*
* type - type of message. A list of possible values is available in
* "audit-records.h" file.
- * pgname - program's name
* op - operation. "adding user", "changing finger info", "deleting group"
* name - user's account or group name. If not available use NULL.
* id - uid or gid that the operation is being performed on. This is used
* only when user is NULL.
*/
-void audit_logger (int type, MAYBE_UNUSED const char *pgname, const char *op,
+void audit_logger (int type, const char *op,
const char *name, unsigned int id,
shadow_audit_result result)
{
SYSLOG ((LOG_ERR, "failed to add group %s", name));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_GROUP, log_get_progname(),
+ audit_logger (AUDIT_ADD_GROUP,
"",
name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
SYSLOG ((LOG_ERR, "failed to remove group %s", name));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_DEL_GROUP, log_get_progname(),
+ audit_logger (AUDIT_DEL_GROUP,
"",
name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
gr_dbname (),
info->action));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_GRP_MGMT, log_get_progname(),
+ audit_logger (AUDIT_GRP_MGMT,
info->audit_msg,
info->name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
sgr_dbname (),
info->action));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_GRP_MGMT, log_get_progname(),
+ audit_logger (AUDIT_GRP_MGMT,
info->audit_msg,
info->name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
SYSLOG ((LOG_ERR, "failed to add group %s to %s", name, gr_dbname ()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_GROUP, log_get_progname(),
+ audit_logger (AUDIT_ADD_GROUP,
"adding-group",
name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
SYSLOG ((LOG_ERR, "failed to add group %s to %s", name, sgr_dbname ()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_GRP_MGMT, log_get_progname(),
+ audit_logger (AUDIT_GRP_MGMT,
"adding-shadow-group",
name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
"failed to remove group %s from %s",
name, gr_dbname ()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_DEL_GROUP, log_get_progname(),
+ audit_logger (AUDIT_DEL_GROUP,
"removing-group",
name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
"failed to remove group %s from %s",
name, sgr_dbname ()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_GRP_MGMT, log_get_progname(),
+ audit_logger (AUDIT_GRP_MGMT,
"removing-shadow-group",
name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
SYSLOG ((LOG_ERR, "failed to add user %s", name));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_USER, log_get_progname(),
+ audit_logger (AUDIT_ADD_USER,
"",
name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
pw_dbname (),
info->action));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_MGMT, log_get_progname(),
+ audit_logger (AUDIT_USER_MGMT,
info->audit_msg,
info->name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
SYSLOG ((LOG_ERR, "failed to add user %s to %s", name, pw_dbname ()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_USER, log_get_progname(),
+ audit_logger (AUDIT_ADD_USER,
"adding-user",
name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
SYSLOG ((LOG_ERR, "failed to add user %s to %s", name, spw_dbname ()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_MGMT, log_get_progname(),
+ audit_logger (AUDIT_USER_MGMT,
"adding-shadow-user",
name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
typedef enum {
SHADOW_AUDIT_FAILURE = 0,
SHADOW_AUDIT_SUCCESS = 1} shadow_audit_result;
-extern void audit_logger (int type, const char *pgname, const char *op,
+extern void audit_logger (int type, const char *op,
const char *name, unsigned int id,
shadow_audit_result result);
void audit_logger_message (const char *message, shadow_audit_result result);
#ifdef WITH_AUDIT
if (E_SUCCESS != code) {
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"change-age", user_name, user_uid, SHADOW_AUDIT_FAILURE);
}
#endif
}
#ifdef WITH_AUDIT
else {
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"change-all-aging-information",
user_name, user_uid, SHADOW_AUDIT_SUCCESS);
}
} else {
#ifdef WITH_AUDIT
if (Mflg) {
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"change-max-age", user_name, user_uid, SHADOW_AUDIT_SUCCESS);
}
if (mflg) {
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"change-min-age", user_name, user_uid, 1);
}
if (dflg) {
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"change-last-change-date",
user_name, user_uid, 1);
}
if (Wflg) {
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"change-passwd-warning",
user_name, user_uid, 1);
}
if (Iflg) {
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"change-inactive-days",
user_name, user_uid, 1);
}
if (Eflg) {
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"change-passwd-expiration",
user_name, user_uid, 1);
}
static void fail_exit(int status)
{
#ifdef WITH_AUDIT
- audit_logger(AUDIT_ADD_GROUP, Prog, "add-group", group_name,
+ audit_logger(AUDIT_ADD_GROUP, "add-group", group_name,
AUDIT_NO_ID, SHADOW_AUDIT_FAILURE);
#endif
exit (status);
fail_exit (E_GRP_UPDATE);
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_GROUP, Prog,
+ audit_logger (AUDIT_ADD_GROUP,
"add-group",
group_name, group_id, SHADOW_AUDIT_SUCCESS);
#endif
fail_exit (E_GRP_UPDATE);
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_GRP_MGMT, Prog,
+ audit_logger (AUDIT_GRP_MGMT,
"add-shadow-group",
group_name, group_id, SHADOW_AUDIT_SUCCESS);
#endif
static void fail_exit(int status)
{
#ifdef WITH_AUDIT
- audit_logger(AUDIT_GRP_MGMT, Prog, "delete-group", group_name,
+ audit_logger(AUDIT_GRP_MGMT, "delete-group", group_name,
AUDIT_NO_ID, SHADOW_AUDIT_FAILURE);
#endif
exit (status);
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_DEL_GROUP, Prog,
+ audit_logger (AUDIT_DEL_GROUP,
"delete-group",
group_name, group_id, SHADOW_AUDIT_SUCCESS);
#endif
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_GRP_MGMT, Prog,
+ audit_logger (AUDIT_GRP_MGMT,
"delete-shadow-group",
group_name, group_id, SHADOW_AUDIT_SUCCESS);
#endif
exit (E_GRP_UPDATE);
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_GRP_MGMT, Prog,
+ audit_logger (AUDIT_GRP_MGMT,
info_group.audit_msg,
group_name, AUDIT_NO_ID,
SHADOW_AUDIT_SUCCESS);
#ifdef WITH_AUDIT
/* If both happened, log password change as its more important */
if (pflg)
- audit_logger (AUDIT_GRP_CHAUTHTOK, Prog,
+ audit_logger (AUDIT_GRP_CHAUTHTOK,
info_gshadow.audit_msg,
group_name, AUDIT_NO_ID,
SHADOW_AUDIT_SUCCESS);
else
- audit_logger (AUDIT_GRP_MGMT, Prog,
+ audit_logger (AUDIT_GRP_MGMT,
info_gshadow.audit_msg,
group_name, AUDIT_NO_ID,
SHADOW_AUDIT_SUCCESS);
exit (E_GRP_UPDATE);
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_GRP_MGMT, Prog,
+ audit_logger (AUDIT_GRP_MGMT,
info_passwd.audit_msg,
group_name, AUDIT_NO_ID,
SHADOW_AUDIT_SUCCESS);
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_GRP_MGMT, Prog,
+ audit_logger (AUDIT_GRP_MGMT,
"modify-group",
group_name, AUDIT_NO_ID,
SHADOW_AUDIT_SUCCESS);
#endif
strcpy (ll.ll_line, "lastlog");
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ACCT_UNLOCK, Prog,
+ audit_logger (AUDIT_ACCT_UNLOCK,
"clearing-lastlog",
pw->pw_name, pw->pw_uid, SHADOW_AUDIT_SUCCESS);
#endif
}
#ifdef WITH_AUDIT
else {
- audit_logger (AUDIT_ACCT_UNLOCK, Prog,
+ audit_logger (AUDIT_ACCT_UNLOCK,
"refreshing-lastlog",
pw->pw_name, pw->pw_uid, SHADOW_AUDIT_SUCCESS);
}
#ifdef WITH_AUDIT
SNPRINTF(audit_buf, "authentication new_gid=%lu",
(unsigned long) grp->gr_gid);
- audit_logger (AUDIT_GRP_AUTH, Prog,
+ audit_logger (AUDIT_GRP_AUTH,
audit_buf, NULL, getuid (), SHADOW_AUDIT_FAILURE);
#endif
SYSLOG ((LOG_INFO,
#ifdef WITH_AUDIT
SNPRINTF(audit_buf, "authentication new_gid=%lu",
(unsigned long) grp->gr_gid);
- audit_logger (AUDIT_GRP_AUTH, Prog,
+ audit_logger (AUDIT_GRP_AUTH,
audit_buf, NULL, getuid (), SHADOW_AUDIT_SUCCESS);
#endif
}
getuid(), "new_group", group,
SHADOW_AUDIT_FAILURE);
} else {
- audit_logger (AUDIT_CHGRP_ID, Prog,
+ audit_logger (AUDIT_CHGRP_ID,
"changing", NULL, getuid(),
SHADOW_AUDIT_FAILURE);
}
fprintf (stderr, _("%s: Cannot determine your user name.\n"),
Prog);
#ifdef WITH_AUDIT
- audit_logger (AUDIT_CHGRP_ID, Prog,
+ audit_logger (AUDIT_CHGRP_ID,
"changing", NULL, getuid (), SHADOW_AUDIT_FAILURE);
#endif
SYSLOG ((LOG_WARN, "Cannot determine the user name of the caller (UID %lu)",
audit_logger_with_group(AUDIT_CHGRP_ID, "changing", NULL, getuid(),
"new_group", group, SHADOW_AUDIT_FAILURE);
} else {
- audit_logger(AUDIT_CHGRP_ID, Prog,
+ audit_logger(AUDIT_CHGRP_ID,
"changing", NULL, getuid(), SHADOW_AUDIT_FAILURE);
}
#endif
perror ("setgid");
#ifdef WITH_AUDIT
SNPRINTF(audit_buf, "changing new_gid=%lu", (unsigned long) gid);
- audit_logger (AUDIT_CHGRP_ID, Prog,
+ audit_logger (AUDIT_CHGRP_ID,
audit_buf, NULL, getuid (), SHADOW_AUDIT_FAILURE);
#endif
exit (EXIT_FAILURE);
perror ("setuid");
#ifdef WITH_AUDIT
SNPRINTF(audit_buf, "changing new_gid=%lu", (unsigned long) gid);
- audit_logger (AUDIT_CHGRP_ID, Prog,
+ audit_logger (AUDIT_CHGRP_ID,
audit_buf, NULL, getuid (), SHADOW_AUDIT_FAILURE);
#endif
exit (EXIT_FAILURE);
execl (SHELL, "sh", "-c", command, (char *) NULL);
#ifdef WITH_AUDIT
SNPRINTF(audit_buf, "changing new_gid=%lu", (unsigned long) gid);
- audit_logger (AUDIT_CHGRP_ID, Prog,
+ audit_logger (AUDIT_CHGRP_ID,
audit_buf, NULL, getuid (), SHADOW_AUDIT_FAILURE);
#endif
perror (SHELL);
#ifdef WITH_AUDIT
SNPRINTF(audit_buf, "changing new_gid=%lu", (unsigned long) gid);
- audit_logger (AUDIT_CHGRP_ID, Prog,
+ audit_logger (AUDIT_CHGRP_ID,
audit_buf, NULL, getuid (), SHADOW_AUDIT_SUCCESS);
#endif
/*
getuid(), "new_group", group,
SHADOW_AUDIT_FAILURE);
} else {
- audit_logger (AUDIT_CHGRP_ID, Prog,
+ audit_logger (AUDIT_CHGRP_ID,
"changing", NULL, getuid (), 0);
}
#endif
else
type = AUDIT_ADD_USER;
- audit_logger (type, Prog,
+ audit_logger (type,
"add-user",
user_name, AUDIT_NO_ID, SHADOW_AUDIT_FAILURE);
#endif
goto err_free_def;
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USYS_CONFIG, Prog,
+ audit_logger (AUDIT_USYS_CONFIG,
"changing-useradd-defaults",
NULL, AUDIT_NO_ID,
SHADOW_AUDIT_SUCCESS);
Prog, user_name);
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_USER, Prog,
+ audit_logger (AUDIT_ADD_USER,
"add-user",
user_name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
fprintf (stderr, _("%s: failed to unlock %s\n"), Prog, spw_dbname ());
SYSLOG ((LOG_ERR, "failed to unlock %s", spw_dbname ()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_USER, Prog,
+ audit_logger (AUDIT_ADD_USER,
"unlocking-shadow-file",
user_name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
fprintf (stderr, _("%s: failed to unlock %s\n"), Prog, pw_dbname ());
SYSLOG ((LOG_ERR, "failed to unlock %s", pw_dbname ()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_USER, Prog,
+ audit_logger (AUDIT_ADD_USER,
"unlocking-passwd-file",
user_name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
fprintf (stderr, _("%s: failed to unlock %s\n"), Prog, sub_uid_dbname ());
SYSLOG ((LOG_ERR, "failed to unlock %s", sub_uid_dbname ()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_USER, Prog,
+ audit_logger (AUDIT_ADD_USER,
"unlocking-subordinate-user-file",
user_name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
fprintf (stderr, _("%s: failed to unlock %s\n"), Prog, sub_gid_dbname ());
SYSLOG ((LOG_ERR, "failed to unlock %s", sub_gid_dbname ()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_USER, Prog,
+ audit_logger (AUDIT_ADD_USER,
"unlocking-subordinate-group-file",
user_name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
fprintf (stderr, _("%s: failed to unlock %s\n"), Prog, gr_dbname ());
SYSLOG ((LOG_ERR, "failed to unlock %s", gr_dbname ()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_USER, Prog,
+ audit_logger (AUDIT_ADD_USER,
"unlocking-group-file",
user_name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
fprintf (stderr, _("%s: failed to unlock %s\n"), Prog, sgr_dbname ());
SYSLOG ((LOG_ERR, "failed to unlock %s", sgr_dbname ()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_USER, Prog,
+ audit_logger (AUDIT_ADD_USER,
"unlocking-gshadow-file",
user_name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
_("%s: failed to prepare the new %s entry '%s'\n"),
Prog, gr_dbname (), grp.gr_name);
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_GROUP, Prog,
+ audit_logger (AUDIT_ADD_GROUP,
"add-group",
grp.gr_name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
_("%s: failed to prepare the new %s entry '%s'\n"),
Prog, sgr_dbname (), sgrp.sg_namp);
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_GROUP, Prog,
+ audit_logger (AUDIT_ADD_GROUP,
"add-group",
grp.gr_name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
#endif /* SHADOWGRP */
SYSLOG ((LOG_INFO, "new group: name=%s, GID=%u", user_name, user_gid));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ADD_GROUP, Prog,
+ audit_logger (AUDIT_ADD_GROUP,
"add-group",
grp.gr_name, AUDIT_NO_ID,
SHADOW_AUDIT_SUCCESS);
* because its not written to disk yet. After close_files it is
* and we can use the real ID thereafter.
*/
- audit_logger (AUDIT_ADD_USER, Prog,
+ audit_logger (AUDIT_ADD_USER,
"add-user",
user_name, AUDIT_NO_ID,
SHADOW_AUDIT_SUCCESS);
}
home_added = true;
#ifdef WITH_AUDIT
- audit_logger(AUDIT_USER_MGMT, Prog, "add-home-dir",
+ audit_logger(AUDIT_USER_MGMT, "add-home-dir",
user_name, user_id, SHADOW_AUDIT_SUCCESS);
#endif
#ifdef WITH_SELINUX
_("%s: warning: the user name %s to %s SELinux user mapping failed.\n"),
Prog, user_name, user_selinux);
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ROLE_ASSIGN, Prog,
+ audit_logger (AUDIT_ROLE_ASSIGN,
"add-selinux-user-mapping",
user_name, user_id, SHADOW_AUDIT_FAILURE);
#endif /* WITH_AUDIT */
#endif /* ENABLE_SUBIDS */
#ifdef WITH_AUDIT
- audit_logger (AUDIT_DEL_USER, Prog,
+ audit_logger (AUDIT_DEL_USER,
"delete-user",
user_name, user_id, SHADOW_AUDIT_FAILURE);
#endif /* WITH_AUDIT */
}
#endif /* ENABLE_SUBIDS */
#ifdef WITH_AUDIT
- audit_logger (AUDIT_DEL_USER, Prog,
+ audit_logger (AUDIT_DEL_USER,
"delete-user",
user_name, user_id, SHADOW_AUDIT_SUCCESS);
#endif /* WITH_AUDIT */
Prog, mailfile, strerrno());
SYSLOG((LOG_ERR, "Cannot remove %s: %s", mailfile, strerrno()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_DEL_USER, Prog,
+ audit_logger (AUDIT_DEL_USER,
"delete-mail-file",
user_name, user_id, SHADOW_AUDIT_FAILURE);
#endif /* WITH_AUDIT */
Prog, mailfile, strerrno());
SYSLOG((LOG_ERR, "Cannot remove %s: %s", mailfile, strerrno()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_DEL_USER, Prog,
+ audit_logger (AUDIT_DEL_USER,
"delete-mail-file",
user_name, user_id, SHADOW_AUDIT_FAILURE);
#endif /* WITH_AUDIT */
#ifdef WITH_AUDIT
else
{
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"delete-mail-file",
user_name, user_id, SHADOW_AUDIT_SUCCESS);
}
Prog, mailfile, user_name);
SYSLOG((LOG_ERR, "%s not owned by %s, not removed", mailfile, strerrno()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_DEL_USER, Prog,
+ audit_logger (AUDIT_DEL_USER,
"delete-mail-file",
user_name, user_id, SHADOW_AUDIT_FAILURE);
#endif /* WITH_AUDIT */
Prog, mailfile, strerrno());
SYSLOG((LOG_ERR, "Cannot remove %s: %s", mailfile, strerrno()));
#ifdef WITH_AUDIT
- audit_logger (AUDIT_DEL_USER, Prog,
+ audit_logger (AUDIT_DEL_USER,
"delete-mail-file",
user_name, user_id, SHADOW_AUDIT_FAILURE);
#endif /* WITH_AUDIT */
#ifdef WITH_AUDIT
else
{
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"delete-mail-file",
user_name, user_id, SHADOW_AUDIT_SUCCESS);
}
fprintf (stderr, _("%s: user '%s' does not exist\n"),
Prog, user_name);
#ifdef WITH_AUDIT
- audit_logger (AUDIT_DEL_USER, Prog,
+ audit_logger (AUDIT_DEL_USER,
"deleting-user-not-found",
user_name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
if (streq(prefix, "") && !flags.chroot && user_busy(user_name, user_id) != 0) {
if (!fflg) {
#ifdef WITH_AUDIT
- audit_logger (AUDIT_DEL_USER, Prog,
+ audit_logger (AUDIT_DEL_USER,
"deleting-user-logged-in",
user_name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
#ifdef WITH_AUDIT
else
{
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"deleting-home-directory",
user_name, user_id, SHADOW_AUDIT_SUCCESS);
}
}
#ifdef WITH_AUDIT
if (errors) {
- audit_logger (AUDIT_DEL_USER, Prog,
+ audit_logger (AUDIT_DEL_USER,
"deleting-home-directory",
user_name, AUDIT_NO_ID,
SHADOW_AUDIT_FAILURE);
_("%s: warning: the user name %s to SELinux user mapping removal failed.\n"),
Prog, user_name);
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ROLE_REMOVE, Prog,
+ audit_logger (AUDIT_ROLE_REMOVE,
"delete-selinux-user-mapping",
user_name, user_id, SHADOW_AUDIT_FAILURE);
#endif /* WITH_AUDIT */
{
if (Lflg && ('!' != pw_pass[0])) {
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
+ audit_logger (AUDIT_USER_CHAUTHTOK,
"updating-passwd", user_newname, user_newid, 1);
#endif
SYSLOG ((LOG_INFO, "lock user '%s' password", user_newname));
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
+ audit_logger (AUDIT_USER_CHAUTHTOK,
"updating-password", user_newname, user_newid, 1);
#endif
SYSLOG ((LOG_INFO, "unlock user '%s' password", user_newname));
memmove(pw_pass, pw_pass + 1, strlen(pw_pass));
} else if (pflg) {
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_CHAUTHTOK, Prog,
+ audit_logger (AUDIT_USER_CHAUTHTOK,
"updating-password", user_newname, user_newid, 1);
#endif
SYSLOG ((LOG_INFO, "change user '%s' password", user_newname));
fail_exit (E_NAME_IN_USE, process_selinux);
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"changing-name", user_newname, user_newid, 1);
#endif
SYSLOG ((LOG_INFO,
if (uflg) {
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"changing-uid", user_newname, user_newid, 1);
#endif
SYSLOG ((LOG_INFO,
}
if (gflg) {
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"changing-primary-group",
user_newname, user_newid, 1);
#endif
}
if (cflg) {
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"changing-comment", user_newname, user_newid, 1);
#endif
pwent->pw_gecos = user_newcomment;
if (dflg) {
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"changing-home-dir",
user_newname, user_newid, 1);
#endif
}
if (sflg) {
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"changing-shell",
user_newname, user_newid, 1);
#endif
if (fflg) {
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"changing-inactive-days",
user_newname, user_newid, 1);
#endif
DAY_TO_STR(new_exp, user_newexpire);
DAY_TO_STR(old_exp, user_expire);
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"changing-expiration-date",
user_newname, user_newid, 1);
#endif
#endif /* ENABLE_SUBIDS */
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"modify-account",
user_name, AUDIT_NO_ID, SHADOW_AUDIT_FAILURE);
#endif
#ifdef WITH_AUDIT
if (uflg || gflg) {
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"updating-home-dir-owner",
user_newname, user_newid, 1);
}
fail_exit (E_HOMEDIR, process_selinux);
}
#ifdef WITH_AUDIT
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"moving-home-dir",
user_newname, user_newid, 1);
#endif
}
#ifdef WITH_AUDIT
audit_logger (AUDIT_USER_MGMT,
- Prog,
"moving-home-dir",
user_newname,
user_newid,
}
#ifdef WITH_AUDIT
else {
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"updating-mail-file-owner",
user_newname, user_newid, 1);
}
}
#ifdef WITH_AUDIT
else {
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"updating-mail-file-name",
user_newname, user_newid, 1);
}
_("%s: warning: the user name %s to %s SELinux user mapping failed.\n"),
Prog, user_name, user_selinux);
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ROLE_ASSIGN, Prog,
+ audit_logger (AUDIT_ROLE_ASSIGN,
"changing-selinux-user-mapping ",
user_name, user_id,
SHADOW_AUDIT_FAILURE);
_("%s: warning: the user name %s to SELinux user mapping removal failed.\n"),
Prog, user_name);
#ifdef WITH_AUDIT
- audit_logger (AUDIT_ROLE_REMOVE, Prog,
+ audit_logger (AUDIT_ROLE_REMOVE,
"delete-selinux-user-mapping",
user_name, user_id,
SHADOW_AUDIT_FAILURE);
*/
#ifdef WITH_AUDIT
if (uflg || gflg) {
- audit_logger (AUDIT_USER_MGMT, Prog,
+ audit_logger (AUDIT_USER_MGMT,
"updating-home-dir-owner",
user_newname, user_newid, 1);
}