDAP retrieval error 2237# 2238#nisLDAPretrieveErrorAction=${DEF_nisLDAPretrieveErrorAction}\ 2239" >> $CONFIG_FILE 2240 2241get_nisLDAPretrieveErrorAction 2242 2243echo " 2244#nisLDAPretrieveErrorAttempts=\ 2245" >> $CONFIG_FILE 2246 2247get_nisLDAPretrieveErrorAttempts 2248 2249echo " 2250#nisLDAPretrieveErrorTimeout=${DEF_nisLDAPretrieveErrorTimeout}\ 2251" >> $CONFIG_FILE 2252 2253get_nisLDAPretrieveErrorTimeout 2254 2255echo " 2256 2257# Action, number of attempts, and timeout following an LDAP store error 2258# 2259#nisLDAPstoreErrorAction=${DEF_nisLDAPstoreErrorAction}\ 2260" >> $CONFIG_FILE 2261 2262get_nisLDAPstoreErrorAction 2263 2264echo " 2265#nisLDAPstoreErrorAttempts=\ 2266" >> $CONFIG_FILE 2267 2268get_nisLDAPstoreErrorAttempts 2269 2270echo " 2271#nisLDAPstoreErrorTimeout=${DEF_nisLDAPstoreErrorTimeout}\ 2272" >> $CONFIG_FILE 2273 2274get_nisLDAPstoreErrorTimeout 2275 2276 2277# We are done, so move back the config file from temp. location 2278# to actual location. 2279# In case the config file name has a directory component which does 2280# not exist, then create it now, otherwise 'mv' will return error. 2281 2282DIR_TO_CREATE=`dirname ${_CONFIG_FILE}` 2283mkdir -p ${DIR_TO_CREATE} 2284 2285echo "Moving output from temporary file ($CONFIG_FILE) to actual file ($_CONFIG_FILE)" 2286mv $CONFIG_FILE $_CONFIG_FILE 2287 2288# Revert back the config file name in case needed. 2289CONFIG_FILE=$_CONFIG_FILE 2290echo "Finished creation of config file ( $_CONFIG_FILE )" 2291 2292} 2293 2294 2295put_mapping_file_copyright_info() 2296{ 2297 2298# Start with an emptty file, so don't append, but overwrite here. 2299# Just change the name and add the word pragma, but keep the same 2300# date and version number as in the ident string of this script. 2301 2302grep "ident \"@(#)$PROG" $ABS_PROG | \ 2303 sed "s/ ident/pragma ident/g" | \ 2304 sed "s/${PROG}/${NEW_NAME}/g" > $MAP_FILE 2305 2306echo "\ 2307# 2308# CDDL HEADER START 2309# 2310# The contents of this file are subject to the terms of the 2311# Common Development and Distribution License (the "License"). 2312# You may not use this file except in compliance with the License. 2313# 2314# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 2315# or http://www.opensolaris.org/os/licensing. 2316# See the License for the specific language governing permissions 2317# and limitations under the License. 2318# 2319# When distributing Covered Code, include this CDDL HEADER in each 2320# file and include the License file at usr/src/OPENSOLARIS.LICENSE. 2321# If applicable, add the following below this CDDL HEADER, with the 2322# fields enclosed by brackets "[]" replaced with your own identifying 2323# information: Portions Copyright [yyyy] [name of copyright owner] 2324# 2325# CDDL HEADER END 2326# 2327# 2328# Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved. 2329# 2330#------------------------------------------------------------------- 2331#\ 2332" >> $MAP_FILE 2333} 2334 2335 2336# 2337# Filter out all the YP domains in /var/yp 2338# The list of domains is stored in list "VARYP_DMN_LIST" 2339# 2340create_all_var_yp_domain_list() 2341{ 2342VARYP_DMN_LIST="" 2343 2344for entry in /var/yp/* 2345do 2346 DMN=`basename $entry` 2347 if [ -d "/var/yp/$DMN" ] && [ -f "/var/yp/binding/$DMN/ypservers" ] 2348 then 2349 VARYP_DMN_LIST="$VARYP_DMN_LIST $DMN" 2350 fi 2351done 2352 2353# d_echo VARYP_DMN_LIST = "$VARYP_DMN_LIST" 2354[ $DEBUG -eq 1 ] && echo VARYP_DMN_LIST = "$VARYP_DMN_LIST" 2355} 2356 2357 2358# 2359# Ask user which domains would be served by N2L 2360# The list of N2L domains is stored in global array 2361# "N2L_DMN_LIST" and number of domains in N2L_DMN_CNT 2362# 2363create_n2l_domain_list() 2364{ 2365# First make a list of all the domains in /var/yp 2366create_all_var_yp_domain_list 2367 2368# Now identify those to be served by N2L 2369let count=0 2370 2371for DMN in $VARYP_DMN_LIST 2372do 2373 get_confirm "Do you want to store maps from ${DMN} domain to LDAP (y/n/h):" \ 2374 "n" "selectDomain4N2L_help" 2375 2376 if [ $? -eq 1 ]; then 2377 N2L_DMN_LIST[count]=$DMN 2378 let count="count + 1" 2379 fi 2380 2381done 2382N2L_DMN_CNT=$count 2383 2384[ $DEBUG -eq 1 ] && echo N2L_DMN_LIST=${N2L_DMN_LIST[*]} 2385[ $DEBUG -eq 1 ] && echo N2L_DMN_CNT=$N2L_DMN_CNT 2386} 2387 2388 2389# 2390# Make various lists for different types of maps for each N2L domain 2391# and ask user if mapping information and comments need to be generated 2392# for custom maps. 2393# 2394# This function looks big, but since KSH does not support 2-D arrays, or 2395# two level of dereferencing, it forced to have so many lists and arrays. 2396# Lists are better for adding or removing elements, and arrays are better 2397# for accessing with index and in knowing the no. of elements. 2398# 2399create_map_lists() 2400{ 2401# Initialize them with no maps. 2402ALL_DMN_ALL_MAPLIST="" 2403ALL_DMN_DEF_MAPLIST="" 2404ALL_DMN_CUST_MAPLIST="" 2405ALL_DMN_AUTO_CUST_MAPLIST="" 2406 2407# Default to don't generate custom mapping info or comment info. 2408CUST_MAP_NEEDED=0 2409CUST_CMT_NEEDED=0 2410 2411let count=0 2412 2413while (( $count < $N2L_DMN_CNT )) 2414do 2415 DMN=${N2L_DMN_LIST[count]} 2416 MAPDIR=/var/yp/${DMN} 2417 2418 # Initialize per domain lists to NULL. 2419 ALL_MAPLIST="" 2420 DEF_MAPLIST="" 2421 CUST_MAPLIST="" 2422 AUTO_CUST_MAPLIST="" 2423 2424 for dbmfile in $MAPDIR/*.dir 2425 do 2426 MAP=`basename $dbmfile .dir` 2427 2428 # Ignore N2L maps (those with "LDAP_" prefix and ageing.byname) 2429 if [[ $MAP != LDAP_* ]] && [[ $MAP != "" ]] && \ 2430 [ -f $MAPDIR/${MAP}.pag ] && [[ $MAP != ageing.byname ]] 2431 then 2432 ALL_MAPLIST="$ALL_MAPLIST $MAP" 2433 2434 if present $MAP $DEFAULT_NIS_MAPS 2435 then 2436 DEF_MAPLIST="$DEF_MAPLIST $MAP" 2437 2438 elif [[ $MAP = auto.* ]] 2439 then 2440 AUTO_CUST_MAPLIST="$AUTO_CUST_MAPLIST $MAP" 2441 2442 else 2443 # If we reached here, means it is custom map. 2444 get_confirm "Do you want the mapping information to be generated for \"$MAP\" map of $DMN domain (y/n/h)?" \ 2445 "n" "generate_mapping_info_for_cust_map_help" 2446 2447 if [ $? -eq 1 ] 2448 then 2449 CUST_MAPLIST="$CUST_MAPLIST $MAP" 2450 else 2451 # If a customer map is not desired, then delete it from 2452 # all maplist too. 2453 ALL_MAPLIST=$(remove $MAP $ALL_MAPLIST) 2454 fi 2455 2456 fi 2457 2458 fi 2459 2460 done 2461 2462 # Make ALL_DMN lists as they are very helpful in checking if a map exists. 2463 ALL_DMN_ALL_MAPLIST=$(merge_lists $ALL_DMN_ALL_MAPLIST $ALL_MAPLIST) 2464 ALL_DMN_DEF_MAPLIST=$(merge_lists $ALL_DMN_DEF_MAPLIST $DEF_MAPLIST) 2465 ALL_DMN_CUST_MAPLIST=$(merge_lists $ALL_DMN_CUST_MAPLIST $CUST_MAPLIST) 2466 ALL_DMN_AUTO_CUST_MAPLIST=$(merge_lists $ALL_DMN_AUTO_CUST_MAPLIST \ 2467 $AUTO_CUST_MAPLIST) 2468 2469 # Store per domain lists in arrays. 2470 ALL_MAPS[$count]="$ALL_MAPLIST" 2471 DEF_MAPS[$count]="$DEF_MAPLIST" 2472 CUST_MAPS[$count]="$CUST_MAPLIST" 2473 AUTO_CUST_MAPS[$count]="$AUTO_CUST_MAPLIST" 2474 2475 [ $DEBUG -eq 1 ] && echo ALL_MAPS[$DMN] = ${ALL_MAPS[$count]} 2476 [ $DEBUG -eq 1 ] && echo DEF_MAPS[$DMN] = ${DEF_MAPS[$count]} 2477 [ $DEBUG -eq 1 ] && echo CUST_MAPS[$DMN] = ${CUST_MAPS[$count]} 2478 [ $DEBUG -eq 1 ] && echo AUTO_CUST_MAPS[$DMN] = ${AUTO_CUST_MAPS[$count]} 2479 2480 let count="count + 1" 2481done 2482 2483[ $DEBUG -eq 1 ] && echo ALL_DMN_ALL_MAPLIST = $ALL_DMN_ALL_MAPLIST 2484[ $DEBUG -eq 1 ] && echo ALL_DMN_DEF_MAPLIST = $ALL_DMN_DEF_MAPLIST 2485[ $DEBUG -eq 1 ] && echo ALL_DMN_CUST_MAPLIST = $ALL_DMN_CUST_MAPLIST 2486[ $DEBUG -eq 1 ] && echo ALL_DMN_AUTO_CUST_MAPLIST = $ALL_DMN_AUTO_CUST_MAPLIST 2487 2488# Store all domain lists in array too. 2489set -A ALL_DMN_ALL_MAPS $ALL_DMN_ALL_MAPLIST 2490set -A ALL_DMN_DEF_MAPS $ALL_DMN_DEF_MAPLIST 2491set -A ALL_DMN_CUST_MAPS $ALL_DMN_CUST_MAPLIST 2492set -A ALL_DMN_AUTO_CUST_MAPS $ALL_DMN_AUTO_CUST_MAPLIST 2493 2494# A positive customer map count implies custom mapping information 2495# is required. Set this flag. 2496[ ${#ALL_DMN_CUST_MAPS[*]} -gt 0 ] && CUST_MAP_NEEDED=1 2497 2498# Give bit of info, and ask if comments need to be placed in mapping file 2499echo " 2500 This script can place relevant information regarding custom 2501 maps at appropriate places in the mapping file which can be 2502 helpful in customizing this file. 2503" 2504 2505get_confirm "Do you want such information to be generated (y/n/h)?" \ 2506 "n" "generate_comment_info_for_cust_map_help" 2507 2508[ $? -eq 1 ] && CUST_CMT_NEEDED=1 2509 2510[ $DEBUG -eq 1 ] && echo CUST_MAP_NEEDED = $CUST_MAP_NEEDED 2511[ $DEBUG -eq 1 ] && echo CUST_CMT_NEEDED = $CUST_CMT_NEEDED 2512 2513} 2514 2515 2516# 2517# Ask user the context for each (N2l) domain 2518# 2519get_nisLDAPdomainContext() 2520{ 2521echo " 2522# List domains and contexts 2523" >> $MAP_FILE 2524 2525for DMN in ${N2L_DMN_LIST[*]} 2526do 2527 while : 2528 do 2529 # Convert to domain in dc format for default choice 2530 domain_2_dc $DMN 2531 2532 get_ans "Enter the naming context for $DMN domain (h=help):"\ 2533 "$_DOM_2_DC" 2534 2535 # If help continue, otherwise break. 2536 case "$ANS" in 2537 [Hh] | help | Help | \?) display_msg nisLDAPdomainContext_help ;; 2538 * ) break ;; 2539 esac 2540 done 2541 2542 # If a value is specified, set it, and save in mapping file too. 2543 if [ "$ANS" != "" ]; then 2544 echo "nisLDAPdomainContext $DMN : ${ANS}" >> $MAP_FILE 2545 fi 2546 2547 [ $DEBUG -eq 1 ] && echo "nisLDAPdomainContext $DMN : ${ANS}" 2548done 2549} 2550 2551 2552# 2553# Ask user the domains for which passwords should be changed 2554# 2555get_nisLDAPyppasswddDomains() 2556{ 2557 2558echo " 2559# List domains for which passwords should be changed. If this is not 2560# present then the value returned by 'domainname' will be used. 2561" >> $MAP_FILE 2562 2563for DMN in ${N2L_DMN_LIST[*]} 2564do 2565 get_confirm "Enable password changes for ${DMN} domain (y/n/h)? " \ 2566 "n" "nisLDAPyppasswddDomains_help" 2567 2568 if [ $? -eq 1 ]; then 2569 echo "nisLDAPyppasswddDomains $DMN" >> $MAP_FILE 2570 fi 2571done 2572 2573echo " 2574# 2575#------------------------------------------------------------------- 2576#\ 2577" >> $MAP_FILE 2578} 2579 2580 2581# 2582# Create NIS databaseId mappings (aliases) 2583# 2584create_nisLDAPdatabaseIdMapping() 2585{ 2586echo ' 2587# Associate map names with databaseIds (aliases) 2588 2589# Standard maps 2590nisLDAPdatabaseIdMapping ethers: ethers.byaddr ethers.byname 2591nisLDAPdatabaseIdMapping group: group.bygid group.byname 2592nisLDAPdatabaseIdMapping hosts:[addr="[0-9]*.[0-9]*.[0-9]*.[0-9]*"] \ 2593 hosts.byaddr hosts.byname 2594# Special mapping to handle the YP_MULTI cases 2595nisLDAPdatabaseIdMapping multihosts: \ 2596 [addr="[0-9]*.[0-9]*.[0-9]*.[0-9]*,*"] \ 2597 hosts.byname 2598nisLDAPdatabaseIdMapping networks: networks.byaddr networks.byname 2599nisLDAPdatabaseIdMapping project: project.byname project.byprojid 2600nisLDAPdatabaseIdMapping protocols: protocols.byname protocols.bynumber 2601nisLDAPdatabaseIdMapping services: services.byname services.byservicename 2602 2603# netid.byname is built up from the hosts and passwd files using different 2604# mappings. It thus has two associated nisLDAPdatabaseIdMappings. 2605nisLDAPdatabaseIdMapping netid.host:[number="0"] netid.byname 2606nisLDAPdatabaseIdMapping netid.pass:[number="[1-9]*"] netid.byname 2607 2608# The next two are special databaseIds. They associate maps with databaseIds 2609# but additionally identify which maps contain password and password adjunct 2610# information for yppasswdd. 2611nisLDAPdatabaseIdMapping passwd: passwd.byname passwd.byuid 2612 2613# mail.byaddr needs to select entries of the form x@y or x!y 2614nisLDAPdatabaseIdMapping mail.mapping:[rf_key="*@*", rf_key="*!*"] \ 2615 mail.byaddr 2616 2617# publickey.byname 2618# Each entry in publickey map consists of a network user name which 2619# may refer to a host or a user. It also contains a default entry for nobody. 2620# Hence, we need three nisLDAPdatabaseIdmappings to support the three 2621# different types of keys. 2622nisLDAPdatabaseIdMapping keys.host:[rf_key="unix.[a-zA-Z]*@*"] \ 2623 publickey.byname 2624nisLDAPdatabaseIdMapping keys.pass:[rf_key="unix.[0-9]*@*"] \ 2625 publickey.byname 2626nisLDAPdatabaseIdMapping keys.nobody:[rf_key="nobody"] publickey.byname 2627 2628# Single standard maps. No point aliasing. 2629# mail.aliases 2630# netmasks.byaddr 2631# rpc.bynumber 2632# ypservers 2633 2634# Other maps 2635# ipnodes looks identical to hosts but maps to a different context. 2636nisLDAPdatabaseIdMapping ipnodes:[addr="*:*"] \ 2637 ipnodes.byaddr ipnodes.byname 2638# Special mapping to handle the YP_MULTI cases 2639nisLDAPdatabaseIdMapping multiipnodes: \ 2640 [addr="*:*,*"] \ 2641 ipnodes.byname 2642 2643# Other single maps. No point aliasing 2644# audit_user 2645# auth_attr 2646# exec_attr 2647# prof_attr 2648# user_attr 2649# auto.home 2650# auto.master 2651# bootparams 2652# timezone.byname 2653# printers.conf.byname 2654# passwd.adjunct.byname 2655# group.adjunct.byname 2656' >> $MAP_FILE 2657 2658[ CUST_CMT_NEEDED -eq 1 ] && \ 2659echo " 2660# If any custom map needs to be aliased, then it should be listed 2661# here in the following format : 2662# nisLDAPdatabaseIdMapping databaseId ":" ["["indexlist"]"] mapname[" "...] 2663" >> $MAP_FILE 2664 2665[ CUST_MAP_NEEDED -eq 1 ] && \ 2666echo "\ 2667# Not aliasing non-default/custom maps as they are assumed to be 2668# simple, single maps.\ 2669" >> $MAP_FILE 2670 2671for MAP in ${ALL_DMN_AUTO_CUST_MAPS[*]} ${ALL_DMN_CUST_MAPS[*]} 2672do 2673 echo "# $MAP" >> $MAP_FILE 2674done 2675 2676echo "\ 2677# 2678#------------------------------------------------------------------------------ 2679# 2680" >> $MAP_FILE 2681} 2682 2683 2684# 2685# Finds the domains in which the given map exists in the supplied list. 2686# Sets result in PRESENT_COUNT and PRESENT_IN_DOMAINS. These fields are 2687# set globally, so they can be accessed from any where. 2688# Input : $1 - map, $2 - list name (just name, not the value) 2689# 2690find_domains() 2691{ 2692_MAP=$1 2693_ARRAY=$2 2694 2695let PRESENT_COUNT=0 2696PRESENT_IN_DOMAINS="" 2697 2698let count=0 2699 2700while (( $count < $N2L_DMN_CNT )) 2701do 2702 2703 # Quick and dirty way to get around unavailability of 2D array 2704 case "$_ARRAY" in 2705 ALL_MAPS ) _LIST=${ALL_MAPS[$count]} ;; 2706 DEF_MAPS ) _LIST=${DEF_MAPS[$count]} ;; 2707 CUST_MAPS ) _LIST=${CUST_MAPS[$count]} ;; 2708 AUTO_CUST_MAPS ) _LIST=${AUTO_CUST_MAPS[$count]} ;; 2709 * ) echo "Invalid value: \"${_ARRAY}\". \c" 2710 ;; 2711 esac 2712 2713 if present $_MAP $_LIST 2714 then 2715 let PRESENT_COUNT="$PRESENT_COUNT + 1" 2716 PRESENT_IN_DOMAINS="$PRESENT_IN_DOMAINS ${N2L_DMN_LIST[count]}" 2717 fi 2718 let count="count + 1" 2719done 2720 2721[ $DEBUG -eq 1 ] && echo "PRESENT_COUNT = $PRESENT_COUNT" 2722[ $DEBUG -eq 1 ] && echo "PRESENT_IN_DOMAINS = $PRESENT_IN_DOMAINS" 2723 2724return 0 2725} 2726 2727 2728# 2729# For a given map, find out which list it belongs to (PRESENT_IN_LIST), 2730# and in how many domains this map shows up (PRESENT_COUNT), and in 2731# which ones (PRESENT_IN_DOMAINS). These fields are set globally, so 2732# they can be accessed from any where. 2733# 2734find_map_presence_details() 2735{ 2736_MAP=$1 2737 2738let PRESENT_COUNT=0 2739PRESENT_IN_LIST="" 2740PRESENT_IN_DOMAINS="" 2741 2742# If the map does not exist, return right away, else 2743# find which list it belongs to. 2744# If a map exists in def or auto or cust lists, then 2745# it also exists in "all" list. 2746 2747if ! present $_MAP $ALL_DMN_ALL_MAPLIST 2748then 2749 return 1 2750 2751elif present $_MAP $ALL_DMN_DEF_MAPLIST 2752then 2753 PRESENT_IN_LIST="DEF_MAPS" 2754 2755elif present $_MAP $ALL_DMN_CUST_MAPLIST 2756then 2757 PRESENT_IN_LIST="CUST_MAPS" 2758 2759else 2760 # If map exists, and not in previous two lists, 2761 # then it has to be here only. 2762 PRESENT_IN_LIST="AUTO_CUST_MAPS" 2763fi 2764 2765# Now we know which list the map belongs to. So, we need to 2766# find which are the domains in which this map exists. 2767 2768find_domains $_MAP $PRESENT_IN_LIST 2769 2770# Since the above function sets the values of PRESENT_COUNT and 2771# PRESENT_IN_DOMAINS fields, we don't need to do anything else. 2772 2773[ $DEBUG -eq 1 ] && echo "PRESENT_IN_LIST = $PRESENT_IN_LIST" 2774 2775return 0 2776} 2777 2778 2779# 2780# Check if the comment char is a single character, return 0 on success. 2781# Input is passed via global variable "COMMENT_CHAR" 2782# 2783valid_comment_char() 2784{ 2785COMMENT_CHAR_LENGTH=`echo "${COMMENT_CHAR}" | wc -c` 2786 2787# echo adds new line character, so adjust length appropriately 2788if [ $COMMENT_CHAR_LENGTH -gt 2 ]; then 2789 echo " Comment character has to be a blank or single character; try again." 2790 return 1 2791else 2792 return 0 2793fi 2794} 2795 2796 2797# 2798# Read the comment character for a MAP. Append in mapping file if valid. 2799# Input - $1 : MAP name 2800# 2801get_comment_char() 2802{ 2803_MAP=$1 2804 2805while : 2806do 2807 get_ans "Specify the comment character for $_MAP :" 2808 COMMENT_CHAR=$ANS 2809 2810 if valid_comment_char; then 2811 break 2812 fi 2813done 2814 2815echo "nisLDAPcommentChar $_MAP : '${COMMENT_CHAR}'" >> $MAP_FILE 2816} 2817 2818 2819# 2820# Read a seperate comment character for a MAP for each domain and 2821# update this information in mapping file. 2822# Input - $1 : MAP name, $@ : list of domains 2823# 2824get_comment_char_per_domain() 2825{ 2826_MAP=$1 2827shift 2828_DOMAIN_LIST="$@" 2829 2830for _DMN in $_DOMAIN_LIST 2831do 2832 2833 while : 2834 do 2835 2836 get_ans "Specify the comment character for $_MAP,${_DMN} :" 2837 COMMENT_CHAR=$ANS 2838 2839 if valid_comment_char; then 2840 break 2841 fi 2842 2843 done 2844 echo "nisLDAPcommentChar $_MAP,${_DMN} : '${COMMENT_CHAR}'" >> $MAP_FILE 2845 2846done 2847} 2848 2849 2850# 2851# This function generates custom comment entries. The output is 2852# appended in the mapping file. 2853# 2854get_custom_nisLDAPcommentChar() 2855{ 2856 2857# All the auto mounter maps are assumed to have '#' as the default comment 2858# char. But still list the non-default auto map entries here anyway. This 2859# will make it very easy in case these entries need to be changed. 2860 2861for MAP in ${ALL_DMN_AUTO_CUST_MAPS[*]} 2862do 2863 echo "nisLDAPcommentChar $MAP : '#'" >> $MAP_FILE 2864done 2865 2866if [ CUST_MAP_NEEDED -eq 1 ]; then 2867 get_confirm "Do you wish to specify the comment character for any custom map (y/n/h)?" \ 2868 "n" "custom_map_comment_char_help" 2869 2870 if [ $? -eq 1 ]; then 2871 for MAP in ${ALL_DMN_CUST_MAPS[*]} 2872 do 2873 2874 get_confirm "Do you wish to specify comment character for \"$MAP\" (y/n/h)?" \ 2875 "n" "custom_map_comment_char_help" 2876 2877 if [ $? -eq 1 ]; then 2878 find_domains $MAP CUST_MAPS 2879 if [ $PRESENT_COUNT -gt 1 ]; then 2880 echo "Map \"$MAP\" is present in these domains : $PRESENT_IN_DOMAINS" 2881 2882 get_confirm "For \"$MAP\", should the same comment character be set for all the domains (y/n/h)?" \ 2883 "y" "same_comment_char_help" 2884 2885 if [ $? -eq 1 ]; then 2886 get_comment_char $MAP 2887 else 2888 get_comment_char_per_domain $MAP "$PRESENT_IN_DOMAINS" 2889 fi 2890 2891 else 2892 get_comment_char $MAP 2893 fi 2894 2895 fi 2896 done 2897 fi 2898fi 2899 2900} 2901 2902 2903# List comment character (if any) for maps 2904create_nisLDAPcommentChar() 2905{ 2906 2907echo "\ 2908# Specify the character representing the start of comments. 2909" >> $MAP_FILE 2910 2911[ CUST_CMT_NEEDED -eq 1 ] && echo "\ 2912# The comment character represents the start of the special 'comment' 2913# field in a given NIS map. If this attribute is not present then the 2914# default comment character '#' is used. If a map cannot contain comments 2915# then the NULL ('') comment character should be specified. The format to 2916# specify the comment character is : 2917# nisLDAPcommentChar MAP[,DOMAIN] : 'single_comment_char' 2918" >> $MAP_FILE 2919 2920echo "\ 2921nisLDAPcommentChar group : '' 2922nisLDAPcommentChar passwd : '' 2923nisLDAPcommentChar ageing.byname : '' 2924nisLDAPcommentChar audit_user : '' 2925nisLDAPcommentChar auth_attr : '' 2926nisLDAPcommentChar exec_attr : '' 2927nisLDAPcommentChar user_attr : '' 2928nisLDAPcommentChar bootparams : '' 2929" >> $MAP_FILE 2930 2931# Need to handle passwd.adjunct.byname map for multiple domain. 2932_MAP=passwd.adjunct.byname 2933if ! present $_MAP $ALL_DMN_DEF_MAPLIST 2934then 2935 # Just put the syntax in comment form 2936 echo "#nisLDAPcommentChar passwd.adjunct.byname: ''" >> $MAP_FILE 2937else 2938 # Find the domains in which this map exists. 2939 find_domains $_MAP DEF_MAPS 2940 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 2941 then 2942 # Don't put domain info as the map is present in all of them. 2943 echo "nisLDAPcommentChar passwd.adjunct.byname: ''" >> $MAP_FILE 2944 else 2945 # Not every domain has this map. So, list for the ones which do. 2946 for _DMN in $PRESENT_IN_DOMAINS 2947 do 2948 echo "nisLDAPcommentChar passwd.adjunct.byname,${_DMN}: ''" >> $MAP_FILE 2949 done 2950 fi 2951fi 2952# passwd.adjunct.byname done 2953 2954 2955# Need to handle group.adjunct.byname map for multiple domain. 2956_MAP=group.adjunct.byname 2957if ! present $_MAP $ALL_DMN_DEF_MAPLIST 2958then 2959 # Just put the syntax in comment form 2960 echo "#nisLDAPcommentChar group.adjunct.byname: ''" >> $MAP_FILE 2961else 2962 # Find the domains in which this map exists. 2963 find_domains $_MAP DEF_MAPS 2964 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 2965 then 2966 # Don't put domain info as the map is present in all of them. 2967 echo "nisLDAPcommentChar group.adjunct.byname: ''" >> $MAP_FILE 2968 else 2969 # Not every domain has this map. So, list for the ones which do. 2970 for _DMN in $PRESENT_IN_DOMAINS 2971 do 2972 echo "nisLDAPcommentChar group.adjunct.byname,${_DMN}: ''" >> $MAP_FILE 2973 done 2974 fi 2975fi 2976# group.adjunct.byname done 2977 2978echo "" >> $MAP_FILE 2979 2980# Ask user for comment char for custom maps 2981get_custom_nisLDAPcommentChar 2982 2983echo " 2984# 2985#------------------------------------------------------------------------------ 2986# 2987" >> $MAP_FILE 2988} 2989 2990 2991# 2992# Generate secure flag entries 2993# 2994create_secure_flag_entries() 2995{ 2996echo "\ 2997# Specify YP_SECURE flags 2998" >> $MAP_FILE 2999 3000[ CUST_CMT_NEEDED -eq 1 ] && echo "\ 3001# If a map is secure, then it needs to be mentioned here 3002# in the following format : 3003# nisLDAPmapFlags mapname : s 3004">> $MAP_FILE 3005 3006# Need to handle passwd.adjunct.byname map for multiple domain. 3007_MAP=passwd.adjunct.byname 3008if ! present $_MAP $ALL_DMN_DEF_MAPLIST 3009then 3010 # Just put the syntax in comment form 3011 echo "#nisLDAPmapFlags passwd.adjunct.byname : s" >> $MAP_FILE 3012else 3013 # Find the domains in which this map exists. 3014 find_domains $_MAP DEF_MAPS 3015 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 3016 then 3017 # Don't put domain info as the map is present in all of them. 3018 echo "nisLDAPmapFlags passwd.adjunct.byname : s" >> $MAP_FILE 3019 else 3020 # Not every domain has this map. So, list for the ones which do. 3021 for _DMN in $PRESENT_IN_DOMAINS 3022 do 3023 echo "nisLDAPmapFlags passwd.adjunct.byname,${_DMN} : s" >> $MAP_FILE 3024 done 3025 fi 3026fi 3027 3028# Need to handle group.adjunct.byname map for multiple domain. 3029_MAP=group.adjunct.byname 3030if ! present $_MAP $ALL_DMN_DEF_MAPLIST 3031then 3032 # Just put the syntax in comment form 3033 echo "#nisLDAPmapFlags group.adjunct.byname : s" >> $MAP_FILE 3034else 3035 # Find the domains in which this map exists. 3036 find_domains $_MAP DEF_MAPS 3037 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 3038 then 3039 # Don't put domain info as the map is present in all of them. 3040 echo "nisLDAPmapFlags group.adjunct.byname : s" >> $MAP_FILE 3041 else 3042 # Not every domain has this map. So, list for the ones which do. 3043 for _DMN in $PRESENT_IN_DOMAINS 3044 do 3045 echo "nisLDAPmapFlags group.adjunct.byname,${_DMN} : s" >> $MAP_FILE 3046 done 3047 fi 3048fi 3049 3050echo "" >> $MAP_FILE 3051 3052STR="any" # Just to make the question look better. 3053while : 3054do 3055 get_confirm "Do you wish to set the secure flag for $STR map (y/n/h)?" \ 3056 "n" "secure_flag_on_help" 3057 3058 if [ $? -eq 0 ]; then 3059 return 0 3060 3061 else 3062 get_ans "Enter the MAP name :" 3063 MAP=$ANS 3064 3065 if [[ $MAP = "" ]]; then 3066 echo " Error : BLANK map name not allowed; try again" 3067 continue 3068 fi 3069 3070 # Check if the supplied map name exists, and if yes, then 3071 # set the PRESENT attributes for further processing 3072 3073 find_map_presence_details $MAP 3074 3075 case $PRESENT_COUNT in 3076 3077 0 ) echo " Error : $MAP not found in any domain; try again" 3078 ;; 3079 3080 1 ) # The map exists in only one domain. 3081 echo "nisLDAPmapFlags $MAP : s" >> $MAP_FILE 3082 STR="another" # Just to make the question look better. 3083 ;; 3084 3085 * ) # The map exists in multiple domain. Ask if this flag needs 3086 # to be set for all domains, or some specific ones. 3087 3088 echo "Map \"$MAP\" is present in these domains : $PRESENT_IN_DOMAINS" 3089 get_confirm "For this map, do you wish to set this flag for all the domains (y/n/h)?" \ 3090 "y" "secure_flag_all_domains_help" 3091 3092 if [ $? -eq 1 ]; then 3093 echo "nisLDAPmapFlags $MAP : s" >> $MAP_FILE 3094 else 3095 3096 for _DMN in $PRESENT_IN_DOMAINS 3097 do 3098 3099 get_confirm_nodef "Set secure flag for $MAP,${_DMN} (y/n)?" 3100 3101 if [ $? -eq 1 ]; then 3102 echo "nisLDAPmapFlags $MAP,${_DMN} : s" >> $MAP_FILE 3103 fi 3104 3105 done 3106 fi 3107 STR="another" # Just to make the question look better. 3108 ;; 3109 3110 esac 3111 3112 fi 3113done 3114} 3115 3116 3117# 3118# Generate interdomain flag entries 3119# 3120create_interdomain_flag_entries() 3121{ 3122 3123INTERDOMAIN_MAP_LIST="ipnodes 3124 multiipnodes 3125 hosts 3126 multihosts 3127 services.byservicename" 3128 3129# 3130# Simple function to avoid duplication of code 3131# 3132print_interdomain_entries() 3133{ 3134for _MAP in $INTERDOMAIN_MAP_LIST 3135do 3136 echo "nisLDAPmapFlags ${_MAP} : b" >> $MAP_FILE 3137done 3138} 3139 3140echo " 3141# Specify YP_INTERDOMAIN flags 3142" >> $MAP_FILE 3143 3144[ CUST_CMT_NEEDED -eq 1 ] && echo "\ 3145# It is used to indicate NIS servers to use the domain name resolver for 3146# host name and address lookups for hosts not found in the maps. 3147# If set, it adds YP_INTERDOMAIN entries in these maps when converting 3148# data from LDAP to YP. It needs to be set in the following format : 3149# nisLDAPmapFlags mapname : b 3150" >> $MAP_FILE 3151 3152# List one set of entries in commented form anyway as it might help 3153# user understand what it means. 3154 3155echo "\ 3156# If \$B is set in /var/yp/Makefile, then this flag should be 3157# set for following maps :\ 3158" >> $MAP_FILE 3159 3160for _MAP in $INTERDOMAIN_MAP_LIST 3161do 3162 echo "# nisLDAPmapFlags ${_MAP} : b" >> $MAP_FILE 3163done 3164 3165# Put a blank line for indentation purpose 3166echo >> $MAP_FILE 3167 3168get_confirm "Do you wish to set the \"interdomain\" flag for any domain (y/n/h)?" \ 3169 "n" "interdomain_flag_on_help" 3170 3171if [ $? -eq 1 ]; then 3172 3173 if [ $N2L_DMN_CNT -gt 1 ]; then 3174 3175 get_confirm "Should \"interdomain\" flag be set for all domain (y/n/h)?" \ 3176 "y" "interdomain_flag_all_domains_help" 3177 3178 if [ $? -eq 1 ]; then 3179 print_interdomain_entries 3180 else 3181 3182 for _DMN in ${N2L_DMN_LIST[*]} 3183 do 3184 get_confirm_nodef "Set interdomain flag for ${_DMN} (y/n)?" 3185 3186 if [ $? -eq 1 ]; then 3187 for _MAP in $INTERDOMAIN_MAP_LIST 3188 do 3189 echo "nisLDAPmapFlags ${_MAP},${_DMN} : b" >> $MAP_FILE 3190 done 3191 fi 3192 3193 done 3194 fi 3195 3196 else 3197 print_interdomain_entries 3198 fi 3199fi 3200 3201echo " 3202# 3203#------------------------------------------------------------------------------ 3204# 3205" >> $MAP_FILE 3206 3207return 0 3208} 3209 3210 3211# 3212# List SECURE and INTERDOMAIN flags 3213# 3214create_nisLDAPmapFlags() 3215{ 3216create_secure_flag_entries 3217create_interdomain_flag_entries 3218} 3219 3220 3221# 3222# Print one Map TTL entry in mapping file using supplied TTL. 3223# 3224print_one_map_ttl_entry() 3225{ 3226_Map=$1 3227_iTtlLo=$2 3228_iTtlHi=$3 3229_runTtl=$4 3230 3231echo "\ 3232nisLDAPentryTtl ${_Map}:${_iTtlLo}:${_iTtlHi}:${_runTtl}\ 3233" >> $MAP_FILE 3234 3235return 0 3236} 3237 3238 3239# 3240# Print all the maps TTL entries of same TTL 3241# values using the supplied TTL triplet. 3242# 3243print_all_same_ttl_entries() 3244{ 3245_iTTLlo=$1 3246_iTTLhi=$2 3247_runTTL=$3 3248 3249for _MAP in ${DEF_TTL_MAPLIST} ${ALL_DMN_CUST_MAPS[*]} \ 3250 ${ALL_DMN_AUTO_CUST_MAPS[*]} 3251do 3252 3253 if [ "$_MAP" != "passwd.adjunct.byname" ] && \ 3254 [ "$_MAP" != "group.adjunct.byname" ] 3255 then 3256 print_one_map_ttl_entry $_MAP $_iTTLlo $_iTTLhi $_runTTL 3257 3258 else 3259 3260 # adjunct maps might not exist in all the domains. 3261 find_domains $_MAP DEF_MAPS 3262 3263 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 3264 then 3265 3266 # Don't put domain info as the map is present in all of them. 3267 print_one_map_ttl_entry $_MAP $_iTTLlo $_iTTLhi $_runTTL 3268 3269 else 3270 3271 for _DMN_ in $PRESENT_IN_DOMAINS 3272 do 3273 _STR="${_MAP},${_DMN_}" 3274 print_one_map_ttl_entry $_STR $_iTTLlo $_iTTLhi $_runTTL 3275 done 3276 3277 fi 3278 fi 3279done 3280 3281return 0 3282} 3283 3284# 3285# Read the initialTTLlo. Set the value in global variable. 3286# 3287get_ittl_lo() 3288{ 3289get_pos_int "Lower limit for initial TTL (in seconds) (h=help):" \ 3290 "$DEF_iTTLlo" "initialTTLlo_help" 3291 3292iTTLlo=${NUM} 3293} 3294 3295 3296# 3297# Read the initialTTLhi. Set the value in global variable. 3298# 3299get_ittl_hi() 3300{ 3301get_pos_int "Higher limit for initial TTL (in seconds) (h=help):" \ 3302 "$DEF_iTTLhi" "initialTTLhi_help" 3303 3304iTTLhi=${NUM} 3305} 3306 3307 3308# 3309# Read the initialTTLhi. Set the value in global variable. 3310# 3311get_run_ttl() 3312{ 3313get_pos_int "Runtime TTL (in seconds) (h=help):" \ 3314 "$DEF_runTTL" "runningTTL_help" 3315 3316runTTL=${NUM} 3317} 3318 3319 3320# 3321# Read one TTL triplet. Set the result in global variables. 3322# 3323read_one_ttl_triplet() 3324{ 3325# Just call the individual functions for each TTL. 3326 3327 get_ittl_lo 3328 get_ittl_hi 3329 get_run_ttl 3330 3331[ $DEBUG -eq 1 ] && \ 3332 echo "TTL = ${iTTLlo}:${iTTLhi}:${runTTL}" 3333 3334return 0 3335} 3336 3337# 3338# Takes MAP name (with or without domain name) as argument, asks 3339# user for TTL values, and appends the entry in the mapping file. 3340# 3341process_one_map_ttl_value() 3342{ 3343 3344_Map_="$1" 3345 3346get_confirm "Retain the default TTL values [$DEF_iTTLlo:$DEF_iTTLhi:$DEF_runTTL] for \"$_Map_\" (y/n/h) ?" \ 3347 "y" "default_different_ttl_help" 3348 3349if [ $? -eq 1 ]; then 3350 print_one_map_ttl_entry $_Map_ $DEF_iTTLlo $DEF_iTTLhi $DEF_runTTL 3351else 3352 3353 echo "Reading TTL values for $_Map_ :" 3354 read_one_ttl_triplet 3355 print_one_map_ttl_entry $_Map_ $iTTLlo $iTTLhi $runTTL 3356 3357fi 3358return 0 3359} 3360 3361 3362# 3363# Read only one TTL triplet for each existing MAP without asking 3364# different values for each domain and update the mapping file. 3365# 3366read_all_maps_ttl_values_no_multiple_domain_issue() 3367{ 3368 3369# Need to read only one TTL triplet for each existing MAP. 3370 3371for _MAP in ${DEF_TTL_MAPLIST} ${ALL_DMN_CUST_MAPS[*]} \ 3372 ${ALL_DMN_AUTO_CUST_MAPS[*]} 3373do 3374 3375 if [ "$_MAP" != "passwd.adjunct.byname" ] && \ 3376 [ "$_MAP" != "group.adjunct.byname" ] 3377 then 3378 process_one_map_ttl_value $_MAP 3379 3380 else 3381 3382 # adjunct maps might not exist in all the domains. 3383 find_domains $_MAP DEF_MAPS 3384 3385 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 3386 then 3387 3388 # Don't put domain info as the map is present in all of them. 3389 process_one_map_ttl_value $_MAP 3390 3391 else 3392 3393 for _DMN_ in $PRESENT_IN_DOMAINS 3394 do 3395 _STR="${_MAP},${_DMN_}" 3396 process_one_map_ttl_value $_STR 3397 done 3398 3399 fi 3400 fi 3401done 3402 3403return 0 3404} 3405 3406 3407# 3408# Read TTL triplet for each default MAP (in database ID form) while 3409# taking care of multiple domains issue and update the mapping file. 3410# 3411read_default_maps_ttl_values_with_multi_domain_issue() 3412{ 3413 3414for _MAP_ in ${DEF_TTL_MAPLIST} 3415do 3416 if [ "$_MAP_" != "passwd.adjunct.byname" ] && \ 3417 [ "$_MAP_" != "group.adjunct.byname" ] 3418 then 3419 3420 for _DMN_ in ${N2L_DMN_LIST[*]} 3421 do 3422 _STR_="${_MAP_},${_DMN_}" 3423 # Now process each combination one at a time. 3424 process_one_map_ttl_value "$_STR_" 3425 done 3426 3427 else 3428 # List only those domains in which adjunct.byname exists. 3429 find_domains $_MAP_ DEF_MAPS 3430 for _DMN_ in $PRESENT_IN_DOMAINS 3431 do 3432 _STR_="${_MAP_},${_DMN_}" 3433 process_one_map_ttl_value "$_STR_" 3434 done 3435 fi 3436done 3437 3438return 0 3439} 3440 3441 3442# 3443# Read TTL triplet for each existing custom MAP while taking 3444# care of multiple domains issue and update the mapping file. 3445# 3446read_custom_maps_ttl_values_with_multi_domain_issue() 3447{ 3448 3449for _MAP_ in ${ALL_DMN_CUST_MAPS[*]} ${ALL_DMN_AUTO_CUST_MAPS[*]} 3450do 3451 3452 find_map_presence_details $_MAP_ 3453 3454 if [ $PRESENT_COUNT -eq 1 ]; then 3455 3456 # This map exists in only one domain. 3457 # So, no need to ask for multiple domains. 3458 3459 process_one_map_ttl_value $_MAP_ 3460 3461 else 3462 3463 # Handle multiple domains. 3464 3465 echo "Map \"${_MAP_}\" is present in these domains : $PRESENT_IN_DOMAINS" 3466 3467 get_confirm "For this map, do you wish to use the same TTL values for all the domains (y/n/h) ?" \ 3468 "y" "same_ttl_across_domains_help" 3469 3470 if [ $? -eq 1 ]; then 3471 3472 # Need to read only one TTL triplet for this MAP. 3473 process_one_map_ttl_value $_MAP_ 3474 3475 else 3476 3477 # Need to ask for each domain 3478 3479 for _DMN_ in $PRESENT_IN_DOMAINS 3480 do 3481 _STR="${_MAP_},${_DMN_}" 3482 3483 # Now process each combination one at a time. 3484 process_one_map_ttl_value "$_STR" 3485 3486 done 3487 fi 3488 fi 3489done 3490 3491return 0 3492} 3493 3494 3495# 3496# List the TTL values for various MAPs 3497# 3498create_nisLDAPentryTtl() 3499{ 3500 3501echo "\ 3502# Associate TTLs with NIS entries derived from LDAP 3503" >> $MAP_FILE 3504 3505[ CUST_CMT_NEEDED -eq 1 ] && echo "\ 3506# Each map has three TTL values which are specified in seconds. 3507# 1. initialTTLlo (default $DEF_iTTLlo sec) The lower limit for the initial 3508# TTL (in seconds) for data read from disk when the ypserv starts. 3509# 3510# 2. initialTTLhi (default $DEF_iTTLhi sec) The upper limit for initial TTL. 3511# 3512# 3. runningTTL (default $DEF_runTTL sec) The TTL (in seconds) for data 3513# retrieved from LDAP while the ypserv is running. 3514# 3515# If any value is not specified, then default value is used. 3516# The format of TTL entry is : 3517# nisLDAPentryTtl MAP[,DOMAIN]:initialTTLlo:initialTTLhi:runningTTL 3518" >> $MAP_FILE 3519 3520# If no maps are present, just return. 3521[ ${#ALL_DMN_ALL_MAPS[*]} -eq 0 ] && return 0 3522 3523echo "The default TTL for each map is set to ${DEF_iTTLlo}:${DEF_iTTLhi}:${DEF_runTTL}" 3524get_confirm "Do you wish to change the TTL values for any map (y/n/h) ?" \ 3525 "n" "default_ttl_help" 3526 3527if [ $? -eq 0 ]; then 3528 # Default values accepted for all the maps. 3529 # So, just print all the maps with default TTL values. 3530 3531 print_all_same_ttl_entries $DEF_iTTLlo $DEF_iTTLhi $DEF_runTTL 3532 3533else 3534 echo "You would be allowed to enter the new TTL values." 3535 get_confirm "Do you wish to use the same TTL values for all the maps (y/n/h) ?" \ 3536 "y" "non_default_same_ttl_help" 3537 3538 if [ $? -eq 1 ]; then 3539 # Need to read only one TTL triplet. 3540 # Print all the maps with new TTL triplet. 3541 3542 # read one ttl triplet 3543 echo "Enter the new TTL values :" 3544 3545 read_one_ttl_triplet 3546 3547 print_all_same_ttl_entries $iTTLlo $iTTLhi $runTTL 3548 3549 else 3550 if [ $N2L_DMN_CNT -eq 1 ]; then 3551 3552 # TTL values are different now. But we haev only one domain. 3553 # So, no need to worry about multiple domains. Need to read 3554 # only one TTL triplet for each existing MAP. 3555 3556 read_all_maps_ttl_values_no_multiple_domain_issue 3557 3558 else 3559 3560 # TTL values are different now. And we have multiple domains 3561 # too. Check if MAPS are going to have same TTL across domains. 3562 # This is just to avoid asking too many TTL triplet inputs 3563 3564 echo "You would be allowed to enter different TTL values for each map." 3565 3566 get_confirm "For a given map, do you wish to use the same TTL values for all the domains (y/n/h) ?" \ 3567 "y" "non_default_different_ttl_help" 3568 3569 if [ $? -eq 1 ]; then 3570 3571 # Need to read only one TTL triplet for each existing MAP. 3572 read_all_maps_ttl_values_no_multiple_domain_issue 3573 3574 else 3575 3576 # We have hit the worst case scenario. TTLs could be 3577 # different per map and per domain. 3578 3579 read_default_maps_ttl_values_with_multi_domain_issue 3580 read_custom_maps_ttl_values_with_multi_domain_issue 3581 fi 3582 fi 3583 fi 3584fi 3585 3586echo " 3587# 3588#------------------------------------------------------------------------------ 3589# 3590" >> $MAP_FILE 3591 3592return 0 3593} 3594 3595 3596# 3597# The custom maps for which we do not have enough 3598# information to be able to generate specific entries, 3599# we just log the message that the user needs to take 3600# care of those entries manually. 3601# 3602ask_user_to_update_the_custom_map_entries_too() 3603{ 3604 3605if [ ${#ALL_DMN_CUST_MAPS[*]} -gt 0 ]; then 3606 3607 echo " 3608# Similar entries need to be created 3609# for following custom maps too :\ 3610" >> $MAP_FILE 3611 3612 for _MAP in ${ALL_DMN_CUST_MAPS[*]} 3613 do 3614 echo "# $_MAP" >> $MAP_FILE 3615 done 3616fi 3617} 3618 3619 3620put_default_nisLDAPnameFields() 3621{ 3622echo ' 3623# Associate names with fields in the maps. Must be same for all domains. 3624nisLDAPnameFields audit_user: \ 3625 ("%s:%s:%s", name, alwaysAuditFlags, neverAuditFlags) 3626 3627nisLDAPnameFields auto.home: \ 3628 ("%s",value) 3629 3630nisLDAPnameFields auto.master: \ 3631 ("%s",value) 3632 3633nisLDAPnameFields auth_attr: \ 3634 ("%s:%s:%s:%s:%s:%s", \ 3635 name, res1, res2, short_desc, long_desc, attrs ) 3636 3637nisLDAPnameFields bootparams: \ 3638 ("%s", params) 3639 3640nisLDAPnameFields ethers: \ 3641 ("%s %s", addr, name) 3642 3643nisLDAPnameFields exec_attr: \ 3644 ("%s:%s:%s:%s:%s:%s:%s", \ 3645 name, policy, type, res1, res2, id, attrs) 3646 3647nisLDAPnameFields group: \ 3648 ("%s:%s:%s:%s", name, passwd, gid, users) 3649' >> $MAP_FILE 3650 3651# Need to handle group.adjunct.byname map for multiple domain. 3652 3653_MAP=group.adjunct.byname 3654if ! present $_MAP $ALL_DMN_DEF_MAPLIST 3655then 3656 # Just put the syntax in comment form 3657 echo '#nisLDAPnameFields group.adjunct.byname: \ 3658# ("%s:%s", name, passwd) 3659' >> $MAP_FILE 3660else 3661 # Find the domains in which this map exists. 3662 find_domains $_MAP DEF_MAPS 3663 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 3664 then 3665 3666 # Don't put domain info as the map is present in all of them. 3667 echo 'nisLDAPnameFields group.adjunct.byname: \ 3668 ("%s:%s", name, passwd) 3669' >> $MAP_FILE 3670 else 3671 # Not every domain has this map. So, list for the ones which do. 3672 for _DMN in $PRESENT_IN_DOMAINS 3673 do 3674 echo "nisLDAPnameFields group.adjunct.byname,${_DMN}: \\ 3675 (\"%s:%s\", name, passwd) 3676" >> $MAP_FILE 3677 done 3678 fi 3679fi 3680 3681echo 'nisLDAPnameFields keys.host: \ 3682 ("%s:%s", publicKey ,secretKey) 3683 3684nisLDAPnameFields keys.pass: \ 3685 ("%s:%s", publicKey ,secretKey) 3686 3687nisLDAPnameFields keys.nobody: \ 3688 ("%s:%s", publicKey ,secretKey) 3689 3690nisLDAPnameFields hosts: \ 3691 ("%a %s %s", addr, canonicalName, aliases) 3692 3693nisLDAPnameFields multihosts: \ 3694 ("%a %s %s", addr, canonicalName, aliases) 3695 3696nisLDAPnameFields ipnodes: \ 3697 ("%a %s %s", addr, canonicalName, aliases) 3698 3699nisLDAPnameFields multiipnodes: \ 3700 ("%a %s %s", addr, canonicalName, aliases) 3701 3702nisLDAPnameFields mail.aliases: \ 3703 ("%s", addresses) 3704 3705nisLDAPnameFields mail.mapping: \ 3706 ("%s", address) 3707 3708# memberTriples is split into sub-fields by a latter nisLDAPsplitField 3709# attribute. 3710nisLDAPnameFields netgroup: \ 3711 ("%s", memberTriples) 3712 3713nisLDAPnameFields netid.host: \ 3714 ("%s:%s", number, data) 3715 3716nisLDAPnameFields netid.pass: \ 3717 ("%s:%s", number, data) 3718 3719nisLDAPnameFields netmasks.byaddr: \ 3720 ("%a", mask) 3721 3722nisLDAPnameFields networks: \ 3723 ("%s %s %s", name, number, aliases) 3724 3725nisLDAPnameFields project: \ 3726 ("%s:%s:%s:%s:%s:%s", \ 3727 name, projID, comment, users, groups, attrs) 3728 3729nisLDAPnameFields protocols: \ 3730 ("%s %s %s", name, number, aliases) 3731 3732nisLDAPnameFields rpc.bynumber: \ 3733 ("%s %s %s", name, number, aliases) 3734 3735nisLDAPnameFields passwd: \ 3736 ("%s:%s:%s:%s:%s:%s:%s", \ 3737 name, passwd, uid, gid, gecos, home, shell) 3738 3739# It is not obvious what the fields in passwd.adjunct are for. They are not 3740# the same as the shadow map. The following is based on information in:- 3741# 3742# lib/libbc/inc/include/pwdadj.h. 3743# 3744# This file implies that these are documented in getpwaent(3) but this man page 3745# does not seem to exist. 3746# 3747# It is believed that 'min','max' and 'def' labels were reserved fields in 3748# SunOS 4.x and are now unused. 'always' and 'never' audit information is 3749# now contained in audit_user(4) so is now unused. 3750# 3751' >> $MAP_FILE 3752 3753# Need to handle passwd.adjunct.byname map for multiple domain. 3754 3755_MAP=passwd.adjunct.byname 3756if ! present $_MAP $ALL_DMN_DEF_MAPLIST 3757then 3758 # Just put the syntax in comment form 3759 echo '#nisLDAPnameFields passwd.adjunct.byname: \ 3760# ("%s:%s:%s:%s:%s:%s:%s", \ 3761# name, passwd, min, max, def, always, \ 3762# never) 3763' >> $MAP_FILE 3764else 3765 # Find the domains in which this map exists. 3766 find_domains $_MAP DEF_MAPS 3767 3768 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 3769 then 3770 3771 # Don't put domain info as the map is present in all of them. 3772 echo 'nisLDAPnameFields passwd.adjunct.byname: \ 3773 ("%s:%s:%s:%s:%s:%s:%s", \ 3774 name, passwd, min, max, def, always, \ 3775 never) 3776' >> $MAP_FILE 3777 else 3778 # Not every domain has this map. So, list for the ones which do. 3779 for _DMN in $PRESENT_IN_DOMAINS 3780 do 3781 echo "nisLDAPnameFields passwd.adjunct.byname,${_DMN}: \\ 3782 (\"%s:%s:%s:%s:%s:%s:%s\", \\ 3783 name, passwd, min, max, def, always, \\ 3784 never) 3785" >> $MAP_FILE 3786 done 3787 fi 3788fi 3789 3790echo ' 3791nisLDAPnameFields printers.conf.byname: \ 3792 ("%s:%s", names, values) 3793 3794nisLDAPnameFields prof_attr: \ 3795 ("%s:%s:%s:%s:%s", \ 3796 name, res1, res2, desc, attrs) 3797 3798nisLDAPnameFields services: \ 3799 ("%s %s/%s %s", name, port, protocol, aliases) 3800 3801# This map is never created but yppasswd uses the mapping to extract password 3802# ageing information from the DIT. The password itself is not required by this 3803# mechanism so is not included in the ageing mapping. 3804nisLDAPnameFields ageing.byname: \ 3805 ("%s:%s:%s:%s:%s:%s:%s:%s", \ 3806 name, lastchg, min, max, warn, inactive, \ 3807 expire, flag) 3808 3809nisLDAPnameFields timezone.byname: \ 3810 ("%s %s", zoneName, hostName) 3811 3812nisLDAPnameFields user_attr: \ 3813 ("%s:%s:%s:%s:%s", user, qualifier, res1, res2, attrs) 3814' >> $MAP_FILE 3815} 3816 3817# 3818# List namefields for non-default auto maps and custom maps. 3819# 3820put_auto_and_custom_map_nisLDAPnameFields() 3821{ 3822for _MAP in ${ALL_DMN_AUTO_CUST_MAPS[*]} ${ALL_DMN_CUST_MAPS[*]} 3823do 3824 3825 echo "\ 3826nisLDAPnameFields ${_MAP}: \\ 3827 (\"%s\",value) 3828" >> $MAP_FILE 3829 3830done 3831} 3832 3833 3834create_nisLDAPnameFields() 3835{ 3836# Put format information of "nisLDAPnameFields" 3837[ CUST_CMT_NEEDED -eq 1 ] && echo ' 3838# "nisLDAPnameFields" specifies the content of entries in a NIS map 3839# and how they should be broken into named fields. It is required as, 3840# unlike NIS+, NIS maps do not store information in named fields. 3841# 3842# Following is the syntax for nisLDAPnameFields : 3843# 3844# "nisLDAPnameFields" mapName ":" "(" matchspec "," fieldNames ")" 3845# fieldName = nameOrArrayName[","...] 3846# nameOrArrayName = Name of field or 'array' of repeated fields. 3847# matchspec = \" formatString \" 3848' >> $MAP_FILE 3849 3850# List the default nameField values 3851put_default_nisLDAPnameFields 3852 3853# List the underlying assumption 3854echo "\ 3855# With the assumption that all the custom maps are simple, single 3856# map (single key-value pair type), below is the nisLDAPnameFields 3857# information for all the custom and non-default auto.* maps. If 3858# this assumption is not valid, then refer to the NISLDAPmapping 3859# man page for information on how to customize this section. 3860" >> $MAP_FILE 3861 3862# List namefields for non-default auto maps and custom maps. 3863put_auto_and_custom_map_nisLDAPnameFields 3864 3865 3866echo " 3867# 3868#------------------------------------------------------------------------------ 3869# 3870" >> $MAP_FILE 3871 3872return 0 3873} 3874 3875 3876# 3877# List repeated field seperators 3878# 3879create_nisLDAPrepeatedFieldSeparators() 3880{ 3881 3882[ CUST_CMT_NEEDED -eq 1 ] && echo " 3883# nisLDAPrepeatedFieldSeparators : It is a character which separates 3884# the repeatable instnaces of splitable fields. It's format is : 3885# 3886# nisLDAPrepeatedFieldSeparators fieldName \"sepChar[...]\" 3887# sepChar = A separator character. 3888# Default value is space or tab. 3889" >> $MAP_FILE 3890 3891echo "\ 3892#nisLDAPrepeatedFieldSeparators memberTriples: \" \t\" 3893" >> $MAP_FILE 3894 3895} 3896 3897 3898# 3899# List split fields 3900# 3901create_nisLDAPsplitField() 3902{ 3903# List the default split fields 3904 3905[ CUST_CMT_NEEDED -eq 1 ] && echo ' 3906# nisLDAPsplitFields : It defines how a field, or list of fields, 3907# named by nisLDAPnameFields is split into sub fields. The original 3908# field is compared with each line of this attribute until one matches. 3909# When a match is found named sub-fields are generated. In latter 3910# operations sub-field names can be used in the same way as other 3911# field names. The format of nisLDAPsplitFields is : 3912# 3913# "nisLDAPsplitFields" fieldName ":" splitSpec[","...] 3914# splitSpec = "(" matchspec "," subFieldNames ")" 3915# fieldName = Name of a field from nisLDAPnameFields 3916# subFieldNames = subFieldname[","...] 3917# matchspec = \" formatString \" 3918' >> $MAP_FILE 3919 3920echo ' 3921nisLDAPsplitField memberTriples: \ 3922 ("(%s,%s,%s)", host, user, domain), \ 3923 ("%s", group) 3924' >> $MAP_FILE 3925 3926} 3927 3928# 3929# List split fields and repeated field separators. 3930# 3931create_split_field_and_repeatedfield_seperators() 3932{ 3933 3934echo "\ 3935# Specify how to break fields up into sub fields. 3936" >> $MAP_FILE 3937 3938create_nisLDAPrepeatedFieldSeparators 3939 3940create_nisLDAPsplitField 3941 3942echo " 3943# 3944#------------------------------------------------------------------------------ 3945# 3946" >> $MAP_FILE 3947} 3948 3949list_default_nisLDAPobjectDN() 3950{ 3951echo ' 3952# Associate maps with RDNs and object classes. Base DN comes from the 3953# nisLDAPdomainContext. 3954# 3955# As supplied this file gives only the most derived objectClass for each map. 3956# For some servers it may be necessary to add "objectClass=" statements for 3957# all the superclasses. This should be done here. 3958 3959nisLDAPobjectDN auto.home: \ 3960 automountmapname=auto_home,?one? \ 3961 objectClass=automount: 3962 3963nisLDAPobjectDN auto.master: \ 3964 automountmapname=auto_master,?one? \ 3965 objectClass=automount: 3966 3967nisLDAPobjectDN auth_attr: \ 3968 ou=SolarisAuthAttr,?one? \ 3969 objectClass=SolarisAuthAttr: 3970 3971nisLDAPobjectDN bootparams: \ 3972 ou=ethers,?one? \ 3973 objectClass=bootableDevice, \ 3974 bootParameter=*:\ 3975 ou=ethers,?one? \ 3976 objectClass=device, \ 3977 objectClass=bootableDevice 3978 3979 3980nisLDAPobjectDN exec_attr:\ 3981 ou=SolarisProfAttr,?one?objectClass=SolarisExecAttr,\ 3982 SolarisKernelSecurityPolicy=*:\ 3983 ou=SolarisProfAttr,?one?objectClass=SolarisExecAttr,\ 3984 objectClass=SolarisProfAttr,\ 3985 objectClass=top 3986 3987nisLDAPobjectDN ethers: \ 3988 ou=ethers,?one? \ 3989 objectClass=ieee802Device, \ 3990 macAddress=*:\ 3991 ou=ethers,?one? \ 3992 objectClass=device, \ 3993 objectClass=ieee802Device 3994 3995nisLDAPobjectDN group: \ 3996 ou=group,?one? \ 3997 objectClass=posixGroup: 3998' >> $MAP_FILE 3999 4000 4001# Need to handle group.adjunct.byname map for multiple domain. 4002 4003_MAP=group.adjunct.byname 4004if ! present $_MAP $ALL_DMN_DEF_MAPLIST 4005then 4006 # Just put the syntax in comment form 4007 echo '#nisLDAPobjectDN group.adjunct.byname: \ 4008# ou=group,?one? \ 4009# objectClass=posixGroup: 4010' >> $MAP_FILE 4011else 4012 # Find the domains in which this map exists. 4013 find_domains $_MAP DEF_MAPS 4014 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 4015 then 4016 # Don't put domain info as the map is present in all of them. 4017 echo 'nisLDAPobjectDN group.adjunct.byname: \ 4018 ou=group,?one? \ 4019 objectClass=posixGroup: 4020' >> $MAP_FILE 4021 else 4022 # Not every domain has this map. So, list for the ones which do. 4023 for _DMN in $PRESENT_IN_DOMAINS 4024 do 4025 echo "nisLDAPobjectDN group.adjunct.byname,${_DMN}: \\ 4026 ou=group,?one? \\ 4027 objectClass=posixGroup: 4028" >> $MAP_FILE 4029 done 4030 fi 4031fi 4032 4033 4034echo 'nisLDAPobjectDN hosts: \ 4035 ou=hosts,?one? \ 4036 objectClass=ipHost:\ 4037 ou=hosts,?one? \ 4038 objectClass=device, \ 4039 objectClass=ipHost 4040 4041nisLDAPobjectDN multihosts: \ 4042 ou=hosts,?one? \ 4043 objectClass=ipHost, \ 4044 ipHostNumber=*.* 4045 4046nisLDAPobjectDN ipnodes: \ 4047 ou=hosts,?one? \ 4048 objectClass=ipHost:\ 4049 ou=hosts,?one? \ 4050 objectClass=device, \ 4051 objectClass=ipHost 4052 4053nisLDAPobjectDN multiipnodes: \ 4054 ou=hosts,?one? \ 4055 objectClass=ipHost, \ 4056 ipHostNumber=*\:* 4057 4058nisLDAPobjectDN mail.aliases: \ 4059 ou=aliases,?one? \ 4060 objectClass=mailGroup: 4061 4062nisLDAPobjectDN mail.mapping: \ 4063 ou=aliases,?one? \ 4064 objectClass=mailGroup 4065 4066nisLDAPobjectDN netgroup: \ 4067 ou=netgroup,?one? \ 4068 objectClass=nisNetgroup: 4069 4070nisLDAPobjectDN networks: \ 4071 ou=networks,?one? \ 4072 objectClass=ipNetwork, \ 4073 cn=*: 4074 4075# Must come after networks (or equivalent) that creates ipNetworks 4076nisLDAPobjectDN netmasks.byaddr: \ 4077 ou=networks,?one? \ 4078 objectClass=ipNetwork, \ 4079 ipNetMaskNumber=*: 4080 4081nisLDAPobjectDN passwd: \ 4082 ou=people,?one? \ 4083 objectClass=posixAccount:\ 4084 ou=people,?one? \ 4085 objectClass=account, \ 4086 objectClass=shadowAccount, \ 4087 objectClass=posixAccount 4088' >> $MAP_FILE 4089 4090 4091# Need to handle passwd.adjunct.byname map for multiple domain. 4092 4093_MAP=passwd.adjunct.byname 4094if ! present $_MAP $ALL_DMN_DEF_MAPLIST 4095then 4096 # Just put the syntax in comment form 4097 echo '#nisLDAPobjectDN passwd.adjunct.byname: \ 4098# ou=people,?one? \ 4099# objectClass=posixAccount:\ 4100# ou=people,?one? \ 4101# objectClass=account, \ 4102# objectClass=shadowAccount, \ 4103# objectClass=posixAccount 4104' >> $MAP_FILE 4105else 4106 # Find the domains in which this map exists. 4107 find_domains $_MAP DEF_MAPS 4108 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 4109 then 4110 # Don't put domain info as the map is present in all of them. 4111 echo 'nisLDAPobjectDN passwd.adjunct.byname: \ 4112 ou=people,?one? \ 4113 objectClass=posixAccount:\ 4114 ou=people,?one? \ 4115 objectClass=account, \ 4116 objectClass=shadowAccount, \ 4117 objectClass=posixAccount 4118' >> $MAP_FILE 4119 else 4120 # Not every domain has this map. So, list for the ones which do. 4121 for _DMN in $PRESENT_IN_DOMAINS 4122 do 4123 echo "nisLDAPobjectDN passwd.adjunct.byname,${_DMN}: \\ 4124 ou=people,?one? \\ 4125 objectClass=posixAccount:\\ 4126 ou=people,?one? \\ 4127 objectClass=account, \\ 4128 objectClass=shadowAccount, \\ 4129 objectClass=posixAccount 4130" >> $MAP_FILE 4131 done 4132 fi 4133fi 4134 4135 4136echo '# Must follow passwd 4137nisLDAPobjectDN netid.pass: \ 4138 ou=people,?one? \ 4139 objectClass=posixAccount 4140 4141# Must follow hosts 4142nisLDAPobjectDN netid.host: \ 4143 ou=hosts,?one? \ 4144 objectClass=ipHost 4145 4146nisLDAPobjectDN printers.conf.byname: \ 4147 ou=printers,?one? \ 4148 objectClass=printerService:\ 4149 ou=printers,?one? \ 4150 objectClass=sunPrinter, \ 4151 objectClass=printerService, \ 4152 objectClass=printerLPR, \ 4153 objectClass=printerAbstract 4154 4155nisLDAPobjectDN prof_attr:\ 4156 ou=SolarisProfAttr,?one?objectClass=SolarisProfAttr,\ 4157 SolarisAttrLongDesc=*:\ 4158 ou=SolarisProfAttr,?one?objectClass=SolarisProfAttr,\ 4159 objectClass=SolarisExecAttr,\ 4160 objectClass=top 4161nisLDAPobjectDN project: \ 4162 ou=project,?one? \ 4163 objectClass=SolarisProject: 4164 4165nisLDAPobjectDN protocols: \ 4166 ou=protocols,?one? \ 4167 objectClass=ipProtocol: 4168 4169nisLDAPobjectDN rpc.bynumber: \ 4170 ou=rpc,?one? \ 4171 objectClass=oncRpc: 4172 4173nisLDAPobjectDN services.byname: \ 4174 ou=services,?one? \ 4175 objectClass=ipService: 4176 4177# Because services.byservicename contains keys of form both 'name' 4178# and 'name/protocol' we generate the DIT just from services.byname. 4179# Hence, write-disabled for services.byservicename 4180nisLDAPobjectDN services.byservicename: \ 4181 ou=services,?one? \ 4182 objectClass=ipService 4183 4184# This map is never created but yppasswd uses the mapping to extract password 4185# aging information from the DIT. 4186nisLDAPobjectDN ageing.byname: \ 4187 ou=people,?one? \ 4188 objectClass=shadowAccount: 4189 4190# Using nisplusTimeZoneData objectClass for compatibility with nis+2ldap 4191nisLDAPobjectDN timezone.byname: \ 4192 ou=Timezone,?one? \ 4193 objectClass=nisplusTimeZoneData: 4194 4195nisLDAPobjectDN user_attr: \ 4196 ou=people,?one? \ 4197 objectClass=SolarisUserAttr: 4198 4199# Must come after passwd (or equivalent) that creates posixAccounts 4200nisLDAPobjectDN audit_user: \ 4201 ou=people,?one? \ 4202 objectClass=SolarisAuditUser: 4203 4204# Must come after hosts + passwd. 4205nisLDAPobjectDN keys.host: \ 4206 ou=hosts,?one? \ 4207 objectClass=NisKeyObject: 4208 4209nisLDAPobjectDN keys.pass: \ 4210 ou=people,?one? \ 4211 objectClass=NisKeyObject: 4212 4213nisLDAPobjectDN keys.nobody: \ 4214 ou=people,?one? \ 4215 objectClass=NisKeyObject:\ 4216 ou=people,?one? \ 4217 objectClass=account, \ 4218 objectClass=NisKeyObject 4219 4220nisLDAPobjectDN ypservers: \ 4221 ou=ypservers,?one? \ 4222 objectClass=device: 4223' >> $MAP_FILE 4224} 4225 4226# List all the non-default auto.* and custom maps. 4227list_auto_custom_nisLDAPobjectDN() 4228{ 4229 4230# auto.* entries are easy. 4231if [ ${#ALL_DMN_AUTO_CUST_MAPS[*]} -gt 0 ]; then 4232 echo "# Non-default custom auto maps (auto.*)\n" >> $MAP_FILE 4233 4234 for _MAP in ${ALL_DMN_AUTO_CUST_MAPS[*]} 4235 do 4236 4237 # We need to find one container for each auto.* map. 4238 # Assume that each auto.* maps's container is auto_*. 4239 4240 _MAP_UNDERSCORE=`echo $_MAP | sed "s/auto\./auto_/"` 4241 4242 echo "\ 4243nisLDAPobjectDN ${_MAP}: \\ 4244 automountmapname=${_MAP_UNDERSCORE},?one? \\ 4245 objectClass=automount: 4246" >> $MAP_FILE 4247 done 4248fi 4249 4250# Since we do not have enough information to generate 4251# entries for other custom maps, best we can do is to 4252# log this map names and ask user to take care of them. 4253 4254ask_user_to_update_the_custom_map_entries_too 4255 4256} 4257 4258 4259# 4260# List association of maps with RDNs and object classes. 4261# 4262create_nisLDAPobjectDN() 4263{ 4264 4265[ CUST_CMT_NEEDED -eq 1 ] && echo ' 4266# nisLDAPobjectDN : It specifies the connection between group of NIS 4267# maps and the LDAP directory. This attribute also defines the 'order' 4268# of the NIS maps. When NIS maps are bulk copied to or from the DIT 4269# they are processed in the same order as related nisLDAPobjectDN 4270# attributes appear in /var/yp/NISLDAPmapping. 4271# The format of "nisLDAPobjectDN" is : 4272# 4273# mapName[" "...] ":" objectDN *( ";" objectDN ) 4274# 4275# where: 4276# 4277# objectDN = readObjectSpec [":"[writeObjectSpec]] 4278# readObjectSpec = [baseAndScope [filterAttrValList]] 4279# writeObjectSpec = [baseAndScope [attrValList]] 4280# baseAndScope = [baseDN] ["?" [scope]] 4281# filterAttrValList = ["?" [filter | attrValList]]] 4282# scope = "base" | "one" | "sub" 4283# attrValList = attribute "=" value 4284# *("," attribute "=" value) 4285' >> $MAP_FILE 4286 4287# List all the default entries anyway. 4288list_default_nisLDAPobjectDN 4289 4290# List all the non-default auto.* and custom maps. 4291list_auto_custom_nisLDAPobjectDN 4292 4293} 4294 4295# 4296# List all the default nisLDAPattributeFromField entries 4297# 4298list_default_nisLDAPattributeFromField() 4299{ 4300echo ' 4301# Describe how named fields are mapped to DIT entries. 4302 4303# audit_user 4304nisLDAPattributeFromField audit_user: \ 4305 dn=("uid=%s,", rf_key ), \ 4306 SolarisAuditAlways=alwaysAuditFlags, \ 4307 SolarisAuditNever=neverAuditFlags 4308 4309# auto.home 4310nisLDAPattributeFromField auto.home: \ 4311 dn=("automountKey=%s,", rf_key ), \ 4312 automountKey=rf_key, \ 4313 automountInformation=value 4314 4315# auto.master 4316nisLDAPattributeFromField auto.master: \ 4317 dn=("automountKey=%s,", rf_key ), \ 4318 automountKey=rf_key, \ 4319 automountInformation=value 4320 4321# auth_attr 4322nisLDAPattributeFromField auth_attr: \ 4323 dn=("cn=%s,", rf_key ), \ 4324 cn=name, \ 4325 SolarisAttrReserved1=res1, \ 4326 SolarisAttrReserved2=res2, \ 4327 SolarisAttrShortDesc=short_desc, \ 4328 SolarisAttrLongDesc=long_desc, \ 4329 SolarisAttrKeyValue=attrs 4330 4331# exec_attr. Because of the messy NIS keys special handling is required here 4332nisLDAPattributeFromField exec_attr: \ 4333 dn=("cn=%s+SolarisKernelSecurityPolicy=%s\ 4334 +SolarisProfileType=%s+SolarisProfileID=%s,", \ 4335 name, policy,type,id), \ 4336 ("%s:*", cn)=rf_key, \ 4337 ("*:%s:*", SolarisKernelSecurityPolicy)=rf_key, \ 4338 ("*:*:%s", SolarisProfileId)=rf_key, \ 4339 solarisProfileType=type, \ 4340 solarisAttrReserved1=res1, \ 4341 SolarisAttrReserved2=res2, \ 4342 solarisAttrKeyValue=attrs 4343 4344# ethers 4345nisLDAPattributeFromField ethers.byname: \ 4346 dn=("cn=%s,", rf_key ), \ 4347 macAddress=addr 4348nisLDAPattributeFromField ethers.byaddr: \ 4349 dn=("cn=%s,", name ), \ 4350 macAddress=rf_key 4351nisLDAPattributeFromField ethers: \ 4352 cn=name, \ 4353 description=rf_comment 4354 4355# bootparams. Must be done after ethers 4356nisLDAPattributeFromField bootparams: \ 4357 dn=("cn=%s,", rf_key ), \ 4358 cn=rf_key, \ 4359 (bootParameter)=(params, " ") 4360' >> $MAP_FILE 4361 4362# group syntax is different when group.adjunct map is present. 4363# So, need to handle the various possibilities 4364 4365_MAP=group.adjunct.byname 4366 4367if ! present $_MAP $ALL_DMN_DEF_MAPLIST 4368then 4369 4370 # Just put the group.adjunct syntax in comment form 4371 4372 echo '# group 4373nisLDAPattributeFromField group.byname: \ 4374 dn=("cn=%s,", rf_key ), \ 4375 gidNumber=gid 4376nisLDAPattributeFromField group.bygid: \ 4377 dn=("cn=%s,", name ), \ 4378 gidNumber=rf_key 4379nisLDAPattributeFromField group: \ 4380 cn=name, \ 4381 userPassword=("{crypt}%s",passwd), \ 4382 (memberUid)=(users, ",") 4383 4384# 4385# If you are using group.adjunct, comment the group section above 4386# and uncomment the following group and group.adjunct sections 4387# 4388# group 4389#nisLDAPattributeFromField group.byname: \ 4390# dn=("cn=%s,", rf_key ), \ 4391# gidNumber=gid 4392#nisLDAPattributeFromField group.bygid: \ 4393# dn=("cn=%s,", name ), \ 4394# gidNumber=rf_key 4395#nisLDAPattributeFromField group: \ 4396# cn=name, \ 4397# (memberUid)=(users, ",") 4398 4399# group.adjunct 4400#nisLDAPattributeFromField group.adjunct.byname: \ 4401# dn=("cn=%s,", rf_key ), \ 4402# cn=name, \ 4403# userPassword=("{crypt}%s",passwd) 4404' >> $MAP_FILE 4405 4406else 4407 4408 # Find the domains in which group.adjunct map exists. 4409 find_domains $_MAP DEF_MAPS 4410 4411 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 4412 then 4413 4414 # All the domains have group.adjunct map. 4415 4416 echo '# group 4417#nisLDAPattributeFromField group.byname: \ 4418# dn=("cn=%s,", rf_key ), \ 4419# gidNumber=gid 4420#nisLDAPattributeFromField group.bygid: \ 4421# dn=("cn=%s,", name ), \ 4422# gidNumber=rf_key 4423#nisLDAPattributeFromField group: \ 4424# cn=name, \ 4425# userPassword=("{crypt}%s",passwd), \ 4426# (memberUid)=(users, ",") 4427 4428# If you are not using group.adjunct, uncomment the group section above 4429# and comment the following group and group.adjunct sections 4430# 4431# group 4432nisLDAPattributeFromField group.byname: \ 4433 dn=("cn=%s,", rf_key ), \ 4434 gidNumber=gid 4435nisLDAPattributeFromField group.bygid: \ 4436 dn=("cn=%s,", name ), \ 4437 gidNumber=rf_key 4438nisLDAPattributeFromField group: \ 4439 cn=name, \ 4440 (memberUid)=(users, ",") 4441 4442# group.adjunct 4443nisLDAPattributeFromField group.adjunct.byname: \ 4444 dn=("cn=%s,", rf_key ), \ 4445 cn=name, \ 4446 userPassword=("{crypt}%s",passwd) 4447' >> $MAP_FILE 4448 4449 else 4450 # Not every domain has group.adjunct map. 4451 4452 # First put the password syntax with domain name for domains 4453 # in which group.adjunct exists. 4454 4455 echo "# group" >> $MAP_FILE 4456 4457 for _DMN in $PRESENT_IN_DOMAINS 4458 do 4459 4460 echo "\ 4461# domain-specific group 4462nisLDAPattributeFromField group.byname,${_DMN}: \\ 4463 dn=(\"cn=%s,\", rf_key ), \\ 4464 gidNumber=gid 4465nisLDAPattributeFromField group.bygid,${_DMN}: \\ 4466 dn=(\"cn=%s,\", name ), \\ 4467 gidNumber=rf_key 4468nisLDAPattributeFromField group,${_DMN}: \\ 4469 cn=name, \\ 4470 (memberUid)=(users, \",\") 4471" >> $MAP_FILE 4472 done 4473 4474 # Now put the other group syntax. We do not need to 4475 # append the domain name here. 4476 4477 echo ' 4478nisLDAPattributeFromField group.byname: \ 4479 dn=("cn=%s,", rf_key ), \ 4480 gidNumber=gid 4481nisLDAPattributeFromField group.bygid: \ 4482 dn=("cn=%s,", name ), \ 4483 gidNumber=rf_key 4484nisLDAPattributeFromField group: \ 4485 cn=name, \ 4486 userPassword=("{crypt}%s",passwd), \ 4487 (memberUid)=(users, ",") 4488' >> $MAP_FILE 4489 4490 # Now we need to put the group.adjunct syntax for domains 4491 # in which this map exists. 4492 4493 echo "# group.adjunct" >> $MAP_FILE 4494 4495 for _DMN in $PRESENT_IN_DOMAINS 4496 do 4497 4498 echo "\ 4499nisLDAPattributeFromField group.adjunct.byname,${_DMN}: \\ 4500 dn=(\"cn=%s,\", rf_key ), \\ 4501 cn=name, \\ 4502 userPassword=(\"{crypt}%s\",passwd) 4503" >> $MAP_FILE 4504 done 4505 4506 fi 4507 4508fi 4509 4510 4511echo ' 4512# hosts 4513# Cannot forward map hosts.byname key as the YP_MULTI entries will not work. 4514nisLDAPattributeFromField hosts.byname: \ 4515 cn=rf_searchkey 4516nisLDAPattributeFromField hosts.byaddr: \ 4517 ipHostNumber=rf_searchipkey 4518nisLDAPattributeFromField hosts: \ 4519 ipHostNumber=addr, \ 4520 dn=("cn=%s+ipHostNumber=%s,", canonicalName, addr), \ 4521 cn=canonicalName, \ 4522 (cn)=(aliases, " "), \ 4523 description=rf_comment 4524 4525nisLDAPattributeFromField multihosts: \ 4526 ("YP_MULTI_%s", cn)=rf_searchkey 4527 4528# ipnodes 4529# Cannot forward map ipnodes.byname key as the YP_MULTI entries will not work. 4530nisLDAPattributeFromField ipnodes.byname: \ 4531 cn=rf_searchkey 4532nisLDAPattributeFromField ipnodes.byaddr: \ 4533 ipHostNumber=rf_searchipkey 4534nisLDAPattributeFromField ipnodes: \ 4535 ipHostNumber=addr, \ 4536 dn=("cn=%s+ipHostNumber=%s,", canonicalName, addr), \ 4537 cn=canonicalName, \ 4538 (cn)=(aliases, " "), \ 4539 description=rf_comment 4540 4541nisLDAPattributeFromField multiipnodes: \ 4542 ("YP_MULTI_%s", cn)=rf_searchkey 4543 4544#mail.aliases 4545nisLDAPattributeFromField mail.aliases: \ 4546 dn=("mail=%s,", rf_key), \ 4547 mail=rf_key, \ 4548 (mgrprfc822mailmember)=(addresses, ",") 4549 4550#mail.mapping 4551#Commented out because all NIS->LDAP mappings are done by mail.aliases 4552#nisLDAPattributeFromField mail.mapping: \ 4553# dn=("mail=%s,", address), \ 4554# mail=address, \ 4555# mgrprfc822mailmember=rf_key 4556nisLDAPattributeFromField mail.mapping: \ 4557 mgrprfc822mailmember=rf_searchkey 4558 4559# netgroup. 4560# 4561# Only need to create DIT entries for netgroup. This contains a superset of 4562# the information in netgroup.byhost and netgroup.byuser 4563nisLDAPattributeFromField netgroup: \ 4564 dn=("cn=%s,", rf_key ), \ 4565 (memberNisNetgroup)=group, \ 4566 (nisNetgroupTriple)= \ 4567 ("(%s,%s,%s)", host, user, domain), \ 4568 cn=rf_key, \ 4569 description=rf_comment 4570 4571# netid.pass 4572# 4573# Commented out because, unless remote domains (and thus /etc/netid) is 4574# supported, all NIS->LDAP mappings are set up from passwd. 4575#nisLDAPattributeFromField netid.pass: \ 4576# ("unix.%s@*", uidNumber)=rf_key, \ 4577# (gidNumber)=("%s", (data), " "), \ 4578# description=rf_comment 4579nisLDAPattributeFromField netid.pass: \ 4580 ("unix.%s@*", uidNumber)=rf_searchkey 4581 4582# netid.host 4583# 4584# Commented out because, unless remote domains (and thus /etc/netid) is 4585# supported, all NIS->LDAP mappings are set up from hosts. 4586#nisLDAPattributeFromField netid.host: \ 4587# dn=("cn=%s+ipHostNumber=%s,", data, \ 4588# ldap:ipHostNumber:?one?("cn=%s", data)), \ 4589# ipHostNumber=ldap:ipHostNumber:?one?("cn=%s", data), \ 4590# ("unix.%s@*", cn)=rf_key, \ 4591# description=rf_comment 4592nisLDAPattributeFromField netid.host: \ 4593 ("unix.%s@*", cn)=rf_searchkey 4594 4595# netmasks.byaddr 4596nisLDAPattributeFromField netmasks.byaddr: \ 4597 dn=("ipNetworkNumber=%s,", rf_ipkey ), \ 4598 ipNetworkNumber=rf_ipkey, \ 4599 ipNetmaskNumber=mask, \ 4600 description=rf_comment 4601 4602# networks. 4603nisLDAPattributeFromField networks.byname: \ 4604 dn=("ipNetworkNumber=%s,", number ), \ 4605 cn=name, \ 4606 cn=rf_key 4607nisLDAPattributeFromField networks.byaddr: \ 4608 dn=("ipNetworkNumber=%s,", rf_key ), \ 4609 cn=name 4610nisLDAPattributeFromField networks: \ 4611 (cn)=(aliases, " "), \ 4612 ipNetworkNumber=number, \ 4613 description=rf_comment 4614' >> $MAP_FILE 4615 4616 4617# passwd syntax is different when passwd.adjunct map is present. 4618# So, need to handle the various possibilities 4619 4620_MAP=passwd.adjunct.byname 4621 4622if ! present $_MAP $ALL_DMN_DEF_MAPLIST 4623then 4624 4625 # Just put the passwd.adjunct syntax in comment form 4626 4627 echo '# passwd 4628nisLDAPattributeFromField passwd.byname: \ 4629 dn=("uid=%s,", rf_key ), \ 4630 uid=rf_key, \ 4631 uidNumber=uid 4632nisLDAPattributeFromField passwd.byuid: \ 4633 dn=("uid=%s,", name ), \ 4634 uidNumber=rf_key, \ 4635 uid=name 4636nisLDAPattributeFromField passwd: \ 4637 cn=name, \ 4638 userPassword=("{crypt}%s",passwd), \ 4639 gidNumber=gid, \ 4640 gecos=gecos, \ 4641 homeDirectory=home, \ 4642 loginShell=shell 4643 4644# 4645# If you are using passwd.adjunct, comment the passwd section above 4646# and uncomment the following passwd and passwd.adjunct sections 4647# 4648# passwd 4649#nisLDAPattributeFromField passwd.byname: \ 4650# dn=("uid=%s,", rf_key ), \ 4651# uid=rf_key, \ 4652# uidNumber=uid 4653#nisLDAPattributeFromField passwd.byuid: \ 4654# dn=("uid=%s,", name ), \ 4655# uidNumber=rf_key, \ 4656# uid=name 4657#nisLDAPattributeFromField passwd: \ 4658# cn=name, \ 4659# gidNumber=gid, \ 4660# gecos=gecos, \ 4661# homeDirectory=home, \ 4662# loginShell=shell 4663 4664# passwd.adjunct 4665#nisLDAPattributeFromField passwd.adjunct.byname: \ 4666# dn=("uid=%s,", rf_key ), \ 4667# uid=name, \ 4668# userPassword=("{crypt}%s",passwd) 4669' >> $MAP_FILE 4670 4671else 4672 4673 # Find the domains in which passwd.adjunct map exists. 4674 find_domains $_MAP DEF_MAPS 4675 4676 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 4677 then 4678 4679 # All the domains have passwd.adjunct map. So, put the right 4680 # passwd syntax and comment-in the passwd.adjunct syntax. 4681 4682 4683 echo '# passwd 4684#nisLDAPattributeFromField passwd.byname: \ 4685# dn=("uid=%s,", rf_key ), \ 4686# uid=rf_key, \ 4687# uidNumber=uid 4688#nisLDAPattributeFromField passwd.byuid: \ 4689# dn=("uid=%s,", name ), \ 4690# uidNumber=rf_key, \ 4691# uid=name 4692#nisLDAPattributeFromField passwd: \ 4693# cn=name, \ 4694# userPassword=("{crypt}%s",passwd), \ 4695# gidNumber=gid, \ 4696# gecos=gecos, \ 4697# homeDirectory=home, \ 4698# loginShell=shell 4699 4700# If you are not using passwd.adjunct, uncomment the passwd section above 4701# and comment the following passwd and passwd.adjunct sections 4702# 4703# passwd 4704nisLDAPattributeFromField passwd.byname: \ 4705 dn=("uid=%s,", rf_key ), \ 4706 uid=rf_key, \ 4707 uidNumber=uid 4708nisLDAPattributeFromField passwd.byuid: \ 4709 dn=("uid=%s,", name ), \ 4710 uidNumber=rf_key, \ 4711 uid=name 4712nisLDAPattributeFromField passwd: \ 4713 cn=name, \ 4714 gidNumber=gid, \ 4715 gecos=gecos, \ 4716 homeDirectory=home, \ 4717 loginShell=shell 4718 4719# passwd.adjunct 4720nisLDAPattributeFromField passwd.adjunct.byname: \ 4721 dn=("uid=%s,", rf_key ), \ 4722 uid=name, \ 4723 userPassword=("{crypt}%s",passwd) 4724' >> $MAP_FILE 4725 4726 else 4727 # Not every domain has passwd.adjunct map. 4728 4729 # First put the password syntax with domain name for domains 4730 # in which passwd.adjunct exists. 4731 4732 echo "# passwd" >> $MAP_FILE 4733 4734 for _DMN in $PRESENT_IN_DOMAINS 4735 do 4736 4737 echo "\ 4738nisLDAPattributeFromField passwd.byname,${_DMN}: \\ 4739 dn=(\"uid=%s,\", rf_key ), \\ 4740 uid=rf_key, \\ 4741 uidNumber=uid 4742nisLDAPattributeFromField passwd.byuid,${_DMN}: \\ 4743 dn=(\"uid=%s,\", name ), \\ 4744 uidNumber=rf_key, \\ 4745 uid=name 4746nisLDAPattributeFromField passwd,${_DMN}: \\ 4747 cn=name, \\ 4748 gidNumber=gid, \\ 4749 gecos=gecos, \\ 4750 homeDirectory=home, \\ 4751 loginShell=shell 4752" >> $MAP_FILE 4753 done 4754 4755 # Now put the other passwd syntax. We do not need to 4756 # append the domain name here. 4757 4758 echo ' 4759nisLDAPattributeFromField passwd.byname: \ 4760 dn=("uid=%s,", rf_key ), \ 4761 uid=rf_key, \ 4762 uidNumber=uid 4763nisLDAPattributeFromField passwd.byuid: \ 4764 dn=("uid=%s,", name ), \ 4765 uidNumber=rf_key, \ 4766 uid=name 4767nisLDAPattributeFromField passwd: \ 4768 cn=name, \ 4769 userPassword=("{crypt}%s",passwd), \ 4770 gidNumber=gid, \ 4771 gecos=gecos, \ 4772 homeDirectory=home, \ 4773 loginShell=shell 4774' >> $MAP_FILE 4775 4776 # Now we need to put the passwd.adjunct syntax for domains 4777 # in which this map exists. 4778 4779 echo "# passwd.adjunct" >> $MAP_FILE 4780 4781 for _DMN in $PRESENT_IN_DOMAINS 4782 do 4783 4784 echo "\ 4785nisLDAPattributeFromField passwd.adjunct.byname,${_DMN}: \\ 4786 dn=(\"uid=%s,\", rf_key ), \\ 4787 uid=name, \\ 4788 userPassword=(\"{crypt}%s\",passwd) 4789" >> $MAP_FILE 4790 done 4791 4792 fi 4793 4794fi 4795 4796echo ' 4797# This map is never created but yppasswd uses the mapping to extract password 4798# aging information from the DIT. 4799nisLDAPattributeFromField ageing.byname: \ 4800 dn=("uid=%s,", rf_key ), \ 4801 uid=name, \ 4802 shadowLastChange=lastchg, \ 4803 shadowMin=min, \ 4804 shadowMax=max, \ 4805 shadowWarning=warn, \ 4806 shadowInactive=inactive, \ 4807 shadowExpire=expire, \ 4808 shadowFlag=flag 4809 4810# printers.conf.byname 4811nisLDAPattributeFromField printers.conf.byname: \ 4812 dn=("printer-uri=%s,", rf_key ), \ 4813 printer-name=rf_key, \ 4814 (printer-aliases)=(names, "|"), \ 4815 sun-printer-bsdaddr=(values, "*bsdaddr=%s:*"), \ 4816 (sun-printer-kvp)=(values,":"), \ 4817 description=rf_comment 4818 4819# prof_attr 4820nisLDAPattributeFromField prof_attr: \ 4821 dn=("cn=%s,", rf_key ), \ 4822 cn=name, \ 4823 SolarisAttrReserved1=res1, \ 4824 SolarisAttrReserved2=res2, \ 4825 SolarisAttrLongDesc=desc, \ 4826 SolarisAttrKeyValue=attrs 4827 4828# project 4829nisLDAPattributeFromField project.byname: \ 4830 dn=("SolarisProjectName=%s,", rf_key ) 4831nisLDAPattributeFromField project.byprojid: \ 4832 dn=("SolarisProjectName=%s,", name ), \ 4833 SolarisProjectID=rf_searchkey 4834nisLDAPattributeFromField project: \ 4835 SolarisProjectName=name, \ 4836 SolarisProjectID=projID, \ 4837 (memberUid)=(users, ","), \ 4838 (memberGid)=(groups, ","), \ 4839 (SolarisProjectAttr)=(attrs, ";"), \ 4840 description=comment 4841 4842# protocols 4843nisLDAPattributeFromField protocols.byname: \ 4844 ipProtocolNumber=number, \ 4845 cn=rf_searchkey 4846nisLDAPattributeFromField protocols.bynumber: \ 4847 ipProtocolNumber=rf_key, \ 4848 description=rf_comment 4849nisLDAPattributeFromField protocols: \ 4850 dn=("cn=%s,", name ), \ 4851 (cn)=(aliases, " "), \ 4852 cn=name 4853 4854# rpc.bynumber 4855nisLDAPattributeFromField rpc.bynumber: \ 4856 dn=("cn=%s,", name ), \ 4857 oncRpcNumber=rf_key, \ 4858 (cn)=(aliases, " "), \ 4859 cn=name, \ 4860 description=rf_comment 4861 4862# services 4863# services.byservicename rule is only used to speed single search 4864nisLDAPattributeFromField services.byservicename: \ 4865 ("%s/%s", cn, ipServiceProtocol) = rf_searchkey 4866 4867nisLDAPattributeFromField services.byname: \ 4868 dn=("cn=%s+ipServiceProtocol=%s,", name, protocol ), \ 4869 ("*/%s", ipServiceProtocol)=rf_key, \ 4870 ("%s/*", ipServicePort)=rf_key, \ 4871 (cn)=(aliases, " "), \ 4872 cn=name, \ 4873 description=rf_comment 4874 4875# timezone.byname 4876nisLDAPattributeFromField timezone.byname: \ 4877 dn=("cn=%s,", rf_key ), \ 4878 cn=hostName, \ 4879 nisplusTimeZone=zoneName, \ 4880 description=comment 4881 4882# user_attr 4883nisLDAPattributeFromField user_attr: \ 4884 dn=("uid=%s,", rf_key ), \ 4885 uid=rf_key, \ 4886 SolarisUserAttr=qualifier, \ 4887 SolarisUserReserved1=res1, \ 4888 SolarisUserReserved2=res2, \ 4889 SolarisAttrKeyValue=attrs 4890 4891# publickey.byname 4892nisLDAPattributeFromField keys.host: \ 4893 dn=("%s", ldap:dn:?one?("cn=%s", (yp:rf_key, "unix.%s@*"))), \ 4894 nisPublicKey=publicKey, \ 4895 nisSecretKey=secretKey 4896 4897nisLDAPattributeFromField keys.pass: \ 4898 dn=("%s", ldap:dn:?one?("uidNumber=%s", (yp:rf_key, "unix.%s@*"))), \ 4899 nisPublicKey=publicKey, \ 4900 nisSecretKey=secretKey 4901 4902nisLDAPattributeFromField keys.nobody: \ 4903 dn=("uid=%s,",yp:rf_key), \ 4904 cn=rf_key, \ 4905 nisPublicKey=publicKey, \ 4906 nisSecretKey=secretKey 4907 4908# ypservers. This derived from IPlanet implementation not RFC. 4909nisLDAPattributeFromField ypservers: \ 4910 dn=("cn=%s,", rf_key), \ 4911 cn=rf_key 4912' >> $MAP_FILE 4913} 4914 4915# 4916# List all the non-default auto.* and custom maps. 4917# 4918list_auto_and_custom_nisLDAPattributeFromField() 4919{ 4920 4921# auto.* entries are easy. 4922if [ ${#ALL_DMN_AUTO_CUST_MAPS[*]} -gt 0 ]; then 4923 echo "# Non-default custom auto maps (auto.*)\n" >> $MAP_FILE 4924fi 4925 4926for _MAP in ${ALL_DMN_AUTO_CUST_MAPS[*]} 4927do 4928 echo "\ 4929# ${_MAP} 4930nisLDAPattributeFromField ${_MAP}: \\ 4931 dn=(\"automountKey=%s,\", rf_key ), \\ 4932 automountKey=rf_key, \\ 4933 automountInformation=value 4934" >> $MAP_FILE 4935done 4936 4937# Since we do not have enough information to generate 4938# entries for other custom maps, best we can do is to 4939# log this map names and ask user to take care of them. 4940 4941ask_user_to_update_the_custom_map_entries_too 4942 4943} 4944 4945 4946# 4947# List mapping of named fields to DIT entries 4948# 4949create_nisLDAPattributeFromField() 4950{ 4951 4952[ CUST_CMT_NEEDED -eq 1 ] && echo ' 4953# nisLDAPattributeFromField : It specifies how an LDAP attribute 4954# value is derived from a NIS entries field values. 4955# 4956# The format of nisLDAPattributeFromField entry is : 4957# mapName ":" fieldattrspec *("," fieldattrspec ) 4958' >> $MAP_FILE 4959 4960# List all the default entries anyway. 4961list_default_nisLDAPattributeFromField 4962 4963# List all the non-default auto.* and custom maps. 4964list_auto_and_custom_nisLDAPattributeFromField 4965 4966echo " 4967# 4968#------------------------------------------------------------------------------ 4969# 4970" >> $MAP_FILE 4971} 4972 4973 4974# 4975# List all the default nisLDAPattributeFromField entries 4976# 4977list_default_nisLDAPfieldFromAttribute() 4978{ 4979echo ' 4980# Describe how named fields are mapped from DIT entries. 4981 4982# audit_user 4983nisLDAPfieldFromAttribute audit_user: \ 4984 ("uid=%s,*", rf_key)=dn, \ 4985 ("uid=%s,*", name)=dn, \ 4986 alwaysAuditFlags=SolarisAuditAlways, \ 4987 neverAuditFlags=SolarisAuditNever 4988 4989# auto.home 4990nisLDAPfieldFromAttribute auto.home: \ 4991 rf_key=automountKey, \ 4992 value=automountInformation 4993 4994# auto.master 4995nisLDAPfieldFromAttribute auto.master: \ 4996 rf_key=automountKey, \ 4997 value=automountInformation 4998 4999# auth_attr 5000nisLDAPfieldFromAttribute auth_attr: \ 5001 rf_key=cn, \ 5002 name=cn, \ 5003 res1=SolarisAttrReserved1, \ 5004 res2=SolarisAttrReserved2, \ 5005 short_desc=SolarisAttrShortDesc, \ 5006 long_desc=SolarisAttrLongDesc, \ 5007 attrs=SolarisAttrKeyValue 5008 5009# Exec_attr. Because of messy NIS keys special handlind is required here 5010nisLDAPfieldFromAttribute exec_attr: \ 5011 rf_key=("%s:%s:%s",cn,SolarisKernelSecurityPolicy, \ 5012 solarisProfileId), \ 5013 name=cn, \ 5014 policy=SolarisKernelSecurityPolicy, \ 5015 type=SolarisProfileType, \ 5016 res1=SolarisAttrReserved1, \ 5017 res2=SolarisAttrReserved2, \ 5018 id=SolarisProfileId, \ 5019 attrs=SolarisAttrKeyValue 5020 5021 5022# ethers 5023nisLDAPfieldFromAttribute ethers.byname: \ 5024 rf_key=cn 5025nisLDAPfieldFromAttribute ethers.byaddr: \ 5026 rf_key=macAddress 5027nisLDAPfieldFromAttribute ethers: \ 5028 name=cn, \ 5029 addr=macAddress, \ 5030 rf_comment=description 5031 5032# bootparams. Must be done after ethers 5033nisLDAPfieldFromAttribute bootparams: \ 5034 rf_key=cn, \ 5035 params=("%s ", (bootParameter), " ") 5036' >> $MAP_FILE 5037 5038# group syntax is different when group.adjunct map is present. 5039# So, need to handle the various possibilities 5040 5041_MAP=group.adjunct.byname 5042 5043if ! present $_MAP $ALL_DMN_DEF_MAPLIST 5044then 5045 5046 # Just put the group.adjunct syntax in comment form 5047 5048 echo '# group 5049nisLDAPfieldFromAttribute group.byname: \ 5050 rf_key=cn 5051nisLDAPfieldFromAttribute group.bygid: \ 5052 rf_key=gidNumber 5053nisLDAPfieldFromAttribute group: \ 5054 gid=gidNumber, \ 5055 name=cn, \ 5056 ("{crypt}%s", passwd)=userPassword, \ 5057 users=("%s,", (memberUid), ",") 5058 5059# 5060# If you are using group.adjunct, comment the group section above 5061# and uncomment the following group and group.adjunct section 5062# 5063# group 5064#nisLDAPfieldFromAttribute group.byname: \ 5065# rf_key=cn 5066#nisLDAPfieldFromAttribute group.bygid: \ 5067# rf_key=gidNumber 5068#nisLDAPfieldFromAttribute group: \ 5069# gid=gidNumber, \ 5070# name=cn, \ 5071# passwd=("#$%s", cn), \ 5072# users=("%s,", (memberUid), ",") 5073 5074# group.adjunct 5075#nisLDAPfieldFromAttribute group.adjunct.byname: \ 5076# rf_key=cn, \ 5077# name=cn, \ 5078# ("{crypt}%s", passwd)=userPassword 5079' >> $MAP_FILE 5080 5081else 5082 5083 # Find the domains in which group.adjunct map exists. 5084 find_domains $_MAP DEF_MAPS 5085 5086 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 5087 then 5088 5089 # All the domains have group.adjunct map. 5090 5091 5092 echo '# group 5093#nisLDAPfieldFromAttribute group.byname: \ 5094# rf_key=cn 5095#nisLDAPfieldFromAttribute group.bygid: \ 5096# rf_key=gidNumber 5097#nisLDAPfieldFromAttribute group: \ 5098# gid=gidNumber, \ 5099# name=cn, \ 5100# ("{crypt}%s", passwd)=userPassword, \ 5101# users=("%s,", (memberUid), ",") 5102 5103# 5104# If you are not using group.adjunct, comment the group section above 5105# and uncomment the following group and group.adjunct sections 5106# 5107# group 5108nisLDAPfieldFromAttribute group.byname: \ 5109 rf_key=cn 5110nisLDAPfieldFromAttribute group.bygid: \ 5111 rf_key=gidNumber 5112nisLDAPfieldFromAttribute group: \ 5113 gid=gidNumber, \ 5114 name=cn, \ 5115 passwd=("#$%s", cn), \ 5116 users=("%s,", (memberUid), ",") 5117 5118# 5119# group.adjunct 5120nisLDAPfieldFromAttribute group.adjunct.byname: \ 5121 rf_key=cn, \ 5122 name=cn, \ 5123 ("{crypt}%s", passwd)=userPassword 5124' >> $MAP_FILE 5125 5126 else 5127 # Not every domain has group.adjunct map. 5128 5129 echo "# group" >> $MAP_FILE 5130 5131 for _DMN in $PRESENT_IN_DOMAINS 5132 do 5133 5134 echo "\ 5135nisLDAPfieldFromAttribute group.byname,${_DMN}: \\ 5136 rf_key=cn 5137nisLDAPfieldFromAttribute group.bygid,${_DMN}: \\ 5138 rf_key=gidNumber 5139nisLDAPfieldFromAttribute group,${_DMN}: \\ 5140 gid=gidNumber, \\ 5141 name=cn, \\ 5142 passwd=(\"#$%s\", cn), \\ 5143 users=(\"%s,\", (memberUid), \",\") 5144" >> $MAP_FILE 5145 done 5146 5147 # Now put the generic group syntax. We do not need to 5148 # append the domain name here. 5149 5150 echo ' 5151nisLDAPfieldFromAttribute group.byname: \ 5152 rf_key=cn 5153nisLDAPfieldFromAttribute group.bygid: \ 5154 rf_key=gidNumber 5155nisLDAPfieldFromAttribute group: \ 5156 gid=gidNumber, \ 5157 name=cn, \ 5158 ("{crypt}%s", passwd)=userPassword, \ 5159 users=("%s,", (memberUid), ",") 5160' >> $MAP_FILE 5161 5162 # Now we need to put the group.adjunct syntax for domains 5163 # in which this map exists. 5164 5165 echo "# 5166# group.adjunct 5167# " >> $MAP_FILE 5168 5169 for _DMN in $PRESENT_IN_DOMAINS 5170 do 5171 5172 echo "\ 5173nisLDAPfieldFromAttribute group.adjunct.byname,${_DMN}: \\ 5174 rf_key=cn, \\ 5175 name=cn, \\ 5176 (\"{crypt}%s\", passwd)=userPassword 5177" >> $MAP_FILE 5178 5179 done 5180 5181 fi 5182 5183fi 5184 5185echo ' 5186# hosts 5187nisLDAPfieldFromAttribute hosts.byaddr: \ 5188 rf_ipkey=ipHostNumber 5189nisLDAPfieldFromAttribute hosts.byname: \ 5190 (rf_key)=(cn) 5191nisLDAPfieldFromAttribute hosts: \ 5192 ("cn=%s+ipHostNumber=*", canonicalName)=dn, \ 5193 addr=ipHostNumber, \ 5194 aliases=("%s ", (cn) - yp:canonicalName, " "), \ 5195 rf_comment=description 5196 5197nisLDAPfieldFromAttribute multihosts: \ 5198 ("cn=%s+ipHostNumber=*", canonicalName)=dn, \ 5199 (rf_key)=("YP_MULTI_%s", cn), \ 5200 aliases=("%s ", (cn) - yp:canonicalName, " "), \ 5201 rf_comment=description, \ 5202 (tmp)=("%s", ipHostNumber:?one?("(&(cn=%s) \ 5203 (ipHostNumber=*.*))", yp:canonicalName)), \ 5204 addr=("%s,", (yp:tmp), ",") 5205 5206# ipnodes 5207nisLDAPfieldFromAttribute ipnodes.byaddr: \ 5208 rf_ipkey=ipHostNumber 5209nisLDAPfieldFromAttribute ipnodes.byname: \ 5210 (rf_key)=(cn) 5211nisLDAPfieldFromAttribute ipnodes: \ 5212 ("cn=%s+ipHostNumber=*", canonicalName)=dn, \ 5213 addr=ipHostNumber, \ 5214 aliases=("%s ", (cn) - yp:canonicalName, " "), \ 5215 rf_comment=description 5216 5217nisLDAPfieldFromAttribute multiipnodes: \ 5218 ("cn=%s+ipHostNumber=*", canonicalName)=dn, \ 5219 (rf_key)=("YP_MULTI_%s", cn), \ 5220 aliases=("%s ", (cn) - yp:canonicalName, " "), \ 5221 rf_comment=description, \ 5222 (tmp)=("%s", ipHostNumber:?one?("(&(cn=%s) \ 5223 (ipHostNumber=*:*))", yp:canonicalName)), \ 5224 addr=("%s,", (yp:tmp), ",") 5225 5226#mail.aliases 5227nisLDAPfieldFromAttribute mail.aliases: \ 5228 rf_key=mail, \ 5229 addresses= ("%s,", (mgrprfc822mailmember), ","), \ 5230 rf_comment=description 5231 5232#mail.mapping 5233nisLDAPfieldFromAttribute mail.mapping: \ 5234 rf_key=mgrprfc822mailmember, \ 5235 address=mail, \ 5236 rf_comment=description 5237 5238# netgroup. 5239nisLDAPfieldFromAttribute netgroup: \ 5240 rf_key=cn, \ 5241 (group)=(memberNisNetgroup), \ 5242 ("(%s,%s,%s)", host, user, domain)= \ 5243 (nisNetgroupTriple), \ 5244 rf_comment=description 5245 5246# netid.pass 5247nisLDAPfieldFromAttribute netid.pass: \ 5248 number=uidNumber, \ 5249 (tmp)=("%s", gidNumber:ou=group,?one?\ 5250 ("memberUid=%s", ldap:uid)), \ 5251 sgid=("%s,", (yp:tmp) - gidNumber, ","), \ 5252 data=("%s,%s", gidNumber, yp:sgid), \ 5253 data=gidNumber, \ 5254 (rf_key)=("unix.%s@%s", yp:number, yp:rf_domain) 5255 5256# netid.host 5257nisLDAPfieldFromAttribute netid.host: \ 5258 ("cn=%s+ipHostNumber=*", data)=dn, \ 5259 number=("0"), \ 5260 (rf_key)=("unix.%s@%s", yp:data, yp:rf_domain) 5261 5262# netmasks.byaddr 5263nisLDAPfieldFromAttribute netmasks.byaddr: \ 5264 ("ipNetworkNumber=%s,*", rf_ipkey)=dn, \ 5265 mask=ipNetmaskNumber, \ 5266 rf_comment=description 5267 5268# networks. 5269nisLDAPfieldFromAttribute networks.byname: \ 5270 (rf_key)=(cn) 5271nisLDAPfieldFromAttribute networks.byaddr: \ 5272 ("ipNetworkNumber=%s,*", rf_key)=dn 5273nisLDAPfieldFromAttribute networks: \ 5274 name=cn, \ 5275 aliases=("%s ", (cn) - yp:name, " "), \ 5276 number=ipNetworkNumber, \ 5277 rf_comment=description 5278' >> $MAP_FILE 5279 5280# passwd syntax is different when passwd.adjunct map is present. 5281# So, need to handle the various possibilities 5282 5283_MAP=passwd.adjunct.byname 5284 5285if ! present $_MAP $ALL_DMN_DEF_MAPLIST 5286then 5287 5288 # Just put the passwd.adjunct syntax in comment form 5289 5290 echo '# passwd 5291nisLDAPfieldFromAttribute passwd.byname: \ 5292 rf_key=uid 5293nisLDAPfieldFromAttribute passwd.byuid: \ 5294 rf_key=uidNumber 5295nisLDAPfieldFromAttribute passwd: \ 5296 name=uid, \ 5297 uid=uidNumber, \ 5298 ("{crypt}%s", passwd)=userPassword, \ 5299 gid=gidNumber, \ 5300 gecos=gecos, \ 5301 home=homeDirectory, \ 5302 shell=loginShell 5303 5304# 5305# If you are using passwd.adjunct, comment the passwd section above 5306# and uncomment the following passwd and passwd.adjunct sections 5307# 5308# passwd 5309#nisLDAPfieldFromAttribute passwd.byname: \ 5310# rf_key=uid 5311#nisLDAPfieldFromAttribute passwd.byuid: \ 5312# rf_key=uidNumber 5313#nisLDAPfieldFromAttribute passwd: \ 5314# name=uid, \ 5315# uid=uidNumber, \ 5316# passwd=("##%s", uid), \ 5317# gid=gidNumber, \ 5318# gecos=gecos, \ 5319# home=homeDirectory, \ 5320# shell=loginShell 5321 5322# passwd.adjunct 5323#nisLDAPfieldFromAttribute passwd.adjunct.byname: \ 5324# rf_key=uid, \ 5325# name=uid, \ 5326# ("{crypt}%s", passwd)=userPassword 5327' >> $MAP_FILE 5328 5329else 5330 5331 # Find the domains in which passwd.adjunct map exists. 5332 find_domains $_MAP DEF_MAPS 5333 5334 if [ $PRESENT_COUNT -eq $N2L_DMN_CNT ] 5335 then 5336 5337 # All the domains have passwd.adjunct map. So, put the right 5338 # passwd syntax and comment-in the passwd.adjunct syntax. 5339 5340 5341 echo '# passwd 5342#nisLDAPfieldFromAttribute passwd.byname: \ 5343# rf_key=uid 5344#nisLDAPfieldFromAttribute passwd.byuid: \ 5345# rf_key=uidNumber 5346#nisLDAPfieldFromAttribute passwd: \ 5347# name=uid, \ 5348# uid=uidNumber, \ 5349# ("{crypt}%s", passwd)=userPassword, \ 5350# gid=gidNumber, \ 5351# gecos=gecos, \ 5352# home=homeDirectory, \ 5353# shell=loginShell 5354 5355# 5356# If you are not using passwd.adjunct, uncomment the passwd section 5357# above and comment the following passwd and passwd.adjunct sections 5358# 5359# passwd 5360nisLDAPfieldFromAttribute passwd.byname: \ 5361 rf_key=uid 5362nisLDAPfieldFromAttribute passwd.byuid: \ 5363 rf_key=uidNumber 5364nisLDAPfieldFromAttribute passwd: \ 5365 name=uid, \ 5366 uid=uidNumber, \ 5367 passwd=("##%s", uid), \ 5368 gid=gidNumber, \ 5369 gecos=gecos, \ 5370 home=homeDirectory, \ 5371 shell=loginShell 5372 5373# 5374# passwd.adjunct Must follow passwd 5375# 5376nisLDAPfieldFromAttribute passwd.adjunct.byname: \ 5377 rf_key=uid, \ 5378 name=uid, \ 5379 ("{crypt}%s", passwd)=userPassword 5380' >> $MAP_FILE 5381 5382 else 5383 # Not every domain has passwd.adjunct map. 5384 5385 # First put the password syntax with domain name for domains 5386 # in which passwd.adjunct exists. 5387 5388 echo "# passwd" >> $MAP_FILE 5389 5390 for _DMN in $PRESENT_IN_DOMAINS 5391 do 5392 5393 echo "\ 5394nisLDAPfieldFromAttribute passwd.byname,${_DMN}: \\ 5395 rf_key=uid 5396nisLDAPfieldFromAttribute passwd.byuid,${_DMN}: \\ 5397 rf_key=uidNumber 5398nisLDAPfieldFromAttribute passwd,${_DMN}: \\ 5399 name=uid, \\ 5400 uid=uidNumber, \\ 5401 passwd=(\"##%s\", uid), \\ 5402 gid=gidNumber, \\ 5403 gecos=gecos, \\ 5404 home=homeDirectory, \\ 5405 shell=loginShell 5406" >> $MAP_FILE 5407 done 5408 5409 # Now put the other passwd syntax. We do not need to 5410 # append the domain name here. 5411 5412 echo ' 5413nisLDAPfieldFromAttribute passwd.byname: \ 5414 rf_key=uid 5415nisLDAPfieldFromAttribute passwd.byuid: \ 5416 rf_key=uidNumber 5417nisLDAPfieldFromAttribute passwd: \ 5418 name=uid, \ 5419 uid=uidNumber, \ 5420 ("{crypt}%s", passwd)=userPassword, \ 5421 gid=gidNumber, \ 5422 gecos=gecos, \ 5423 home=homeDirectory, \ 5424 shell=loginShell 5425' >> $MAP_FILE 5426 5427 # Now we need to put the passwd.adjunct syntax for domains 5428 # in which this map exists. 5429 5430 echo "# 5431# passwd.adjunct Must follow passwd 5432# " >> $MAP_FILE 5433 5434 for _DMN in $PRESENT_IN_DOMAINS 5435 do 5436 5437 echo "\ 5438nisLDAPfieldFromAttribute passwd.adjunct.byname,${_DMN}: \\ 5439 rf_key=uid, \\ 5440 name=uid, \\ 5441 (\"{crypt}%s\", passwd)=userPassword 5442" >> $MAP_FILE 5443 5444 done 5445 5446 fi 5447 5448fi 5449 5450echo ' 5451# This map is never created but yppasswd uses the mapping to extract password 5452# ageing information from the DIT. 5453nisLDAPfieldFromAttribute ageing.byname: \ 5454 rf_key=uid, \ 5455 name=uid, \ 5456 lastchg=shadowLastChange, \ 5457 min=shadowMin, \ 5458 max=shadowMax, \ 5459 warn=shadowWarning, \ 5460 inactive=shadowInactive, \ 5461 expire=shadowExpire, \ 5462 flag=shadowFlag 5463 5464# printers.conf.byname 5465nisLDAPfieldFromAttribute printers.conf.byname: \ 5466 rf_key=printer-uri, \ 5467 names=("%s|", (printer-aliases), "|"), \ 5468 bsdaddr=("bsdaddr=%s", sun-printer-bsdaddr), \ 5469 kvps=("%s:", (sun-printer-kvp) - yp:bsdaddr), \ 5470 values=("%s:%s", yp:bsdaddr, yp:kvps), \ 5471 values=("%s:", yp:bsdaddr), \ 5472 values=yp:kvps, \ 5473 rf_comment=description 5474 5475# prof_attr 5476nisLDAPfieldFromAttribute prof_attr: \ 5477 rf_key=cn, \ 5478 name=cn, \ 5479 res1=SolarisAttrReserved1, \ 5480 res2=SolarisAttrReserved2, \ 5481 desc=SolarisAttrLongDesc, \ 5482 attrs=SolarisAttrKeyValue 5483 5484# project 5485nisLDAPfieldFromAttribute project.byname: \ 5486 rf_key=SolarisProjectName 5487nisLDAPfieldFromAttribute project.byprojid: \ 5488 rf_key=SolarisProjectID 5489nisLDAPfieldFromAttribute project: \ 5490 name=SolarisProjectName, \ 5491 projID=SolarisProjectID, \ 5492 comment=description, \ 5493 users=("%s,", (memberUid), ","), \ 5494 groups=("%s,", (memberGid), ","), \ 5495 attrs=("%s;", (SolarisProjectAttr), ";") 5496 5497# protocols 5498nisLDAPfieldFromAttribute protocols.byname: \ 5499 ("cn=%s,*", rf_key)=dn, \ 5500 (rf_key)=(cn) 5501nisLDAPfieldFromAttribute protocols.bynumber: \ 5502 rf_key=ipProtocolNumber, \ 5503 rf_comment=description 5504nisLDAPfieldFromAttribute protocols: \ 5505 ("cn=%s,*", name)=dn, \ 5506 number=ipProtocolNumber, \ 5507 aliases=("%s ", (cn) - yp:name, " ") 5508 5509# rpc.bynumber 5510nisLDAPfieldFromAttribute rpc.bynumber: \ 5511 rf_key=oncRpcNumber, \ 5512 number=oncRpcNumber, \ 5513 ("cn=%s,*", name)=dn, \ 5514 aliases=("%s ", (cn) - yp:name, " "), \ 5515 rf_comment=description 5516 5517# services 5518nisLDAPfieldFromAttribute services.byname: \ 5519 rf_key = ("%s/%s", ipServicePort, ipServiceProtocol) 5520nisLDAPfieldFromAttribute services.byservicename: \ 5521 (rf_key)=("%s/%s", cn, ipServiceProtocol), \ 5522 (rf_key)=(cn) 5523nisLDAPfieldFromAttribute services: \ 5524 ("cn=%s+ipServiceProtocol=*", name)=dn, \ 5525 protocol=ipServiceProtocol, \ 5526 port=ipServicePort, \ 5527 aliases=("%s ", (cn) - yp:name, " "), \ 5528 rf_comment=description 5529 5530# timezone.byname 5531nisLDAPfieldFromAttribute timezone.byname: \ 5532 rf_key=cn, \ 5533 hostName=cn, \ 5534 zoneName=nisplusTimeZone, \ 5535 rf_comment=description 5536 5537# user_attr 5538nisLDAPfieldFromAttribute user_attr: \ 5539 ("uid=%s,*", rf_key)=dn, \ 5540 ("uid=%s,*", user)=dn, \ 5541 qualifier=SolarisUserAttr, \ 5542 res1=SolarisUserReserved1, \ 5543 res2=SolarisUserReserved2, \ 5544 attrs=SolarisAttrKeyValue 5545 5546# publickey.byname 5547nisLDAPfieldFromAttribute keys.host: \ 5548 ("cn=%s+ipHostNumber=*", cname)=dn, \ 5549 rf_key=("unix.%s@%s", yp:cname, yp:rf_domain), \ 5550 publicKey=nisPublicKey, \ 5551 secretKey=nisSecretKey 5552 5553nisLDAPfieldFromAttribute keys.pass: \ 5554 rf_key=("unix.%s@%s", uidNumber, yp:rf_domain), \ 5555 publicKey=nisPublicKey, \ 5556 secretKey=nisSecretKey 5557 5558nisLDAPfieldFromAttribute keys.nobody: \ 5559 rf_key=uid, \ 5560 publicKey=nisPublicKey, \ 5561 secretKey=nisSecretKey 5562 5563# ypservers. This derived from IPlanet implementation not RFC. 5564nisLDAPfieldFromAttribute ypservers: \ 5565 rf_key=cn 5566' >> $MAP_FILE 5567} 5568 5569 5570# 5571# List all the non-default auto.* and custom maps. 5572# 5573list_auto_and_custom_nisLDAPfieldFromAttribute() 5574{ 5575 5576# auto.* entries are easy. 5577if [ ${#ALL_DMN_AUTO_CUST_MAPS[*]} -gt 0 ]; then 5578 echo "# Non-default custom auto maps (auto.*)\n" >> $MAP_FILE 5579fi 5580 5581for _MAP in ${ALL_DMN_AUTO_CUST_MAPS[*]} 5582do 5583 echo "\ 5584# ${_MAP} 5585nisLDAPfieldFromAttribute ${_MAP}: \\ 5586 rf_key=automountKey, \\ 5587 value=automountInformation 5588" >> $MAP_FILE 5589done 5590 5591# Since we do not have enough information to generate 5592# entries for other custom maps, best we can do is to 5593# log this map names and ask user to take care of them. 5594 5595ask_user_to_update_the_custom_map_entries_too 5596 5597} 5598 5599 5600# 5601# List mapping of named fields from DIT entries 5602# 5603create_nisLDAPfieldFromAttribute() 5604{ 5605 5606[ CUST_CMT_NEEDED -eq 1 ] && echo ' 5607# nisLDAPfieldFromAttribute : It specifies how a NIS entries 5608# field values are derived from LDAP attribute values. 5609# 5610# The format of nisLDAPfieldFromAttribute is : 5611# mapName ":" fieldattrspec *("," fieldattrspec) 5612' >> $MAP_FILE 5613 5614# List all the default entries anyway. 5615list_default_nisLDAPfieldFromAttribute 5616 5617# List all the non-default auto.* and custom maps. 5618list_auto_and_custom_nisLDAPfieldFromAttribute 5619 5620echo " 5621# 5622#------------------------------------------------------------------------------ 5623# 5624" >> $MAP_FILE 5625} 5626 5627 5628 5629# Main function for creating the mapping file 5630create_mapping_file() 5631{ 5632# Ask user the list of domains to be served by N2L 5633create_n2l_domain_list 5634 5635# If there are no N2L domains or none selected, then exit 5636if [ $N2L_DMN_CNT -eq 0 ]; then 5637 echo "There are no domains to serve. No mapping file generated." 5638 return 1 5639fi 5640 5641while : 5642do 5643 get_ans "Enter the mapping file name (h=help):" "${MAP_FILE}" 5644 5645 # If help continue, otherwise break. 5646 case "$ANS" in 5647 [Hh] | help | Help | \?) display_msg new_mapping_file_name_help ;; 5648 * ) break ;; 5649 esac 5650done 5651 5652MAP_FILE=${ANS} 5653[ $DEBUG -eq 1 ] && MAP_FILE = $MAP_FILE 5654 5655# Backup existing mapping file if selected 5656check_back_mapping_file 5657 5658# To prevent from leaving a partial mapping file in case some error 5659# or signal takes place which might result in machine starting in N2L 5660# mode at next reboot, store the output being generated in a temporary 5661# file first, and move it at the final destination only at the end if 5662# everything goes fine. 5663 5664_MAP_FILE=$MAP_FILE 5665MAP_FILE=${TMPDIR}/${TMPMAP}.$$ 5666 5667echo "Generating mapping file temporarily as \"${MAP_FILE}\"" 5668 5669# Place copyright information 5670put_mapping_file_copyright_info 5671 5672 5673# Prepare various map lists for each domain 5674create_map_lists 5675 5676# List domains and contexts 5677get_nisLDAPdomainContext 5678 5679# List domains for which passwords should be changed 5680get_nisLDAPyppasswddDomains 5681 5682# List databaseId mappings (aliases) 5683create_nisLDAPdatabaseIdMapping 5684 5685# List comment character for maps 5686create_nisLDAPcommentChar 5687 5688# List SECURE and INTERDOMAIN flags 5689create_nisLDAPmapFlags 5690 5691# List TTL values 5692 create_nisLDAPentryTtl 5693 5694# List name fields 5695create_nisLDAPnameFields 5696 5697# List split fields and repeated fields seperators. 5698create_split_field_and_repeatedfield_seperators 5699 5700# List association of maps with RDNs and object classes. 5701create_nisLDAPobjectDN 5702 5703# List mapping of named fields to DIT entries 5704create_nisLDAPattributeFromField 5705 5706# List mapping of named fields from DIT entries 5707create_nisLDAPfieldFromAttribute 5708 5709 5710# We are done, so move back the mapping file from temp. location 5711# to actual location. 5712# In case the mapping file name has a directory component which does 5713# not exist, then create it now, otherwise 'mv' will return error. 5714 5715DIR_TO_CREATE=`dirname ${_MAP_FILE}` 5716mkdir -p ${DIR_TO_CREATE} 5717 5718echo "Moving output from temporary file ($MAP_FILE) to actual file ($_MAP_FILE)" 5719mv $MAP_FILE $_MAP_FILE 5720 5721# Revert back the mapping file name in case needed. 5722MAP_FILE=$_MAP_FILE 5723echo "Finished creation of mapping file ( $MAP_FILE )" 5724 5725} 5726 5727 5728# 5729# Main function for creating config file (ypserv) 5730# 5731process_config_file() 5732{ 5733# Ask for confirmation if the file name is not specified. 5734 5735if [ $CONFIG_FILE_SPECIFIED -eq 0 ]; then 5736 display_msg no_config_file_name_specified 5737 5738 get_confirm_nodef "Do you want to create the config file (y/n) ?" 5739 5740 [ $? -eq 0 ] && return 0 5741 5742 while : 5743 do 5744 get_ans "Enter the config file name (h=help):" "${CONFIG_FILE}" 5745 5746 # If help continue, otherwise break. 5747 case "$ANS" in 5748 [Hh] | help | Help | \?) display_msg new_config_file_name_help ;; 5749 * ) break ;; 5750 esac 5751 done 5752 5753 CONFIG_FILE=${ANS} 5754 [ $DEBUG -eq 1 ] && CONFIG_FILE = $CONFIG_FILE 5755 5756fi 5757 5758# Backup existing config file if selected 5759check_back_config_file 5760 5761# Create config file 5762create_config_file 5763} 5764 5765 5766# 5767# Main function for creating mapping file (NISLDAPmapping) 5768# 5769process_mapping_file() 5770{ 5771# Ask for confirmation if the file name is not specified. 5772 5773if [ $MAPPING_FILE_SPECIFIED -eq 0 ]; then 5774 display_msg no_mapping_file_name_specified 5775 5776 get_confirm_nodef "Do you want to create the mapping file (y/n) ?" 5777 5778 [ $? -eq 0 ] && return 0 5779 5780 5781fi 5782 5783# Create mapping file 5784create_mapping_file 5785} 5786 5787########################################### 5788########### MAIN ########### 5789########################################### 5790 5791PROG=`basename $0` # Program name 5792ABS_PROG=$0 # absolute path needed 5793 5794# Only superuser should be able to run this script. 5795is_root_user 5796if [ $? -ne 0 ]; then 5797 echo "ERROR : Only root can run $PROG" 5798 exit 1 5799fi 5800 5801# Initialize things 5802init 5803 5804# Parse command line arguments. 5805parse_arg $* 5806 5807# Create config file (ypserv) 5808process_config_file 5809 5810# Create mapping file (NISLDAPmapping). 5811process_mapping_file 5812 5813# Cleanup temp files and directories unless debug. 5814[ $DEBUG -eq 0 ] && cleanup 5815 5816exit 0 5817