2008-12-23 03:22:43 +05:30
|
|
|
/*
|
2021-12-05 21:05:27 +05:30
|
|
|
* SPDX-FileCopyrightText: 2008 , Nicolas François
|
2008-12-23 03:22:43 +05:30
|
|
|
*
|
2021-12-05 21:05:27 +05:30
|
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
2008-12-23 03:22:43 +05:30
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
|
|
|
#include <assert.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
|
|
|
|
#include "defines.h"
|
|
|
|
#include "pwio.h"
|
|
|
|
#include "shadowio.h"
|
|
|
|
#include "prototypes.h"
|
2021-11-29 05:07:53 +05:30
|
|
|
#include "shadowlog.h"
|
2008-12-23 03:22:43 +05:30
|
|
|
|
|
|
|
/*
|
|
|
|
* cleanup_report_add_user - Report failure to add an user to the system
|
|
|
|
*
|
|
|
|
* It should be registered when it is decided to add an user to the system.
|
|
|
|
*/
|
|
|
|
void cleanup_report_add_user (void *user_name)
|
|
|
|
{
|
|
|
|
const char *name = (const char *)user_name;
|
|
|
|
|
|
|
|
SYSLOG ((LOG_ERR, "failed to add user %s", name));
|
|
|
|
#ifdef WITH_AUDIT
|
2021-11-29 05:07:53 +05:30
|
|
|
audit_logger (AUDIT_ADD_USER, log_get_progname(),
|
2008-12-23 03:22:43 +05:30
|
|
|
"",
|
|
|
|
name, AUDIT_NO_ID,
|
|
|
|
SHADOW_AUDIT_FAILURE);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void cleanup_report_mod_passwd (void *cleanup_info)
|
|
|
|
{
|
|
|
|
const struct cleanup_info_mod *info;
|
|
|
|
info = (const struct cleanup_info_mod *)cleanup_info;
|
|
|
|
|
|
|
|
SYSLOG ((LOG_ERR,
|
|
|
|
"failed to change %s (%s)",
|
|
|
|
pw_dbname (),
|
|
|
|
info->action));
|
|
|
|
#ifdef WITH_AUDIT
|
2021-11-29 05:07:53 +05:30
|
|
|
audit_logger (AUDIT_USER_ACCT, log_get_progname(),
|
2008-12-23 03:22:43 +05:30
|
|
|
info->audit_msg,
|
|
|
|
info->name, AUDIT_NO_ID,
|
|
|
|
SHADOW_AUDIT_FAILURE);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* cleanup_report_add_user_passwd - Report failure to add an user to
|
|
|
|
* /etc/passwd
|
|
|
|
*
|
|
|
|
* It should be registered when it is decided to add an user to the
|
|
|
|
* /etc/passwd database.
|
|
|
|
*/
|
|
|
|
void cleanup_report_add_user_passwd (void *user_name)
|
|
|
|
{
|
|
|
|
const char *name = (const char *)user_name;
|
|
|
|
|
|
|
|
SYSLOG ((LOG_ERR, "failed to add user %s to %s", name, pw_dbname ()));
|
|
|
|
#ifdef WITH_AUDIT
|
2021-11-29 05:07:53 +05:30
|
|
|
audit_logger (AUDIT_ADD_USER, log_get_progname(),
|
2008-12-23 03:22:43 +05:30
|
|
|
"adding user to /etc/passwd",
|
|
|
|
name, AUDIT_NO_ID,
|
|
|
|
SHADOW_AUDIT_FAILURE);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* cleanup_report_add_user_shadow - Report failure to add an user to
|
|
|
|
* /etc/shadow
|
|
|
|
*
|
|
|
|
* It should be registered when it is decided to add an user to the
|
|
|
|
* /etc/shadow database.
|
|
|
|
*/
|
|
|
|
void cleanup_report_add_user_shadow (void *user_name)
|
|
|
|
{
|
|
|
|
const char *name = (const char *)user_name;
|
|
|
|
|
|
|
|
SYSLOG ((LOG_ERR, "failed to add user %s to %s", name, spw_dbname ()));
|
|
|
|
#ifdef WITH_AUDIT
|
2021-11-29 05:07:53 +05:30
|
|
|
audit_logger (AUDIT_ADD_USER, log_get_progname(),
|
2008-12-23 03:22:43 +05:30
|
|
|
"adding user to /etc/shadow",
|
|
|
|
name, AUDIT_NO_ID,
|
|
|
|
SHADOW_AUDIT_FAILURE);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* cleanup_unlock_passwd - Unlock the /etc/passwd database
|
|
|
|
*
|
|
|
|
* It should be registered after the passwd database is successfully locked.
|
|
|
|
*/
|
|
|
|
void cleanup_unlock_passwd (unused void *arg)
|
|
|
|
{
|
|
|
|
if (pw_unlock () == 0) {
|
2021-11-29 05:07:53 +05:30
|
|
|
fprintf (log_get_logfd(),
|
2008-12-23 03:22:43 +05:30
|
|
|
_("%s: failed to unlock %s\n"),
|
2021-11-29 05:07:53 +05:30
|
|
|
log_get_progname(), pw_dbname ());
|
2008-12-23 03:22:43 +05:30
|
|
|
SYSLOG ((LOG_ERR, "failed to unlock %s", pw_dbname ()));
|
|
|
|
#ifdef WITH_AUDIT
|
|
|
|
audit_logger_message ("unlocking passwd file",
|
|
|
|
SHADOW_AUDIT_FAILURE);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* cleanup_unlock_shadow - Unlock the /etc/shadow database
|
|
|
|
*
|
|
|
|
* It should be registered after the shadow database is successfully locked.
|
|
|
|
*/
|
|
|
|
void cleanup_unlock_shadow (unused void *arg)
|
|
|
|
{
|
|
|
|
if (spw_unlock () == 0) {
|
2021-11-29 05:07:53 +05:30
|
|
|
fprintf (log_get_logfd(),
|
2008-12-23 03:22:43 +05:30
|
|
|
_("%s: failed to unlock %s\n"),
|
2021-11-29 05:07:53 +05:30
|
|
|
log_get_progname(), spw_dbname ());
|
2008-12-23 03:22:43 +05:30
|
|
|
SYSLOG ((LOG_ERR, "failed to unlock %s", spw_dbname ()));
|
|
|
|
#ifdef WITH_AUDIT
|
|
|
|
audit_logger_message ("unlocking shadow file",
|
|
|
|
SHADOW_AUDIT_FAILURE);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|