]>
git.ipfire.org Git - thirdparty/shadow.git/log
Alejandro Colomar [Fri, 21 Feb 2025 06:36:53 +0000 (07:36 +0100)]
lib/: Remove unused parameter $3 of password_check() and propagate
Propagate the removal of dead code to its callers, which were only
passing the parameter to this function.
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Fri, 21 Feb 2025 05:41:48 +0000 (06:41 +0100)]
lib/copydir.c: Remove unused parameter $2 of copy_hardlink()
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Fri, 21 Feb 2025 05:40:22 +0000 (06:40 +0100)]
lib/copydir.c: Remove unused parameter $3 of copy_symlink()
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Thu, 20 Feb 2025 16:46:23 +0000 (17:46 +0100)]
src/gpasswd.c: Remove unused parameter $1 of check_perms()
Fixes: 53e1eb404541 (2024-07-01; "src/: Remove dead code")
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Thu, 20 Feb 2025 16:37:56 +0000 (17:37 +0100)]
src/useradd.c: Remove unused variable
Fixes: d91b22cc2f6d (2024-07-08; "lib/, src/: Use stpsep() instead of its pattern")
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Tue, 22 Jul 2025 21:18:48 +0000 (23:18 +0200)]
lib/, src/: Use strerrno() instead of its pattern
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Tue, 22 Jul 2025 20:14:08 +0000 (22:14 +0200)]
lib/string/: strerrno(): Add macro
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Wed, 23 Jul 2025 20:50:51 +0000 (22:50 +0200)]
lib/getdef.h: Add missing includes
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Fri, 24 Oct 2025 10:09:55 +0000 (12:09 +0200)]
lib/utmp.c: ttyname_ra(): Add macro
And use it instead of its pattern.
This macro enforces correct use of ttyname_r(3) with arrays.
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Fri, 24 Oct 2025 09:55:06 +0000 (11:55 +0200)]
lib/utmp.c: is_my_tty(): Use ttyname_r(3) to make it re-entrant
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Fri, 24 Oct 2025 10:03:41 +0000 (12:03 +0200)]
lib/utmp.c: is_my_tty(): Rename local variable
This name makes the function definition more readable.
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Fri, 24 Oct 2025 10:22:24 +0000 (12:22 +0200)]
lib/utmp.c: is_my_tty(): Don't cache ttyname(3).
The method for checking for truncation was quite weird. By not caching
ttyname(3), we use it directly, without needing a temporary copy, which
removes opportunities for bugs.
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Wed, 1 Jan 2025 23:12:51 +0000 (00:12 +0100)]
lib/, src/, tests/: Move x*() definitions to non-x* header files
Now that all of these are one-liners, they don't need a separate header
file. Compact stuff.
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sat, 7 Jun 2025 17:29:10 +0000 (19:29 +0200)]
lib/string/strtok/: xastrsep2ls() Reimplement in terms of exit_if_null()
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Tue, 27 May 2025 08:48:28 +0000 (10:48 +0200)]
lib/string/strdup/xstrndup.h: Add STRNDUP()
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Wed, 1 Jan 2025 22:24:57 +0000 (23:24 +0100)]
lib/string/strdup/: XSTRNDUP(): Reimplement in terms of exit_if_null()
This is much simpler.
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 8 Dec 2024 11:21:06 +0000 (12:21 +0100)]
lib/string/sprintf/, tests/: xaprintf(): Reimplement in terms of exit_if_null()
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 8 Dec 2024 11:09:15 +0000 (12:09 +0100)]
lib/alloc/x/: X*ALLOC(): Reimplement in terms of exit_if_null()
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 8 Dec 2024 11:04:11 +0000 (12:04 +0100)]
lib/string/strdup/: xstrdup(): Reimplement xstrdup() in terms of exit_if_null()
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Tue, 5 Dec 2023 12:46:23 +0000 (13:46 +0100)]
lib/: exit_if_null(): Add macro to exit(3) on error
Writing an x*() variant function of several functions is unnecessary.
It's simpler to write a generic exit_if_null() macro that can be chained
with any other calls. With such a macro, the x*() variants can be
implemented as one-liner macros that are much easier to read:
For example:
#define xmalloc(size) exit_if_null(malloc(size))
If an error is detected, log an error, and exit(13). About why 13, I
don't really know. It's just what was used previously in xmalloc().
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 20 Jul 2025 15:02:17 +0000 (17:02 +0200)]
lib/, src/: Use STRNEQ() instead of their pattern
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 20 Jul 2025 14:51:30 +0000 (16:51 +0200)]
lib/string/strcmp/: strneq(), STRNEQ(): Add APIs
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 5 Oct 2025 08:09:04 +0000 (10:09 +0200)]
lib/attr.h: ATTR_NONSTRING: Add attribute [[gnu::nonstring]]
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Thu, 7 Aug 2025 12:24:13 +0000 (14:24 +0200)]
lib/attr.h: __has_c_attribute(): Define fallback
This allows using __has_c_attribute() in compilers that don't have it.
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Thu, 4 Jul 2024 16:47:58 +0000 (18:47 +0200)]
lib/, src/: Use strncmp(3) instead of explicit byte comparisons
This is simpler to read, IMO.
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sat, 9 Aug 2025 18:38:24 +0000 (20:38 +0200)]
lib/commonio.[ch]: struct commonio_ops: Add prefix 'cio_' to structure members
This structure has members that are named like libc APIs.
libc is allowed to provide any functions as macros (7.1.4p1 in C23).
This means that libc is allowed to provide a free(3) macro, which could
look like
#define free(p) __free(p)
And that would be expanded by the preprocessor in our code, turning our
structure members into some code that won't work (or even worse, it
might misbehave).
So, fix this undefined behavior.
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Serge Hallyn [Sat, 18 Oct 2025 16:48:09 +0000 (11:48 -0500)]
Merge pull request #1258 from ikerexxe/useradd-chroot
src/useradd.c: chroot or prefix SELinux file context
Alejandro Colomar [Wed, 15 Oct 2025 16:01:14 +0000 (18:01 +0200)]
src/usermod.c: Remove optimizations
These optimizations checked if the old value is the same as the new
value, and skip such changes. This was unnecessary, and added
complexity to the source code.
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Wed, 15 Oct 2025 16:01:14 +0000 (18:01 +0200)]
src/usermod.c: Remove 'no changes' informative output
No news is good news.
Debian needs to parse this message to ignore it, or alternatively check
if the call will be a no-op (which we already do) and skip the call.
If we remove this output, we're allowing Debian to remove that
complexity in their wrapper.
We don't expect this output to be very useful for interactive use
either.
Also, this message was changed from stderr to stdout recently, so we
don't need to worry about old scripts that might break due to this
change. If there were scripts relying on that, they would have been
broken already in the previous change.
Closes: <https://github.com/shadow-maint/shadow/issues/1361>
Reported-by: Marc Haber <githubvisible@zugschlus.de>
Cc: <https://github.com/cachius>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Iker Pedrosa [Fri, 4 Jul 2025 08:03:42 +0000 (10:03 +0200)]
man/: update `--root` flag with no SELinux support
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 12:29:55 +0000 (14:29 +0200)]
src/gpasswd.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 11:09:12 +0000 (13:09 +0200)]
src/pwunconv.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 11:08:10 +0000 (13:08 +0200)]
src/pwunconv.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 11:05:52 +0000 (13:05 +0200)]
src/pwconv.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 11:04:26 +0000 (13:04 +0200)]
src/pwconv.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 10:58:58 +0000 (12:58 +0200)]
src/pwck.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 10:55:35 +0000 (12:55 +0200)]
src/pwck.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 10:48:18 +0000 (12:48 +0200)]
src/passwd.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 10:35:44 +0000 (12:35 +0200)]
src/passwd.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 10:03:30 +0000 (12:03 +0200)]
src/chsh.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 09:59:32 +0000 (11:59 +0200)]
src/chsh.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 09:56:13 +0000 (11:56 +0200)]
src/chpasswd.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 09:52:52 +0000 (11:52 +0200)]
src/chpasswd.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 09:50:06 +0000 (11:50 +0200)]
src/chfn.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 09:45:29 +0000 (11:45 +0200)]
src/chfn.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 09:41:35 +0000 (11:41 +0200)]
src/chage.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 09:34:42 +0000 (11:34 +0200)]
src/chage.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 14:32:27 +0000 (16:32 +0200)]
src/grpunconv.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 14:30:47 +0000 (16:30 +0200)]
src/grpunconv.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 14:28:15 +0000 (16:28 +0200)]
src/grpconv.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 14:26:48 +0000 (16:26 +0200)]
src/grpconv.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 14:23:42 +0000 (16:23 +0200)]
src/grpck.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 14:17:35 +0000 (16:17 +0200)]
src/grpck.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 14:14:08 +0000 (16:14 +0200)]
src/groupmems.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 14:07:24 +0000 (16:07 +0200)]
src/groupmems.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 14:04:07 +0000 (16:04 +0200)]
src/chgpasswd.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 14:01:20 +0000 (16:01 +0200)]
src/chgpasswd.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 10:13:50 +0000 (12:13 +0200)]
src/groupdel.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Thu, 3 Jul 2025 10:10:06 +0000 (12:10 +0200)]
src/groupmod.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 20 May 2025 12:09:12 +0000 (14:09 +0200)]
src/groupadd.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Closes: https://github.com/shadow-maint/shadow/issues/940
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 20 May 2025 12:02:16 +0000 (14:02 +0200)]
lib/: add SELinux control flag in cleanup_unlock_*()
Expand cleanup_unlock_passwd(), cleanup_unlock_shadow(),
cleanup_unlock_group() and cleanup_unlock_gshadow() interfaces to add a
control flag for SELinux file context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 13:55:54 +0000 (15:55 +0200)]
src/newusers.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 13:50:17 +0000 (15:50 +0200)]
src/newusers.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 13:44:55 +0000 (15:44 +0200)]
src/userdel.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 13:37:50 +0000 (15:37 +0200)]
src/userdel.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 13:35:35 +0000 (15:35 +0200)]
src/userdel.c: replace global variable by flags structure
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 13:30:57 +0000 (15:30 +0200)]
src/usermod.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 12:53:13 +0000 (14:53 +0200)]
src/usermod.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 1 Jul 2025 11:23:08 +0000 (13:23 +0200)]
src/useradd.c: SELinux file context for fail_exit()
Do not process SELinux file context when running fail_exit() when chroot
or prefix options are selected.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Tue, 20 May 2025 10:38:16 +0000 (12:38 +0200)]
src/useradd.c: SELinux file context for home and mail
Do not process SELinux file context when creating home and mail folders
when chroot or prefix options are selected.
Closes: https://github.com/shadow-maint/shadow/issues/940
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 14:32:42 +0000 (16:32 +0200)]
src/useradd.c: chroot or prefix SELinux file context
Do not process SELinux file context during file closure when chroot or
prefix options are selected.
Closes: https://github.com/shadow-maint/shadow/issues/940
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 14:12:40 +0000 (16:12 +0200)]
lib/, src/: add SELinux control flag in sub_gid_unlock()
Expand sub_gid_unlock() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 14:10:09 +0000 (16:10 +0200)]
lib/, src/: add SELinux control flag in sub_uid_unlock()
Expand sub_uid_unlock() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 14:06:57 +0000 (16:06 +0200)]
src/vipw.c: add SELinux control flag in unlock
All unlock functions require the SELinux control flag, thus add it as an
argument.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 14:03:58 +0000 (16:03 +0200)]
lib/, src/: add SELinux control flag in sgr_unlock()
Expand sgr_unlock() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 14:00:43 +0000 (16:00 +0200)]
lib/, src/: add SELinux control flag in gr_unlock()
Expand gr_unlock() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 13:57:21 +0000 (15:57 +0200)]
lib/, src/: add SELinux control flag in spw_unlock()
Expand spw_unlock() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 13:53:17 +0000 (15:53 +0200)]
lib/, src/: add SELinux control flag in pw_unlock()
Expand pw_unlock() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 13:44:06 +0000 (15:44 +0200)]
lib/: add SELinux control flag in commonio_unlock()
Expand commonio_unlock() interface to add a control flag for SELinux
file context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 13:38:18 +0000 (15:38 +0200)]
lib/, src/: add SELinux control flag in sub_gid_close()
Expand sub_gid_close() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 13:35:48 +0000 (15:35 +0200)]
lib/, src/: add SELinux control flag in sub_uid_close()
Expand sub_uid_close() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 13:32:05 +0000 (15:32 +0200)]
lib/, src/: add SELinux control flag in sgr_close()
Expand sgr_close() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 13:28:42 +0000 (15:28 +0200)]
lib/, src/: add SELinux control flag in gr_close()
Expand gr_close() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 13:23:11 +0000 (15:23 +0200)]
lib/, src/: add SELinux control flag in spw_close()
Expand spw_close() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 13:19:29 +0000 (15:19 +0200)]
lib/, src/: add SELinux control flag in pw_close()
Expand pw_close() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Iker Pedrosa [Fri, 25 Apr 2025 13:13:12 +0000 (15:13 +0200)]
lib/: add SELinux control flag in commonio_close()
Expand commonio_close() interface to add a control flag for SELinux file
context processing.
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
Alejandro Colomar [Sun, 28 Sep 2025 08:40:09 +0000 (10:40 +0200)]
lib/: Use libc _FILE_SHADOW from <paths.h>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Mon, 24 Feb 2025 22:06:39 +0000 (23:06 +0100)]
lib/shadow/, lib/, po/: sgetspent(): Move to under lib/shadow/shadow/
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 10 Nov 2024 22:31:23 +0000 (23:31 +0100)]
lib/shadow/, lib/, po/: sgetpwent(): Move to under lib/shadow/passwd/
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 10 Nov 2024 22:14:28 +0000 (23:14 +0100)]
lib/shadow/, lib/, po/: sgetgrent(): Move to under lib/shadow/group/
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 10 Nov 2024 22:00:19 +0000 (23:00 +0100)]
lib/: GSHADOW: Remove unused macro
And with it, the file that defines it, which does nothing else.
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 10 Nov 2024 18:04:06 +0000 (19:04 +0100)]
lib/shadow/, lib/: getsgent(): Move to separate file
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 10 Nov 2024 17:52:57 +0000 (18:52 +0100)]
lib/shadow/, lib/, src/: getsgnam(): Move to separate file
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 10 Nov 2024 17:44:05 +0000 (18:44 +0100)]
lib/shadow/, lib/: sgetsgent(): Move to separate file
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 10 Nov 2024 17:18:19 +0000 (18:18 +0100)]
lib/shadow/, lib/: fgetsgent(): Move to separate file
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 10 Nov 2024 17:07:59 +0000 (18:07 +0100)]
lib/shadow/, lib/, src/: struct sgrp: Move to separate file
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 10 Nov 2024 16:44:23 +0000 (17:44 +0100)]
lib/shadow/, lib/: setsgent(): Move to separate file
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 10 Nov 2024 16:36:44 +0000 (17:36 +0100)]
lib/shadow/, lib/, src/: Use _PATH_GSHADOW from <paths.h>
This macro is provided by glibc (but not musl) as _PATH_GSHADOW in
<paths.h>. Let's use that macro, and define it only if libc doesn't
provide it.
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 10 Nov 2024 15:48:15 +0000 (16:48 +0100)]
lib/shadow/, lib/, src/: endsgent(): Move to separate file
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Alejandro Colomar [Sun, 10 Nov 2024 15:22:12 +0000 (16:22 +0100)]
lib/shadow/, lib/: gshadow: Move to separate file and rename
Signed-off-by: Alejandro Colomar <alx@kernel.org>