/* SSSD sss_usermod Copyright (C) Jakub Hrozek 2009 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include #include #include #include #include #include #include "util/util.h" #include "db/sysdb.h" #include "tools/tools_util.h" #define DO_LOCK 1 #define DO_UNLOCK 2 #define VAR_CHECK(var, val, msg) do { \ if (var != (val)) { \ DEBUG(0, (msg)); \ var = EXIT_FAILURE; \ goto fini; \ } \ } while(0) struct user_mod_ctx { struct sysdb_req *sysreq; struct sss_domain_info *domain; struct tools_ctx *ctx; const char *username; struct sysdb_attrs *attrs; char **addgroups; char **rmgroups; int cur; int error; bool done; }; /* sysdb callback */ static void mod_user_done(void *pvt, int error, struct ldb_result *ignore) { struct user_mod_ctx *data = talloc_get_type(pvt, struct user_mod_ctx); data->done = true; sysdb_transaction_done(data->sysreq, error); if (error) data->error = error; } static void add_to_groups(void *, int, struct ldb_result *); /* sysdb_req_fn_t */ static void mod_user(struct sysdb_req *req, void *pvt) { struct user_mod_ctx *user_ctx; int ret; user_ctx = talloc_get_type(pvt, struct user_mod_ctx); user_ctx->sysreq = req; if(user_ctx->attrs->num == 0) { add_to_groups(user_ctx, EOK, NULL); } else { ret = sysdb_set_user_attr(req, sysdb_req_get_ctx(req), user_ctx->domain->name, user_ctx->username, user_ctx->attrs, add_to_groups, user_ctx); if (ret != EOK) { mod_user_done(user_ctx, ret, NULL); } } } static void remove_from_groups(void *pvt, int error, struct ldb_result *ignore) { struct user_mod_ctx *user_ctx = talloc_get_type(pvt, struct user_mod_ctx); struct ldb_dn *group_dn; struct ldb_dn *user_dn; int ret; if (error) { mod_user_done(pvt, error, NULL); return; } /* check if we removed all of them */ if (user_ctx->rmgroups == NULL || user_ctx->rmgroups[user_ctx->cur] == NULL) { mod_user_done(user_ctx, EOK, NULL); return; } user_dn = sysdb_user_dn(user_ctx->ctx->sysdb, user_ctx, user_ctx->domain->name, user_ctx->username); if (!user_dn) { mod_user_done(pvt, ENOMEM, NULL); return; } group_dn = sysdb_group_dn(user_ctx->ctx->sysdb, user_ctx, user_ctx->domain->name, user_ctx->rmgroups[user_ctx->cur]); if (!group_dn) { mod_user_done(pvt, ENOMEM, NULL); return; } ret = sysdb_remove_group_member(user_ctx->sysreq, user_dn, group_dn, remove_from_groups, user_ctx); if (ret != EOK) mod_user_done(user_ctx, ret, NULL); /* go on to next group */ user_ctx->cur++; } static void add_to_groups(void *pvt, int error, struct ldb_result *ignore) { struct user_mod_ctx *user_ctx = talloc_get_type(pvt, struct user_mod_ctx); struct ldb_dn *group_dn; struct ldb_dn *user_dn; int ret; if (error) { mod_user_done(pvt, error, NULL); return; } /* check if we added all of them */ if (user_ctx->addgroups == NULL || user_ctx->addgroups[user_ctx->cur] == NULL) { user_ctx->cur = 0; remove_from_groups(user_ctx, EOK, NULL); return; } user_dn = sysdb_user_dn(user_ctx->ctx->sysdb, user_ctx, user_ctx->domain->name, user_ctx->username); if (!user_dn) { mod_user_done(pvt, ENOMEM, NULL); return; } group_dn = sysdb_group_dn(user_ctx->ctx->sysdb, user_ctx, user_ctx->domain->name, user_ctx->addgroups[user_ctx->cur]); if (!group_dn) { mod_user_done(pvt, ENOMEM, NULL); return; } ret = sysdb_add_group_member(user_ctx->sysreq, user_dn, group_dn, add_to_groups, user_ctx); if (ret != EOK) mod_user_done(user_ctx, ret, NULL); /* go on to next group */ user_ctx->cur++; } int main(int argc, const char **argv) { int pc_lock; uid_t pc_uid = 0; gid_t pc_gid = 0; const char *pc_gecos = NULL; const char *pc_home = NULL; const char *pc_shell = NULL; struct poptOption long_options[] = { POPT_AUTOHELP { "uid", 'u', POPT_ARG_INT | POPT_ARGFLAG_DOC_HIDDEN, &pc_uid, 0, "The UID of the user", NULL }, { "gid", 'g', POPT_ARG_INT | POPT_ARGFLAG_DOC_HIDDEN, &pc_gid, 0, "The GID of the user", NULL }, { "gecos", 'c', POPT_ARG_STRING, &pc_gecos, 0, "The comment string", NULL }, { "home", 'h', POPT_ARG_STRING, &pc_home, 0, "Home directory", NULL }, { "shell", 's', POPT_ARG_STRING, &pc_shell, 0, "Login shell", NULL }, { "append-group", 'a', POPT_ARG_STRING, NULL, 'a', "Groups to add this user to", NULL }, { "remove-group", 'r', POPT_ARG_STRING, NULL, 'r', "Groups to remove this user from", NULL }, { "lock", 'L', POPT_ARG_INT, &pc_lock, DO_LOCK, "Lock the account", NULL }, { "unlock", 'U', POPT_ARG_INT, &pc_lock, DO_UNLOCK, "Unlock the account", NULL }, POPT_TABLEEND }; poptContext pc = NULL; struct user_mod_ctx *user_ctx = NULL; struct tools_ctx *ctx = NULL; char *groups; int ret; debug_prg_name = argv[0]; ret = setup_db(&ctx); if (ret != EOK) { DEBUG(0, ("Could not set up database\n")); ret = EXIT_FAILURE; goto fini; } user_ctx = talloc_zero(ctx, struct user_mod_ctx); if (user_ctx == NULL) { DEBUG(0, ("Could not allocate memory for user_ctx context\n")); return ENOMEM; } user_ctx->ctx = ctx; user_ctx->attrs = sysdb_new_attrs(ctx); if (user_ctx->attrs == NULL) { DEBUG(0, ("Could not allocate memory for sysdb_attrs\n")); return ENOMEM; } /* parse user_ctx */ pc = poptGetContext(NULL, argc, argv, long_options, 0); poptSetOtherOptionHelp(pc, "USERNAME"); while ((ret = poptGetNextOpt(pc)) > 0) { if (ret == 'a' || ret == 'r') { groups = poptGetOptArg(pc); if (!groups) { ret = -1; break; } ret = parse_groups(ctx, groups, (ret == 'a') ? (&user_ctx->addgroups) : (&user_ctx->rmgroups)); free(groups); if (ret != EOK) { break; } } } if(ret != -1) { usage(pc, poptStrerror(ret)); ret = EXIT_FAILURE; goto fini; } /* username is an argument without --option */ user_ctx->username = poptGetArg(pc); if (user_ctx->username == NULL) { usage(pc, "Specify user to modify\n"); ret = EXIT_FAILURE; goto fini; } /* add parameters to changeset */ /* FIXME - might want to do this via attr:pc_var mapping in a loop */ if(pc_shell) { ret = sysdb_attrs_add_string(user_ctx->attrs, SYSDB_SHELL, pc_shell); VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); } if(pc_home) { ret = sysdb_attrs_add_string(user_ctx->attrs, SYSDB_HOMEDIR, pc_home); VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); } if(pc_gecos) { ret = sysdb_attrs_add_string(user_ctx->attrs, SYSDB_FULLNAME, pc_gecos); VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); } if(pc_uid) { ret = sysdb_attrs_add_long(user_ctx->attrs, SYSDB_UIDNUM, pc_uid); VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); } if(pc_gid) { ret = sysdb_attrs_add_long(user_ctx->attrs, SYSDB_GIDNUM, pc_gid); VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); } if(pc_lock == DO_LOCK) { ret = sysdb_attrs_add_string(user_ctx->attrs, SYSDB_DISABLED, "true"); VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); } if(pc_lock == DO_UNLOCK) { /* PAM code checks for 'false' value in SYSDB_DISABLED attribute */ ret = sysdb_attrs_add_string(user_ctx->attrs, SYSDB_DISABLED, "false"); VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); } /* arguments processed, go on to actual work */ user_ctx->domain = btreemap_get_value(ctx->domains, "LOCAL"); if (user_ctx->domain == NULL) { VAR_CHECK(ret, EOK, "Could not set default values\n"); } ret = sysdb_transaction(ctx, ctx->sysdb, mod_user, user_ctx); if (ret != EOK) { DEBUG(0, ("Could not start transaction (%d)[%s]\n", ret, strerror(ret))); ret = EXIT_FAILURE; goto fini; } while (!user_ctx->done) { tevent_loop_once(ctx->ev); } if (user_ctx->error) { ret = user_ctx->error; DEBUG(0, ("Operation failed (%d)[%s]\n", ret, strerror(ret))); ret = EXIT_FAILURE; goto fini; } ret = EXIT_SUCCESS; fini: poptFreeContext(pc); talloc_free(ctx); exit(ret); }