]> git.ipfire.org Git - thirdparty/util-linux.git/blob - login-utils/vipw.c
Merge branch '2016-03-02/cgns' of https://github.com/hallyn/util-linux
[thirdparty/util-linux.git] / login-utils / vipw.c
1 /*
2 * Copyright (c) 1987 Regents of the University of California.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * Updated Thu Oct 12 09:56:55 1995 by faith@cs.unc.edu with security
34 * patches from Zefram <A.Main@dcs.warwick.ac.uk>
35 *
36 * Updated Thu Nov 9 21:58:53 1995 by Martin Schulze
37 * <joey@finlandia.infodrom.north.de>. Support for vigr.
38 *
39 * Martin Schulze's patches adapted to Util-Linux by Nicolai Langfeldt.
40 *
41 * 1999-02-22 Arkadiusz Miƛkiewicz <misiek@pld.ORG.PL>
42 * - added Native Language Support
43 * Sun Mar 21 1999 - Arnaldo Carvalho de Melo <acme@conectiva.com.br>
44 * - fixed strerr(errno) in gettext calls
45 */
46
47 #include <errno.h>
48 #include <fcntl.h>
49 #include <paths.h>
50 #include <pwd.h>
51 #include <shadow.h>
52 #include <signal.h>
53 #include <stdio.h>
54 #include <stdlib.h>
55 #include <string.h>
56 #include <sys/file.h>
57 #include <sys/param.h>
58 #include <sys/resource.h>
59 #include <sys/stat.h>
60 #include <sys/time.h>
61 #include <sys/types.h>
62 #include <sys/wait.h>
63 #include <unistd.h>
64
65 #include "c.h"
66 #include "fileutils.h"
67 #include "closestream.h"
68 #include "nls.h"
69 #include "setpwnam.h"
70 #include "strutils.h"
71 #include "xalloc.h"
72 #include "rpmatch.h"
73
74 #ifdef HAVE_LIBSELINUX
75 # include <selinux/selinux.h>
76 #endif
77
78 #define FILENAMELEN 67
79
80 enum {
81 VIPW,
82 VIGR
83 };
84 int program;
85 char orig_file[FILENAMELEN]; /* original file /etc/passwd or /etc/group */
86 char *tmp_file; /* tmp file */
87
88 void pw_error (char *, int, int);
89
90 static void copyfile(int from, int to)
91 {
92 int nr, nw, off;
93 char buf[8 * 1024];
94
95 while ((nr = read(from, buf, sizeof(buf))) > 0)
96 for (off = 0; off < nr; nr -= nw, off += nw)
97 if ((nw = write(to, buf + off, nr)) < 0)
98 pw_error(tmp_file, 1, 1);
99
100 if (nr < 0)
101 pw_error(orig_file, 1, 1);
102 }
103
104 static void pw_init(void)
105 {
106 struct rlimit rlim;
107
108 /* Unlimited resource limits. */
109 rlim.rlim_cur = rlim.rlim_max = RLIM_INFINITY;
110 (void)setrlimit(RLIMIT_CPU, &rlim);
111 (void)setrlimit(RLIMIT_FSIZE, &rlim);
112 (void)setrlimit(RLIMIT_STACK, &rlim);
113 (void)setrlimit(RLIMIT_DATA, &rlim);
114 (void)setrlimit(RLIMIT_RSS, &rlim);
115
116 /* Don't drop core (not really necessary, but GP's). */
117 rlim.rlim_cur = rlim.rlim_max = 0;
118 (void)setrlimit(RLIMIT_CORE, &rlim);
119
120 /* Turn off signals. */
121 (void)signal(SIGALRM, SIG_IGN);
122 (void)signal(SIGHUP, SIG_IGN);
123 (void)signal(SIGINT, SIG_IGN);
124 (void)signal(SIGPIPE, SIG_IGN);
125 (void)signal(SIGQUIT, SIG_IGN);
126 (void)signal(SIGTERM, SIG_IGN);
127 (void)signal(SIGTSTP, SIG_IGN);
128 (void)signal(SIGTTOU, SIG_IGN);
129
130 /* Create with exact permissions. */
131 (void)umask(0);
132 }
133
134 static FILE * pw_tmpfile(int lockfd)
135 {
136 FILE *fd;
137 char *tmpname = NULL;
138
139 if ((fd = xfmkstemp(&tmpname, "/etc", ".vipw")) == NULL) {
140 ulckpwdf();
141 err(EXIT_FAILURE, _("can't open temporary file"));
142 }
143
144 copyfile(lockfd, fileno(fd));
145 tmp_file = tmpname;
146 return fd;
147 }
148
149 static void pw_write(void)
150 {
151 char tmp[FILENAMELEN + 4];
152
153 sprintf(tmp, "%s%s", orig_file, ".OLD");
154 unlink(tmp);
155
156 if (link(orig_file, tmp))
157 warn(_("%s: create a link to %s failed"), orig_file, tmp);
158
159 #ifdef HAVE_LIBSELINUX
160 if (is_selinux_enabled() > 0) {
161 security_context_t passwd_context = NULL;
162 int ret = 0;
163 if (getfilecon(orig_file, &passwd_context) < 0) {
164 warnx(_("Can't get context for %s"), orig_file);
165 pw_error(orig_file, 1, 1);
166 }
167 ret = setfilecon(tmp_file, passwd_context);
168 freecon(passwd_context);
169 if (ret != 0) {
170 warnx(_("Can't set context for %s"), tmp_file);
171 pw_error(tmp_file, 1, 1);
172 }
173 }
174 #endif
175
176 if (rename(tmp_file, orig_file) == -1) {
177 int errsv = errno;
178 errx(EXIT_FAILURE,
179 ("cannot write %s: %s (your changes are still in %s)"),
180 orig_file, strerror(errsv), tmp_file);
181 }
182 unlink(tmp_file);
183 free(tmp_file);
184 }
185
186 static void pw_edit(void)
187 {
188 int pstat;
189 pid_t pid;
190 char *p, *editor, *tk;
191
192 editor = getenv("EDITOR");
193 editor = xstrdup(editor ? editor : _PATH_VI);
194
195 tk = strtok(editor, " \t");
196 if (tk && (p = strrchr(tk, '/')) != NULL)
197 ++p;
198 else
199 p = editor;
200
201 pid = fork();
202 if (pid < 0)
203 err(EXIT_FAILURE, _("fork failed"));
204
205 if (!pid) {
206 execlp(editor, p, tmp_file, NULL);
207 /* Shouldn't get here */
208 _exit(EXIT_FAILURE);
209 }
210 for (;;) {
211 pid = waitpid(pid, &pstat, WUNTRACED);
212 if (WIFSTOPPED(pstat)) {
213 /* the editor suspended, so suspend us as well */
214 kill(getpid(), SIGSTOP);
215 kill(pid, SIGCONT);
216 } else {
217 break;
218 }
219 }
220 if (pid == -1 || !WIFEXITED(pstat) || WEXITSTATUS(pstat) != 0)
221 pw_error(editor, 1, 1);
222
223 free(editor);
224 }
225
226 void __attribute__((__noreturn__))
227 pw_error(char *name, int err, int eval)
228 {
229 if (err) {
230 if (name)
231 warn("%s: ", name);
232 else
233 warn(NULL);
234 }
235 warnx(_("%s unchanged"), orig_file);
236 unlink(tmp_file);
237 ulckpwdf();
238 exit(eval);
239 }
240
241 static void edit_file(int is_shadow)
242 {
243 struct stat begin, end;
244 int passwd_file, ch_ret;
245 FILE *tmp_fd;
246
247 pw_init();
248
249 /* acquire exclusive lock */
250 if (lckpwdf() < 0)
251 err(EXIT_FAILURE, _("cannot get lock"));
252
253 passwd_file = open(orig_file, O_RDONLY, 0);
254 if (passwd_file < 0)
255 err(EXIT_FAILURE, _("cannot open %s"), orig_file);
256 tmp_fd = pw_tmpfile(passwd_file);
257
258 if (fstat(fileno(tmp_fd), &begin))
259 pw_error(tmp_file, 1, 1);
260
261 pw_edit();
262
263 if (fstat(fileno(tmp_fd), &end))
264 pw_error(tmp_file, 1, 1);
265 /* Some editors, such as Vim with 'writebackup' mode enabled,
266 * use "atomic save" in which the old file is deleted and a new
267 * one with the same name created in its place. */
268 if (end.st_nlink == 0) {
269 if (close_stream(tmp_fd) != 0)
270 err(EXIT_FAILURE, _("write error"));
271 tmp_fd = fopen(tmp_file, "r");
272 if (!tmp_file)
273 err(EXIT_FAILURE, _("cannot open %s"), tmp_file);
274 if (fstat(fileno(tmp_fd), &end))
275 pw_error(tmp_file, 1, 1);
276 }
277 if (begin.st_mtime == end.st_mtime) {
278 warnx(_("no changes made"));
279 pw_error((char *)NULL, 0, 0);
280 }
281 /* pw_tmpfile() will create the file with mode 600 */
282 if (!is_shadow)
283 ch_ret = fchmod(fileno(tmp_fd), 0644);
284 else
285 ch_ret = fchmod(fileno(tmp_fd), 0400);
286 if (ch_ret < 0)
287 err(EXIT_FAILURE, "%s: %s", _("cannot chmod file"), orig_file);
288 if (close_stream(tmp_fd) != 0)
289 err(EXIT_FAILURE, _("write error"));
290 pw_write();
291 close(passwd_file);
292 ulckpwdf();
293 }
294
295 static void __attribute__((__noreturn__)) usage(FILE *out)
296 {
297 fputs(USAGE_HEADER, out);
298 fprintf(out, " %s\n", program_invocation_short_name);
299
300 fputs(USAGE_SEPARATOR, out);
301 fputs(_("Edit the password or group file.\n"), out);
302
303 fputs(USAGE_OPTIONS, out);
304 fputs(USAGE_HELP, out);
305 fputs(USAGE_VERSION, out);
306 fprintf(out, USAGE_MAN_TAIL("vipw(8)"));
307 exit(out == stderr ? EXIT_FAILURE : EXIT_SUCCESS);
308 }
309
310 int main(int argc, char *argv[])
311 {
312 setlocale(LC_ALL, "");
313 bindtextdomain(PACKAGE, LOCALEDIR);
314 textdomain(PACKAGE);
315 atexit(close_stdout);
316
317 if (!strcmp(program_invocation_short_name, "vigr")) {
318 program = VIGR;
319 xstrncpy(orig_file, GROUP_FILE, sizeof(orig_file));
320 } else {
321 program = VIPW;
322 xstrncpy(orig_file, PASSWD_FILE, sizeof(orig_file));
323 }
324
325 if (1 < argc) {
326 if (!strcmp(argv[1], "-V") || !strcmp(argv[1], "--version")) {
327 printf(UTIL_LINUX_VERSION);
328 exit(EXIT_SUCCESS);
329 }
330 if (!strcmp(argv[1], "-h") || !strcmp(argv[1], "--help"))
331 usage(stdout);
332 usage(stderr);
333 }
334
335 edit_file(0);
336
337 if (program == VIGR) {
338 strncpy(orig_file, SGROUP_FILE, FILENAMELEN - 1);
339 } else {
340 strncpy(orig_file, SHADOW_FILE, FILENAMELEN - 1);
341 }
342
343 if (access(orig_file, F_OK) == 0) {
344 char response[80];
345
346 fputs((program == VIGR)
347 ? _("You are using shadow groups on this system.\n")
348 : _("You are using shadow passwords on this system.\n"), stdout);
349
350 /* TRANSLATORS: this program uses for y and n rpmatch(3),
351 * which means they can be translated. */
352 printf(_("Would you like to edit %s now [y/n]? "), orig_file);
353
354 if (fgets(response, sizeof(response), stdin)) {
355 if (rpmatch(response) == RPMATCH_YES)
356 edit_file(1);
357 }
358 }
359 exit(EXIT_SUCCESS);
360 }