Changes for kernel and Busybox
[tomato.git] / release / src / router / busybox / loginutils / adduser.c
blob1d082c876760e22b5a5ad5e483f93272147f2cb0
1 /* vi: set sw=4 ts=4: */
2 /*
3 * adduser - add users to /etc/passwd and /etc/shadow
5 * Copyright (C) 1999 by Lineo, inc. and John Beppu
6 * Copyright (C) 1999,2000,2001 by John Beppu <beppu@codepoet.org>
8 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
9 */
11 //usage:#define adduser_trivial_usage
12 //usage: "[OPTIONS] USER"
13 //usage:#define adduser_full_usage "\n\n"
14 //usage: "Add a user\n"
15 //usage: "\n -h DIR Home directory"
16 //usage: "\n -g GECOS GECOS field"
17 //usage: "\n -s SHELL Login shell"
18 //usage: "\n -G GRP Add user to existing group"
19 //usage: "\n -S Create a system user"
20 //usage: "\n -D Don't assign a password"
21 //usage: "\n -H Don't create home directory"
22 //usage: "\n -u UID User id"
24 #include "libbb.h"
26 #if CONFIG_LAST_SYSTEM_ID < CONFIG_FIRST_SYSTEM_ID
27 #error Bad LAST_SYSTEM_ID or FIRST_SYSTEM_ID in .config
28 #endif
30 /* #define OPT_HOME (1 << 0) */ /* unused */
31 /* #define OPT_GECOS (1 << 1) */ /* unused */
32 #define OPT_SHELL (1 << 2)
33 #define OPT_GID (1 << 3)
34 #define OPT_DONT_SET_PASS (1 << 4)
35 #define OPT_SYSTEM_ACCOUNT (1 << 5)
36 #define OPT_DONT_MAKE_HOME (1 << 6)
37 #define OPT_UID (1 << 7)
39 /* We assume UID_T_MAX == INT_MAX */
40 /* remix */
41 /* recoded such that the uid may be passed in *p */
42 static void passwd_study(struct passwd *p)
44 int max = UINT_MAX;
46 if (getpwnam(p->pw_name)) {
47 bb_error_msg_and_die("%s '%s' in use", "user", p->pw_name);
48 /* this format string is reused in adduser and addgroup */
51 if (!(option_mask32 & OPT_UID)) {
52 if (option_mask32 & OPT_SYSTEM_ACCOUNT) {
53 p->pw_uid = CONFIG_FIRST_SYSTEM_ID;
54 max = CONFIG_LAST_SYSTEM_ID;
55 } else {
56 p->pw_uid = CONFIG_LAST_SYSTEM_ID + 1;
57 max = 64999;
60 /* check for a free uid (and maybe gid) */
61 while (getpwuid(p->pw_uid) || (p->pw_gid == (gid_t)-1 && getgrgid(p->pw_uid))) {
62 if (option_mask32 & OPT_UID) {
63 /* -u N, cannot pick uid other than N: error */
64 bb_error_msg_and_die("%s '%s' in use", "uid", itoa(p->pw_uid));
65 /* this format string is reused in adduser and addgroup */
67 if (p->pw_uid == max) {
68 bb_error_msg_and_die("no %cids left", 'u');
69 /* this format string is reused in adduser and addgroup */
71 p->pw_uid++;
74 if (p->pw_gid == (gid_t)-1) {
75 p->pw_gid = p->pw_uid; /* new gid = uid */
76 if (getgrnam(p->pw_name)) {
77 bb_error_msg_and_die("%s '%s' in use", "group", p->pw_name);
78 /* this format string is reused in adduser and addgroup */
83 static void addgroup_wrapper(struct passwd *p, const char *group_name)
85 char *argv[6];
87 argv[0] = (char*)"addgroup";
88 if (group_name) {
89 /* Add user to existing group */
90 argv[1] = (char*)"--";
91 argv[2] = p->pw_name;
92 argv[3] = (char*)group_name;
93 argv[4] = NULL;
94 } else {
95 /* Add user to his own group with the first free gid
96 * found in passwd_study.
98 #if ENABLE_FEATURE_ADDGROUP_LONG_OPTIONS || !ENABLE_ADDGROUP
99 /* We try to use --gid, not -g, because "standard" addgroup
100 * has no short option -g, it has only long --gid.
102 argv[1] = (char*)"--gid";
103 #else
104 /* Breaks if system in fact does NOT use busybox addgroup */
105 argv[1] = (char*)"-g";
106 #endif
107 argv[2] = utoa(p->pw_gid);
108 argv[3] = (char*)"--";
109 argv[4] = p->pw_name;
110 argv[5] = NULL;
113 spawn_and_wait(argv);
116 static void passwd_wrapper(const char *login_name) NORETURN;
118 static void passwd_wrapper(const char *login_name)
120 BB_EXECLP("passwd", "passwd", "--", login_name, NULL);
121 bb_error_msg_and_die("can't execute passwd, you must set password manually");
124 #if ENABLE_FEATURE_ADDUSER_LONG_OPTIONS
125 static const char adduser_longopts[] ALIGN1 =
126 "home\0" Required_argument "h"
127 "gecos\0" Required_argument "g"
128 "shell\0" Required_argument "s"
129 "ingroup\0" Required_argument "G"
130 "disabled-password\0" No_argument "D"
131 "empty-password\0" No_argument "D"
132 "system\0" No_argument "S"
133 "no-create-home\0" No_argument "H"
134 "uid\0" Required_argument "u"
136 #endif
139 * adduser will take a login_name as its first parameter.
140 * home, shell, gecos:
141 * can be customized via command-line parameters.
143 int adduser_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
144 int adduser_main(int argc UNUSED_PARAM, char **argv)
146 struct passwd pw;
147 const char *usegroup = NULL;
148 char *p;
149 unsigned opts;
151 #if ENABLE_FEATURE_ADDUSER_LONG_OPTIONS
152 applet_long_options = adduser_longopts;
153 #endif
155 /* got root? */
156 if (geteuid()) {
157 bb_error_msg_and_die(bb_msg_perm_denied_are_you_root);
160 pw.pw_gecos = (char *)"Linux User,,,";
161 /* We assume that newly created users "inherit" root's shell setting */
162 pw.pw_shell = (char *)get_shell_name();
163 pw.pw_dir = NULL;
165 /* exactly one non-option arg */
166 /* disable interactive passwd for system accounts */
167 opt_complementary = "=1:SD:u+";
168 if (sizeof(pw.pw_uid) == sizeof(int)) {
169 opts = getopt32(argv, "h:g:s:G:DSHu:", &pw.pw_dir, &pw.pw_gecos, &pw.pw_shell, &usegroup, &pw.pw_uid);
170 } else {
171 unsigned uid;
172 opts = getopt32(argv, "h:g:s:G:DSHu:", &pw.pw_dir, &pw.pw_gecos, &pw.pw_shell, &usegroup, &uid);
173 if (opts & OPT_UID) {
174 pw.pw_uid = uid;
177 argv += optind;
179 /* fill in the passwd struct */
180 pw.pw_name = argv[0];
181 die_if_bad_username(pw.pw_name);
182 if (!pw.pw_dir) {
183 /* create string for $HOME if not specified already */
184 pw.pw_dir = xasprintf("/home/%s", argv[0]);
186 pw.pw_passwd = (char *)"x";
187 if (opts & OPT_SYSTEM_ACCOUNT) {
188 if (!usegroup) {
189 usegroup = "nogroup";
191 if (!(opts & OPT_SHELL)) {
192 pw.pw_shell = (char *) "/bin/false";
195 pw.pw_gid = usegroup ? xgroup2gid(usegroup) : -1; /* exits on failure */
197 /* make sure everything is kosher and setup uid && maybe gid */
198 passwd_study(&pw);
200 p = xasprintf("x:%u:%u:%s:%s:%s",
201 (unsigned) pw.pw_uid, (unsigned) pw.pw_gid,
202 pw.pw_gecos, pw.pw_dir, pw.pw_shell);
203 if (update_passwd(bb_path_passwd_file, pw.pw_name, p, NULL) < 0) {
204 return EXIT_FAILURE;
206 if (ENABLE_FEATURE_CLEAN_UP)
207 free(p);
209 #if ENABLE_FEATURE_SHADOWPASSWDS
210 /* /etc/shadow fields:
211 * 1. username
212 * 2. encrypted password
213 * 3. last password change (unix date (unix time/24*60*60))
214 * 4. minimum days required between password changes
215 * 5. maximum days password is valid
216 * 6. days before password is to expire that user is warned
217 * 7. days after password expires that account is disabled
218 * 8. unix date when login expires (i.e. when it may no longer be used)
220 /* fields: 2 3 4 5 6 78 */
221 p = xasprintf("!:%u:0:99999:7:::", (unsigned)(time(NULL)) / (24*60*60));
222 /* ignore errors: if file is missing we suppose admin doesn't want it */
223 update_passwd(bb_path_shadow_file, pw.pw_name, p, NULL);
224 if (ENABLE_FEATURE_CLEAN_UP)
225 free(p);
226 #endif
228 /* add to group */
229 addgroup_wrapper(&pw, usegroup);
231 /* clear the umask for this process so it doesn't
232 * screw up the permissions on the mkdir and chown. */
233 umask(0);
234 if (!(opts & OPT_DONT_MAKE_HOME)) {
235 /* set the owner and group so it is owned by the new user,
236 * then fix up the permissions to 2755. Can't do it before
237 * since chown will clear the setgid bit */
238 int mkdir_err = mkdir(pw.pw_dir, 0755);
239 if (mkdir_err == 0) {
240 /* New home. Copy /etc/skel to it */
241 const char *args[] = {
242 "chown",
243 "-R",
244 xasprintf("%u:%u", (int)pw.pw_uid, (int)pw.pw_gid),
245 pw.pw_dir,
246 NULL
248 /* Be silent on any errors (like: no /etc/skel) */
249 logmode = LOGMODE_NONE;
250 copy_file("/etc/skel", pw.pw_dir, FILEUTILS_RECUR);
251 logmode = LOGMODE_STDIO;
252 chown_main(4, (char**)args);
254 if ((mkdir_err != 0 && errno != EEXIST)
255 || chown(pw.pw_dir, pw.pw_uid, pw.pw_gid) != 0
256 || chmod(pw.pw_dir, 02755) != 0 /* set setgid bit on homedir */
258 bb_simple_perror_msg(pw.pw_dir);
262 if (!(opts & OPT_DONT_SET_PASS)) {
263 /* interactively set passwd */
264 passwd_wrapper(pw.pw_name);
267 return EXIT_SUCCESS;