2002-12-03 06:41:09 +01:00
|
|
|
#!/bin/sh
|
|
|
|
#
|
2023-05-10 17:40:58 +02:00
|
|
|
# SPDX-License-Identifier: BSD-2-Clause
|
2017-11-27 16:37:16 +01:00
|
|
|
#
|
2004-03-16 14:46:29 +01:00
|
|
|
# Copyright (c) 2002-2004 Michael Telahun Makonnen. All rights reserved.
|
2002-12-03 06:41:09 +01:00
|
|
|
#
|
|
|
|
# Redistribution and use in source and binary forms, with or without
|
|
|
|
# modification, are permitted provided that the following conditions
|
|
|
|
# are met:
|
|
|
|
# 1. Redistributions of source code must retain the above copyright
|
|
|
|
# notice, this list of conditions and the following disclaimer.
|
|
|
|
# 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
# notice, this list of conditions and the following disclaimer in the
|
|
|
|
# documentation and/or other materials provided with the distribution.
|
|
|
|
#
|
|
|
|
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
# IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
# OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
# IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
# NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
# THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
#
|
2003-06-20 18:53:36 +02:00
|
|
|
# Email: Mike Makonnen <mtm@FreeBSD.Org>
|
2002-12-03 06:41:09 +01:00
|
|
|
#
|
|
|
|
#
|
|
|
|
|
|
|
|
# err msg
|
2010-01-14 23:04:08 +01:00
|
|
|
# Display $msg on stderr, unless we're being quiet.
|
|
|
|
#
|
2002-12-03 06:41:09 +01:00
|
|
|
err() {
|
|
|
|
if [ -z "$quietflag" ]; then
|
2010-01-14 23:04:08 +01:00
|
|
|
echo 1>&2 ${THISCMD}: ERROR: $*
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# info msg
|
2010-01-14 23:04:08 +01:00
|
|
|
# Display $msg on stdout, unless we're being quiet.
|
|
|
|
#
|
2002-12-03 06:41:09 +01:00
|
|
|
info() {
|
|
|
|
if [ -z "$quietflag" ]; then
|
2010-01-14 23:04:08 +01:00
|
|
|
echo ${THISCMD}: INFO: $*
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# get_nextuid
|
|
|
|
# Output the value of $_uid if it is available for use. If it
|
|
|
|
# is not, output the value of the next higher uid that is available.
|
|
|
|
# If a uid is not specified, output the first available uid, as indicated
|
|
|
|
# by pw(8).
|
2010-01-14 23:04:08 +01:00
|
|
|
#
|
2002-12-03 06:41:09 +01:00
|
|
|
get_nextuid () {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _uid=$1 _nextuid=
|
2002-12-03 06:41:09 +01:00
|
|
|
|
|
|
|
if [ -z "$_uid" ]; then
|
2024-04-19 17:11:16 +02:00
|
|
|
_nextuid="$(${PWCMD} usernext | cut -f1 -d:)"
|
2002-12-03 06:41:09 +01:00
|
|
|
else
|
|
|
|
while : ; do
|
2024-04-20 21:35:25 +02:00
|
|
|
if ! ${PWCMD} usershow $_uid > /dev/null 2>&1; then
|
2002-12-03 06:41:09 +01:00
|
|
|
_nextuid=$_uid
|
|
|
|
break
|
|
|
|
fi
|
2024-04-20 21:35:25 +02:00
|
|
|
_uid=$((_uid + 1))
|
2002-12-03 06:41:09 +01:00
|
|
|
done
|
|
|
|
fi
|
|
|
|
echo $_nextuid
|
|
|
|
}
|
|
|
|
|
|
|
|
# show_usage
|
|
|
|
# Display usage information for this utility.
|
|
|
|
#
|
|
|
|
show_usage() {
|
|
|
|
echo "usage: ${THISCMD} [options]"
|
|
|
|
echo " options may include:"
|
|
|
|
echo " -C save to the configuration file only"
|
2004-03-16 14:46:29 +01:00
|
|
|
echo " -D do not attempt to create the home directory"
|
2002-12-03 06:41:09 +01:00
|
|
|
echo " -E disable this account after creation"
|
|
|
|
echo " -G additional groups to add accounts to"
|
|
|
|
echo " -L login class of the user"
|
2008-01-27 11:15:36 +01:00
|
|
|
echo " -M file permission for home directory"
|
2002-12-03 06:41:09 +01:00
|
|
|
echo " -N do not read configuration file"
|
2024-04-11 20:11:18 +02:00
|
|
|
echo " -Z do not attempt to create ZFS home dataset"
|
2004-03-16 14:46:29 +01:00
|
|
|
echo " -S a nonexistent shell is not an error"
|
2002-12-03 06:41:09 +01:00
|
|
|
echo " -d home directory"
|
|
|
|
echo " -f file from which input will be received"
|
2003-03-24 00:06:44 +01:00
|
|
|
echo " -g default login group"
|
2002-12-03 06:41:09 +01:00
|
|
|
echo " -h display this usage message"
|
|
|
|
echo " -k path to skeleton home directory"
|
|
|
|
echo " -m user welcome message file"
|
|
|
|
echo " -q absolute minimal user feedback"
|
|
|
|
echo " -s shell"
|
|
|
|
echo " -u uid to start at"
|
|
|
|
echo " -w password type: no, none, yes or random"
|
|
|
|
}
|
|
|
|
|
|
|
|
# valid_shells
|
|
|
|
# Outputs a list of valid shells from /etc/shells. Only the
|
|
|
|
# basename of the shell is output.
|
|
|
|
#
|
|
|
|
valid_shells() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _prefix=
|
2024-04-19 17:11:16 +02:00
|
|
|
|
|
|
|
${GREPCMD} '^[^#]' ${ETCSHELLS} |
|
2002-12-03 06:41:09 +01:00
|
|
|
while read _path _junk ; do
|
2024-04-19 17:11:16 +02:00
|
|
|
echo -n "${_prefix}${_path##*/}"
|
|
|
|
_prefix=' '
|
2002-12-03 06:41:09 +01:00
|
|
|
done
|
2003-06-20 21:23:55 +02:00
|
|
|
|
2004-03-30 21:24:56 +02:00
|
|
|
# /usr/sbin/nologin is a special case
|
2003-06-20 21:23:55 +02:00
|
|
|
[ -x "${NOLOGIN_PATH}" ] && echo -n " ${NOLOGIN}"
|
2002-12-03 06:41:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
# fullpath_from_shell shell
|
2004-06-06 19:55:55 +02:00
|
|
|
# Given $shell, which is either the full path to a shell or
|
|
|
|
# the basename component of a valid shell, get the
|
2002-12-03 06:41:09 +01:00
|
|
|
# full path to the shell from the /etc/shells file.
|
|
|
|
#
|
|
|
|
fullpath_from_shell() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _shell=$1 _fullpath=
|
2024-04-19 17:11:16 +02:00
|
|
|
|
|
|
|
if [ -z "$_shell" ]; then
|
|
|
|
return
|
|
|
|
fi
|
2002-12-03 06:41:09 +01:00
|
|
|
|
2004-09-23 15:09:42 +02:00
|
|
|
# /usr/sbin/nologin is a special case; it needs to be handled
|
2024-04-19 17:11:16 +02:00
|
|
|
# before the grep | while loop, since a 'return' from within
|
2004-09-23 15:09:42 +02:00
|
|
|
# a subshell will not terminate the function's execution, and
|
|
|
|
# the path to the nologin shell might be printed out twice.
|
|
|
|
#
|
2024-04-19 17:11:16 +02:00
|
|
|
if [ "$_shell" = "${NOLOGIN}" ] ||
|
|
|
|
[ "$_shell" = "${NOLOGIN_PATH}" ]; then
|
2004-09-23 15:09:42 +02:00
|
|
|
echo ${NOLOGIN_PATH}
|
2024-04-19 17:11:16 +02:00
|
|
|
return
|
2004-09-23 15:09:42 +02:00
|
|
|
fi
|
|
|
|
|
2024-04-19 17:11:16 +02:00
|
|
|
${GREPCMD} '^[^#]' ${ETCSHELLS} |
|
2002-12-03 06:41:09 +01:00
|
|
|
while read _path _junk ; do
|
2024-04-19 17:11:16 +02:00
|
|
|
if [ "$_path" = "$_shell" ] ||
|
|
|
|
[ "${_path##*/}" = "$_shell" ]; then
|
|
|
|
echo "$_path"
|
|
|
|
break
|
|
|
|
fi
|
2002-12-03 06:41:09 +01:00
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2003-06-20 21:23:55 +02:00
|
|
|
# shell_exists shell
|
|
|
|
# If the given shell is listed in ${ETCSHELLS} or it is
|
|
|
|
# the nologin shell this function will return 0.
|
|
|
|
# Otherwise, it will return 1. If shell is valid but
|
|
|
|
# the path is invalid or it is not executable it
|
|
|
|
# will emit an informational message saying so.
|
|
|
|
#
|
2010-01-14 23:04:08 +01:00
|
|
|
shell_exists() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _sh=$1
|
2003-06-20 21:23:55 +02:00
|
|
|
|
2024-04-19 17:11:16 +02:00
|
|
|
if [ -z "$(fullpath_from_shell "$_sh")" ] ; then
|
|
|
|
err "Invalid shell ($_sh) for user $username."
|
|
|
|
return 1
|
2003-06-20 21:23:55 +02:00
|
|
|
fi
|
2024-04-19 17:11:16 +02:00
|
|
|
[ -x "$_sh" ] ||
|
2003-06-20 21:36:56 +02:00
|
|
|
info "The shell ($_sh) does not exist or is not executable."
|
2003-06-20 21:23:55 +02:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2002-12-03 06:41:09 +01:00
|
|
|
# save_config
|
|
|
|
# Save some variables to a configuration file.
|
|
|
|
# Note: not all script variables are saved, only those that
|
|
|
|
# it makes sense to save.
|
|
|
|
#
|
|
|
|
save_config() {
|
|
|
|
echo "# Configuration file for adduser(8)." > ${ADDUSERCONF}
|
|
|
|
echo "# NOTE: only *some* variables are saved." >> ${ADDUSERCONF}
|
2024-04-19 17:11:16 +02:00
|
|
|
echo "# Last Modified on $(${DATECMD})." >> ${ADDUSERCONF}
|
2002-12-03 06:41:09 +01:00
|
|
|
echo '' >> ${ADDUSERCONF}
|
2008-01-27 11:15:36 +01:00
|
|
|
echo "defaultHomePerm=$uhomeperm" >> ${ADDUSERCONF}
|
2003-03-20 17:36:03 +01:00
|
|
|
echo "defaultLgroup=$ulogingroup" >> ${ADDUSERCONF}
|
2002-12-03 06:41:09 +01:00
|
|
|
echo "defaultclass=$uclass" >> ${ADDUSERCONF}
|
|
|
|
echo "defaultgroups=$ugroups" >> ${ADDUSERCONF}
|
|
|
|
echo "passwdtype=$passwdtype" >> ${ADDUSERCONF}
|
|
|
|
echo "homeprefix=$homeprefix" >> ${ADDUSERCONF}
|
|
|
|
echo "defaultshell=$ushell" >> ${ADDUSERCONF}
|
|
|
|
echo "udotdir=$udotdir" >> ${ADDUSERCONF}
|
|
|
|
echo "msgfile=$msgfile" >> ${ADDUSERCONF}
|
|
|
|
echo "disableflag=$disableflag" >> ${ADDUSERCONF}
|
2007-04-12 10:17:56 +02:00
|
|
|
echo "uidstart=$uidstart" >> ${ADDUSERCONF}
|
2002-12-03 06:41:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
# add_user
|
|
|
|
# Add a user to the user database. If the user chose to send a welcome
|
|
|
|
# message or lock the account, do so.
|
|
|
|
#
|
|
|
|
add_user() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _uid= _name= _comment= _gecos= _home= _group= _grouplist=
|
|
|
|
local _shell= _class= _dotdir= _expire= _pwexpire= _passwd= _upasswd=
|
|
|
|
local _passwdmethod= _pwcmd=
|
2002-12-03 06:41:09 +01:00
|
|
|
|
|
|
|
# Is this a configuration run? If so, don't modify user database.
|
|
|
|
#
|
|
|
|
if [ -n "$configflag" ]; then
|
|
|
|
save_config
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
|
2003-01-23 02:57:30 +01:00
|
|
|
_name="-n '$username'"
|
2003-02-09 19:29:09 +01:00
|
|
|
[ -n "$uuid" ] && _uid='-u "$uuid"'
|
|
|
|
[ -n "$ulogingroup" ] && _group='-g "$ulogingroup"'
|
|
|
|
[ -n "$ugroups" ] && _grouplist='-G "$ugroups"'
|
|
|
|
[ -n "$ushell" ] && _shell='-s "$ushell"'
|
|
|
|
[ -n "$uclass" ] && _class='-L "$uclass"'
|
|
|
|
[ -n "$ugecos" ] && _comment='-c "$ugecos"'
|
|
|
|
[ -n "$udotdir" ] && _dotdir='-k "$udotdir"'
|
|
|
|
[ -n "$uexpire" ] && _expire='-e "$uexpire"'
|
|
|
|
[ -n "$upwexpire" ] && _pwexpire='-p "$upwexpire"'
|
2024-04-19 17:11:16 +02:00
|
|
|
if [ -z "$Dflag" ] && [ -n "$uhome" ]; then
|
2004-03-16 14:46:29 +01:00
|
|
|
# The /nonexistent home directory is special. It
|
|
|
|
# means the user has no home directory.
|
|
|
|
if [ "$uhome" = "$NOHOME" ]; then
|
|
|
|
_home='-d "$uhome"'
|
|
|
|
else
|
2008-01-27 11:15:36 +01:00
|
|
|
# Use home directory permissions if specified
|
|
|
|
if [ -n "$uhomeperm" ]; then
|
|
|
|
_home='-m -d "$uhome" -M "$uhomeperm"'
|
|
|
|
else
|
|
|
|
_home='-m -d "$uhome"'
|
|
|
|
fi
|
2004-03-16 14:46:29 +01:00
|
|
|
fi
|
2024-04-19 17:11:16 +02:00
|
|
|
elif [ -n "$Dflag" ] && [ -n "$uhome" ]; then
|
2004-03-16 14:46:29 +01:00
|
|
|
_home='-d "$uhome"'
|
|
|
|
fi
|
2002-12-03 06:41:09 +01:00
|
|
|
case $passwdtype in
|
|
|
|
no)
|
|
|
|
_passwdmethod="-w no"
|
|
|
|
_passwd="-h -"
|
|
|
|
;;
|
|
|
|
yes)
|
2003-02-09 19:29:09 +01:00
|
|
|
# Note on processing the password: The outer double quotes
|
|
|
|
# make literal everything except ` and \ and $.
|
|
|
|
# The outer single quotes make literal ` and $.
|
|
|
|
# We can ensure the \ isn't treated specially by specifying
|
|
|
|
# the -r switch to the read command used to obtain the input.
|
|
|
|
#
|
2002-12-03 06:41:09 +01:00
|
|
|
_passwdmethod="-w yes"
|
|
|
|
_passwd="-h 0"
|
2003-02-09 19:29:09 +01:00
|
|
|
_upasswd='echo "$upass" |'
|
2002-12-03 06:41:09 +01:00
|
|
|
;;
|
|
|
|
none)
|
|
|
|
_passwdmethod="-w none"
|
|
|
|
;;
|
|
|
|
random)
|
|
|
|
_passwdmethod="-w random"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2024-04-11 20:11:18 +02:00
|
|
|
# create ZFS dataset before home directory is created with pw
|
|
|
|
if [ "${Zcreate}" = "yes" ]; then
|
|
|
|
if [ "${Zencrypt}" = "yes" ]; then
|
|
|
|
echo "Enter encryption keyphrase for ZFS dataset (${zhome}):"
|
|
|
|
fi
|
|
|
|
if [ -n "$BSDINSTALL_CHROOT" ]; then
|
|
|
|
create_zfs_chrooted_dataset
|
|
|
|
else
|
2024-04-20 21:35:25 +02:00
|
|
|
if ! create_zfs_dataset; then
|
2024-04-11 20:11:18 +02:00
|
|
|
err "There was an error adding user ($username)."
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2002-12-03 06:41:09 +01:00
|
|
|
_pwcmd="$_upasswd ${PWCMD} useradd $_uid $_name $_group $_grouplist $_comment"
|
|
|
|
_pwcmd="$_pwcmd $_shell $_class $_home $_dotdir $_passwdmethod $_passwd"
|
|
|
|
_pwcmd="$_pwcmd $_expire $_pwexpire"
|
|
|
|
|
2024-04-19 17:11:16 +02:00
|
|
|
if ! _output=$(eval $_pwcmd) ; then
|
2002-12-03 06:41:09 +01:00
|
|
|
err "There was an error adding user ($username)."
|
|
|
|
return 1
|
|
|
|
else
|
|
|
|
info "Successfully added ($username) to the user database."
|
|
|
|
if [ "random" = "$passwdtype" ]; then
|
|
|
|
randompass="$_output"
|
|
|
|
info "Password for ($username) is: $randompass"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -n "$disableflag" ]; then
|
|
|
|
if ${PWCMD} lock $username ; then
|
|
|
|
info "Account ($username) is locked."
|
|
|
|
else
|
|
|
|
info "Account ($username) could NOT be locked."
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2024-04-11 20:11:18 +02:00
|
|
|
# give newly created user permissions to their home zfs dataset
|
|
|
|
if [ "${Zcreate}" = "yes" ]; then
|
|
|
|
set_zfs_perms
|
|
|
|
if [ -n "$BSDINSTALL_CHROOT" ]; then
|
|
|
|
umount_legacy_zfs
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2024-05-15 14:13:49 +02:00
|
|
|
local _line= _owner= _perms= _file= _dir=
|
2002-12-03 06:41:09 +01:00
|
|
|
if [ -n "$msgflag" ]; then
|
2024-04-19 17:11:16 +02:00
|
|
|
if [ -r "$msgfile" ]; then
|
2002-12-03 06:41:09 +01:00
|
|
|
# We're evaluating the contents of an external file.
|
|
|
|
# Let's not open ourselves up for attack. _perms will
|
|
|
|
# be empty if it's writeable only by the owner. _owner
|
|
|
|
# will *NOT* be empty if the file is owned by root.
|
|
|
|
#
|
2024-04-19 17:11:16 +02:00
|
|
|
_dir="$(dirname "$msgfile")"
|
|
|
|
_file="$(basename "$msgfile")"
|
|
|
|
_perms=$(/usr/bin/find "$_dir" -name "$_file" -perm +07022 -prune)
|
|
|
|
_owner=$(/usr/bin/find "$_dir" -name "$_file" -user 0 -prune)
|
|
|
|
if [ -z "$_owner" ] || [ -n "$_perms" ]; then
|
2002-12-03 06:41:09 +01:00
|
|
|
err "The message file ($msgfile) may be writeable only by root."
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
while read _line ; do
|
|
|
|
eval echo "$_line"
|
2024-04-19 17:11:16 +02:00
|
|
|
done <"$msgfile" | ${MAILCMD} -s"Welcome" ${username}
|
2002-12-03 06:41:09 +01:00
|
|
|
info "Sent welcome message to ($username)."
|
2024-04-19 17:11:16 +02:00
|
|
|
fi
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# get_user
|
|
|
|
# Reads username of the account from standard input or from a global
|
|
|
|
# variable containing an account line from a file. The username is
|
|
|
|
# required. If this is an interactive session it will prompt in
|
|
|
|
# a loop until a username is entered. If it is batch processing from
|
|
|
|
# a file it will output an error message and return to the caller.
|
|
|
|
#
|
|
|
|
get_user() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _input=
|
2002-12-03 06:41:09 +01:00
|
|
|
|
|
|
|
# No need to take down user names if this is a configuration saving run.
|
|
|
|
[ -n "$configflag" ] && return
|
|
|
|
|
|
|
|
while : ; do
|
|
|
|
if [ -z "$fflag" ]; then
|
|
|
|
echo -n "Username: "
|
|
|
|
read _input
|
|
|
|
else
|
2024-04-19 17:11:16 +02:00
|
|
|
_input="$(echo "$fileline" | cut -f1 -d:)"
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|
|
|
|
|
2007-03-27 00:22:10 +02:00
|
|
|
# There *must* be a username, and it must not exist. If
|
|
|
|
# this is an interactive session give the user an
|
|
|
|
# opportunity to retry.
|
2002-12-03 06:41:09 +01:00
|
|
|
#
|
|
|
|
if [ -z "$_input" ]; then
|
|
|
|
err "You must enter a username!"
|
|
|
|
[ -z "$fflag" ] && continue
|
|
|
|
fi
|
2024-04-20 21:35:25 +02:00
|
|
|
if ${PWCMD} usershow "$_input" > /dev/null 2>&1; then
|
2007-03-27 00:22:10 +02:00
|
|
|
err "User exists!"
|
|
|
|
[ -z "$fflag" ] && continue
|
|
|
|
fi
|
2002-12-03 06:41:09 +01:00
|
|
|
break
|
|
|
|
done
|
|
|
|
username="$_input"
|
|
|
|
}
|
|
|
|
|
|
|
|
# get_gecos
|
|
|
|
# Reads extra information about the user. Can be used both in interactive
|
|
|
|
# and batch (from file) mode.
|
|
|
|
#
|
|
|
|
get_gecos() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _input=
|
2002-12-03 06:41:09 +01:00
|
|
|
|
|
|
|
# No need to take down additional user information for a configuration run.
|
|
|
|
[ -n "$configflag" ] && return
|
|
|
|
|
|
|
|
if [ -z "$fflag" ]; then
|
|
|
|
echo -n "Full name: "
|
|
|
|
read _input
|
|
|
|
else
|
2024-04-19 17:11:16 +02:00
|
|
|
_input="$(echo "$fileline" | cut -f7 -d:)"
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|
|
|
|
ugecos="$_input"
|
|
|
|
}
|
|
|
|
|
|
|
|
# get_shell
|
|
|
|
# Get the account's shell. Works in interactive and batch mode. It
|
2004-06-06 19:55:55 +02:00
|
|
|
# accepts either the base name of the shell or the full path.
|
2002-12-03 06:41:09 +01:00
|
|
|
# If an invalid shell is entered it will simply use the default shell.
|
|
|
|
#
|
|
|
|
get_shell() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _input= _fullpath=
|
2002-12-03 06:41:09 +01:00
|
|
|
ushell="$defaultshell"
|
|
|
|
|
|
|
|
# Make sure the current value of the shell is a valid one
|
2004-03-16 14:46:29 +01:00
|
|
|
if [ -z "$Sflag" ]; then
|
|
|
|
if ! shell_exists $ushell ; then
|
|
|
|
info "Using default shell ${defaultshell}."
|
|
|
|
ushell="$defaultshell"
|
|
|
|
fi
|
2003-06-20 21:23:55 +02:00
|
|
|
fi
|
2002-12-03 06:41:09 +01:00
|
|
|
|
|
|
|
if [ -z "$fflag" ]; then
|
2024-04-19 17:11:16 +02:00
|
|
|
echo -n "Shell ($shells) [${ushell##*/}]: "
|
2002-12-03 06:41:09 +01:00
|
|
|
read _input
|
|
|
|
else
|
2024-04-19 17:11:16 +02:00
|
|
|
_input="$(echo "$fileline" | cut -f9 -d:)"
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|
|
|
|
if [ -n "$_input" ]; then
|
2004-03-16 14:46:29 +01:00
|
|
|
if [ -n "$Sflag" ]; then
|
|
|
|
ushell="$_input"
|
2002-12-03 06:41:09 +01:00
|
|
|
else
|
2024-04-19 17:11:16 +02:00
|
|
|
_fullpath=$(fullpath_from_shell "$_input")
|
2004-03-16 14:46:29 +01:00
|
|
|
if [ -n "$_fullpath" ]; then
|
|
|
|
ushell="$_fullpath"
|
|
|
|
else
|
|
|
|
err "Invalid shell ($_input) for user $username."
|
|
|
|
info "Using default shell ${defaultshell}."
|
|
|
|
ushell="$defaultshell"
|
|
|
|
fi
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# get_homedir
|
|
|
|
# Reads the account's home directory. Used both with interactive input
|
|
|
|
# and batch input.
|
|
|
|
#
|
|
|
|
get_homedir() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _input=
|
2002-12-03 06:41:09 +01:00
|
|
|
if [ -z "$fflag" ]; then
|
|
|
|
echo -n "Home directory [${homeprefix}/${username}]: "
|
|
|
|
read _input
|
|
|
|
else
|
2024-04-19 17:11:16 +02:00
|
|
|
_input="$(echo "$fileline" | cut -f8 -d:)"
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -n "$_input" ]; then
|
|
|
|
uhome="$_input"
|
|
|
|
# if this is a configuration run, then user input is the home
|
|
|
|
# directory prefix. Otherwise it is understood to
|
|
|
|
# be $prefix/$user
|
|
|
|
#
|
2024-04-19 17:11:16 +02:00
|
|
|
[ -z "$configflag" ] &&
|
|
|
|
homeprefix="$(dirname "$uhome")" ||
|
|
|
|
homeprefix="$uhome"
|
2002-12-03 06:41:09 +01:00
|
|
|
else
|
|
|
|
uhome="${homeprefix}/${username}"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2008-01-27 11:15:36 +01:00
|
|
|
# get_homeperm
|
|
|
|
# Reads the account's home directory permissions.
|
|
|
|
#
|
|
|
|
get_homeperm() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _input= _prompt=
|
2008-01-27 11:15:36 +01:00
|
|
|
uhomeperm=$defaultHomePerm
|
|
|
|
|
|
|
|
if [ -n "$uhomeperm" ]; then
|
|
|
|
_prompt="Home directory permissions [${uhomeperm}]: "
|
|
|
|
else
|
|
|
|
_prompt="Home directory permissions (Leave empty for default): "
|
|
|
|
fi
|
|
|
|
if [ -z "$fflag" ]; then
|
|
|
|
echo -n "$_prompt"
|
|
|
|
read _input
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -n "$_input" ]; then
|
|
|
|
uhomeperm="$_input"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2024-04-11 20:11:18 +02:00
|
|
|
# get_zfs_home
|
|
|
|
# Determine if homeprefix is located on a ZFS filesystem and if
|
|
|
|
# so, enable ZFS home dataset creation.
|
|
|
|
#
|
|
|
|
get_zfs_home() {
|
2024-05-20 15:43:34 +02:00
|
|
|
local _prefix= _tmp=
|
2024-04-20 21:35:25 +02:00
|
|
|
|
2024-04-11 20:11:18 +02:00
|
|
|
# check if zfs kernel module is loaded before attempting to run zfs to
|
|
|
|
# prevent loading the kernel module on systems that don't use ZFS
|
2024-04-29 12:29:35 +02:00
|
|
|
if ! "$KLDSTATCMD" -q -m zfs; then
|
|
|
|
Zcreate="no"
|
2024-04-11 20:11:18 +02:00
|
|
|
return
|
|
|
|
fi
|
2024-04-20 21:35:25 +02:00
|
|
|
if ! _prefix=$(${ZFSCMD} list -Ho name "${homeprefix}" 2>/dev/null) ||
|
|
|
|
[ -z "${_prefix}" ]; then
|
2024-04-11 20:11:18 +02:00
|
|
|
Zcreate="no"
|
2024-04-20 21:35:25 +02:00
|
|
|
return
|
2024-04-11 20:11:18 +02:00
|
|
|
fi
|
2024-05-20 15:43:34 +02:00
|
|
|
# Make sure that _prefix is not a subdirectory within a dataset. If it
|
|
|
|
# is, the containing dataset will be the same for it and its parent.
|
|
|
|
_tmp=$(${ZFSCMD} list -Ho name "$(dirname "${homeprefix}")" 2>/dev/null)
|
|
|
|
if [ "${_tmp}" = "${_prefix}" ]; then
|
|
|
|
Zcreate="no"
|
|
|
|
return
|
|
|
|
fi
|
2024-04-20 21:35:25 +02:00
|
|
|
zhome="${_prefix}/${username}"
|
2024-04-11 20:11:18 +02:00
|
|
|
}
|
|
|
|
|
2002-12-03 06:41:09 +01:00
|
|
|
# get_uid
|
|
|
|
# Reads a numeric userid in an interactive or batch session. Automatically
|
|
|
|
# allocates one if it is not specified.
|
|
|
|
#
|
|
|
|
get_uid() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _input= _prompt=
|
2007-04-12 10:17:56 +02:00
|
|
|
uuid=${uidstart}
|
2002-12-03 06:41:09 +01:00
|
|
|
|
|
|
|
if [ -n "$uuid" ]; then
|
2024-04-19 17:11:16 +02:00
|
|
|
uuid=$(get_nextuid "$uuid")
|
2002-12-03 06:41:09 +01:00
|
|
|
_prompt="Uid [$uuid]: "
|
|
|
|
else
|
|
|
|
_prompt="Uid (Leave empty for default): "
|
|
|
|
fi
|
|
|
|
if [ -z "$fflag" ]; then
|
2003-01-20 18:55:31 +01:00
|
|
|
echo -n "$_prompt"
|
2002-12-03 06:41:09 +01:00
|
|
|
read _input
|
|
|
|
else
|
2024-04-19 17:11:16 +02:00
|
|
|
_input="$(echo "$fileline" | cut -f2 -d:)"
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|
|
|
|
|
|
|
|
[ -n "$_input" ] && uuid=$_input
|
2024-04-19 17:11:16 +02:00
|
|
|
uuid=$(get_nextuid "$uuid")
|
2002-12-03 06:41:09 +01:00
|
|
|
uidstart=$uuid
|
|
|
|
}
|
|
|
|
|
|
|
|
# get_class
|
|
|
|
# Reads login class of account. Can be used in interactive or batch mode.
|
|
|
|
#
|
|
|
|
get_class() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _input= _class=
|
2002-12-03 06:41:09 +01:00
|
|
|
uclass="$defaultclass"
|
|
|
|
_class=${uclass:-"default"}
|
|
|
|
|
|
|
|
if [ -z "$fflag" ]; then
|
|
|
|
echo -n "Login class [$_class]: "
|
|
|
|
read _input
|
|
|
|
else
|
2024-04-19 17:11:16 +02:00
|
|
|
_input="$(echo "$fileline" | cut -f4 -d:)"
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|
|
|
|
|
|
|
|
[ -n "$_input" ] && uclass="$_input"
|
|
|
|
}
|
|
|
|
|
|
|
|
# get_logingroup
|
|
|
|
# Reads user's login group. Can be used in both interactive and batch
|
|
|
|
# modes. The specified value can be a group name or its numeric id.
|
2003-03-20 17:36:03 +01:00
|
|
|
# This routine leaves the field blank if nothing is provided and
|
|
|
|
# a default login group has not been set. The pw(8) command
|
|
|
|
# will then provide a login group with the same name as the username.
|
2002-12-03 06:41:09 +01:00
|
|
|
#
|
|
|
|
get_logingroup() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _input=
|
2003-03-20 17:36:03 +01:00
|
|
|
ulogingroup="$defaultLgroup"
|
2002-12-03 06:41:09 +01:00
|
|
|
|
|
|
|
if [ -z "$fflag" ]; then
|
2003-03-20 17:36:03 +01:00
|
|
|
echo -n "Login group [${ulogingroup:-$username}]: "
|
2002-12-03 06:41:09 +01:00
|
|
|
read _input
|
|
|
|
else
|
2024-04-19 17:11:16 +02:00
|
|
|
_input="$(echo "$fileline" | cut -f3 -d:)"
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|
|
|
|
|
|
|
|
# Pw(8) will use the username as login group if it's left empty
|
2003-03-20 17:36:03 +01:00
|
|
|
[ -n "$_input" ] && ulogingroup="$_input"
|
2002-12-03 06:41:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
# get_groups
|
|
|
|
# Read additional groups for the user. It can be used in both interactive
|
|
|
|
# and batch modes.
|
|
|
|
#
|
|
|
|
get_groups() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _input= _group=
|
2002-12-03 06:41:09 +01:00
|
|
|
ugroups="$defaultgroups"
|
|
|
|
_group=${ulogingroup:-"${username}"}
|
|
|
|
|
|
|
|
if [ -z "$configflag" ]; then
|
|
|
|
[ -z "$fflag" ] && echo -n "Login group is $_group. Invite $username"
|
|
|
|
[ -z "$fflag" ] && echo -n " into other groups? [$ugroups]: "
|
|
|
|
else
|
|
|
|
[ -z "$fflag" ] && echo -n "Enter additional groups [$ugroups]: "
|
|
|
|
fi
|
|
|
|
read _input
|
|
|
|
|
|
|
|
[ -n "$_input" ] && ugroups="$_input"
|
|
|
|
}
|
|
|
|
|
|
|
|
# get_expire_dates
|
|
|
|
# Read expiry information for the account and also for the password. This
|
|
|
|
# routine is used only from batch processing mode.
|
|
|
|
#
|
|
|
|
get_expire_dates() {
|
2024-04-19 17:11:16 +02:00
|
|
|
upwexpire="$(echo "$fileline" | cut -f5 -d:)"
|
|
|
|
uexpire="$(echo "$fileline" | cut -f6 -d:)"
|
2002-12-03 06:41:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
# get_password
|
|
|
|
# Read the password in batch processing mode. The password field matters
|
|
|
|
# only when the password type is "yes" or "random". If the field is empty and the
|
|
|
|
# password type is "yes", then it assumes the account has an empty passsword
|
|
|
|
# and changes the password type accordingly. If the password type is "random"
|
|
|
|
# and the password field is NOT empty, then it assumes the account will NOT
|
|
|
|
# have a random password and set passwdtype to "yes."
|
|
|
|
#
|
|
|
|
get_password() {
|
|
|
|
# We may temporarily change a password type. Make sure it's changed
|
|
|
|
# back to whatever it was before we process the next account.
|
|
|
|
#
|
2024-04-19 17:11:16 +02:00
|
|
|
if [ -n "$savedpwtype" ]; then
|
2002-12-03 06:41:09 +01:00
|
|
|
passwdtype=$savedpwtype
|
|
|
|
savedpwtype=
|
2024-04-19 17:11:16 +02:00
|
|
|
fi
|
2002-12-03 06:41:09 +01:00
|
|
|
|
|
|
|
# There may be a ':' in the password
|
|
|
|
upass=${fileline#*:*:*:*:*:*:*:*:*:}
|
|
|
|
|
|
|
|
if [ -z "$upass" ]; then
|
|
|
|
case $passwdtype in
|
|
|
|
yes)
|
|
|
|
# if it's empty, assume an empty password
|
|
|
|
passwdtype=none
|
|
|
|
savedpwtype=yes
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
else
|
|
|
|
case $passwdtype in
|
|
|
|
random)
|
|
|
|
passwdtype=yes
|
|
|
|
savedpwtype=random
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2024-04-11 20:11:18 +02:00
|
|
|
# get_zfs_encryption
|
|
|
|
# Ask user if they want to enable encryption on their ZFS home dataset.
|
|
|
|
#
|
|
|
|
get_zfs_encryption() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _input= _prompt=
|
2024-04-11 20:11:18 +02:00
|
|
|
_prompt="Enable ZFS encryption? (yes/no) [${Zencrypt}]: "
|
|
|
|
while : ; do
|
|
|
|
echo -n "$_prompt"
|
|
|
|
read _input
|
|
|
|
|
|
|
|
[ -z "$_input" ] && _input=$Zencrypt
|
|
|
|
case $_input in
|
|
|
|
[Nn][Oo]|[Nn])
|
|
|
|
Zencrypt="no"
|
|
|
|
break
|
|
|
|
;;
|
|
|
|
[Yy][Ee][Ss]|[Yy][Ee]|[Yy])
|
|
|
|
Zencrypt="yes"
|
|
|
|
break
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
# invalid answer; repeat loop
|
|
|
|
continue
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
|
|
|
|
if [ "${Zencrypt}" = "yes" ]; then
|
|
|
|
zfsopt="-o encryption=on -o keylocation=prompt -o keyformat=passphrase"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# create_zfs_chrooted_dataset
|
|
|
|
# Create ZFS dataset owned by the user that was just added within a bsdinstall chroot
|
|
|
|
#
|
|
|
|
create_zfs_chrooted_dataset() {
|
|
|
|
if ! ${ZFSCMD} create -u ${zfsopt} "${zhome}"; then
|
|
|
|
err "There was an error creating ZFS dataset (${zhome})."
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
${ZFSCMD} set mountpoint=legacy "${zhome}"
|
|
|
|
${MKDIRCMD} -p "${uhome}"
|
|
|
|
${MOUNTCMD} -t zfs "${zhome}" "${uhome}"
|
|
|
|
}
|
|
|
|
|
|
|
|
# umount_legacy_zfs
|
|
|
|
# Unmount ZFS home directory created as a legacy mount and switch inheritance
|
|
|
|
#
|
|
|
|
umount_legacy_zfs() {
|
|
|
|
${UMOUNTCMD} "${uhome}"
|
|
|
|
${ZFSCMD} inherit mountpoint "${zhome}"
|
|
|
|
}
|
|
|
|
|
|
|
|
# create_zfs_dataset
|
|
|
|
# Create ZFS dataset owned by the user that was just added.
|
|
|
|
#
|
|
|
|
create_zfs_dataset() {
|
|
|
|
if ! ${ZFSCMD} create ${zfsopt} "${zhome}"; then
|
|
|
|
err "There was an error creating ZFS dataset (${zhome})."
|
|
|
|
return 1
|
|
|
|
else
|
|
|
|
info "Successfully created ZFS dataset (${zhome})."
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# set_zfs_perms
|
|
|
|
# Give new user ownership of newly created zfs dataset.
|
|
|
|
#
|
|
|
|
set_zfs_perms() {
|
|
|
|
if ! ${ZFSCMD} allow "${username}" create,destroy,mount,snapshot "${zhome}"; then
|
|
|
|
err "There was an error setting permissions on ZFS dataset (${zhome})."
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2002-12-03 06:41:09 +01:00
|
|
|
# input_from_file
|
|
|
|
# Reads a line of account information from standard input and
|
|
|
|
# adds it to the user database.
|
|
|
|
#
|
|
|
|
input_from_file() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _field=
|
2002-12-03 06:41:09 +01:00
|
|
|
|
2003-02-09 19:29:09 +01:00
|
|
|
while read -r fileline ; do
|
2002-12-03 06:41:09 +01:00
|
|
|
case "$fileline" in
|
|
|
|
\#*|'')
|
|
|
|
;;
|
2007-04-12 09:38:26 +02:00
|
|
|
*)
|
|
|
|
get_user || continue
|
|
|
|
get_gecos
|
|
|
|
get_uid
|
|
|
|
get_logingroup
|
|
|
|
get_class
|
|
|
|
get_shell
|
|
|
|
get_homedir
|
2024-04-11 20:11:18 +02:00
|
|
|
get_zfs_home
|
2008-01-27 11:15:36 +01:00
|
|
|
get_homeperm
|
2007-04-12 09:38:26 +02:00
|
|
|
get_password
|
|
|
|
get_expire_dates
|
2007-10-20 02:45:31 +02:00
|
|
|
ugroups="$defaultgroups"
|
2007-04-12 09:38:26 +02:00
|
|
|
|
|
|
|
add_user
|
|
|
|
;;
|
2002-12-03 06:41:09 +01:00
|
|
|
esac
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
# input_interactive
|
|
|
|
# Prompts for user information interactively, and commits to
|
|
|
|
# the user database.
|
|
|
|
#
|
|
|
|
input_interactive() {
|
2024-05-15 14:13:49 +02:00
|
|
|
local _disable= _pass= _passconfirm= _input=
|
2024-04-19 17:11:16 +02:00
|
|
|
local _random="no"
|
|
|
|
local _emptypass="no"
|
|
|
|
local _usepass="yes"
|
|
|
|
local _logingroup_ok="no"
|
|
|
|
local _groups_ok="no"
|
|
|
|
local _all_ok="yes"
|
2002-12-03 06:41:09 +01:00
|
|
|
case $passwdtype in
|
|
|
|
none)
|
|
|
|
_emptypass="yes"
|
|
|
|
_usepass="yes"
|
|
|
|
;;
|
|
|
|
no)
|
|
|
|
_usepass="no"
|
|
|
|
;;
|
|
|
|
random)
|
|
|
|
_random="yes"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
get_user
|
|
|
|
get_gecos
|
|
|
|
get_uid
|
2003-02-08 09:04:53 +01:00
|
|
|
|
|
|
|
# The case where group = user is handled elsewhere, so
|
|
|
|
# validate any other groups the user is invited to.
|
|
|
|
until [ "$_logingroup_ok" = yes ]; do
|
|
|
|
get_logingroup
|
|
|
|
_logingroup_ok=yes
|
2024-04-19 17:11:16 +02:00
|
|
|
if [ -n "$ulogingroup" ] && [ "$username" != "$ulogingroup" ]; then
|
2003-02-08 09:04:53 +01:00
|
|
|
if ! ${PWCMD} show group $ulogingroup > /dev/null 2>&1; then
|
|
|
|
echo "Group $ulogingroup does not exist!"
|
|
|
|
_logingroup_ok=no
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
until [ "$_groups_ok" = yes ]; do
|
|
|
|
get_groups
|
|
|
|
_groups_ok=yes
|
|
|
|
for i in $ugroups; do
|
|
|
|
if [ "$username" != "$i" ]; then
|
|
|
|
if ! ${PWCMD} show group $i > /dev/null 2>&1; then
|
|
|
|
echo "Group $i does not exist!"
|
|
|
|
_groups_ok=no
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
done
|
|
|
|
|
2002-12-03 06:41:09 +01:00
|
|
|
get_class
|
|
|
|
get_shell
|
|
|
|
get_homedir
|
2008-01-27 11:15:36 +01:00
|
|
|
get_homeperm
|
2024-04-11 20:11:18 +02:00
|
|
|
get_zfs_home
|
|
|
|
[ "$Zcreate" = "yes" ] && get_zfs_encryption
|
2002-12-03 06:41:09 +01:00
|
|
|
|
|
|
|
while : ; do
|
|
|
|
echo -n "Use password-based authentication? [$_usepass]: "
|
|
|
|
read _input
|
|
|
|
[ -z "$_input" ] && _input=$_usepass
|
|
|
|
case $_input in
|
|
|
|
[Nn][Oo]|[Nn])
|
|
|
|
passwdtype="no"
|
|
|
|
;;
|
|
|
|
[Yy][Ee][Ss]|[Yy][Ee]|[Yy])
|
|
|
|
while : ; do
|
|
|
|
echo -n "Use an empty password? (yes/no) [$_emptypass]: "
|
|
|
|
read _input
|
|
|
|
[ -n "$_input" ] && _emptypass=$_input
|
|
|
|
case $_emptypass in
|
|
|
|
[Nn][Oo]|[Nn])
|
|
|
|
echo -n "Use a random password? (yes/no) [$_random]: "
|
|
|
|
read _input
|
|
|
|
[ -n "$_input" ] && _random="$_input"
|
|
|
|
case $_random in
|
|
|
|
[Yy][Ee][Ss]|[Yy][Ee]|[Yy])
|
|
|
|
passwdtype="random"
|
|
|
|
break
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
passwdtype="yes"
|
2003-03-19 09:07:15 +01:00
|
|
|
[ -n "$configflag" ] && break
|
2002-12-03 06:41:09 +01:00
|
|
|
trap 'stty echo; exit' 0 1 2 3 15
|
|
|
|
stty -echo
|
|
|
|
echo -n "Enter password: "
|
2020-04-05 21:25:46 +02:00
|
|
|
IFS= read -r upass
|
2002-12-03 06:41:09 +01:00
|
|
|
echo''
|
|
|
|
echo -n "Enter password again: "
|
2020-04-05 21:25:46 +02:00
|
|
|
IFS= read -r _passconfirm
|
2002-12-03 06:41:09 +01:00
|
|
|
echo ''
|
|
|
|
stty echo
|
|
|
|
# if user entered a blank password
|
|
|
|
# explicitly ask again.
|
2024-04-19 17:11:16 +02:00
|
|
|
[ -z "$upass$_passconfirm" ] && continue
|
2002-12-03 06:41:09 +01:00
|
|
|
;;
|
|
|
|
[Yy][Ee][Ss]|[Yy][Ee]|[Yy])
|
|
|
|
passwdtype="none"
|
|
|
|
break;
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
# invalid answer; repeat the loop
|
|
|
|
continue
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
if [ "$upass" != "$_passconfirm" ]; then
|
|
|
|
echo "Passwords did not match!"
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
break
|
|
|
|
done
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
# invalid answer; repeat loop
|
|
|
|
continue
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
break;
|
|
|
|
done
|
|
|
|
_disable=${disableflag:-"no"}
|
|
|
|
while : ; do
|
|
|
|
echo -n "Lock out the account after creation? [$_disable]: "
|
|
|
|
read _input
|
|
|
|
[ -z "$_input" ] && _input=$_disable
|
|
|
|
case $_input in
|
|
|
|
[Nn][Oo]|[Nn])
|
|
|
|
disableflag=
|
|
|
|
;;
|
|
|
|
[Yy][Ee][Ss]|[Yy][Ee]|[Yy])
|
|
|
|
disableflag=yes
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
# invalid answer; repeat loop
|
|
|
|
continue
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
break
|
|
|
|
done
|
2024-04-11 20:11:18 +02:00
|
|
|
|
2002-12-03 06:41:09 +01:00
|
|
|
# Display the information we have so far and prompt to
|
|
|
|
# commit it.
|
|
|
|
#
|
|
|
|
_disable=${disableflag:-"no"}
|
2024-04-11 20:11:18 +02:00
|
|
|
[ -z "$configflag" ] && printf "%-11s : %s\n" Username $username
|
2002-12-03 06:41:09 +01:00
|
|
|
case $passwdtype in
|
|
|
|
yes)
|
|
|
|
_pass='*****'
|
|
|
|
;;
|
|
|
|
no)
|
|
|
|
_pass='<disabled>'
|
|
|
|
;;
|
|
|
|
none)
|
|
|
|
_pass='<blank>'
|
|
|
|
;;
|
|
|
|
random)
|
|
|
|
_pass='<random>'
|
|
|
|
;;
|
|
|
|
esac
|
2024-04-11 20:11:18 +02:00
|
|
|
[ -z "$configflag" ] && printf "%-11s : %s\n" "Password" "$_pass"
|
|
|
|
[ -n "$configflag" ] && printf "%-11s : %s\n" "Pass Type" "$passwdtype"
|
|
|
|
[ -z "$configflag" ] && printf "%-11s : %s\n" "Full Name" "$ugecos"
|
|
|
|
[ -z "$configflag" ] && printf "%-11s : %s\n" "Uid" "$uuid"
|
2024-04-19 17:11:16 +02:00
|
|
|
[ "$Zcreate" = "yes" ] && [ -z "$configflag" ] &&
|
|
|
|
printf "%-11s : %s\n" "ZFS dataset" "${zhome}"
|
|
|
|
[ "$Zencrypt" = "yes" ] && [ -z "$configflag" ] &&
|
|
|
|
printf "%-11s : %s\n" "Encrypted" "${Zencrypt}"
|
2024-04-11 20:11:18 +02:00
|
|
|
printf "%-11s : %s\n" "Class" "$uclass"
|
|
|
|
printf "%-11s : %s %s\n" "Groups" "${ulogingroup:-$username}" "$ugroups"
|
|
|
|
printf "%-11s : %s\n" "Home" "$uhome"
|
|
|
|
printf "%-11s : %s\n" "Home Mode" "$uhomeperm"
|
|
|
|
printf "%-11s : %s\n" "Shell" "$ushell"
|
|
|
|
printf "%-11s : %s\n" "Locked" "$_disable"
|
2002-12-03 06:41:09 +01:00
|
|
|
while : ; do
|
2023-07-18 19:37:48 +02:00
|
|
|
echo -n "OK? (yes/no) [$_all_ok]: "
|
2002-12-03 06:41:09 +01:00
|
|
|
read _input
|
2023-07-18 19:37:48 +02:00
|
|
|
if [ -z "$_input" ]; then
|
|
|
|
_input=$_all_ok
|
|
|
|
fi
|
2002-12-03 06:41:09 +01:00
|
|
|
case $_input in
|
|
|
|
[Nn][Oo]|[Nn])
|
|
|
|
return 1
|
|
|
|
;;
|
|
|
|
[Yy][Ee][Ss]|[Yy][Ee]|[Yy])
|
|
|
|
add_user
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
continue
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
break
|
|
|
|
done
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2005-04-28 14:44:02 +02:00
|
|
|
#### END SUBROUTINE DEFINITION ####
|
2002-12-03 06:41:09 +01:00
|
|
|
|
2024-04-19 17:11:16 +02:00
|
|
|
THISCMD=${0##*/}
|
2002-12-03 06:41:09 +01:00
|
|
|
DEFAULTSHELL=/bin/sh
|
|
|
|
ADDUSERCONF="${ADDUSERCONF:-/etc/adduser.conf}"
|
|
|
|
PWCMD="${PWCMD:-/usr/sbin/pw}"
|
|
|
|
MAILCMD="${MAILCMD:-mail}"
|
|
|
|
ETCSHELLS="${ETCSHELLS:-/etc/shells}"
|
2004-03-16 14:46:29 +01:00
|
|
|
NOHOME="/nonexistent"
|
2003-06-20 21:23:55 +02:00
|
|
|
NOLOGIN="nologin"
|
2004-03-30 21:24:56 +02:00
|
|
|
NOLOGIN_PATH="/usr/sbin/nologin"
|
2003-01-23 21:07:40 +01:00
|
|
|
GREPCMD="/usr/bin/grep"
|
|
|
|
DATECMD="/bin/date"
|
2024-04-11 20:11:18 +02:00
|
|
|
MKDIRCMD="/bin/mkdir"
|
|
|
|
MOUNTCMD="/sbin/mount"
|
|
|
|
UMOUNTCMD="/sbin/umount"
|
|
|
|
ZFSCMD="/sbin/zfs"
|
|
|
|
KLDSTATCMD="/sbin/kldstat"
|
2002-12-03 06:41:09 +01:00
|
|
|
|
|
|
|
# Set default values
|
|
|
|
#
|
|
|
|
username=
|
|
|
|
uuid=
|
|
|
|
uidstart=
|
|
|
|
ugecos=
|
|
|
|
ulogingroup=
|
|
|
|
uclass=
|
|
|
|
uhome=
|
2008-01-27 11:15:36 +01:00
|
|
|
uhomeperm=
|
2002-12-03 06:41:09 +01:00
|
|
|
upass=
|
|
|
|
ushell=
|
|
|
|
udotdir=/usr/share/skel
|
|
|
|
ugroups=
|
|
|
|
uexpire=
|
|
|
|
upwexpire=
|
2024-04-19 17:11:16 +02:00
|
|
|
shells="$(valid_shells)"
|
2002-12-03 06:41:09 +01:00
|
|
|
passwdtype="yes"
|
|
|
|
msgfile=/etc/adduser.msg
|
|
|
|
msgflag=
|
|
|
|
quietflag=
|
|
|
|
configflag=
|
|
|
|
fflag=
|
|
|
|
infile=
|
|
|
|
disableflag=
|
2004-03-16 14:46:29 +01:00
|
|
|
Dflag=
|
|
|
|
Sflag=
|
2024-04-11 20:11:18 +02:00
|
|
|
Zcreate="yes"
|
2002-12-03 06:41:09 +01:00
|
|
|
readconfig="yes"
|
|
|
|
homeprefix="/home"
|
|
|
|
randompass=
|
|
|
|
fileline=
|
|
|
|
savedpwtype=
|
|
|
|
defaultclass=
|
2003-03-20 17:36:03 +01:00
|
|
|
defaultLgroup=
|
2003-06-24 17:20:43 +02:00
|
|
|
defaultgroups=
|
2002-12-03 06:41:09 +01:00
|
|
|
defaultshell="${DEFAULTSHELL}"
|
2008-01-27 11:15:36 +01:00
|
|
|
defaultHomePerm=
|
2024-04-11 20:11:18 +02:00
|
|
|
zfsopt=
|
|
|
|
Zencrypt="no"
|
2002-12-03 06:41:09 +01:00
|
|
|
|
|
|
|
# Make sure the user running this program is root. This isn't a security
|
2010-01-14 23:04:08 +01:00
|
|
|
# measure as much as it is a useful method of reminding the user to
|
2002-12-03 06:41:09 +01:00
|
|
|
# 'su -' before he/she wastes time entering data that won't be saved.
|
|
|
|
#
|
2024-04-19 17:11:16 +02:00
|
|
|
procowner=${procowner:-$(/usr/bin/id -u)}
|
2002-12-03 06:41:09 +01:00
|
|
|
if [ "$procowner" != "0" ]; then
|
|
|
|
err 'you must be the super-user (uid 0) to use this utility.'
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2011-12-30 11:58:14 +01:00
|
|
|
# Override from our conf file
|
2002-12-03 06:41:09 +01:00
|
|
|
# Quickly go through the commandline line to see if we should read
|
|
|
|
# from our configuration file. The actual parsing of the commandline
|
|
|
|
# arguments happens after we read in our configuration file (commandline
|
|
|
|
# should override configuration file).
|
|
|
|
#
|
|
|
|
for _i in $* ; do
|
|
|
|
if [ "$_i" = "-N" ]; then
|
|
|
|
readconfig=
|
|
|
|
break;
|
|
|
|
fi
|
|
|
|
done
|
2024-04-19 17:11:16 +02:00
|
|
|
if [ -n "$readconfig" ] && [ -r "${ADDUSERCONF}" ]; then
|
|
|
|
. "${ADDUSERCONF}"
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|
|
|
|
|
2011-12-30 11:58:14 +01:00
|
|
|
# Process command-line options
|
2002-12-03 06:41:09 +01:00
|
|
|
#
|
|
|
|
for _switch ; do
|
|
|
|
case $_switch in
|
|
|
|
-L)
|
|
|
|
defaultclass="$2"
|
|
|
|
shift; shift
|
|
|
|
;;
|
|
|
|
-C)
|
|
|
|
configflag=yes
|
|
|
|
shift
|
|
|
|
;;
|
2004-03-16 14:46:29 +01:00
|
|
|
-D)
|
|
|
|
Dflag=yes
|
|
|
|
shift
|
|
|
|
;;
|
2002-12-03 06:41:09 +01:00
|
|
|
-E)
|
|
|
|
disableflag=yes
|
|
|
|
shift
|
|
|
|
;;
|
|
|
|
-k)
|
|
|
|
udotdir="$2"
|
|
|
|
shift; shift
|
|
|
|
;;
|
|
|
|
-f)
|
|
|
|
[ "$2" != "-" ] && infile="$2"
|
|
|
|
fflag=yes
|
|
|
|
shift; shift
|
|
|
|
;;
|
2003-03-20 17:36:03 +01:00
|
|
|
-g)
|
|
|
|
defaultLgroup="$2"
|
|
|
|
shift; shift
|
|
|
|
;;
|
2002-12-03 06:41:09 +01:00
|
|
|
-G)
|
|
|
|
defaultgroups="$2"
|
|
|
|
shift; shift
|
|
|
|
;;
|
|
|
|
-h)
|
|
|
|
show_usage
|
|
|
|
exit 0
|
|
|
|
;;
|
|
|
|
-d)
|
|
|
|
homeprefix="$2"
|
|
|
|
shift; shift
|
|
|
|
;;
|
|
|
|
-m)
|
|
|
|
case "$2" in
|
|
|
|
[Nn][Oo])
|
|
|
|
msgflag=
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
msgflag=yes
|
|
|
|
msgfile="$2"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
shift; shift
|
|
|
|
;;
|
2008-01-27 11:15:36 +01:00
|
|
|
-M)
|
|
|
|
defaultHomePerm=$2
|
|
|
|
shift; shift
|
|
|
|
;;
|
2002-12-03 06:41:09 +01:00
|
|
|
-N)
|
|
|
|
readconfig=
|
|
|
|
shift
|
|
|
|
;;
|
|
|
|
-w)
|
|
|
|
case "$2" in
|
|
|
|
no|none|random|yes)
|
|
|
|
passwdtype=$2
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
show_usage
|
|
|
|
exit 1
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
shift; shift
|
|
|
|
;;
|
|
|
|
-q)
|
|
|
|
quietflag=yes
|
|
|
|
shift
|
|
|
|
;;
|
|
|
|
-s)
|
2024-04-19 17:11:16 +02:00
|
|
|
defaultshell="$(fullpath_from_shell $2)"
|
2002-12-03 06:41:09 +01:00
|
|
|
shift; shift
|
|
|
|
;;
|
2004-03-16 14:46:29 +01:00
|
|
|
-S)
|
|
|
|
Sflag=yes
|
|
|
|
shift
|
|
|
|
;;
|
2002-12-03 06:41:09 +01:00
|
|
|
-u)
|
|
|
|
uidstart=$2
|
|
|
|
shift; shift
|
|
|
|
;;
|
2024-04-11 20:11:18 +02:00
|
|
|
-Z)
|
|
|
|
Zcreate="no"
|
|
|
|
shift
|
|
|
|
;;
|
2002-12-03 06:41:09 +01:00
|
|
|
esac
|
|
|
|
done
|
|
|
|
|
|
|
|
# If the -f switch was used, get input from a file. Otherwise,
|
|
|
|
# this is an interactive session.
|
|
|
|
#
|
|
|
|
if [ -n "$fflag" ]; then
|
|
|
|
if [ -z "$infile" ]; then
|
|
|
|
input_from_file
|
|
|
|
elif [ -n "$infile" ]; then
|
|
|
|
if [ -r "$infile" ]; then
|
|
|
|
input_from_file < $infile
|
|
|
|
else
|
|
|
|
err "File ($infile) is unreadable or does not exist."
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
input_interactive
|
2003-01-24 01:24:26 +01:00
|
|
|
while : ; do
|
2024-05-06 18:18:47 +02:00
|
|
|
_another_user="no"
|
2003-03-19 09:07:15 +01:00
|
|
|
if [ -z "$configflag" ]; then
|
2023-07-18 19:37:48 +02:00
|
|
|
echo -n "Add another user? (yes/no) [$_another_user]: "
|
2003-03-19 09:07:15 +01:00
|
|
|
else
|
2023-07-18 19:37:48 +02:00
|
|
|
echo -n "Re-edit the default configuration? (yes/no) [$_another_user]: "
|
2003-03-19 09:07:15 +01:00
|
|
|
fi
|
2003-01-24 01:24:26 +01:00
|
|
|
read _input
|
2023-07-18 19:37:48 +02:00
|
|
|
if [ -z "$_input" ]; then
|
|
|
|
_input=$_another_user
|
|
|
|
fi
|
2003-01-24 01:24:26 +01:00
|
|
|
case $_input in
|
|
|
|
[Yy][Ee][Ss]|[Yy][Ee]|[Yy])
|
2024-04-19 17:11:16 +02:00
|
|
|
uidstart=$(get_nextuid $uidstart)
|
2003-01-24 01:24:26 +01:00
|
|
|
input_interactive
|
|
|
|
continue
|
|
|
|
;;
|
|
|
|
[Nn][Oo]|[Nn])
|
|
|
|
echo "Goodbye!"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
continue
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
break
|
|
|
|
done
|
2002-12-03 06:41:09 +01:00
|
|
|
fi
|