]> git.ipfire.org Git - thirdparty/shadow.git/log
thirdparty/shadow.git
6 hours agotests/system/tests/test_groupmod.py: add test for groupmod -U with user list master
Iker Pedrosa [Tue, 23 Dec 2025 08:51:56 +0000 (09:51 +0100)] 
tests/system/tests/test_groupmod.py: add test for groupmod -U with user list

Add comprehensive test for the groupmod -U option when provided with a
list of users to set group membership. This test verifies:

- Setting initial group membership with multiple users
- Proper membership verification in both group and gshadow entries
- Updating group membership by modifying the user list
- Correct handling of membership changes in group databases

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
6 hours agotests/system/framework/utils/tools.py: fix GShadowEntry
Iker Pedrosa [Tue, 23 Dec 2025 09:26:33 +0000 (10:26 +0100)] 
tests/system/framework/utils/tools.py: fix GShadowEntry

GShadowEntry administrators and members represent a list of usernames,
not a single string. Thus, set them to `list[str]`. This fixes type
safety and clarifies the expected data structure.

Fixes: 458700b5d670 (2025-09-10; "tests/system/framework/: fix Python linter issues")
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
2 days agoRelease 4.19.0 1459/head 4.19.0
Alejandro Colomar [Mon, 29 Dec 2025 12:38:53 +0000 (13:38 +0100)] 
Release 4.19.0

Breaking changes:

-  Remove support for escaped newlines in configuration files.
   It never worked correctly.
   b0a7ce58b924 (2025-12-05; "lib/, po/: Remove fgetsx() and fputsx()")

-  Some user names and group names are too dangerous and are rejected,
   even with --badname.
   25aea7422615 (2025-12-25; "lib/chkname.c, src/: Strictly disallow really bad names")

Future breaking changes:

-  SHA512 and SHA256 will be supported unconditionally in the next
   release.  The build-time flag '--with-sha-crypt' will be removed.
   See <https://github.com/shadow-maint/shadow/pull/1452>.

Support:

-  Several years ago, there were talks about deprecating su(1) and
   login(1), back when this project was maintained as part of Debian.
   However, nothing was clearly stated, and there were doubts about the
   status of these programs.  Let's clarify them now.

   Our implementations of su(1) and login(1) are fully supported, and we
   don't have any plans to remove them.  They are NOT deprecated.
   See <https://github.com/shadow-maint/shadow/issues/464>.

Deprecations:

-  groupmems(8)
The program will be removed in a future release.
See <https://github.com/shadow-maint/shadow/issues/1343>.

-  logoutd(8)
The program will be removed in the next release.
See <https://github.com/shadow-maint/shadow/issues/999>,
and <https://github.com/shadow-maint/shadow/pull/1344>.

-  DES
This hashing algorithm has been deprecated for a long time,
and support for it will be removed in a future release.
See <https://github.com/shadow-maint/shadow/pull/1456>

-  MD5
This hashing algorithm has been deprecated for a long time,
and support for it will be removed in a future release.
See <https://github.com/shadow-maint/shadow/pull/1457>

-  login.defs(5): MD_CRYPT_ENAB
This feature had been deprecated for decades.  It will be
removed in a future release.
The command-line equivalents (-m, --md5) of this feature in
chpasswd(8) and chgpasswd(8) will also be removed in a future
release.
See <https://github.com/shadow-maint/shadow/pull/1455>.

-  login.defs(5): PASS_MAX_LEN
This feature is ignored except for DES.  Once DES is removed,
it makes no sense keeping it.  It may be removed in a future
release.

-  Password aging
Scientific research shows that periodic password expiration
leads to predictable password patterns, and that even in a
theoretical scenario where that wouldn't happen the gains in
security are mathematically negligible.
<https://people.scs.carleton.ca/~paulv/papers/expiration-authorcopy.pdf>

Modern security standards, such as NIST SP 800-63B-4 in the USA,
prohibit periodic password expiration.
<https://pages.nist.gov/800-63-4/sp800-63b.html#passwordver>
<https://pages.nist.gov/800-63-FAQ/#q-b05>
<https://www.ncsc.gov.uk/collection/passwords/updating-your-approach#PasswordGuidance:UpdatingYourApproach-Don'tenforceregularpasswordexpiry>

To align with these, we're deprecating the ability to
periodically expire passwords.  The specifics and long-term
roadmap are currently being discussed, and we invite feedback
from users, particularly from those in regulated environments.
See <https://github.com/shadow-maint/shadow/pull/1432>.

This deprecation includes the following programs and features:

expiry(1)
chage(1):
-I,--inactive (also the interactive version)
-m,--mindays (also the interactive version)
-M,--maxdays (also the interactive version)
-W,--warndays (also the interactive version)
passwd(1):
-k,--keep-tokens
-n,--mindays
-x,--maxdays
-i,--inactive
-w,--warndays
useradd(8):
-f,--inactive
usermod(8):
-f,--inactive
login.defs(5):
PASS_MIN_DAYS
PASS_MAX_DAYS
PASS_WARN_AGE
/etc/default/useradd:
INACTIVE
shadow(5):
sp_lstchg: Restrict to just the values 0 and empty.
sp_min
sp_max
sp_warn
sp_inact

We recognize that many users operate in environments with
regulatory or contractual requirements that still mandate
password aging.  To minimize disruption, these features will
remain functional for a significant period.  However, we
encourage administrators to review their internal policies,
talk to their regulators if appropriate, and participate in the
roadmap discussion linked above.

Co-authored-by: Iker Pedrosa <ipedrosa@redhat.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
2 days agopo/: Update
Alejandro Colomar [Tue, 30 Dec 2025 13:25:16 +0000 (14:25 +0100)] 
po/: Update

I don't know what this commit does, to be honest.  I just
did './autogen.sh && make && make dist' and committed the
changes to .po files.  Why?  I don't know.

BTW, I kept out some changes that were actually bad.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
2 days agopo/shadow.pot: Update
Alejandro Colomar [Mon, 29 Dec 2025 22:37:18 +0000 (23:37 +0100)] 
po/shadow.pot: Update

I don't know what this commit does, to be honest.  I just
did './autogen.sh && make && make dist' and committed the
changes to .pot files.  Why?  I don't know.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
2 days agolib/: Use non-empty compound literals
Alejandro Colomar [Tue, 30 Dec 2025 15:17:55 +0000 (16:17 +0100)] 
lib/: Use non-empty compound literals

While the empty one is more correct, {0} will also work, and will
likely silence diagnostics in old compiler versions.

Empty compound literals are only supported in GCC since commit
gcc.git 14cfa01755a6 (2022-08-25; "c: Support C2x empty initializer braces")

Reported-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
2 days agoAdd ubuntu-22.04 to the CI test matrix
Serge Hallyn [Tue, 30 Dec 2025 15:52:10 +0000 (09:52 -0600)] 
Add ubuntu-22.04 to the CI test matrix

we need to check against older compilers.

Signed-off-by: Serge Hallyn <serge@hallyn.com>
2 days agoman/lastlog.8: Drop redundant closing brackets
Tobias Stoeckmann [Tue, 30 Dec 2025 11:52:35 +0000 (12:52 +0100)] 
man/lastlog.8: Drop redundant closing brackets

Only one opening bracket is used before two closing brackets are
encountered for "(--user)".

Drop redundant ones within the file.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 days agoman/: Fix SELinux note formatting
Tobias Stoeckmann [Tue, 30 Dec 2025 11:11:33 +0000 (12:11 +0100)] 
man/: Fix SELinux note formatting

Use tab instead of spaces to comply with rest of files.

Fixes: 923aeac250d0 (2025-07-04; "man/: update `--root` flag with no SELinux support")
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 days agosg: Properly document synopsis and options
Tobias Stoeckmann [Sun, 28 Dec 2025 15:36:19 +0000 (16:36 +0100)] 
sg: Properly document synopsis and options

The usage message of sg and synopsis of its manual page diverged. The
difference was even noted in a comment, instead of fixing it.

Synchronize both, add information about hidden options and document
what they do.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 days agosg: group is not optional
Tobias Stoeckmann [Mon, 29 Dec 2025 18:06:33 +0000 (19:06 +0100)] 
sg: group is not optional

The group argument is not optional, so do not specify it as such in the
manual page.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 days agosg: Fix grammar in documentation
Tobias Stoeckmann [Sun, 28 Dec 2025 15:34:54 +0000 (16:34 +0100)] 
sg: Fix grammar in documentation

Use "an" in front of sg due to its pronounciation. Also, start a comment
with capital letter in its first sentence to comply with other comments.

No functional change.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
3 days agolib/, src/: Reduce scope of local variables
Alejandro Colomar [Sat, 13 Dec 2025 23:57:19 +0000 (00:57 +0100)] 
lib/, src/: Reduce scope of local variables

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 days agolib/, src/: Some empty lists have 0 elements, not 1 empty string
Alejandro Colomar [Sat, 13 Dec 2025 23:51:34 +0000 (00:51 +0100)] 
lib/, src/: Some empty lists have 0 elements, not 1 empty string

In general, empty fields in a CSV are errors.  However, in some cases,
we want to allow passing empty lists, and the way to encode that is as
an empty string.  This was accidentally broken in 4.17.0, when we
switched from using strtok(3) to strsep(3), without remembering to
special-case an empty CSV.

The bug affected directly groupadd(8) and groupmod(8).

The bug also affected the library function add_groups().  In systems
using PAM, that function is unused.  On systems without PAM, it is
called by the library function setup_uid_gid(), with the contents of the
"CONSOLE_GROUPS" configuration (login.defs) CSV string.

setup_uid_gid() is directly called by su(1) and login(1) on systems
without PAM.

setup_uid_gid() is also called by the library function expire().

expire() is directly called by expiry(1), su(1), and login(1).

This bug is a regression introduced in the release 4.17.0, and present
in the releases 4.17.{0..4} and 4.18.0.

Fixes: 90afe61003ef (2024-12-05; "lib/, src/: Use strsep(3) instead of strtok(3)")
Link: <https://github.com/shadow-maint/shadow/issues/1420>
Reported-by: Osark Vieira <https://github.com/osark084>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 days agolib/, src/: Add blocks
Alejandro Colomar [Mon, 22 Dec 2025 19:05:36 +0000 (20:05 +0100)] 
lib/, src/: Add blocks

This is in preparation for the following patch.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 days agotests/system/tests/test_groupadd.py: add test for groupadd -U with empty string
Iker Pedrosa [Mon, 15 Dec 2025 11:47:08 +0000 (12:47 +0100)] 
tests/system/tests/test_groupadd.py: add test for groupadd -U with empty string

Test verifies that groupadd -U '' correctly creates group with no
members.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 days agotests/system/tests/test_groupmod.py: add test for groupmod -U with empty string
Iker Pedrosa [Mon, 15 Dec 2025 11:42:46 +0000 (12:42 +0100)] 
tests/system/tests/test_groupmod.py: add test for groupmod -U with empty string

Test verifies that groupmod -U '' correctly clears group membership.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
6 days agolib/chkname.c, src/: Strictly disallow really bad names
Alejandro Colomar [Mon, 23 Dec 2024 10:06:33 +0000 (11:06 +0100)] 
lib/chkname.c, src/: Strictly disallow really bad names

Some names are bad, and some names are really bad.  '--badname' should
only allow the mildly bad ones, which we can handle.  Some names are too
bad, and it's not possible to deal with them.  Reject them
unconditionally.

-  A leading '-' is too dangerous.  It breaks things like execve(2), and
   almost every command.

-  Spaces are used for delimiting lists of users and groups.

-  '"' is special in many languages, including the shell.  Having it in
   user names would be unnecessarily dangerous.

-  '#' is used for delimiting comments in several of our config files.
   Having it in usernames could result in incorrect configuration files.

-  "'" is special in many languages, including the shell.  Having it in
   user names would be unnecessarily dangerous.

-  ',' is used for delimiting lists of users and groups.

-  '/' is used for delimiting files, and thus could result in incorrect
   handling of users and groups.

-  ':' is the main delimiter in /etc/shadow and /etc/passwd.

-  ';' is special in many languages, including the shell.  Having it in
   user names would be unnecessarily dangerous.

There are other characters that we should disallow, but they need more
research to make sure we don't introduce regressions.  This set should
be less problematic.

Acked-by: Tobias Stoeckmann <tobias@stoeckmann.org>
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Reviewed-by: Chris Hofstaedtler <zeha@debian.org>
Cc: Marc 'Zugschlus' Haber <mh+githubvisible@zugschlus.de>
Cc: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
8 days agouserdel: Fix syslog message
Tobias Stoeckmann [Tue, 23 Dec 2025 11:05:09 +0000 (12:05 +0100)] 
userdel: Fix syslog message

Actually log the user name as done with stderr message.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
8 days agolib/run_part.c: Fix error message
Tobias Stoeckmann [Tue, 23 Dec 2025 11:04:23 +0000 (12:04 +0100)] 
lib/run_part.c: Fix error message

The failing function call was wait, not waitpid.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
8 days agochage: Remove unneeded xstrdup calls
Tobias Stoeckmann [Tue, 23 Dec 2025 11:32:02 +0000 (12:32 +0100)] 
chage: Remove unneeded xstrdup calls

Duplicating name and hash is not needed here, because duplication
occurs in spw_update. You can detect the small memory leak with
tools like valgrind.

More importantly though, if xstrdup fails, it calls exit. The
update_age function is in the "criticial section" between
open_files and close_files, though. Correct error handling would
require fail_exit to release the held locks.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
10 days agosrc/gpasswd.c: fix segfault in clean up callbacks
Iker Pedrosa [Fri, 19 Dec 2025 15:27:54 +0000 (16:27 +0100)] 
src/gpasswd.c: fix segfault in clean up callbacks

The gpasswd utility was segfaulting when cleanup functions were called
because these functions expect a pointer to `process_selinux` but was
being passed NULL. This caused a NULL pointer dereference.

This commits adds the pointer to `process_selinux` to clean up
functions making `gpasswd` consistent with other group utilities.

Reproduction steps:
$ useradd tuser
$ groupadd tuser
$ gpasswd -a tuser tgroup
Adding user tuser to group tgroup
Segmentation fault (core dumped)

Fixes: 4d431898bad8 (2025-10-07; "src/gpasswd.c: chroot or prefix SELinux file context")
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
12 days agolib/obscure.c: Introduce obscure_get_range
Tobias Stoeckmann [Fri, 19 Dec 2025 11:36:59 +0000 (11:36 +0000)] 
lib/obscure.c: Introduce obscure_get_range

Unify the retrieval of PASS_MIN_LEN and PASS_MAX_LEN for output
in passwd and actual checks.

Fixes wrong output for minimum password lengths if no such
restriction is configured: 5 is printed, 0 is in effect.

How to reproduce:

1. Use passwd compiled without PAM support
2. Do not specify PASS_MIN_LEN in login.defs
3. Run passwd as a user and enter your old password, then
   - you will see that 5 characters are expected
   - you can just press enter twice

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
12 days agolib/obscure.c: Fix PASS_MIN_LEN -1 case
Tobias Stoeckmann [Fri, 19 Dec 2025 11:33:45 +0000 (11:33 +0000)] 
lib/obscure.c: Fix PASS_MIN_LEN -1 case

The getdef_num implementation allows -1 to be specified in login.defs.
In general, -1 should be treated the same way as "not specified". In
this case, casting -1 to size_t leads to every password being "too
short."

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
12 days agogshadow: Open audit socket after check_fds
Tobias Stoeckmann [Sat, 20 Dec 2025 17:25:03 +0000 (17:25 +0000)] 
gshadow: Open audit socket after check_fds

Protect gshadow the same way as newgrp.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
12 days agonewgrp, sg: Open audit socket after check_fds
Tobias Stoeckmann [Sat, 20 Dec 2025 16:46:18 +0000 (16:46 +0000)] 
newgrp, sg: Open audit socket after check_fds

The check_fds function is supposed to ensure that fds 0, 1, and 2 are
opened in a well-defined state, i.e. either they are already connected
to supposed input/output files or will be connected to /dev/null if not.

Opening the audit socket before checking the fds allows the audit socket
to get one of these numbers.

Avoid this by opening the audit socket after the check.

In general, this check is already covered by system libraries, but this
proof of concept works for root user. Note the different states of the
file descriptor 2.

In bash or another shell that interprets `2>&-` as closing stderr with
shadow + audit support, e.g. Arch Linux:
```
sg bin 'ls -l /proc/self/fd'
sg bin 'ls -l /proc/self/fd' 2>/dev/null
sg bin 'ls -l /proc/self/fd' 2>&-
```

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
13 days agoetc/login.defs: Clarify PASS_MAX_LEN usage
Tobias Stoeckmann [Fri, 19 Dec 2025 12:15:00 +0000 (12:15 +0000)] 
etc/login.defs: Clarify PASS_MAX_LEN usage

The PASS_MAX_LEN option is only used with DES.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
13 days agoPASS_MAX_LEN.xml: Explain PASS_MAX_LEN use cases
Tobias Stoeckmann [Fri, 19 Dec 2025 11:02:45 +0000 (11:02 +0000)] 
PASS_MAX_LEN.xml: Explain PASS_MAX_LEN use cases

The `PASS_MAX_LEN` is effectively only used for DES. Do not describe it
in a way that makes it sound like `MD_CRYPT_ENAB=yes` is required to
disable it. Any other `ENCRYPT_METHOD` disables it as well.

Also, even for DES, `PASS_MAX_LEN` requires `OBSCURE_CHECKS_ENAB` to
have any effect.

Even more, `PASS_MIN_LEN` and `PASS_MAX_LEN` are only used for
user passwords. Group passwords are not checked.

Note: All of this is actually true even if compiled with PAM if command
line arguments change root. But if compiled with PAM support, this
section is not added to manual pages... Since this is true for some
more files, it's not part of this commit.

Link to source files:
- lib/obscure.c line 133 stops further checks, including max length,
  if OBSCURE_CHECS_ENAB is not yes
- lib/obscure.c line 172 is only reached in case of DES
- src/passwd.c line 248 duplicates the check for output
- src/gpasswd.c has no reference to obscure

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
13 days agoman/passwd.5.xml: Use sentences for descriptions
Tobias Stoeckmann [Fri, 19 Dec 2025 12:47:59 +0000 (12:47 +0000)] 
man/passwd.5.xml: Use sentences for descriptions

Even though this is technically no sentence, it stays in sync with the
other file descriptions this way.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
13 days agotests: Fix typos in comments
Tobias Stoeckmann [Fri, 19 Dec 2025 14:54:12 +0000 (14:54 +0000)] 
tests: Fix typos in comments

No functional change

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
13 days agoFix documentation style
Tobias Stoeckmann [Fri, 19 Dec 2025 10:56:50 +0000 (10:56 +0000)] 
Fix documentation style

Always start a sentence with lowercase letter after 'Note:', 'Warning:',
etc. This unifies all occurrences.

No functional change.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
13 days agolib/, src/: Drop 10000 as infinity
Tobias Stoeckmann [Fri, 19 Dec 2025 12:50:46 +0000 (12:50 +0000)] 
lib/, src/: Drop 10000 as infinity

If password aging should not be performed, disable it properly. Just
specifying a "long enough time" is not infinity.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
13 days agopwunconv: Drop incorrect comment
Tobias Stoeckmann [Fri, 19 Dec 2025 12:50:01 +0000 (12:50 +0000)] 
pwunconv: Drop incorrect comment

Shadow password files do not necessarily need aging information.
Also, passwd has no aging information.

No conversion is performed, so drop the comment entirely.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
13 days agopasswd: Clarify password strength check comment
Tobias Stoeckmann [Fri, 19 Dec 2025 11:10:58 +0000 (11:10 +0000)] 
passwd: Clarify password strength check comment

- The total number of password change tries can be configured
- Except min length, password strength checks can be disabled
- Even the root user can have password strength checks...
- ... except in some cases (stdin, command line arguments)

In general, this code does not run for PAM, except root directory
is modified through command line arguments by root user.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
13 days agoENCRYPT_METHOD.xml: Fix grammar
Tobias Stoeckmann [Fri, 19 Dec 2025 11:00:02 +0000 (11:00 +0000)] 
ENCRYPT_METHOD.xml: Fix grammar

Use singular in these cases.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agolib/, src/: Fix formatting
Tobias Stoeckmann [Tue, 16 Dec 2025 21:59:59 +0000 (22:59 +0100)] 
lib/, src/: Fix formatting

Fix places where spaces were used instead of tabs.

No functional change.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agopasswd: Fix TOCTOU race condition (no PAM)
Tobias Stoeckmann [Tue, 16 Dec 2025 13:00:54 +0000 (14:00 +0100)] 
passwd: Fix TOCTOU race condition (no PAM)

The passwd tool checks if the password of a user may be changed before
locking the passwd/shadow files. This leaves a time window to perform
the same action twice (e.g. circumventing PASS_MIN_DAYS limit) or to
circumvent a locked password by an administrator.

Perform the check after the lock again. This keeps the behavior as it
is today for a user and also prevents the race condition.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agopasswd: Use fail_exit in check_password
Tobias Stoeckmann [Tue, 16 Dec 2025 12:58:54 +0000 (13:58 +0100)] 
passwd: Use fail_exit in check_password

Calling fail_exit here prepares an upcoming commit to reuse the
functions when databases have been locked.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agopasswd: check_password: Use shadow entry for logs
Tobias Stoeckmann [Tue, 16 Dec 2025 09:03:43 +0000 (10:03 +0100)] 
passwd: check_password: Use shadow entry for logs

Always use the name in shadow entry for logging. This reduces the
amount of data retrieved from password entry to bare minimum, i.e.
passing through into library call.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agopasswd: Unify (un)locking routines
Tobias Stoeckmann [Mon, 15 Dec 2025 16:08:05 +0000 (17:08 +0100)] 
passwd: Unify (un)locking routines

Make sure that passwd and shadow are always opened in the correct
order to avoid possible dead locks with other tools:

- Lock passwd first, then shadow
- Unlock shadow first, then passwd

The passwd utility may work without a shadow entry. In that case, it
operates on the passwd file. But to figure this out, the shadow file
must have been opened and thus locked already. Unconditionally open the
passwd file first, even though it's not needed most of the time.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agopasswd: Call fail_exit on pwd lock failure
Tobias Stoeckmann [Mon, 15 Dec 2025 16:06:00 +0000 (17:06 +0100)] 
passwd: Call fail_exit on pwd lock failure

At this point, shadow might be already locked if update_noshadow is
called as fallback within update_shadow. Make sure that unlock is
called before exit.

Fixes: 45c6603cc86c (2007-10-07; "[svn-upgrade] Integrating new upstream version, shadow (19990709)")
Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agopasswd: Fix style
Tobias Stoeckmann [Mon, 15 Dec 2025 16:03:52 +0000 (17:03 +0100)] 
passwd: Fix style

No functional change

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agopasswd: Pass process_selinux flag directly
Tobias Stoeckmann [Mon, 15 Dec 2025 15:21:22 +0000 (16:21 +0100)] 
passwd: Pass process_selinux flag directly

No need to re-evaluate option_flags in functions. Unifies checks and
simplifies code.

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agonewusers: Allow creation without aging information
Tobias Stoeckmann [Mon, 15 Dec 2025 09:22:17 +0000 (10:22 +0100)] 
newusers: Allow creation without aging information

If PASS_MAX_DAYS is not set, newusers falls back to 10000 days, which is
considered "unlimited" in some parts of the source tree. All other tools
fall back to -1, which truely implies unlimited.

Sync newusers with all other shadow tools.

How to reproduce:

1. Remove or comment out PASS_MAX_DAYS from /etc/login.defs
2. Run `newusers <<< user:pass:1234:1234::/home/user:/bin/bash`
3. Check user line in /etc/shadow
```
/etc/shadow:user:HASH:19721:0:10000:7:::
```

Max days are set to 10000. Instead, this should be:

```
/etc/shadow:user:HASH:19721:0::7:::
```

Reviewed-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agonewusers: Add test for creation without aging
Tobias Stoeckmann [Mon, 15 Dec 2025 09:22:15 +0000 (10:22 +0100)] 
newusers: Add test for creation without aging

If PASS_MAX_DAYS is not set, newusers should not set max password age.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agolib/pwd2spwd.c: Set no aging information
Tobias Stoeckmann [Mon, 15 Dec 2025 09:45:41 +0000 (10:45 +0100)] 
lib/pwd2spwd.c: Set no aging information

The pwd_to_spwd routine claims that fields without corresponding
information in the password file are set to uninitialized values,
but sets some aging information. These cannot be available in
struct passwd.

Also, the code is only used in passwd to temporarily hold the
new password. All other values are copied from an existing entry
later on. If no entry exists, all values are dismissed anyway.

Clarify that everything is uninitialized except name and password.
Gets rid of magic value 10000 for sp_max.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agolib/pwd2spwd.c: Simplify style
Tobias Stoeckmann [Mon, 15 Dec 2025 09:41:11 +0000 (10:41 +0100)] 
lib/pwd2spwd.c: Simplify style

No need for a nested block here.

Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2 weeks agolib/xgetXXbyYY.c: include stdint.h for SIZE_MAX
Mike Gilbert [Sat, 13 Dec 2025 20:07:02 +0000 (15:07 -0500)] 
lib/xgetXXbyYY.c: include stdint.h for SIZE_MAX

Fixes build failure:
```
In file included from xgetgrnam.c:40:
xgetXXbyYY.c: In function â€˜xgetgrnam’:
xgetXXbyYY.c:83:31: error: â€˜SIZE_MAX’ undeclared (first use in this function)
   83 |                 if (length == SIZE_MAX) {
      |                               ^~~~~~~~
```

Signed-off-by: Mike Gilbert <floppym@gentoo.org>
3 weeks agosrc/chsh.c: add argument for fail_exit()
Iker Pedrosa [Tue, 9 Dec 2025 11:10:33 +0000 (12:10 +0100)] 
src/chsh.c: add argument for fail_exit()

Fixes: 374ca05c282f (2025-10-07; "src/chsh.c: SELinux file context for fail_exit()")
Reported-by: Michael Vetter <jubalh@iodoru.org>
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agoupdated Dutch translation
Frans Spiesschaert [Sun, 7 Dec 2025 22:33:09 +0000 (23:33 +0100)] 
updated Dutch translation

3 weeks ago(pre-)Release 4.19.0-rc1 2025-12-07/4.19.0-rc1 1411/head 4.19.0-rc1
Serge Hallyn [Sun, 7 Dec 2025 16:08:19 +0000 (10:08 -0600)] 
(pre-)Release 4.19.0-rc1

First pre-release of 'herve', 4.19.0

Signed-off-by: Serge Hallyn <serge@hallyn.com>
3 weeks agolib/tcbfuncs.c: rmdir_leading(): Create string just once
Alejandro Colomar [Sat, 16 Nov 2024 21:20:16 +0000 (22:20 +0100)] 
lib/tcbfuncs.c: rmdir_leading(): Create string just once

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/tcbfuncs.c: rmdir_leading(): Constify input
Alejandro Colomar [Sat, 16 Nov 2024 17:16:40 +0000 (18:16 +0100)] 
lib/tcbfuncs.c: rmdir_leading(): Constify input

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/search/: lsearch_T(): Don't return anything
Alejandro Colomar [Mon, 17 Nov 2025 19:50:31 +0000 (20:50 +0100)] 
lib/search/: lsearch_T(): Don't return anything

We don't use this value.  This silences a diagnostic about the unused
return value.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/: Rename XCALLOC() => xcalloc_T()
Alejandro Colomar [Sat, 15 Nov 2025 21:12:22 +0000 (22:12 +0100)] 
lib/: Rename XCALLOC() => xcalloc_T()

The 'T' in the name notes that this API is a type-safe variant of the
API it wraps.  This makes the names more explicative.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/: Rename CALLOC() => calloc_T()
Alejandro Colomar [Sat, 15 Nov 2025 21:08:15 +0000 (22:08 +0100)] 
lib/: Rename CALLOC() => calloc_T()

The 'T' in the name notes that this API is a type-safe variant of the
API it wraps.  This makes the names more explicative.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/: Rename XMALLOC() => xmalloc_T()
Alejandro Colomar [Sat, 15 Nov 2025 21:02:33 +0000 (22:02 +0100)] 
lib/: Rename XMALLOC() => xmalloc_T()

The 'T' in the name notes that this API is a type-safe variant of the
API it wraps.  This makes the names more explicative.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/: Rename MALLOC() => malloc_T()
Alejandro Colomar [Sat, 15 Nov 2025 21:01:20 +0000 (22:01 +0100)] 
lib/: Rename MALLOC() => malloc_T()

The 'T' in the name notes that this API is a type-safe variant of the
API it wraps.  This makes the names more explicative.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/: Rename XREALLOC() => xrealloc_T()
Alejandro Colomar [Sat, 15 Nov 2025 20:58:10 +0000 (21:58 +0100)] 
lib/: Rename XREALLOC() => xrealloc_T()

The 'T' in the name notes that this API is a type-safe variant of the
API it wraps.  This makes the names more explicative.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/: Rename REALLOC() => realloc_T()
Alejandro Colomar [Sat, 15 Nov 2025 20:56:34 +0000 (21:56 +0100)] 
lib/: Rename REALLOC() => realloc_T()

The 'T' in the name notes that this API is a type-safe variant of the
API it wraps.  This makes the names more explicative.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/, src/: Rename REALLOCF() => reallocf_T()
Alejandro Colomar [Sat, 15 Nov 2025 20:47:56 +0000 (21:47 +0100)] 
lib/, src/: Rename REALLOCF() => reallocf_T()

The 'T' in the name notes that this API is a type-safe variant of the
API it wraps.  This makes the names more explicative.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/alloc/: REALLOC[F](): Move _Generic(3) to separate line
Alejandro Colomar [Fri, 14 Nov 2025 00:50:11 +0000 (01:50 +0100)] 
lib/alloc/: REALLOC[F](): Move _Generic(3) to separate line

This should be more readable.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/: Use compound literals to avoid casts
Alejandro Colomar [Fri, 14 Nov 2025 01:29:16 +0000 (02:29 +0100)] 
lib/: Use compound literals to avoid casts

Casts are unsafe.

Compound literals also have the ability of converting values, but they
don't have the unwanted effects on safety --casts disable most useful
diagnostics--.

Compound literals are lvalues, which means their address can be taken,
and they can also be assigned to.  To avoid this, we force lvalue
conversion through a statement expression.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/alloc/: reallocarray[f]_(): Add helper macros to handle n?:1
Alejandro Colomar [Sat, 15 Nov 2025 20:33:21 +0000 (21:33 +0100)] 
lib/alloc/: reallocarray[f]_(): Add helper macros to handle n?:1

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/gshadow.c: fgetsgent(): Don't use static variables
Alejandro Colomar [Mon, 22 Jul 2024 17:34:21 +0000 (19:34 +0200)] 
lib/gshadow.c: fgetsgent(): Don't use static variables

BTW, getline(3) says we are responsible for free(3)ing the buffer on
error.

Reported-by: Chris Hofstaedtler <zeha@debian.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/: Use getline(3) instead of its pattern
Alejandro Colomar [Mon, 22 Jul 2024 11:46:32 +0000 (13:46 +0200)] 
lib/: Use getline(3) instead of its pattern

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/, po/: Remove fgetsx() and fputsx()
Alejandro Colomar [Sun, 21 Jul 2024 16:40:25 +0000 (18:40 +0200)] 
lib/, po/: Remove fgetsx() and fputsx()

It seems they never worked correctly.  Let's keep it simple and remove
support for escaped newlines.

Closes: <https://github.com/shadow-maint/shadow/issues/1055>
Reported-by: Chris Hofstaedtler <zeha@debian.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agotests/system/tests/test_newgrp.py: change to new group
Iker Pedrosa [Thu, 21 Aug 2025 10:57:16 +0000 (12:57 +0200)] 
tests/system/tests/test_newgrp.py: change to new group

Change to a new group using `newgrp`.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agotests/system/framework/roles/shadow.py: implement binding for `newgrp`
Iker Pedrosa [Thu, 21 Aug 2025 10:55:20 +0000 (12:55 +0200)] 
tests/system/framework/roles/shadow.py: implement binding for `newgrp`

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agoshare/ansible/: Make sure `expect` is found in Alpine
Iker Pedrosa [Thu, 21 Aug 2025 13:37:41 +0000 (15:37 +0200)] 
share/ansible/: Make sure `expect` is found in Alpine

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agoshare/ansible/: install `expect` package
Iker Pedrosa [Thu, 21 Aug 2025 10:54:21 +0000 (12:54 +0200)] 
share/ansible/: install `expect` package

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agotests/system/tests/test_groupmems.py: add user to group as root user
Iker Pedrosa [Tue, 19 Aug 2025 09:26:18 +0000 (11:26 +0200)] 
tests/system/tests/test_groupmems.py: add user to group as root user

This is the transformation to Python of the test located in
`tests/grouptools/groupmems/01_groupmems_root_add_user/groupmems.test`,
which checks that `groupmems` is able to add a user to a group running
as the root user.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agotests/system/framework/roles/shadow.py: implement binding for `groupmems`
Iker Pedrosa [Tue, 19 Aug 2025 09:23:16 +0000 (11:23 +0200)] 
tests/system/framework/roles/shadow.py: implement binding for `groupmems`

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agoshare/ansible/: create the groupmems PAM service file
Iker Pedrosa [Tue, 19 Aug 2025 09:47:42 +0000 (11:47 +0200)] 
share/ansible/: create the groupmems PAM service file

Temporary workaround to create the groupmems PAM service file. Fedora
will soon provide this service file and we'll be able to remove the
workaround.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agotests/system/tests/test_newusers.py: create multiple users using file input
Iker Pedrosa [Fri, 8 Aug 2025 15:08:20 +0000 (17:08 +0200)] 
tests/system/tests/test_newusers.py: create multiple users using file input

This is the transformation to Python of the test located in
`tests/newusers/20_multiple_users/newusers.test`, which checks that
`newusers` is able to create new users from file.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agotests/system/tests/test_newusers.py: create multiple users from stdin
Iker Pedrosa [Fri, 8 Aug 2025 15:05:42 +0000 (17:05 +0200)] 
tests/system/tests/test_newusers.py: create multiple users from stdin

This is the transformation to Python of the test located in
`tests/newusers/35_read_from_stdin/newusers.test`, which checks that
`newusers` is able to create new users from stdin.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agotests/system/framework/roles/shadow.py: implement binding for `newusers`
Iker Pedrosa [Fri, 8 Aug 2025 14:22:16 +0000 (16:22 +0200)] 
tests/system/framework/roles/shadow.py: implement binding for `newusers`

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agoshare/ansible/: create the newusers PAM service file
Iker Pedrosa [Fri, 8 Aug 2025 14:20:59 +0000 (16:20 +0200)] 
share/ansible/: create the newusers PAM service file

Temporary workaround to create the newusers PAM service file. Fedora
will soon provide this service file and we'll be able to remove the
workaround.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agolib/search/: Use (void)0 within _Generic(3) to avoid -Wunused-value diagnostics
Alejandro Colomar [Fri, 5 Dec 2025 15:06:15 +0000 (16:06 +0100)] 
lib/search/: Use (void)0 within _Generic(3) to avoid -Wunused-value diagnostics

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/sssd.h: sssd_flush_cache(): Define as static inline function
Alejandro Colomar [Fri, 21 Feb 2025 07:41:37 +0000 (08:41 +0100)] 
lib/sssd.h: sssd_flush_cache(): Define as static inline function

Being a macro, the unused return value triggers a diagnostic.
This probably needs further investigation, but we have the issue linked
below for that.

Link: <https://github.com/shadow-maint/shadow/issues/1221>
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agoautogen.sh: CFLAGS: Promose some -Wunused-* to an error
Alejandro Colomar [Sat, 29 Nov 2025 23:24:13 +0000 (00:24 +0100)] 
autogen.sh: CFLAGS: Promose some -Wunused-* to an error

Reviewed-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/prefix_flag.c: Add [[gnu::unused]] to variable used in conditionally-compiled...
Alejandro Colomar [Fri, 21 Feb 2025 07:47:29 +0000 (08:47 +0100)] 
lib/prefix_flag.c: Add [[gnu::unused]] to variable used in conditionally-compiled code

Reviewed-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/, src/: Add [[gnu::unused]] to parameters used in conditionally-compiled code
Alejandro Colomar [Fri, 21 Feb 2025 07:05:42 +0000 (08:05 +0100)] 
lib/, src/: Add [[gnu::unused]] to parameters used in conditionally-compiled code

Reviewed-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/logind.c: Unname unused function parameter
Alejandro Colomar [Fri, 21 Feb 2025 05:46:53 +0000 (06:46 +0100)] 
lib/logind.c: Unname unused function parameter

[Serge: preference to keep the names as a comment, but ok]
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/, src/ tests/: Unname unused parameters in callbacks
Alejandro Colomar [Fri, 21 Feb 2025 05:25:15 +0000 (06:25 +0100)] 
lib/, src/ tests/: Unname unused parameters in callbacks

[Serge: preference to keep the names as a comment, but ok]
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agosrc/: Unname unused parameter of main()
Alejandro Colomar [Thu, 20 Feb 2025 16:44:02 +0000 (17:44 +0100)] 
src/: Unname unused parameter of main()

Reviewed-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agonewusers: allow not passing a password
Antonio Terceiro [Sun, 24 Aug 2025 13:59:07 +0000 (10:59 -0300)] 
newusers: allow not passing a password

A possible use case for this is wanting to add subuid/subgid entries for
an existing user. This change makes it possible to pass `username::::::`
to newusers; the empty password will be ignored an everything else will
be done. Currently this fails miserably, as PAM errors out on a empty
password.

Signed-off-by: Antonio Terceiro <terceiro@debian.org>
3 weeks agolib/{alloc,search}/: Use typeas() to add support for arbitrary types
Alejandro Colomar [Sat, 15 Nov 2025 19:42:21 +0000 (20:42 +0100)] 
lib/{alloc,search}/: Use typeas() to add support for arbitrary types

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/sizeof.h: typeas(): Add macro
Alejandro Colomar [Sat, 15 Nov 2025 19:21:25 +0000 (20:21 +0100)] 
lib/sizeof.h: typeas(): Add macro

This macro is like typeof(), but requires that the input is a type name.

This macro is useful because it parenthesizes the type name, which
allows one to create pointers to arbitrary types.  The following code
works for simple types:

T  x;
T  *p;

For example, that would work fine for 'int':

int  x;
int  *p;

However, that wouldn't work for types such as 'int[3]':

int[3]  x;
int[3]  *p;

But if we do instead

typeas(T)  x;
typeas(T)  *p;

now we can use 'int[3]' just fine:

typeof((int[3]){})  x;
typeof((int[3]){})  *p;

To understand this, we create a compound literal of type int[3], with
default values (zero, zero, zero), then get it's type, which is
obviously int[3].  And then we use that to declare a variable x of that
type, and a pointer p, which has type 'int(*)[3]'.

This would also work with something simpler.  One could use typeof(T)
directly:

typeof(T)  x;
typeof(T)  *p;

However, typeof() doesn't require that the input is a type; it accepts
arbitrary input.  The following is valid C:

typeof(42)  x;

For our macro MALLOC(), where we want the second argument to be a type
name, we want to require that the argument is a type name.  For that, we
need to use typeas().

Reported-by: Alejandro Colomar <alx@kernel.org>
Suggested-by: Thiago Adams <thiago.adams@gmail.com>
Suggested-by: Martin Uecker <uecker@tugraz.at>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/search/: Split APIs
Alejandro Colomar [Sat, 15 Nov 2025 20:42:56 +0000 (21:42 +0100)] 
lib/search/: Split APIs

Have xxx_T() macros that only add type safety to the function they wrap.

Have XXX() macros that do more magic; in this case, they deduce the
comparison function that is appropriate for the type.

This will allow using the xxx_T() macros in more complex cases, where
the function can't be deduced just from the type.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/search/: Simplify CMP()
Alejandro Colomar [Sat, 15 Nov 2025 19:47:43 +0000 (20:47 +0100)] 
lib/search/: Simplify CMP()

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/search/, lib/, src/: Add a type parameter to the type-safe macros
Alejandro Colomar [Fri, 14 Nov 2025 00:20:41 +0000 (01:20 +0100)] 
lib/search/, lib/, src/: Add a type parameter to the type-safe macros

This simplifies the implementation, allowing us to use _Generic(3) to
replace _Static_assert(3), is_same_type(), and local variables.

Local variables in macros can cause issues when nesting such macros.

This also makes the code more readable, by having the type explicitly
stated at call site.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/: Use a consistent name for macro arguments representing a type name
Alejandro Colomar [Sat, 15 Nov 2025 19:55:25 +0000 (20:55 +0100)] 
lib/: Use a consistent name for macro arguments representing a type name

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agosrc/: Fix uninitialized flags, and use const appropriately
Alejandro Colomar [Fri, 5 Dec 2025 13:11:56 +0000 (14:11 +0100)] 
src/: Fix uninitialized flags, and use const appropriately

In all these functions, we were setting the flags to 'true' in
process_flags() if the appropriate command-line flag was specified.
However, they were never being defined to 'false', which should be the
default value.  Initialize these flags to false.

Fixes: c0c9485d9a5a (2025-10-07; "src/useradd.c: chroot or prefix SELinux file context")
Link: <https://github.com/shadow-maint/shadow/pull/1396>
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Cc: Iker Pedrosa <ipedrosa@redhat.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agoUpdate po and potfiles
Serge Hallyn [Fri, 5 Dec 2025 05:00:56 +0000 (23:00 -0600)] 
Update po and potfiles

I just did a 'make dist', then committed the updates to the po and
shadow.pot files.

Closes #1359

Signed-off-by: Serge Hallyn <serge@hallyn.com>
CC: Chris Hofstaedtler <zeha@debian.org>
3 weeks agouseradd: fix uninitialized flags causing aarch64 failure
Iker Pedrosa [Tue, 25 Nov 2025 08:52:03 +0000 (09:52 +0100)] 
useradd: fix uninitialized flags causing aarch64 failure

Initialize option_flags structure to prevent garbage memory values in
`flags.chroot` and `flags.prefix` fields. Uninitialized memory caused
architecture-specific failures where process_selinux evaluation
differed between x86_64 and aarch64, leading to `pw_close()` failures
when SELinux contexts weren't properly managed.

Fixes: c0c9485d (2025-04-25; "src/useradd.c: chroot or prefix SELinux file context")
Link: <https://bodhi.fedoraproject.org/updates/FEDORA-2025-3d835cfb15>
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
3 weeks agoautogen.sh: CFLAGS: Promote -Wdiscarded-qualifiers to an error
Alejandro Colomar [Thu, 20 Feb 2025 16:16:13 +0000 (17:16 +0100)] 
autogen.sh: CFLAGS: Promote -Wdiscarded-qualifiers to an error

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agolib/string/strspn/: Add missing const
Alejandro Colomar [Wed, 19 Feb 2025 17:52:45 +0000 (18:52 +0100)] 
lib/string/strspn/: Add missing const

Closes: <https://github.com/shadow-maint/shadow/issues/1218>
Reported-by: Chris Hofstaedtler <zeha@debian.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agosrc/usermod.c: $user_newhome: Remove all trailing '/'s
Alejandro Colomar [Mon, 13 Oct 2025 13:36:32 +0000 (15:36 +0200)] 
src/usermod.c: $user_newhome: Remove all trailing '/'s

FTR: I'm not entirely sure if an empty string can arrive here.  It might
be that the streq() check is dead code, but I'm not sure, so I put it.
It also makes the code more robust.

Signed-off-by: Alejandro Colomar <alx@kernel.org>
3 weeks agoconfigure.ac, Makefile.am: Propagate ./configure flags to 'distcheck'
Alejandro Colomar [Sat, 2 Aug 2025 10:35:41 +0000 (12:35 +0200)] 
configure.ac, Makefile.am: Propagate ./configure flags to 'distcheck'

'make distcheck' runs ./configure (among other things).  That command
should inherit the flags passed on the command line, as they are the
flags necessary to build in the current system.

This also allows testing different configurations in the same system.
Until now, we only tested the default automagic configuration.  With
this change, one can test the same default automagic configuration, by
not passing any flags to ./configure, or they can test more specific
configurations, by passing flags.

This allows removing the hardcoded AM_DISTCHECK_CONFIGURE_FLAGS in the
"Makefile.am".

Signed-off-by: Alejandro Colomar <alx@kernel.org>