blob: b9e46e768d7c68735cf07772290cfea3b6670206
1 | /* vi: set sw=4 ts=4: */ |
2 | /* |
3 | * adduser - add users to /etc/passwd and /etc/shadow |
4 | * |
5 | * Copyright (C) 1999 by Lineo, inc. and John Beppu |
6 | * Copyright (C) 1999,2000,2001 by John Beppu <beppu@codepoet.org> |
7 | * |
8 | * Licensed under GPLv2 or later, see file LICENSE in this source tree. |
9 | */ |
10 | //config:config ADDUSER |
11 | //config: bool "adduser" |
12 | //config: default y |
13 | //config: help |
14 | //config: Utility for creating a new user account. |
15 | //config: |
16 | //config:config FEATURE_ADDUSER_LONG_OPTIONS |
17 | //config: bool "Enable long options" |
18 | //config: default y |
19 | //config: depends on ADDUSER && LONG_OPTS |
20 | //config: help |
21 | //config: Support long options for the adduser applet. |
22 | //config: |
23 | //config:config FEATURE_CHECK_NAMES |
24 | //config: bool "Enable sanity check on user/group names in adduser and addgroup" |
25 | //config: default n |
26 | //config: depends on ADDUSER || ADDGROUP |
27 | //config: help |
28 | //config: Enable sanity check on user and group names in adduser and addgroup. |
29 | //config: To avoid problems, the user or group name should consist only of |
30 | //config: letters, digits, underscores, periods, at signs and dashes, |
31 | //config: and not start with a dash (as defined by IEEE Std 1003.1-2001). |
32 | //config: For compatibility with Samba machine accounts "$" is also supported |
33 | //config: at the end of the user or group name. |
34 | //config: |
35 | //config:config LAST_ID |
36 | //config: int "Last valid uid or gid for adduser and addgroup" |
37 | //config: depends on ADDUSER || ADDGROUP |
38 | //config: default 60000 |
39 | //config: help |
40 | //config: Last valid uid or gid for adduser and addgroup |
41 | //config: |
42 | //config:config FIRST_SYSTEM_ID |
43 | //config: int "First valid system uid or gid for adduser and addgroup" |
44 | //config: depends on ADDUSER || ADDGROUP |
45 | //config: range 0 LAST_ID |
46 | //config: default 100 |
47 | //config: help |
48 | //config: First valid system uid or gid for adduser and addgroup |
49 | //config: |
50 | //config:config LAST_SYSTEM_ID |
51 | //config: int "Last valid system uid or gid for adduser and addgroup" |
52 | //config: depends on ADDUSER || ADDGROUP |
53 | //config: range FIRST_SYSTEM_ID LAST_ID |
54 | //config: default 999 |
55 | //config: help |
56 | //config: Last valid system uid or gid for adduser and addgroup |
57 | |
58 | //applet:IF_ADDUSER(APPLET(adduser, BB_DIR_USR_SBIN, BB_SUID_DROP)) |
59 | |
60 | //kbuild:lib-$(CONFIG_ADDUSER) += adduser.o |
61 | |
62 | //usage:#define adduser_trivial_usage |
63 | //usage: "[OPTIONS] USER [GROUP]" |
64 | //usage:#define adduser_full_usage "\n\n" |
65 | //usage: "Create new user, or add USER to GROUP\n" |
66 | //usage: "\n -h DIR Home directory" |
67 | //usage: "\n -g GECOS GECOS field" |
68 | //usage: "\n -s SHELL Login shell" |
69 | //usage: "\n -G GRP Add user to existing group" |
70 | //usage: "\n -S Create a system user" |
71 | //usage: "\n -D Don't assign a password" |
72 | //usage: "\n -H Don't create home directory" |
73 | //usage: "\n -u UID User id" |
74 | //usage: "\n -k SKEL Skeleton directory (/etc/skel)" |
75 | |
76 | #include "libbb.h" |
77 | |
78 | #if CONFIG_LAST_SYSTEM_ID < CONFIG_FIRST_SYSTEM_ID |
79 | #error Bad LAST_SYSTEM_ID or FIRST_SYSTEM_ID in .config |
80 | #endif |
81 | #if CONFIG_LAST_ID < CONFIG_LAST_SYSTEM_ID |
82 | #error Bad LAST_ID or LAST_SYSTEM_ID in .config |
83 | #endif |
84 | |
85 | |
86 | /* #define OPT_HOME (1 << 0) */ /* unused */ |
87 | /* #define OPT_GECOS (1 << 1) */ /* unused */ |
88 | #define OPT_SHELL (1 << 2) |
89 | #define OPT_GID (1 << 3) |
90 | #define OPT_DONT_SET_PASS (1 << 4) |
91 | #define OPT_SYSTEM_ACCOUNT (1 << 5) |
92 | #define OPT_DONT_MAKE_HOME (1 << 6) |
93 | #define OPT_UID (1 << 7) |
94 | #define OPT_SKEL (1 << 8) |
95 | |
96 | /* remix */ |
97 | /* recoded such that the uid may be passed in *p */ |
98 | static void passwd_study(struct passwd *p) |
99 | { |
100 | int max = CONFIG_LAST_ID; |
101 | |
102 | if (getpwnam(p->pw_name)) { |
103 | bb_error_msg_and_die("%s '%s' in use", "user", p->pw_name); |
104 | /* this format string is reused in adduser and addgroup */ |
105 | } |
106 | |
107 | if (!(option_mask32 & OPT_UID)) { |
108 | if (option_mask32 & OPT_SYSTEM_ACCOUNT) { |
109 | p->pw_uid = CONFIG_FIRST_SYSTEM_ID; |
110 | max = CONFIG_LAST_SYSTEM_ID; |
111 | } else { |
112 | p->pw_uid = CONFIG_LAST_SYSTEM_ID + 1; |
113 | } |
114 | } |
115 | /* check for a free uid (and maybe gid) */ |
116 | while (getpwuid(p->pw_uid) || (p->pw_gid == (gid_t)-1 && getgrgid(p->pw_uid))) { |
117 | if (option_mask32 & OPT_UID) { |
118 | /* -u N, cannot pick uid other than N: error */ |
119 | bb_error_msg_and_die("%s '%s' in use", "uid", itoa(p->pw_uid)); |
120 | /* this format string is reused in adduser and addgroup */ |
121 | } |
122 | if (p->pw_uid == max) { |
123 | bb_error_msg_and_die("no %cids left", 'u'); |
124 | /* this format string is reused in adduser and addgroup */ |
125 | } |
126 | p->pw_uid++; |
127 | } |
128 | |
129 | if (p->pw_gid == (gid_t)-1) { |
130 | p->pw_gid = p->pw_uid; /* new gid = uid */ |
131 | if (getgrnam(p->pw_name)) { |
132 | bb_error_msg_and_die("%s '%s' in use", "group", p->pw_name); |
133 | /* this format string is reused in adduser and addgroup */ |
134 | } |
135 | } |
136 | } |
137 | |
138 | static int addgroup_wrapper(struct passwd *p, const char *group_name) |
139 | { |
140 | char *argv[6]; |
141 | |
142 | argv[0] = (char*)"addgroup"; |
143 | if (group_name) { |
144 | /* Add user to existing group */ |
145 | argv[1] = (char*)"--"; |
146 | argv[2] = p->pw_name; |
147 | argv[3] = (char*)group_name; |
148 | argv[4] = NULL; |
149 | } else { |
150 | /* Add user to his own group with the first free gid |
151 | * found in passwd_study. |
152 | */ |
153 | #if ENABLE_FEATURE_ADDGROUP_LONG_OPTIONS || !ENABLE_ADDGROUP |
154 | /* We try to use --gid, not -g, because "standard" addgroup |
155 | * has no short option -g, it has only long --gid. |
156 | */ |
157 | argv[1] = (char*)"--gid"; |
158 | #else |
159 | /* Breaks if system in fact does NOT use busybox addgroup */ |
160 | argv[1] = (char*)"-g"; |
161 | #endif |
162 | argv[2] = utoa(p->pw_gid); |
163 | argv[3] = (char*)"--"; |
164 | argv[4] = p->pw_name; |
165 | argv[5] = NULL; |
166 | } |
167 | |
168 | return spawn_and_wait(argv); |
169 | } |
170 | |
171 | static void passwd_wrapper(const char *login_name) NORETURN; |
172 | |
173 | static void passwd_wrapper(const char *login_name) |
174 | { |
175 | BB_EXECLP("passwd", "passwd", "--", login_name, NULL); |
176 | bb_error_msg_and_die("can't execute passwd, you must set password manually"); |
177 | } |
178 | |
179 | #if ENABLE_FEATURE_ADDUSER_LONG_OPTIONS |
180 | static const char adduser_longopts[] ALIGN1 = |
181 | "home\0" Required_argument "h" |
182 | "gecos\0" Required_argument "g" |
183 | "shell\0" Required_argument "s" |
184 | "ingroup\0" Required_argument "G" |
185 | "disabled-password\0" No_argument "D" |
186 | "empty-password\0" No_argument "D" |
187 | "system\0" No_argument "S" |
188 | "no-create-home\0" No_argument "H" |
189 | "uid\0" Required_argument "u" |
190 | "skel\0" Required_argument "k" |
191 | ; |
192 | #endif |
193 | |
194 | /* |
195 | * adduser will take a login_name as its first parameter. |
196 | * home, shell, gecos: |
197 | * can be customized via command-line parameters. |
198 | */ |
199 | int adduser_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; |
200 | int adduser_main(int argc UNUSED_PARAM, char **argv) |
201 | { |
202 | struct passwd pw; |
203 | const char *usegroup = NULL; |
204 | char *p; |
205 | unsigned opts; |
206 | char *uid; |
207 | const char *skel = "/etc/skel"; |
208 | |
209 | #if ENABLE_FEATURE_ADDUSER_LONG_OPTIONS |
210 | applet_long_options = adduser_longopts; |
211 | #endif |
212 | |
213 | /* got root? */ |
214 | if (geteuid()) { |
215 | bb_error_msg_and_die("%s", bb_msg_perm_denied_are_you_root); |
216 | } |
217 | |
218 | pw.pw_gecos = (char *)"Linux User,,,"; |
219 | /* We assume that newly created users "inherit" root's shell setting */ |
220 | pw.pw_shell = (char *)get_shell_name(); |
221 | pw.pw_dir = NULL; |
222 | |
223 | /* at least one and at most two non-option args */ |
224 | /* disable interactive passwd for system accounts */ |
225 | opt_complementary = "-1:?2:SD"; |
226 | opts = getopt32(argv, "h:g:s:G:DSHu:k:", &pw.pw_dir, &pw.pw_gecos, &pw.pw_shell, &usegroup, &uid, &skel); |
227 | if (opts & OPT_UID) |
228 | pw.pw_uid = xatou_range(uid, 0, CONFIG_LAST_ID); |
229 | |
230 | argv += optind; |
231 | pw.pw_name = argv[0]; |
232 | |
233 | if (!opts && argv[1]) { |
234 | /* if called with two non-option arguments, adduser |
235 | * will add an existing user to an existing group. |
236 | */ |
237 | return addgroup_wrapper(&pw, argv[1]); |
238 | } |
239 | |
240 | /* fill in the passwd struct */ |
241 | die_if_bad_username(pw.pw_name); |
242 | if (!pw.pw_dir) { |
243 | /* create string for $HOME if not specified already */ |
244 | pw.pw_dir = xasprintf("/home/%s", argv[0]); |
245 | } |
246 | pw.pw_passwd = (char *)"x"; |
247 | if (opts & OPT_SYSTEM_ACCOUNT) { |
248 | if (!usegroup) { |
249 | usegroup = "nogroup"; |
250 | } |
251 | if (!(opts & OPT_SHELL)) { |
252 | pw.pw_shell = (char *) "/bin/false"; |
253 | } |
254 | } |
255 | pw.pw_gid = usegroup ? xgroup2gid(usegroup) : -1; /* exits on failure */ |
256 | |
257 | /* make sure everything is kosher and setup uid && maybe gid */ |
258 | passwd_study(&pw); |
259 | |
260 | p = xasprintf("x:%u:%u:%s:%s:%s", |
261 | (unsigned) pw.pw_uid, (unsigned) pw.pw_gid, |
262 | pw.pw_gecos, pw.pw_dir, pw.pw_shell); |
263 | if (update_passwd(bb_path_passwd_file, pw.pw_name, p, NULL) < 0) { |
264 | return EXIT_FAILURE; |
265 | } |
266 | if (ENABLE_FEATURE_CLEAN_UP) |
267 | free(p); |
268 | #if ENABLE_FEATURE_SHADOWPASSWDS |
269 | /* /etc/shadow fields: |
270 | * 1. username |
271 | * 2. encrypted password |
272 | * 3. last password change (unix date (unix time/24*60*60)) |
273 | * 4. minimum days required between password changes |
274 | * 5. maximum days password is valid |
275 | * 6. days before password is to expire that user is warned |
276 | * 7. days after password expires that account is disabled |
277 | * 8. unix date when login expires (i.e. when it may no longer be used) |
278 | */ |
279 | /* fields: 2 3 4 5 6 78 */ |
280 | p = xasprintf("!:%u:0:99999:7:::", (unsigned)(time(NULL)) / (24*60*60)); |
281 | /* ignore errors: if file is missing we suppose admin doesn't want it */ |
282 | update_passwd(bb_path_shadow_file, pw.pw_name, p, NULL); |
283 | if (ENABLE_FEATURE_CLEAN_UP) |
284 | free(p); |
285 | #endif |
286 | |
287 | /* add to group */ |
288 | addgroup_wrapper(&pw, usegroup); |
289 | |
290 | /* clear the umask for this process so it doesn't |
291 | * screw up the permissions on the mkdir and chown. */ |
292 | umask(0); |
293 | if (!(opts & OPT_DONT_MAKE_HOME)) { |
294 | /* set the owner and group so it is owned by the new user, |
295 | * then fix up the permissions to 2755. Can't do it before |
296 | * since chown will clear the setgid bit */ |
297 | int mkdir_err = mkdir(pw.pw_dir, 0755); |
298 | if (mkdir_err == 0) { |
299 | /* New home. Copy /etc/skel to it */ |
300 | const char *args[] = { |
301 | "chown", |
302 | "-R", |
303 | xasprintf("%u:%u", (int)pw.pw_uid, (int)pw.pw_gid), |
304 | pw.pw_dir, |
305 | NULL |
306 | }; |
307 | /* Be silent on any errors (like: no /etc/skel) */ |
308 | if (!(opts & OPT_SKEL)) |
309 | logmode = LOGMODE_NONE; |
310 | copy_file(skel, pw.pw_dir, FILEUTILS_RECUR); |
311 | logmode = LOGMODE_STDIO; |
312 | chown_main(4, (char**)args); |
313 | } |
314 | if ((mkdir_err != 0 && errno != EEXIST) |
315 | || chown(pw.pw_dir, pw.pw_uid, pw.pw_gid) != 0 |
316 | || chmod(pw.pw_dir, 02755) != 0 /* set setgid bit on homedir */ |
317 | ) { |
318 | bb_simple_perror_msg(pw.pw_dir); |
319 | } |
320 | } |
321 | |
322 | if (!(opts & OPT_DONT_SET_PASS)) { |
323 | /* interactively set passwd */ |
324 | passwd_wrapper(pw.pw_name); |
325 | } |
326 | |
327 | return EXIT_SUCCESS; |
328 | } |
329 |