]>
git.cameronkatri.com Git - pw-darwin.git/blob - pw/pw_group.c
3 * David L. Nugent. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY DAVID L. NUGENT AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL DAVID L. NUGENT OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * $Id: pw_group.c,v 1.2 1996/12/19 15:22:44 davidn Exp $
38 static int print_group(struct group
* grp
, int pretty
);
39 static gid_t
gr_gidpolicy(struct userconf
* cnf
, struct cargs
* args
);
42 pw_group(struct userconf
* cnf
, int mode
, struct cargs
* args
)
44 struct carg
*a_name
= getarg(args
, 'n');
45 struct carg
*a_gid
= getarg(args
, 'g');
47 struct group
*grp
= NULL
;
49 char **members
= NULL
;
51 static struct group fakegroup
=
60 * With M_NEXT, we only need to return the
65 gid_t next
= gr_gidpolicy(cnf
, args
);
66 if (getarg(args
, 'q'))
68 printf("%ld\n", (long)next
);
72 if (mode
== M_PRINT
&& getarg(args
, 'a')) {
73 int pretty
= getarg(args
, 'P') != NULL
;
76 while ((grp
= getgrent()) != NULL
)
77 print_group(grp
, pretty
);
83 cmderr(EX_DATAERR
, "group name or id required\n");
85 if (mode
!= M_ADD
&& grp
== NULL
&& isdigit(*a_name
->val
)) {
86 (a_gid
= a_name
)->ch
= 'g';
90 grp
= (a_name
!= NULL
) ? getgrnam(a_name
->val
) : getgrgid((gid_t
) atoi(a_gid
->val
));
92 if (mode
== M_UPDATE
|| mode
== M_DELETE
|| mode
== M_PRINT
) {
93 if (a_name
== NULL
&& grp
== NULL
) /* Try harder */
94 grp
= getgrgid(atoi(a_gid
->val
));
97 if (mode
== M_PRINT
&& getarg(args
, 'F')) {
100 fakegroup
.gr_name
= a_name
? a_name
->val
: "nogroup";
101 fakegroup
.gr_gid
= a_gid
? (gid_t
) atol(a_gid
->val
) : -1;
102 fakegroup
.gr_mem
= fmems
;
103 return print_group(&fakegroup
, getarg(args
, 'P') != NULL
);
105 cmderr(EX_DATAERR
, "unknown group `%s'\n", a_name
? a_name
->val
: a_gid
->val
);
107 if (a_name
== NULL
) /* Needed later */
108 a_name
= addarg(args
, 'n', grp
->gr_name
);
111 * Handle deletions now
113 if (mode
== M_DELETE
) {
114 gid_t gid
= grp
->gr_gid
;
116 if (delgrent(grp
) == -1)
117 cmderr(EX_IOERR
, "Error updating group file: %s\n", strerror(errno
));
118 pw_log(cnf
, mode
, W_GROUP
, "%s(%ld) removed", a_name
->val
, (long) gid
);
120 } else if (mode
== M_PRINT
)
121 return print_group(grp
, getarg(args
, 'P') != NULL
);
124 grp
->gr_gid
= (gid_t
) atoi(a_gid
->val
);
126 if ((arg
= getarg(args
, 'l')) != NULL
)
127 grp
->gr_name
= pw_checkname((u_char
*)arg
->val
, 0);
129 if (a_name
== NULL
) /* Required */
130 cmderr(EX_DATAERR
, "group name required\n");
131 else if (grp
!= NULL
) /* Exists */
132 cmderr(EX_DATAERR
, "group name `%s' already exists\n", a_name
->val
);
134 extendarray(&members
, &grmembers
, 200);
137 grp
->gr_name
= pw_checkname((u_char
*)a_name
->val
, 0);
138 grp
->gr_passwd
= "*";
139 grp
->gr_gid
= gr_gidpolicy(cnf
, args
);
140 grp
->gr_mem
= members
;
144 * This allows us to set a group password Group passwords is an
145 * antique idea, rarely used and insecure (no secure database) Should
146 * be discouraged, but it is apparently still supported by some
150 if ((arg
= getarg(args
, 'h')) != NULL
) {
151 if (strcmp(arg
->val
, "-") == 0)
152 grp
->gr_passwd
= "*"; /* No access */
154 int fd
= atoi(arg
->val
);
156 int istty
= isatty(fd
);
161 if (tcgetattr(fd
, &t
) == -1)
164 struct termios n
= t
;
167 n
.c_lflag
&= ~(ECHO
);
168 tcsetattr(fd
, TCSANOW
, &n
);
169 printf("%sassword for group %s:", (mode
== M_UPDATE
) ? "New p" : "P", grp
->gr_name
);
173 b
= read(fd
, line
, sizeof(line
) - 1);
174 if (istty
) { /* Restore state */
175 tcsetattr(fd
, TCSANOW
, &t
);
180 perror("-h file descriptor");
184 if ((p
= strpbrk(line
, " \t\r\n")) != NULL
)
187 cmderr(EX_DATAERR
, "empty password read on file descriptor %d\n", fd
);
188 grp
->gr_passwd
= pw_pwcrypt(line
);
192 if (((arg
= getarg(args
, 'M')) != NULL
|| (arg
= getarg(args
, 'm')) != NULL
) && arg
->val
) {
197 /* Make sure this is not stay NULL with -M "" */
198 extendarray(&members
, &grmembers
, 200);
199 if (arg
->ch
== 'm') {
202 while (grp
->gr_mem
[k
] != NULL
) {
203 if (extendarray(&members
, &grmembers
, i
+ 2) != -1) {
204 members
[i
++] = grp
->gr_mem
[k
];
209 for (p
= strtok(arg
->val
, ", \t"); p
!= NULL
; p
= strtok(NULL
, ", \t")) {
211 if ((pwd
= getpwnam(p
)) == NULL
) {
212 if (!isdigit(*p
) || (pwd
= getpwuid((uid_t
) atoi(p
))) == NULL
)
213 cmderr(EX_NOUSER
, "user `%s' does not exist\n", p
);
216 * Check for duplicates
218 for (j
= 0; j
< i
&& strcmp(members
[j
], pwd
->pw_name
)!=0; j
++)
220 if (j
== i
&& extendarray(&members
, &grmembers
, i
+ 2) != -1)
221 members
[i
++] = newstr(pwd
->pw_name
);
223 while (i
< grmembers
)
225 grp
->gr_mem
= members
;
228 if (getarg(args
, 'N') != NULL
)
229 return print_group(grp
, getarg(args
, 'P') != NULL
);
231 if ((mode
== M_ADD
&& !addgrent(grp
)) || (mode
== M_UPDATE
&& !chggrent(a_name
->val
, grp
))) {
232 perror("group update");
235 /* grp may have been invalidated */
236 if ((grp
= getgrnam(a_name
->val
)) == NULL
)
237 cmderr(EX_SOFTWARE
, "group disappeared during update\n");
239 pw_log(cnf
, mode
, W_GROUP
, "%s(%ld)", grp
->gr_name
, (long) grp
->gr_gid
);
249 gr_gidpolicy(struct userconf
* cnf
, struct cargs
* args
)
252 gid_t gid
= (gid_t
) - 1;
253 struct carg
*a_gid
= getarg(args
, 'g');
256 * Check the given gid, if any
259 gid
= (gid_t
) atol(a_gid
->val
);
261 if ((grp
= getgrgid(gid
)) != NULL
&& getarg(args
, 'o') == NULL
)
262 cmderr(EX_DATAERR
, "gid `%ld' has already been allocated\n", (long) grp
->gr_gid
);
267 * We need to allocate the next available gid under one of
268 * two policies a) Grab the first unused gid b) Grab the
269 * highest possible unused gid
271 if (cnf
->min_gid
>= cnf
->max_gid
) { /* Sanity claus^H^H^H^Hheck */
273 cnf
->max_gid
= 32000;
275 bm
= bm_alloc(cnf
->max_gid
- cnf
->min_gid
+ 1);
278 * Now, let's fill the bitmap from the password file
281 while ((grp
= getgrent()) != NULL
)
282 if (grp
->gr_gid
>= (int) cnf
->min_gid
&& grp
->gr_gid
<= (int) cnf
->max_gid
)
283 bm_setbit(&bm
, grp
->gr_gid
- cnf
->min_gid
);
287 * Then apply the policy, with fallback to reuse if necessary
290 gid
= (gid_t
) (bm_firstunset(&bm
) + cnf
->min_gid
);
292 gid
= (gid_t
) (bm_lastset(&bm
) + 1);
293 if (!bm_isset(&bm
, gid
))
296 gid
= (gid_t
) (bm_firstunset(&bm
) + cnf
->min_gid
);
300 * Another sanity check
302 if (gid
< cnf
->min_gid
|| gid
> cnf
->max_gid
)
303 cmderr(EX_SOFTWARE
, "unable to allocate a new gid - range fully used\n");
311 print_group(struct group
* grp
, int pretty
)
317 fmtgrent(&buf
, &buflen
, grp
);
323 printf("Group Name: %-10s #%lu\n"
325 grp
->gr_name
, (long) grp
->gr_gid
);
326 for (i
= 0; grp
->gr_mem
[i
]; i
++)
327 printf("%s%s", i
? "," : "", grp
->gr_mem
[i
]);
328 fputs("\n\n", stdout
);