]> git.saurik.com Git - apple/system_cmds.git/blame - chpass.tproj/chpass.c
system_cmds-336.tar.gz
[apple/system_cmds.git] / chpass.tproj / chpass.c
CommitLineData
1815bff5
A
1/*
2 * Copyright (c) 1999 Apple Computer, Inc. All rights reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
2fc1e207
A
6 * "Portions Copyright (c) 1999 Apple Computer, Inc. All Rights
7 * Reserved. This file contains Original Code and/or Modifications of
8 * Original Code as defined in and that are subject to the Apple Public
9 * Source License Version 1.0 (the 'License'). You may not use this file
10 * except in compliance with the License. Please obtain a copy of the
11 * License at http://www.apple.com/publicsource and read it before using
12 * this file.
1815bff5
A
13 *
14 * The Original Code and all software distributed under the License are
15 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
16 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
17 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
2fc1e207
A
18 * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
19 * License for the specific language governing rights and limitations
20 * under the License."
1815bff5
A
21 *
22 * @APPLE_LICENSE_HEADER_END@
23 */
24/*-
25 * Copyright (c) 1990, 1993, 1994
26 * The Regents of the University of California. All rights reserved.
27 *
28 * Redistribution and use in source and binary forms, with or without
29 * modification, are permitted provided that the following conditions
30 * are met:
31 * 1. Redistributions of source code must retain the above copyright
32 * notice, this list of conditions and the following disclaimer.
33 * 2. Redistributions in binary form must reproduce the above copyright
34 * notice, this list of conditions and the following disclaimer in the
35 * documentation and/or other materials provided with the distribution.
36 * 3. All advertising materials mentioning features or use of this software
37 * must display the following acknowledgement:
38 * This product includes software developed by the University of
39 * California, Berkeley and its contributors.
40 * 4. Neither the name of the University nor the names of its contributors
41 * may be used to endorse or promote products derived from this software
42 * without specific prior written permission.
43 *
44 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
45 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
46 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
47 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
48 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
49 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
50 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
51 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
52 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
53 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
54 * SUCH DAMAGE.
55 */
56
57#ifndef lint
58static char copyright[] =
59"@(#) Copyright (c) 1988, 1993, 1994\n\
60 The Regents of the University of California. All rights reserved.\n";
61#endif /* not lint */
62
63#include <sys/param.h>
64#include <sys/stat.h>
65#include <sys/signal.h>
66#include <sys/time.h>
67#include <sys/resource.h>
68
69#include <ctype.h>
70#include <err.h>
71#include <errno.h>
72#include <fcntl.h>
73#include <pwd.h>
74#include <stdio.h>
75#include <stdlib.h>
76#include <string.h>
77#include <unistd.h>
78
79#include <pw_scan.h>
80#include <pw_util.h>
81#include "pw_copy.h"
82
83#include "chpass.h"
84#include "pathnames.h"
c3a08f59
A
85#ifdef DIRECTORY_SERVICE
86#include "directory_service.h"
87
88#define PWSETFIELD(field, in, out) if(in->field) out.field = strdup(in->field)
89#endif /* DIRECTORY_SERVICE */
1815bff5
A
90
91char *progname = "chpass";
92char *tempname;
93uid_t uid;
c3a08f59
A
94#ifdef DIRECTORY_SERVICE
95int dswhere;
96#endif /* DIRECTORY_SERVICE */
1815bff5
A
97
98void baduser __P((void));
99void usage __P((void));
100
101int
102main(argc, argv)
103 int argc;
104 char **argv;
105{
106 enum { NEWSH, LOADENTRY, EDITENTRY } op;
107 struct passwd *pw, lpw;
108 int ch, pfd, tfd;
109 char *arg;
c3a08f59
A
110#ifdef DIRECTORY_SERVICE
111 struct passwd pworig;
2fc1e207 112 char *task_argv[3] = { NULL };
c3a08f59 113#endif /* DIRECTORY_SERVICE */
1815bff5
A
114
115 op = EDITENTRY;
116 while ((ch = getopt(argc, argv, "a:s:")) != EOF)
117 switch(ch) {
118 case 'a':
119 op = LOADENTRY;
120 arg = optarg;
121 break;
122 case 's':
123 op = NEWSH;
124 arg = optarg;
125 break;
126 case '?':
127 default:
128 usage();
129 }
130 argc -= optind;
131 argv += optind;
132
133 uid = getuid();
134
135 if (op == EDITENTRY || op == NEWSH)
c3a08f59
A
136#ifdef DIRECTORY_SERVICE
137 {
138#endif /* DIRECTORY_SERVICE */
1815bff5
A
139 switch(argc) {
140 case 0:
141 if (!(pw = getpwuid(uid)))
142 errx(1, "unknown user: uid %u", uid);
143 break;
144 case 1:
145 if (!(pw = getpwnam(*argv)))
146 errx(1, "unknown user: %s", *argv);
c3a08f59 147#ifndef DIRECTORY_SERVICE
1815bff5
A
148 if (uid && uid != pw->pw_uid)
149 baduser();
c3a08f59 150#endif /* DIRECTORY_SERVICE */
1815bff5
A
151 break;
152 default:
153 usage();
154 }
155
c3a08f59
A
156#ifdef DIRECTORY_SERVICE
157 if ((dswhere = wherepwent(pw->pw_name)) < 0) {
158 if(dswhere > E_NOTFOUND)
159 errc(1, dswhere, "wherepwent");
160 else
161 errx(1, "wherepwent returned %d", dswhere);
162 }
163 switch(dswhere) {
164 case WHERE_REMOTENI:
165 errx(1,
166"Can't change info for user \"%s\", which resides in the\n"
167"netinfo domain \"%s\"",
168 pw->pw_name, DSPath);
169 case WHERE_DS:
170 errx(1,
171"Can't change info for user \"%s\", which resides in the\n"
172"Directory Service path \"%s\"",
173 pw->pw_name, DSPath);
174 case WHERE_NIS:
175 errx(1,
176"Can't change info for user \"%s\", which resides in NIS",
177 pw->pw_name);
178 case WHERE_LOCALNI:
179 pworig = *pw;
180 PWSETFIELD(pw_name, pw, pworig);
181 PWSETFIELD(pw_passwd, pw, pworig);
182 PWSETFIELD(pw_class, pw, pworig);
183 PWSETFIELD(pw_gecos, pw, pworig);
184 PWSETFIELD(pw_dir, pw, pworig);
185 PWSETFIELD(pw_shell, pw, pworig);
186 /* drop through */
187 default:
188 if (uid && uid != pw->pw_uid)
189 baduser();
190 }
191 }
192#endif /* DIRECTORY_SERVICE */
193
1815bff5
A
194 if (op == NEWSH) {
195 /* protect p_shell -- it thinks NULL is /bin/sh */
196 if (!arg[0])
197 usage();
198 if (p_shell(arg, pw, (ENTRY *)NULL))
199 pw_error((char *)NULL, 0, 1);
200 }
201
202 if (op == LOADENTRY) {
c3a08f59
A
203#ifdef DIRECTORY_SERVICE
204 warnx("-a is only supported for %s", MasterPasswd);
205 dswhere = WHERE_FILES;
206#endif /* DIRECTORY_SERVICE */
1815bff5
A
207 if (uid)
208 baduser();
209 pw = &lpw;
c3a08f59 210 if (!pw_scan(arg, pw, NULL))
1815bff5
A
211 exit(1);
212 }
213
214 /*
215 * The temporary file/file descriptor usage is a little tricky here.
216 * 1: We start off with two fd's, one for the master password
217 * file (used to lock everything), and one for a temporary file.
218 * 2: Display() gets an fp for the temporary file, and copies the
219 * user's information into it. It then gives the temporary file
220 * to the user and closes the fp, closing the underlying fd.
221 * 3: The user edits the temporary file some number of times.
222 * 4: Verify() gets an fp for the temporary file, and verifies the
223 * contents. It can't use an fp derived from the step #2 fd,
224 * because the user's editor may have created a new instance of
225 * the file. Once the file is verified, its contents are stored
226 * in a password structure. The verify routine closes the fp,
227 * closing the underlying fd.
228 * 5: Delete the temporary file.
229 * 6: Get a new temporary file/fd. Pw_copy() gets an fp for it
230 * file and copies the master password file into it, replacing
231 * the user record with a new one. We can't use the first
232 * temporary file for this because it was owned by the user.
233 * Pw_copy() closes its fp, flushing the data and closing the
234 * underlying file descriptor. We can't close the master
235 * password fp, or we'd lose the lock.
236 * 7: Call pw_mkdb() (which renames the temporary file) and exit.
237 * The exit closes the master passwd fp/fd.
238 */
239 pw_init();
c3a08f59
A
240#ifdef DIRECTORY_SERVICE
241 if (dswhere == WHERE_FILES)
242#endif /* DIRECTORY_SERVICE */
243 pfd = pw_lock();
1815bff5
A
244 tfd = pw_tmp();
245
246 if (op == EDITENTRY) {
c3a08f59
A
247#ifdef DIRECTORY_SERVICE
248 setrestricted(dswhere, pw);
249#endif /* DIRECTORY_SERVICE */
1815bff5
A
250 display(tfd, pw);
251 edit(pw);
252 (void)unlink(tempname);
c3a08f59
A
253#ifdef DIRECTORY_SERVICE
254 if (dswhere == WHERE_FILES)
255#endif /* DIRECTORY_SERVICE */
256 tfd = pw_tmp();
1815bff5
A
257 }
258
c3a08f59
A
259#ifdef DIRECTORY_SERVICE
260 switch (dswhere) {
261 case WHERE_LOCALNI:
262 update_local_ni(&pworig, pw);
263 break;
264 case WHERE_FILES:
265#endif /* DIRECTORY_SERVICE */
266 pw_copy(pfd, tfd, pw);
1815bff5 267
c3a08f59
A
268 if (pw_mkdb() != 0)
269 pw_error((char *)NULL, 0, 1);
270#ifdef DIRECTORY_SERVICE
271 }
2fc1e207
A
272 task_argv[0] = "/usr/sbin/lookupd";
273 task_argv[1] = "-flushcache";
274 task_argv[2] = NULL;
275 LaunchTaskWithPipes( task_argv[0], task_argv, NULL, NULL );
c3a08f59 276#endif /* DIRECTORY_SERVICE */
1815bff5
A
277 exit(0);
278}
279
2fc1e207
A
280#ifdef DIRECTORY_SERVICE
281// read from 0
282int LaunchTaskWithPipes(const char *path, char *const argv[], int *outPipe0, int *outPipe1)
283{
284 int outputPipe[2];
285 pid_t pid;
286
287 if (outPipe0 != NULL)
288 pipe(outputPipe);
289
290 pid = fork();
291 if (pid == -1)
292 return -1;
293
294 /* Handle the child */
295 if (pid == 0)
296 {
297 int result = -1;
298
299 if (outPipe0 != NULL)
300 dup2(outputPipe[1], fileno(stdout));
301
302 result = execv(path, argv);
303 if (result == -1) {
304 _exit(1);
305 }
306
307 /* This should never be reached */
308 _exit(1);
309 }
310
311 /* Now the parent */
312 if ( outPipe0 != NULL )
313 *outPipe0 = outputPipe[0];
314 if ( outPipe1 != NULL )
315 *outPipe1 = outputPipe[1];
316
317 return 0;
318}
319#endif /* DIRECTORY_SERVICE */
320
1815bff5
A
321void
322baduser()
323{
324
325 errx(1, "%s", strerror(EACCES));
326}
327
328void
329usage()
330{
331
332 (void)fprintf(stderr, "usage: chpass [-a list] [-s shell] [user]\n");
333 exit(1);
334}