diff options
Diffstat (limited to 'server/tools/sss_usermod.c')
-rw-r--r-- | server/tools/sss_usermod.c | 361 |
1 files changed, 361 insertions, 0 deletions
diff --git a/server/tools/sss_usermod.c b/server/tools/sss_usermod.c new file mode 100644 index 00000000..03127899 --- /dev/null +++ b/server/tools/sss_usermod.c @@ -0,0 +1,361 @@ +/* + SSSD + + sss_usermod + + Copyright (C) Jakub Hrozek <jhrozek@redhat.com> 2009 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +#include <stdio.h> +#include <stdlib.h> +#include <talloc.h> +#include <popt.h> +#include <errno.h> +#include <sys/types.h> + +#include "util/util.h" +#include "db/sysdb.h" +#include "tools/tools_util.h" + +#define DO_LOCK 1 +#define DO_UNLOCK 2 + +#define VAR_CHECK(var, val, msg) do { \ + if (var != (val)) { \ + DEBUG(0, (msg)); \ + var = EXIT_FAILURE; \ + goto fini; \ + } \ +} while(0) + +struct user_mod_ctx { + struct sysdb_req *sysreq; + + struct sss_domain_info *domain; + struct tools_ctx *ctx; + + const char *username; + struct sysdb_attrs *attrs; + + char **addgroups; + char **rmgroups; + int cur; + + int error; + bool done; +}; + +/* sysdb callback */ +static void mod_user_done(void *pvt, int error, struct ldb_result *ignore) +{ + struct user_mod_ctx *data = talloc_get_type(pvt, struct user_mod_ctx); + + data->done = true; + + sysdb_transaction_done(data->sysreq, error); + + if (error) + data->error = error; +} + +static void add_to_groups(void *, int, struct ldb_result *); + +/* sysdb_req_fn_t */ +static void mod_user(struct sysdb_req *req, void *pvt) +{ + struct user_mod_ctx *user_ctx; + int ret; + + user_ctx = talloc_get_type(pvt, struct user_mod_ctx); + user_ctx->sysreq = req; + + if(user_ctx->attrs->num == 0) { + add_to_groups(user_ctx, EOK, NULL); + } else { + ret = sysdb_set_user_attr(req, + sysdb_req_get_ctx(req), + user_ctx->domain->name, + user_ctx->username, + user_ctx->attrs, + add_to_groups, + user_ctx); + + if (ret != EOK) { + mod_user_done(user_ctx, ret, NULL); + } + } +} + +static void remove_from_groups(void *pvt, int error, struct ldb_result *ignore) +{ + struct user_mod_ctx *user_ctx = talloc_get_type(pvt, struct user_mod_ctx); + struct ldb_dn *group_dn; + struct ldb_dn *user_dn; + int ret; + + if (error) { + mod_user_done(pvt, error, NULL); + return; + } + + /* check if we removed all of them */ + if (user_ctx->rmgroups == NULL || + user_ctx->rmgroups[user_ctx->cur] == NULL) { + mod_user_done(user_ctx, EOK, NULL); + return; + } + + user_dn = sysdb_user_dn(user_ctx->ctx->sysdb, user_ctx, + user_ctx->domain->name, user_ctx->username); + if (!user_dn) { + mod_user_done(pvt, ENOMEM, NULL); + return; + } + + group_dn = sysdb_group_dn(user_ctx->ctx->sysdb, user_ctx, + user_ctx->domain->name, + user_ctx->rmgroups[user_ctx->cur]); + if (!group_dn) { + mod_user_done(pvt, ENOMEM, NULL); + return; + } + + ret = sysdb_remove_group_member(user_ctx->sysreq, + user_dn, group_dn, + remove_from_groups, user_ctx); + if (ret != EOK) + mod_user_done(user_ctx, ret, NULL); + + /* go on to next group */ + user_ctx->cur++; +} + +static void add_to_groups(void *pvt, int error, struct ldb_result *ignore) +{ + struct user_mod_ctx *user_ctx = talloc_get_type(pvt, struct user_mod_ctx); + struct ldb_dn *group_dn; + struct ldb_dn *user_dn; + int ret; + + if (error) { + mod_user_done(pvt, error, NULL); + return; + } + + /* check if we added all of them */ + if (user_ctx->addgroups == NULL || + user_ctx->addgroups[user_ctx->cur] == NULL) { + user_ctx->cur = 0; + remove_from_groups(user_ctx, EOK, NULL); + return; + } + + user_dn = sysdb_user_dn(user_ctx->ctx->sysdb, user_ctx, + user_ctx->domain->name, user_ctx->username); + if (!user_dn) { + mod_user_done(pvt, ENOMEM, NULL); + return; + } + + group_dn = sysdb_group_dn(user_ctx->ctx->sysdb, user_ctx, + user_ctx->domain->name, + user_ctx->addgroups[user_ctx->cur]); + if (!group_dn) { + mod_user_done(pvt, ENOMEM, NULL); + return; + } + + ret = sysdb_add_group_member(user_ctx->sysreq, + user_dn, group_dn, + add_to_groups, user_ctx); + if (ret != EOK) + mod_user_done(user_ctx, ret, NULL); + + /* go on to next group */ + user_ctx->cur++; +} + +int main(int argc, const char **argv) +{ + int pc_lock; + uid_t pc_uid = 0; + gid_t pc_gid = 0; + const char *pc_gecos = NULL; + const char *pc_home = NULL; + const char *pc_shell = NULL; + struct poptOption long_options[] = { + POPT_AUTOHELP + { "uid", 'u', POPT_ARG_INT, &pc_uid, 0, "The UID of the user", NULL }, + { "gid", 'g', POPT_ARG_INT, &pc_gid, 0, "The GID of the user", NULL }, + { "gecos", 'c', POPT_ARG_STRING, &pc_gecos, 0, "The comment string", NULL }, + { "home", 'h', POPT_ARG_STRING, &pc_home, 0, "Home directory", NULL }, + { "shell", 's', POPT_ARG_STRING, &pc_shell, 0, "Login shell", NULL }, + { "append-group", 'a', POPT_ARG_STRING, NULL, 'a', "Groups to add this user to", NULL }, + { "remove-group", 'r', POPT_ARG_STRING, NULL, 'r', "Groups to remove this user from", NULL }, + { "lock", 'L', POPT_ARG_INT, &pc_lock, DO_LOCK, "Lock the account", NULL }, + { "unlock", 'U', POPT_ARG_INT, &pc_lock, DO_UNLOCK, "Unlock the account", NULL }, + POPT_TABLEEND + }; + poptContext pc = NULL; + struct user_mod_ctx *user_ctx = NULL; + struct tools_ctx *ctx = NULL; + char *groups; + int ret; + + debug_prg_name = argv[0]; + + ret = setup_db(&ctx); + if (ret != EOK) { + DEBUG(0, ("Could not set up database\n")); + ret = EXIT_FAILURE; + goto fini; + } + + user_ctx = talloc_zero(ctx, struct user_mod_ctx); + if (user_ctx == NULL) { + DEBUG(0, ("Could not allocate memory for user_ctx context\n")); + return ENOMEM; + } + user_ctx->ctx = ctx; + + user_ctx->attrs = sysdb_new_attrs(ctx); + if (user_ctx->attrs == NULL) { + DEBUG(0, ("Could not allocate memory for sysdb_attrs\n")); + return ENOMEM; + } + + /* parse user_ctx */ + pc = poptGetContext(NULL, argc, argv, long_options, 0); + poptSetOtherOptionHelp(pc, "USERNAME"); + while ((ret = poptGetNextOpt(pc)) > 0) { + if (ret == 'a' || ret == 'r') { + groups = poptGetOptArg(pc); + if (!groups) { + ret = -1; + break; + } + + ret = parse_groups(ctx, + groups, + (ret == 'a') ? (&user_ctx->addgroups) : (&user_ctx->rmgroups)); + + free(groups); + if (ret != EOK) { + break; + } + } + } + + if(ret != -1) { + usage(pc, poptStrerror(ret)); + ret = EXIT_FAILURE; + goto fini; + } + + /* username is an argument without --option */ + user_ctx->username = poptGetArg(pc); + if (user_ctx->username == NULL) { + usage(pc, "Specify user to modify\n"); + ret = EXIT_FAILURE; + goto fini; + } + + /* add parameters to changeset */ + /* FIXME - might want to do this via attr:pc_var mapping in a loop */ + + if(pc_shell) { + ret = sysdb_attrs_add_string(user_ctx->attrs, + SYSDB_SHELL, + pc_shell); + VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); + } + + if(pc_home) { + ret = sysdb_attrs_add_string(user_ctx->attrs, + SYSDB_HOMEDIR, + pc_home); + VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); + } + + if(pc_gecos) { + ret = sysdb_attrs_add_string(user_ctx->attrs, + SYSDB_FULLNAME, + pc_gecos); + VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); + } + + if(pc_uid) { + ret = sysdb_attrs_add_long(user_ctx->attrs, + SYSDB_UIDNUM, + pc_uid); + VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); + } + + if(pc_gid) { + ret = sysdb_attrs_add_long(user_ctx->attrs, + SYSDB_GIDNUM, + pc_gid); + VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); + } + + if(pc_lock == DO_LOCK) { + ret = sysdb_attrs_add_string(user_ctx->attrs, + SYSDB_DISABLED, + "true"); + VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); + } + + if(pc_lock == DO_UNLOCK) { + /* PAM code checks for 'false' value in SYSDB_DISABLED attribute */ + ret = sysdb_attrs_add_string(user_ctx->attrs, + SYSDB_DISABLED, + "false"); + VAR_CHECK(ret, EOK, "Could not add attribute to changeset\n"); + } + + + /* arguments processed, go on to actual work */ + user_ctx->domain = btreemap_get_value(ctx->domains, "LOCAL"); + if (user_ctx->domain == NULL) { + VAR_CHECK(ret, EOK, "Could not set default values\n"); + } + + ret = sysdb_transaction(ctx, ctx->sysdb, mod_user, user_ctx); + if (ret != EOK) { + DEBUG(0, ("Could not start transaction (%d)[%s]\n", + ret, strerror(ret))); + ret = EXIT_FAILURE; + goto fini; + } + + while (!user_ctx->done) { + tevent_loop_once(ctx->ev); + } + + if (user_ctx->error) { + ret = user_ctx->error; + DEBUG(0, ("Operation failed (%d)[%s]\n", ret, strerror(ret))); + ret = EXIT_FAILURE; + goto fini; + } + + ret = EXIT_SUCCESS; + +fini: + poptFreeContext(pc); + talloc_free(ctx); + exit(ret); +} |