2000-05-01 19:10:52 +00:00
|
|
|
/* vi: set sw=4 ts=4: */
|
|
|
|
/*
|
|
|
|
* Mini id implementation for busybox
|
|
|
|
*
|
|
|
|
* Copyright (C) 2000 by Randolph Chung <tausq@debian.org>
|
2008-10-29 00:27:31 +00:00
|
|
|
* Copyright (C) 2008 by Tito Ragusa <farmatito@tiscali.it>
|
2000-05-01 19:10:52 +00:00
|
|
|
*
|
2006-05-19 19:29:19 +00:00
|
|
|
* Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
|
2000-05-01 19:10:52 +00:00
|
|
|
*/
|
|
|
|
|
2008-09-12 09:58:11 +00:00
|
|
|
/* BB_AUDIT SUSv3 compliant. */
|
2008-10-29 00:27:31 +00:00
|
|
|
/* Hacked by Tito Ragusa (C) 2004 to handle usernames of whatever
|
|
|
|
* length and to be more similar to GNU id.
|
2007-03-10 16:58:49 +00:00
|
|
|
* -Z option support: by Yuichi Nakamura <ynakam@hitachisoft.jp>
|
2008-09-12 09:58:11 +00:00
|
|
|
* Added -G option Tito Ragusa (C) 2008 for SUSv3.
|
2004-09-02 22:21:41 +00:00
|
|
|
*/
|
2003-03-19 09:13:01 +00:00
|
|
|
|
2007-05-26 19:00:18 +00:00
|
|
|
#include "libbb.h"
|
2004-09-02 22:21:41 +00:00
|
|
|
|
2008-11-17 00:12:17 +00:00
|
|
|
#if !ENABLE_USE_BB_PWD_GRP
|
2008-11-16 15:03:11 +00:00
|
|
|
#if defined(__UCLIBC_MAJOR__) && (__UCLIBC_MAJOR__ == 0)
|
|
|
|
#if (__UCLIBC_MINOR__ < 9) || (__UCLIBC_MINOR__ == 9 && __UCLIBC_SUBLEVEL__ < 30)
|
|
|
|
#error "Sorry, you need at least uClibc version 0.9.30 for id applet to build"
|
|
|
|
#endif
|
|
|
|
#endif
|
2008-11-17 00:12:17 +00:00
|
|
|
#endif
|
2008-11-16 15:03:11 +00:00
|
|
|
|
2008-10-29 00:27:31 +00:00
|
|
|
enum {
|
|
|
|
PRINT_REAL = (1 << 0),
|
|
|
|
NAME_NOT_NUMBER = (1 << 1),
|
|
|
|
JUST_USER = (1 << 2),
|
|
|
|
JUST_GROUP = (1 << 3),
|
|
|
|
JUST_ALL_GROUPS = (1 << 4),
|
2007-03-10 16:58:49 +00:00
|
|
|
#if ENABLE_SELINUX
|
2008-10-29 00:27:31 +00:00
|
|
|
JUST_CONTEXT = (1 << 5),
|
2007-03-10 16:58:49 +00:00
|
|
|
#endif
|
2008-10-29 00:27:31 +00:00
|
|
|
};
|
2004-09-02 22:21:41 +00:00
|
|
|
|
2008-12-02 22:56:59 +00:00
|
|
|
static int print_common(unsigned id, const char *name, const char *prefix)
|
2005-10-11 14:38:01 +00:00
|
|
|
{
|
2008-10-29 00:27:31 +00:00
|
|
|
if (prefix) {
|
|
|
|
printf("%s", prefix);
|
2004-09-15 03:04:08 +00:00
|
|
|
}
|
2008-10-29 00:27:31 +00:00
|
|
|
if (!(option_mask32 & NAME_NOT_NUMBER) || !name) {
|
|
|
|
printf("%u", id);
|
|
|
|
}
|
|
|
|
if (!option_mask32 || (option_mask32 & NAME_NOT_NUMBER)) {
|
|
|
|
if (name) {
|
|
|
|
printf(option_mask32 ? "%s" : "(%s)", name);
|
|
|
|
} else {
|
|
|
|
/* Don't set error status flag in default mode */
|
|
|
|
if (option_mask32) {
|
|
|
|
if (ENABLE_DESKTOP)
|
|
|
|
bb_error_msg("unknown ID %u", id);
|
|
|
|
return EXIT_FAILURE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return EXIT_SUCCESS;
|
2004-09-02 22:21:41 +00:00
|
|
|
}
|
2003-03-19 09:13:01 +00:00
|
|
|
|
2008-10-29 00:27:31 +00:00
|
|
|
static int print_group(gid_t id, const char *prefix)
|
|
|
|
{
|
2008-12-02 22:56:59 +00:00
|
|
|
return print_common(id, gid2group(id), prefix);
|
2008-10-29 00:27:31 +00:00
|
|
|
}
|
|
|
|
|
2008-11-05 08:15:13 +00:00
|
|
|
static int print_user(uid_t id, const char *prefix)
|
2008-10-29 00:27:31 +00:00
|
|
|
{
|
2008-12-02 22:56:59 +00:00
|
|
|
return print_common(id, uid2uname(id), prefix);
|
2008-10-29 00:27:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* On error set *n < 0 and return >= 0
|
|
|
|
* If *n is too small, update it and return < 0
|
|
|
|
* (ok to trash groups[] in both cases)
|
|
|
|
* Otherwise fill in groups[] and return >= 0
|
|
|
|
*/
|
|
|
|
static int get_groups(const char *username, gid_t rgid, gid_t *groups, int *n)
|
|
|
|
{
|
|
|
|
int m;
|
|
|
|
|
|
|
|
if (username) {
|
|
|
|
/* If the user is a member of more than
|
|
|
|
* *n groups, then -1 is returned. Otherwise >= 0.
|
|
|
|
* (and no defined way of detecting errors?!) */
|
|
|
|
m = getgrouplist(username, rgid, groups, n);
|
|
|
|
/* I guess *n < 0 might indicate error. Anyway,
|
|
|
|
* malloc'ing -1 bytes won't be good, so: */
|
|
|
|
//if (*n < 0)
|
|
|
|
// return 0;
|
|
|
|
//return m;
|
2008-10-29 10:30:54 +00:00
|
|
|
//commented out here, happens below anyway
|
2008-10-29 00:27:31 +00:00
|
|
|
} else {
|
|
|
|
/* On error -1 is returned, which ends up in *n */
|
|
|
|
int nn = getgroups(*n, groups);
|
|
|
|
/* 0: nn <= *n, groups[] was big enough; -1 otherwise */
|
|
|
|
m = - (nn > *n);
|
|
|
|
*n = nn;
|
|
|
|
}
|
|
|
|
if (*n < 0)
|
|
|
|
return 0; /* error, don't return < 0! */
|
|
|
|
return m;
|
|
|
|
}
|
2008-09-18 00:56:24 +00:00
|
|
|
|
2007-10-11 10:05:36 +00:00
|
|
|
int id_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
|
2008-07-05 09:18:54 +00:00
|
|
|
int id_main(int argc UNUSED_PARAM, char **argv)
|
2000-05-01 19:10:52 +00:00
|
|
|
{
|
2008-10-29 00:27:31 +00:00
|
|
|
uid_t ruid;
|
|
|
|
gid_t rgid;
|
|
|
|
uid_t euid;
|
|
|
|
gid_t egid;
|
|
|
|
unsigned opt;
|
|
|
|
int i;
|
|
|
|
int status = EXIT_SUCCESS;
|
|
|
|
const char *prefix;
|
2008-09-18 00:56:24 +00:00
|
|
|
const char *username;
|
2007-03-10 16:58:49 +00:00
|
|
|
#if ENABLE_SELINUX
|
2008-10-29 00:27:31 +00:00
|
|
|
security_context_t scontext = NULL;
|
2007-03-10 16:58:49 +00:00
|
|
|
#endif
|
2008-10-29 00:27:31 +00:00
|
|
|
/* Don't allow -n -r -nr -ug -rug -nug -rnug -uZ -gZ -GZ*/
|
2004-09-15 03:04:08 +00:00
|
|
|
/* Don't allow more than one username */
|
2008-10-29 00:27:31 +00:00
|
|
|
opt_complementary = "?1:u--g:g--u:G--u:u--G:g--G:G--g:r?ugG:n?ugG"
|
2009-04-21 11:09:40 +00:00
|
|
|
IF_SELINUX(":u--Z:Z--u:g--Z:Z--g:G--Z:Z--G");
|
|
|
|
opt = getopt32(argv, "rnugG" IF_SELINUX("Z"));
|
2005-10-11 14:38:01 +00:00
|
|
|
|
2008-10-29 00:27:31 +00:00
|
|
|
username = argv[optind];
|
2008-09-18 00:56:24 +00:00
|
|
|
if (username) {
|
2008-12-03 19:05:55 +00:00
|
|
|
struct passwd *p = xgetpwnam(username);
|
2008-10-29 00:27:31 +00:00
|
|
|
euid = ruid = p->pw_uid;
|
|
|
|
egid = rgid = p->pw_gid;
|
2008-09-18 00:56:24 +00:00
|
|
|
} else {
|
2008-10-29 00:27:31 +00:00
|
|
|
egid = getegid();
|
|
|
|
rgid = getgid();
|
|
|
|
euid = geteuid();
|
|
|
|
ruid = getuid();
|
2008-09-12 09:58:11 +00:00
|
|
|
}
|
2008-10-29 00:27:31 +00:00
|
|
|
/* JUST_ALL_GROUPS ignores -r PRINT_REAL flag even if man page for */
|
|
|
|
/* id says: print the real ID instead of the effective ID, with -ugG */
|
2008-11-05 08:18:16 +00:00
|
|
|
/* in fact in this case egid is always printed if egid != rgid */
|
2008-10-29 00:27:31 +00:00
|
|
|
if (!opt || (opt & JUST_ALL_GROUPS)) {
|
|
|
|
gid_t *groups;
|
|
|
|
int n;
|
|
|
|
|
|
|
|
if (!opt) {
|
|
|
|
/* Default Mode */
|
|
|
|
status |= print_user(ruid, "uid=");
|
|
|
|
status |= print_group(rgid, " gid=");
|
|
|
|
if (euid != ruid)
|
|
|
|
status |= print_user(euid, " euid=");
|
|
|
|
if (egid != rgid)
|
|
|
|
status |= print_group(egid, " egid=");
|
2004-09-15 03:04:08 +00:00
|
|
|
} else {
|
2008-10-29 00:27:31 +00:00
|
|
|
/* JUST_ALL_GROUPS */
|
|
|
|
status |= print_group(rgid, NULL);
|
|
|
|
if (egid != rgid)
|
|
|
|
status |= print_group(egid, " ");
|
|
|
|
}
|
2008-10-29 10:30:54 +00:00
|
|
|
/* We are supplying largish buffer, trying
|
|
|
|
* to not run get_groups() twice. That might be slow
|
|
|
|
* ("user database in remote SQL server" case) */
|
2008-10-29 00:27:31 +00:00
|
|
|
groups = xmalloc(64 * sizeof(gid_t));
|
|
|
|
n = 64;
|
|
|
|
if (get_groups(username, rgid, groups, &n) < 0) {
|
|
|
|
/* Need bigger buffer after all */
|
|
|
|
groups = xrealloc(groups, n * sizeof(gid_t));
|
|
|
|
get_groups(username, rgid, groups, &n);
|
|
|
|
}
|
|
|
|
if (n > 0) {
|
|
|
|
/* Print the list */
|
|
|
|
prefix = " groups=";
|
|
|
|
for (i = 0; i < n; i++) {
|
|
|
|
if (opt && (groups[i] == rgid || groups[i] == egid))
|
|
|
|
continue;
|
|
|
|
status |= print_group(groups[i], opt ? " " : prefix);
|
|
|
|
prefix = ",";
|
2007-03-20 11:30:28 +00:00
|
|
|
}
|
2008-10-29 00:27:31 +00:00
|
|
|
} else if (n < 0) { /* error in get_groups() */
|
|
|
|
if (!ENABLE_DESKTOP)
|
2009-11-13 08:08:27 +00:00
|
|
|
bb_error_msg_and_die("can't get groups");
|
2008-10-29 00:27:31 +00:00
|
|
|
else
|
|
|
|
return EXIT_FAILURE;
|
2007-03-20 11:30:28 +00:00
|
|
|
}
|
2008-10-29 10:30:54 +00:00
|
|
|
if (ENABLE_FEATURE_CLEAN_UP)
|
|
|
|
free(groups);
|
2007-03-10 16:58:49 +00:00
|
|
|
#if ENABLE_SELINUX
|
2008-10-29 00:27:31 +00:00
|
|
|
if (is_selinux_enabled()) {
|
|
|
|
if (getcon(&scontext) == 0)
|
|
|
|
printf(" context=%s", scontext);
|
2007-03-20 11:30:28 +00:00
|
|
|
}
|
|
|
|
#endif
|
2008-10-29 00:27:31 +00:00
|
|
|
} else if (opt & PRINT_REAL) {
|
|
|
|
euid = ruid;
|
|
|
|
egid = rgid;
|
2004-09-02 22:21:41 +00:00
|
|
|
}
|
2004-09-15 03:04:08 +00:00
|
|
|
|
2008-10-29 00:27:31 +00:00
|
|
|
if (opt & JUST_USER)
|
|
|
|
status |= print_user(euid, NULL);
|
|
|
|
else if (opt & JUST_GROUP)
|
|
|
|
status |= print_group(egid, NULL);
|
2007-03-10 16:58:49 +00:00
|
|
|
#if ENABLE_SELINUX
|
2008-10-29 00:27:31 +00:00
|
|
|
else if (opt & JUST_CONTEXT) {
|
|
|
|
selinux_or_die();
|
|
|
|
if (username || getcon(&scontext)) {
|
|
|
|
bb_error_msg_and_die("can't get process context%s",
|
|
|
|
username ? " for a different user" : "");
|
|
|
|
}
|
|
|
|
fputs(scontext, stdout);
|
2004-09-02 22:21:41 +00:00
|
|
|
}
|
2008-10-29 00:27:31 +00:00
|
|
|
/* freecon(NULL) seems to be harmless */
|
|
|
|
if (ENABLE_FEATURE_CLEAN_UP)
|
|
|
|
freecon(scontext);
|
2003-07-03 10:07:04 +00:00
|
|
|
#endif
|
2007-09-27 10:20:47 +00:00
|
|
|
bb_putchar('\n');
|
2006-10-26 23:21:47 +00:00
|
|
|
fflush_stdout_and_exit(status);
|
2004-09-02 22:21:41 +00:00
|
|
|
}
|