diff options
author | Jesse Buhagiar <jesse.buhagiar@student.rmit.edu.au> | 2020-01-12 21:46:28 +1100 |
---|---|---|
committer | Andreas Kling <kling@serenityos.org> | 2020-02-02 10:58:45 +0100 |
commit | f9609fe08acb93f66d88e7c10a80f526f4a77b61 (patch) | |
tree | 738a7c55628eb367592331c08e3ce4d47249ea44 /Userland | |
parent | 5f78e2ff3ab6d5a55ca83a44f7e6f8fd1a1841f6 (diff) | |
download | serenity-f9609fe08acb93f66d88e7c10a80f526f4a77b61.zip |
Userland: useradd utility
This commit implements the `useradd` utility that is found on most,
if not all *NIX systems. It allows the root user to add new users
to the password file found in `/etc/passwd`, thereby making
it easier to manipulate the file.
Diffstat (limited to 'Userland')
-rw-r--r-- | Userland/useradd.cpp | 139 |
1 files changed, 139 insertions, 0 deletions
diff --git a/Userland/useradd.cpp b/Userland/useradd.cpp new file mode 100644 index 0000000000..ef5e51b427 --- /dev/null +++ b/Userland/useradd.cpp @@ -0,0 +1,139 @@ +/* + * Copyright (c) 2019-2020, Jesse Buhagiar <jooster669@gmail.com> + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions are met: + * + * 1. Redistributions of source code must retain the above copyright notice, this + * list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright notice, + * this list of conditions and the following disclaimer in the documentation + * and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" + * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER + * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, + * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ +#include <AK/String.h> +#include <LibCore/CArgsParser.h> +#include <ctype.h> +#include <pwd.h> +#include <stdio.h> +#include <sys/stat.h> +#include <sys/types.h> +#include <unistd.h> + +constexpr uid_t BASE_UID = 1000; +constexpr gid_t USERS_GID = 100; +constexpr const char* DEFAULT_SHELL = "/bin/Shell"; + +int main(int argc, char** argv) +{ + const char* home_path = nullptr; + int uid = 0; + int gid = USERS_GID; + bool create_home_dir = false; + const char* shell = DEFAULT_SHELL; + const char* gecos = ""; + const char* username = nullptr; + + CArgsParser args_parser; + args_parser.add_option(home_path, "Home directory for the new user", "home-dir", 'd', "path"); + args_parser.add_option(uid, "User ID (uid) for the new user", "uid", 'u', "uid"); + args_parser.add_option(gid, "Group ID (gid) for the new user", "gid", 'g', "gid"); + args_parser.add_option(create_home_dir, "Create home directory if it does not exist", "create-home", 'm'); + args_parser.add_option(shell, "Path to the default shell binary for the new user", "shell", 's', "path-to-shell"); + args_parser.add_option(gecos, "GECOS name of the new user", "gecos", 'n', "general-info"); + args_parser.add_positional_argument(username, "Login user identity (username)", "login"); + + args_parser.parse(argc, argv); + + // Let's run a quick sanity check on username + if (strpbrk(username, "\\/!@#$%^&*()~+=`:\n")) { + fprintf(stderr, "invalid character in username, %s\n", username); + return 1; + } + + // Disallow names starting with _ and - + if (username[0] == '_' || username[0] == '-' || !isalpha(username[0])) { + fprintf(stderr, "invalid username, %s\n", username); + return 1; + } + + if (uid < 0) { + fprintf(stderr, "invalid uid %d!\n", uid); + return 3; + } + + // First, let's sort out the uid for the user + if (uid > 0) { + if (getpwuid(static_cast<uid_t>(uid))) { + fprintf(stderr, "uid %u already exists!\n", uid); + return 4; + } + + } else { + for (uid = BASE_UID; getpwuid(static_cast<uid_t>(uid)); uid++) { + } + } + + if (gid < 0) { + fprintf(stderr, "invalid gid %d\n", gid); + return 3; + } + + FILE* pwfile = fopen("/etc/passwd", "a"); + if (!pwfile) { + perror("failed to open /etc/passwd"); + return 1; + } + + String home; + if (!home_path) + home = String::format("/home/%s", username); + else + home = home_path; + + if (create_home_dir) { + if (mkdir(home.characters(), 0700) < 0) { + perror(String::format("failed to create directory %s", home.characters()).characters()); + return 12; + } + + if (chown(home.characters(), static_cast<uid_t>(uid), static_cast<gid_t>(gid)) < 0) { + perror(String::format("failed to chown %s to %u:%u", home.characters(), uid, gid).characters()); + + if (rmdir(home.characters()) < 0) { + perror(String::format("failed to rmdir %s", home.characters()).characters()); + return 12; + } + return 12; + } + } + + struct passwd p; + p.pw_name = const_cast<char*>(username); + p.pw_dir = const_cast<char*>(home.characters()); + p.pw_uid = static_cast<uid_t>(uid); + p.pw_gid = static_cast<gid_t>(gid); + p.pw_shell = const_cast<char*>(shell); + p.pw_gecos = const_cast<char*>(gecos); + + if (putpwent(&p, pwfile) < 0) { + perror("putpwent"); + return 1; + } + + fclose(pwfile); + + return 0; +} |