]> git.ipfire.org Git - thirdparty/util-linux.git/blame - login-utils/vipw.c
scriptreplay: cleanup usage()
[thirdparty/util-linux.git] / login-utils / vipw.c
CommitLineData
6dbe3af9
KZ
1/*
2 * Copyright (c) 1987 Regents of the University of California.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
726f69e2
KZ
32 *
33 * Updated Thu Oct 12 09:56:55 1995 by faith@cs.unc.edu with security
34 * patches from Zefram <A.Main@dcs.warwick.ac.uk>
35 *
06eafe47 36 * Updated Thu Nov 9 21:58:53 1995 by Martin Schulze
fd6b7a7f
KZ
37 * <joey@finlandia.infodrom.north.de>. Support for vigr.
38 *
39 * Martin Schulze's patches adapted to Util-Linux by Nicolai Langfeldt.
7eda085c 40 *
b50945d4 41 * 1999-02-22 Arkadiusz Miƛkiewicz <misiek@pld.ORG.PL>
7eda085c
KZ
42 * - added Native Language Support
43 * Sun Mar 21 1999 - Arnaldo Carvalho de Melo <acme@conectiva.com.br>
44 * - fixed strerr(errno) in gettext calls
6dbe3af9
KZ
45 */
46
06eafe47
SK
47#include <errno.h>
48#include <fcntl.h>
49#include <paths.h>
6dbe3af9 50#include <pwd.h>
46b6bcca 51#include <shadow.h>
06eafe47 52#include <signal.h>
6dbe3af9
KZ
53#include <stdio.h>
54#include <stdlib.h>
55#include <string.h>
06eafe47 56#include <sys/file.h>
6dbe3af9 57#include <sys/param.h>
06eafe47
SK
58#include <sys/resource.h>
59#include <sys/stat.h>
6dbe3af9 60#include <sys/time.h>
06eafe47 61#include <sys/types.h>
6dbe3af9 62#include <sys/wait.h>
6dbe3af9 63#include <unistd.h>
6c9f102f 64#include <getopt.h>
6dbe3af9 65
06eafe47 66#include "c.h"
1b1af0c1 67#include "fileutils.h"
439cdf1e 68#include "closestream.h"
06eafe47 69#include "nls.h"
fd6b7a7f 70#include "setpwnam.h"
8abcf290 71#include "strutils.h"
23925360 72#include "xalloc.h"
51924a4e 73#include "rpmatch.h"
6dbe3af9 74
48d7b13a 75#ifdef HAVE_LIBSELINUX
06eafe47 76# include <selinux/selinux.h>
d03dd608
KZ
77#endif
78
fd6b7a7f 79#define FILENAMELEN 67
6dbe3af9 80
06eafe47
SK
81enum {
82 VIPW,
83 VIGR
84};
2ba641e5
SK
85static int program;
86static char orig_file[FILENAMELEN]; /* original file /etc/passwd or /etc/group */
87static char *tmp_file; /* tmp file */
6dbe3af9 88
092bc0ed 89void pw_error (char *, int, int);
6dbe3af9 90
06eafe47
SK
91static void copyfile(int from, int to)
92{
66ee8158 93 int nr, nw, off;
06eafe47 94 char buf[8 * 1024];
9b59ecf0 95
6dbe3af9
KZ
96 while ((nr = read(from, buf, sizeof(buf))) > 0)
97 for (off = 0; off < nr; nr -= nw, off += nw)
98 if ((nw = write(to, buf + off, nr)) < 0)
06eafe47 99 pw_error(tmp_file, 1, 1);
fd6b7a7f 100
6dbe3af9 101 if (nr < 0)
06eafe47 102 pw_error(orig_file, 1, 1);
46df3aaa
SK
103#ifdef HAVE_EXPLICIT_BZERO
104 explicit_bzero(buf, sizeof(buf));
105#endif
6dbe3af9
KZ
106}
107
06eafe47
SK
108static void pw_init(void)
109{
6dbe3af9
KZ
110 struct rlimit rlim;
111
112 /* Unlimited resource limits. */
113 rlim.rlim_cur = rlim.rlim_max = RLIM_INFINITY;
114 (void)setrlimit(RLIMIT_CPU, &rlim);
115 (void)setrlimit(RLIMIT_FSIZE, &rlim);
116 (void)setrlimit(RLIMIT_STACK, &rlim);
117 (void)setrlimit(RLIMIT_DATA, &rlim);
118 (void)setrlimit(RLIMIT_RSS, &rlim);
119
120 /* Don't drop core (not really necessary, but GP's). */
121 rlim.rlim_cur = rlim.rlim_max = 0;
122 (void)setrlimit(RLIMIT_CORE, &rlim);
123
124 /* Turn off signals. */
125 (void)signal(SIGALRM, SIG_IGN);
126 (void)signal(SIGHUP, SIG_IGN);
127 (void)signal(SIGINT, SIG_IGN);
128 (void)signal(SIGPIPE, SIG_IGN);
129 (void)signal(SIGQUIT, SIG_IGN);
130 (void)signal(SIGTERM, SIG_IGN);
131 (void)signal(SIGTSTP, SIG_IGN);
132 (void)signal(SIGTTOU, SIG_IGN);
133
134 /* Create with exact permissions. */
135 (void)umask(0);
136}
137
46b6bcca 138static FILE * pw_tmpfile(int lockfd)
06eafe47 139{
46b6bcca
SK
140 FILE *fd;
141 char *tmpname = NULL;
c07ebfa1 142
bde91c85 143 if ((fd = xfmkstemp(&tmpname, "/etc", ".vipw")) == NULL) {
46b6bcca
SK
144 ulckpwdf();
145 err(EXIT_FAILURE, _("can't open temporary file"));
c07ebfa1
KZ
146 }
147
46b6bcca
SK
148 copyfile(lockfd, fileno(fd));
149 tmp_file = tmpname;
150 return fd;
6dbe3af9
KZ
151}
152
46b6bcca 153static void pw_write(void)
06eafe47
SK
154{
155 char tmp[FILENAMELEN + 4];
156
e8f26419
KZ
157 sprintf(tmp, "%s%s", orig_file, ".OLD");
158 unlink(tmp);
18be404b
KZ
159
160 if (link(orig_file, tmp))
161 warn(_("%s: create a link to %s failed"), orig_file, tmp);
d03dd608 162
48d7b13a 163#ifdef HAVE_LIBSELINUX
4ba66edf 164 if (is_selinux_enabled() > 0) {
06eafe47
SK
165 security_context_t passwd_context = NULL;
166 int ret = 0;
167 if (getfilecon(orig_file, &passwd_context) < 0) {
168 warnx(_("Can't get context for %s"), orig_file);
169 pw_error(orig_file, 1, 1);
170 }
171 ret = setfilecon(tmp_file, passwd_context);
172 freecon(passwd_context);
173 if (ret != 0) {
174 warnx(_("Can't set context for %s"), tmp_file);
175 pw_error(tmp_file, 1, 1);
176 }
d03dd608
KZ
177 }
178#endif
179
e8f26419
KZ
180 if (rename(tmp_file, orig_file) == -1) {
181 int errsv = errno;
81c8a46f 182 errx(EXIT_FAILURE,
46b6bcca 183 ("cannot write %s: %s (your changes are still in %s)"),
81c8a46f 184 orig_file, strerror(errsv), tmp_file);
e8f26419
KZ
185 }
186 unlink(tmp_file);
46b6bcca 187 free(tmp_file);
76839e97 188 tmp_file = NULL;
6dbe3af9
KZ
189}
190
ccb07d4d 191static void pw_edit(void)
06eafe47 192{
6dbe3af9
KZ
193 int pstat;
194 pid_t pid;
467d50fa 195 char *p, *editor, *tk;
6dbe3af9 196
467d50fa 197 editor = getenv("EDITOR");
23925360 198 editor = xstrdup(editor ? editor : _PATH_VI);
467d50fa
KZ
199
200 tk = strtok(editor, " \t");
201 if (tk && (p = strrchr(tk, '/')) != NULL)
6dbe3af9 202 ++p;
06eafe47 203 else
6dbe3af9
KZ
204 p = editor;
205
2b6fc908 206 pid = fork();
9b59ecf0
MP
207 if (pid < 0)
208 err(EXIT_FAILURE, _("fork failed"));
209
2b6fc908 210 if (!pid) {
fd6b7a7f 211 execlp(editor, p, tmp_file, NULL);
7bc5eeee 212 errexec(editor);
6dbe3af9
KZ
213 }
214 for (;;) {
06eafe47
SK
215 pid = waitpid(pid, &pstat, WUNTRACED);
216 if (WIFSTOPPED(pstat)) {
217 /* the editor suspended, so suspend us as well */
218 kill(getpid(), SIGSTOP);
219 kill(pid, SIGCONT);
220 } else {
221 break;
222 }
6dbe3af9
KZ
223 }
224 if (pid == -1 || !WIFEXITED(pstat) || WEXITSTATUS(pstat) != 0)
225 pw_error(editor, 1, 1);
23925360
KZ
226
227 free(editor);
6dbe3af9
KZ
228}
229
506e6d26
SK
230void __attribute__((__noreturn__))
231pw_error(char *name, int err, int eval)
06eafe47 232{
6dbe3af9 233 if (err) {
6dbe3af9 234 if (name)
81c8a46f
SK
235 warn("%s: ", name);
236 else
237 warn(NULL);
6dbe3af9 238 }
81c8a46f 239 warnx(_("%s unchanged"), orig_file);
76839e97
KZ
240
241 if (tmp_file)
242 unlink(tmp_file);
46b6bcca 243 ulckpwdf();
6dbe3af9
KZ
244 exit(eval);
245}
246
06eafe47 247static void edit_file(int is_shadow)
c07ebfa1
KZ
248{
249 struct stat begin, end;
46b6bcca
SK
250 int passwd_file, ch_ret;
251 FILE *tmp_fd;
c07ebfa1
KZ
252
253 pw_init();
c07ebfa1 254
46b6bcca
SK
255 /* acquire exclusive lock */
256 if (lckpwdf() < 0)
257 err(EXIT_FAILURE, _("cannot get lock"));
258
a16f45d4 259 passwd_file = open(orig_file, O_RDONLY | O_CLOEXEC, 0);
46b6bcca 260 if (passwd_file < 0)
289dcc90 261 err(EXIT_FAILURE, _("cannot open %s"), orig_file);
46b6bcca
SK
262 tmp_fd = pw_tmpfile(passwd_file);
263
264 if (fstat(fileno(tmp_fd), &begin))
c07ebfa1 265 pw_error(tmp_file, 1, 1);
d03dd608 266
ccb07d4d 267 pw_edit();
d03dd608 268
46b6bcca 269 if (fstat(fileno(tmp_fd), &end))
c07ebfa1 270 pw_error(tmp_file, 1, 1);
69a826f1
SK
271 /* Some editors, such as Vim with 'writebackup' mode enabled,
272 * use "atomic save" in which the old file is deleted and a new
273 * one with the same name created in its place. */
274 if (end.st_nlink == 0) {
275 if (close_stream(tmp_fd) != 0)
276 err(EXIT_FAILURE, _("write error"));
a16f45d4 277 tmp_fd = fopen(tmp_file, "r" UL_CLOEXECSTR);
76839e97 278 if (!tmp_fd)
69a826f1
SK
279 err(EXIT_FAILURE, _("cannot open %s"), tmp_file);
280 if (fstat(fileno(tmp_fd), &end))
281 pw_error(tmp_file, 1, 1);
282 }
c07ebfa1 283 if (begin.st_mtime == end.st_mtime) {
81c8a46f 284 warnx(_("no changes made"));
c07ebfa1
KZ
285 pw_error((char *)NULL, 0, 0);
286 }
46b6bcca 287 /* pw_tmpfile() will create the file with mode 600 */
e8f26419 288 if (!is_shadow)
46b6bcca 289 ch_ret = fchmod(fileno(tmp_fd), 0644);
e8f26419 290 else
46b6bcca
SK
291 ch_ret = fchmod(fileno(tmp_fd), 0400);
292 if (ch_ret < 0)
293 err(EXIT_FAILURE, "%s: %s", _("cannot chmod file"), orig_file);
439cdf1e
SK
294 if (close_stream(tmp_fd) != 0)
295 err(EXIT_FAILURE, _("write error"));
46b6bcca
SK
296 pw_write();
297 close(passwd_file);
298 ulckpwdf();
c07ebfa1
KZ
299}
300
86be6a32 301static void __attribute__((__noreturn__)) usage(void)
cc8e9934 302{
86be6a32 303 FILE *out = stdout;
cc8e9934
SK
304 fputs(USAGE_HEADER, out);
305 fprintf(out, " %s\n", program_invocation_short_name);
451dbcfa
BS
306
307 fputs(USAGE_SEPARATOR, out);
308 fputs(_("Edit the password or group file.\n"), out);
309
cc8e9934 310 fputs(USAGE_OPTIONS, out);
f45f3ec3
RM
311 printf(USAGE_HELP_OPTIONS(16));
312 printf(USAGE_MAN_TAIL("vipw(8)"));
86be6a32 313 exit(EXIT_SUCCESS);
cc8e9934
SK
314}
315
06eafe47
SK
316int main(int argc, char *argv[])
317{
6c9f102f
SK
318 int c;
319 static const struct option longopts[] = {
320 {"version", no_argument, NULL, 'V'},
321 {"help", no_argument, NULL, 'h'},
322 {NULL, 0, NULL, 0}
323 };
324
e8f26419
KZ
325 setlocale(LC_ALL, "");
326 bindtextdomain(PACKAGE, LOCALEDIR);
327 textdomain(PACKAGE);
2c308875 328 close_stdout_atexit();
e8f26419 329
81c8a46f 330 if (!strcmp(program_invocation_short_name, "vigr")) {
e8f26419
KZ
331 program = VIGR;
332 xstrncpy(orig_file, GROUP_FILE, sizeof(orig_file));
e8f26419
KZ
333 } else {
334 program = VIPW;
335 xstrncpy(orig_file, PASSWD_FILE, sizeof(orig_file));
e8f26419
KZ
336 }
337
124a9030 338 while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) {
6c9f102f
SK
339 switch (c) {
340 case 'V':
2c308875 341 print_version(EXIT_SUCCESS);
6c9f102f 342 case 'h':
86be6a32 343 usage();
6c9f102f
SK
344 default:
345 errtryhelp(EXIT_FAILURE);
346 }
124a9030 347 }
e8f26419
KZ
348
349 edit_file(0);
350
124a9030
KZ
351 if (program == VIGR)
352 xstrncpy(orig_file, SGROUP_FILE, sizeof(orig_file));
353 else
354 xstrncpy(orig_file, SHADOW_FILE, sizeof(orig_file));
e8f26419
KZ
355
356 if (access(orig_file, F_OK) == 0) {
357 char response[80];
358
4cd4b687 359 fputs((program == VIGR)
e8f26419 360 ? _("You are using shadow groups on this system.\n")
4cd4b687 361 : _("You are using shadow passwords on this system.\n"), stdout);
11b86e17 362
4c5e1f8e
SK
363 /* TRANSLATORS: this program uses for y and n rpmatch(3),
364 * which means they can be translated. */
e8f26419
KZ
365 printf(_("Would you like to edit %s now [y/n]? "), orig_file);
366
74ce680a
SK
367 if (fgets(response, sizeof(response), stdin) &&
368 rpmatch(response) == RPMATCH_YES)
369 edit_file(1);
e8f26419 370 }
9b59ecf0 371 exit(EXIT_SUCCESS);
6dbe3af9 372}